-
Global information
- Generated on Tue Jul 4 21:38:40 2023
- Log file: /home/vchalla/output/postgresql-2023-07-04_123503.log
- Parsed 70,087,566 log entries in 4h31m18s
- Log start from 2023-07-04 12:35:03 to 2023-07-04 18:49:31
-
Overview
Global Stats
- 5,269 Number of unique normalized queries
- 5,702,069 Number of queries
- 3h10m40s Total query duration
- 2023-07-04 12:35:03 First query
- 2023-07-04 18:49:31 Last query
- 35,600 queries/s at 2023-07-04 18:36:26 Query peak
- 3h10m40s Total query duration
- 4s780ms Prepare/parse total duration
- 1m15s Bind total duration
- 3h9m20s Execute total duration
- 1,199 Number of events
- 4 Number of unique normalized events
- 1,124 Max number of times the same event was reported
- 0 Number of cancellation
- 52 Total number of automatic vacuums
- 29 Total number of automatic analyzes
- 62 Number temporary file
- 79.55 MiB Max size of temporary file
- 1.28 MiB Average size of temporary file
- 9 Total number of sessions
- 1 sessions at 2023-07-04 18:41:16 Session peak
- 1s174ms Total duration of sessions
- 130ms Average duration of sessions
- 633,563 Average queries per session
- 21m11s Average queries duration per session
- 109 Total number of connections
- 20 connections/s at 2023-07-04 18:35:12 Connection peak
- 2 Total number of databases
SQL Traffic
Key values
- 35,600 queries/s Query Peak
- 2023-07-04 18:36:26 Date
SELECT Traffic
Key values
- 414 queries/s Query Peak
- 2023-07-04 18:41:14 Date
INSERT/UPDATE/DELETE Traffic
Key values
- 35,599 queries/s Query Peak
- 2023-07-04 18:36:26 Date
Queries duration
Key values
- 3h10m40s Total query duration
Prepared queries ratio
Key values
- 0.00 Ratio of bind vs prepare
- 0.00 % Ratio between prepared and "usual" statements
General Activity
Day Hour Count Min duration Max duration Avg duration Latency Percentile(90) Latency Percentile(95) Latency Percentile(99) Jul 04 12 1,800 0ms 0ms 0ms 1ms 1ms 1ms 13 4,320 0ms 0ms 0ms 1ms 1ms 1ms 14 4,320 0ms 0ms 0ms 1ms 1ms 1ms 15 4,320 0ms 0ms 0ms 1ms 1ms 1ms 16 4,320 0ms 0ms 0ms 1ms 1ms 1ms 17 4,320 0ms 0ms 0ms 1ms 1ms 1ms 18 5,678,669 0ms 6m7s 2ms 15m59s 24m49s 34m30s Day Hour SELECT COPY TO Average Duration Latency Percentile(90) Latency Percentile(95) Latency Percentile(99) Jul 04 12 0 0 0ms 0ms 0ms 0ms 13 0 0 0ms 0ms 0ms 0ms 14 0 0 0ms 0ms 0ms 0ms 15 0 0 0ms 0ms 0ms 0ms 16 0 0 0ms 0ms 0ms 0ms 17 0 0 0ms 0ms 0ms 0ms 18 6,128 0 0ms 0ms 5ms 251ms Day Hour INSERT UPDATE DELETE COPY FROM Average Duration Latency Percentile(90) Latency Percentile(95) Latency Percentile(99) Jul 04 12 0 0 0 0 0ms 0ms 0ms 0ms 13 0 0 0 0 0ms 0ms 0ms 0ms 14 0 0 0 0 0ms 0ms 0ms 0ms 15 0 0 0 0 0ms 0ms 0ms 0ms 16 0 0 0 0 0ms 0ms 0ms 0ms 17 0 0 0 0 0ms 0ms 0ms 0ms 18 5,660,216 0 19 0 1ms 0ms 6m7s 25m53s Day Hour Prepare Bind Bind/Prepare Percentage of prepare Jul 04 12 0 0 0.00 0.00% 13 0 0 0.00 0.00% 14 0 0 0.00 0.00% 15 0 0 0.00 0.00% 16 0 0 0.00 0.00% 17 0 0 0.00 0.00% 18 5,046 5,666,518 1,122.97 0.09% Day Hour Count Average / Second Jul 04 12 6 0.00/s 13 0 0.00/s 14 0 0.00/s 15 0 0.00/s 16 0 0.00/s 17 0 0.00/s 18 103 0.03/s Day Hour Count Average Duration Jul 04 12 0 0ms 13 0 0ms 14 0 0ms 15 0 0ms 16 0 0ms 17 0 0ms 18 9 130ms -
Connections
Established Connections
Key values
- 20 connections Connection Peak
- 2023-07-04 18:35:12 Date
Connections per database
Key values
- clair Main Database
- 109 connections Total
Connections per user
Key values
- libvuln Main User
- 109 connections Total
-
Sessions
Simultaneous sessions
Key values
- 1 sessions Session Peak
- 2023-07-04 18:41:16 Date
Histogram of session times
Key values
- 8 0-500ms duration
Sessions per database
Key values
- clair Main Database
- 9 sessions Total
Sessions per user
Key values
- clair Main User
- 9 sessions Total
Sessions per host
Key values
- 10.128.3.69 Main Host
- 9 sessions Total
-
Checkpoints / Restartpoints
Checkpoints Buffers
Key values
- 5,180 buffers Checkpoint Peak
- 2023-07-04 18:36:24 Date
- 238.625 seconds Highest write time
- 34.844 seconds Sync time
Checkpoints Wal files
Key values
- 32 files Wal files usage Peak
- 2023-07-04 18:43:59 Date
Checkpoints distance
Key values
- 3,331.57 Mo Distance Peak
- 2023-07-04 18:39:43 Date
Checkpoints Activity
Day Hour Written buffers Write time Sync time Total time Jul 04 12 2,385 238.625s 0.003s 238.643s 13 0 0s 0s 0s 14 0 0s 0s 0s 15 0 0s 0s 0s 16 0 0s 0s 0s 17 0 0s 0s 0s 18 54,903 567.752s 227.714s 832.211s Day Hour Added Removed Recycled Synced files Longest sync Average sync Jul 04 12 0 2 0 29 0.003s 0.001s 13 0 0 0 0 0s 0s 14 0 0 0 0 0s 0s 15 0 0 0 0 0s 0s 16 0 0 0 0 0s 0s 17 0 0 0 0 0s 0s 18 0 520 602 842 14.753s 6.368s Day Hour Count Avg time (sec) Jul 04 12 0 0s 13 0 0s 14 0 0s 15 0 0s 16 0 0s 17 0 0s 18 0 0s Day Hour Mean distance Mean estimate Jul 04 12 34,774.00 kB 34,774.00 kB 13 0.00 kB 0.00 kB 14 0.00 kB 0.00 kB 15 0.00 kB 0.00 kB 16 0.00 kB 0.00 kB 17 0.00 kB 0.00 kB 18 699,217.59 kB 1,062,938.18 kB -
Temporary Files
Size of temporary files
Key values
- 4.99 MiB Temp Files size Peak
- 2023-07-04 18:46:28 Date
Number of temporary files
Key values
- 3 per second Temp Files Peak
- 2023-07-04 18:46:28 Date
Temporary Files Activity
Day Hour Count Total size Average size Jul 04 12 0 0 0 13 0 0 0 14 0 0 0 15 0 0 0 16 0 0 0 17 0 0 0 18 62 79.55 MiB 1.28 MiB Queries generating the most temporary files (N)
Rank Count Total size Min size Max size Avg size Query 1 1 79.55 MiB 79.55 MiB 79.55 MiB 79.55 MiB delete from vuln v1 using vuln v2 left join uo_vuln uvl on v2.id = uvl.vuln where uvl.vuln is null and v2.updater = ? and v1.id = v2.id;-
DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id;
Date: 2023-07-04 18:46:12 Duration: 0ms
Queries generating the largest temporary files
Rank Size Query 1 79.55 MiB DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id;[ Date: 2023-07-04 18:46:17 ]
-
Vacuums
Vacuums / Analyzes Distribution
Key values
- 0 sec Highest CPU-cost vacuum
Table
Database - Date
- 0 sec Highest CPU-cost analyze
Table
Database - Date
Analyzes per table
Key values
- public.uo_vuln (11) Main table analyzed (database clair)
- 29 analyzes Total
Vacuums per table
Key values
- pg_toast.pg_toast_2619 (11) Main table vacuumed on database clair
- 52 vacuums Total
Index Buffer usage Skipped WAL usage Table Vacuums scans hits misses dirtied pins frozen records full page bytes clair.pg_toast.pg_toast_2619 11 1 840 0 57 0 0 10 6 43,353 clair.public.updater_status 11 1 687 0 145 0 0 18 3 18,572 clair.pg_catalog.pg_statistic 10 1 565 0 121 0 0 42 18 84,869 clair.public.uo_vuln 9 1 156,857 0 34,432 0 0 20,376 6,705 25,147,836 clair.public.vuln 4 0 901,080 0 475,530 0 0 134,289 482 9,711,883 clair.pg_toast.pg_toast_16920 4 0 201,202 0 123,296 0 0 36,563 111 2,322,049 clair.public.enrichment 1 0 373,589 0 9,751 0 0 133,635 2,347 20,920,033 template1.pg_catalog.pg_statistic 1 1 57 0 30 0 0 66 27 139,174 clair.public.uo_enrich 1 0 1,122 0 1,107 0 0 1 0 188 Total 52 5 1,635,999 1,271,856 644,469 0 0 325,000 9,699 58,387,957 Tuples removed per table
Key values
- public.uo_vuln (429153) Main table with removed tuples on database clair
- 431516 tuples Total removed
Index Tuples Pages Table Vacuums scans removed remain not yet removable removed remain clair.public.uo_vuln 9 1 429,153 15,608,088 124,565 400 145,802 clair.public.vuln 4 0 1,640 8,129,337 0 0 1,165,646 clair.pg_toast.pg_toast_16920 4 0 440 1,483,468 0 0 284,467 template1.pg_catalog.pg_statistic 1 1 163 404 0 0 26 clair.pg_catalog.pg_statistic 10 1 113 6,721 1,952 0 443 clair.public.updater_status 11 1 6 17,041 12,497 0 451 clair.pg_toast.pg_toast_2619 11 1 1 2,889 2,221 0 640 clair.public.enrichment 1 0 0 132,436 0 0 8,113 clair.public.uo_enrich 1 0 0 132,436 0 0 1,104 Total 52 5 431,516 25,512,820 141,235 400 1,606,692 Pages removed per table
Key values
- public.uo_vuln (400) Main table with removed pages on database clair
- 400 pages Total removed
Table Number of vacuums Index scans Tuples removed Pages removed clair.public.uo_vuln 9 1 429153 400 clair.pg_toast.pg_toast_2619 11 1 1 0 clair.public.enrichment 1 0 0 0 clair.public.updater_status 11 1 6 0 template1.pg_catalog.pg_statistic 1 1 163 0 clair.public.uo_enrich 1 0 0 0 clair.public.vuln 4 0 1640 0 clair.pg_toast.pg_toast_16920 4 0 440 0 clair.pg_catalog.pg_statistic 10 1 113 0 Total 52 5 431,516 400 Autovacuum Activity
Day Hour VACUUMs ANALYZEs Jul 04 12 4 4 13 0 0 14 0 0 15 0 0 16 0 0 17 0 0 18 48 25 - 0 sec Highest CPU-cost vacuum
-
Locks
Locks by types
Key values
- ShareLock Main Lock Type
- 70 locks Total
Most frequent waiting queries (N)
Rank Count Total time Min time Max time Avg duration Query 1 1 4m26s 4m26s 4m26s 4m26s delete from vuln v1 using vuln v2 left join uo_vuln uvl on v2.id = uvl.vuln where uvl.vuln is null and v2.updater = ? and v1.id = v2.id;-
DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id;
Date: 2023-07-04 18:46:12
2 68 3m1s 1s97ms 7s330ms 2s674ms insert into vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?[...]-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30)), ($31, $32, $33, $34, $35, $36, $37, $38, $39, $40, $41, $42, $43, $44, $45, $46, $47, $48, $49, $50, $51, $52, $53, $54, $55, $56, $57, $58, VersionRange($59, $60)), ($61, $62, $63, $64, $65, $66, $67, $68, $69, $70, $71, $72, $73, $74, $75, $76, $77, $78, $79, $80, $81, $82, $83, $84, $85, $86, $87, $88, VersionRange($89, $90)), ($91, $92, $93, $94, $95, $96, $97, $98, $99, $100, $101, $102, $103, $104, $105, $106, $107, $108, $109, $110, $111, $112, $113, $114, $115, $116, $117, $118, VersionRange($119, $120)), ($121, $122, $123, $124, $125, $126, $127, $128, $129, $130, $131, $132, $133, $134, $135, $136, $137, $138, $139, $140, $141, $142, $143, $144, $145, $146, $147, $148, VersionRange($149, $150)), ($151, $152, $153, $154, $155, $156, $157, $158, $159, $160, $161, $162, $163, $164, $165, $166, $167, $168, $169, $170, $171, $172, $173, $174, $175, $176, $177, $178, VersionRange($179, $180)), ($181, $182, $183, $184, $185, $186, $187, $188, $189, $190, $191, $192, $193, $194, $195, $196, $197, $198, $199, $200, $201, $202, $203, $204, $205, $206, $207, $208, VersionRange($209, $210)), ($211, $212, $213, $214, $215, $216, $217, $218, $219, $220, $221, $222, $223, $224, $225, $226, $227, $228, $229, $230, $231, $232, $233, $234, $235, $236, $237, $238, VersionRange($239, $240)), ($241, $242, $243, $244, $245, $246, $247, $248, $249, $250, $251, $252, $253, $254, $255, $256, $257, $258, $259, $260, $261, $262, $263, $264, $265, $266, $267, $268, VersionRange($269, $270)), ($271, $272, $273, $274, $275, $276, $277, $278, $279, $280, $281, $282, $283, $284, $285, $286, $287, $288, $289, $290, $291, $292, $293, $294, $295, $296, $297, $298, VersionRange($299, $300)), ($301, $302, $303, $304, $305, $306, $307, $308, $309, $310, $311, $312, $313, $314, $315, $316, $317, $318, $319, $320, $321, $322, $323, $324, $325, $326, $327, $328, VersionRange($329, $330)), ($331, $332, $333, $334, $335, $336, $337, $338, $339, $340, $341, $342, $343, $344, $345, $346, $347, $348, $349, $350, $351, $352, $353, $354, $355, $356, $357, $358, VersionRange($359, $360)), ($361, $362, $363, $364, $365, $366, $367, $368, $369, $370, $371, $372, $373, $374, $375, $376, $377, $378, $379, $380, $381, $382, $383, $384, $385, $386, $387, $388, VersionRange($389, $390)), ($391, $392, $393, $394, $395, $396, $397, $398, $399, $400, $401, $402, $403, $404, $405, $406, $407, $408, $409, $410, $411, $412, $413, $414, $415, $416, $417, $418, VersionRange($419, $420)), ($421, $422, $423, $424, $425, $426, $427, $428, $429, $430, $431, $432, $433, $434, $435, $436, $437, $438, $439, $440, $441, $442, $443, $444, $445, $446, $447, $448, VersionRange($449, $450)), ($451, $452, $453, $454, $455, $456, $457, $458, $459, $460, $461, $462, $463, $464, $465, $466, $467, $468, $469, $470, $471, $472, $473, $474, $475, $476, $477, $478, VersionRange($479, $480)), ($481, $482, $483, $484, $485, $486, $487, $488, $489, $490, $491, $492, $493, $494, $495, $496, $497, $498, $499, $500, $501, $502, $503, $504, $505, $506, $507, $508, VersionRange($509, $510)), ($511, $512, $513, $514, $515, $516, $517, $518, $519, $520, $521, $522, $523, $524, $525, $526, $527, $528, $529, $530, $531, $532, $533, $534, $535, $536, $537, $538, VersionRange($539, $540)), ($541, $542, $543, $544, $545, $546, $547, $548, $549, $550, $551, $552, $553, $554, $555, $556, $557, $558, $559, $560, $561, $562, $563, $564, $565, $566, $567, $568, VersionRange($569, $570)), ($571, $572, $573, $574, $575, $576, $577, $578, $579, $580, $581, $582, $583, $584, $585, $586, $587, $588, $589, $590, $591, $592, $593, $594, $595, $596, $597, $598, VersionRange($599, $600)), ($601, $602, $603, $604, $605, $606, $607, $608, $609, $610, $611, $612, $613, $614, $615, $616, $617, $618, $619, $620, $621, $622, $623, $624, $625, $626, $627, $628, VersionRange($629, $630)), ($631, $632, $633, $634, $635, $636, $637, $638, $639, $640, $641, $642, $643, $644, $645, $646, $647, $648, $649, $650, $651, $652, $653, $654, $655, $656, $657, $658, VersionRange($659, $660)), ($661, $662, $663, $664, $665, $666, $667, $668, $669, $670, $671, $672, $673, $674, $675, $676, $677, $678, $679, $680, $681, $682, $683, $684, $685, $686, $687, $688, VersionRange($689, $690)), ($691, $692, $693, $694, $695, $696, $697, $698, $699, $700, $701, $702, $703, $704, $705, $706, $707, $708, $709, $710, $711, $712, $713, $714, $715, $716, $717, $718, VersionRange($719, $720)), ($721, $722, $723, $724, $725, $726, $727, $728, $729, $730, $731, $732, $733, $734, $735, $736, $737, $738, $739, $740, $741, $742, $743, $744, $745, $746, $747, $748, VersionRange($749, $750)), ($751, $752, $753, $754, $755, $756, $757, $758, $759, $760, $761, $762, $763, $764, $765, $766, $767, $768, $769, $770, $771, $772, $773, $774, $775, $776, $777, $778, VersionRange($779, $780)), ($781, $782, $783, $784, $785, $786, $787, $788, $789, $790, $791, $792, $793, $794, $795, $796, $797, $798, $799, $800, $801, $802, $803, $804, $805, $806, $807, $808, VersionRange($809, $810)), ($811, $812, $813, $814, $815, $816, $817, $818, $819, $820, $821, $822, $823, $824, $825, $826, $827, $828, $829, $830, $831, $832, $833, $834, $835, $836, $837, $838, VersionRange($839, $840)), ($841, $842, $843, $844, $845, $846, $847, $848, $849, $850, $851, $852, $853, $854, $855, $856, $857, $858, $859, $860, $861, $862, $863, $864, $865, $866, $867, $868, VersionRange($869, $870)), ($871, $872, $873, $874, $875, $876, $877, $878, $879, $880, $881, $882, $883, $884, $885, $886, $887, $888, $889, $890, $891, $892, $893, $894, $895, $896, $897, $898, VersionRange($899, $900)), ($901, $902, $903, $904, $905, $906, $907, $908, $909, $910, $911, $912, $913, $914, $915, $916, $917, $918, $919, $920, $921, $922, $923, $924, $925, $926, $927, $928, VersionRange($929, $930)), ($931, $932, $933, $934, $935, $936, $937, $938, $939, $940, $941, $942, $943, $944, $945, $946, $947, $948, $949, $950, $951, $952, $953, $954, $955, $956, $957, $958, VersionRange($959, $960)), ($961, $962, $963, $964, $965, $966, $967, $968, $969, $970, $971, $972, $973, $974, $975, $976, $977, $978, $979, $980, $981, $982, $983, $984, $985, $986, $987, $988, VersionRange($989, $990)), ($991, $992, $993, $994, $995, $996, $997, $998, $999, $1000, $1001, $1002, $1003, $1004, $1005, $1006, $1007, $1008, $1009, $1010, $1011, $1012, $1013, $1014, $1015, $1016, $1017, $1018, VersionRange($1019, $1020)), ($1021, $1022, $1023, $1024, $1025, $1026, $1027, $1028, $1029, $1030, $1031, $1032, $1033, $1034, $1035, $1036, $1037, $1038, $1039, $1040, $1041, $1042, $1043, $1044, $1045, $1046, $1047, $1048, VersionRange($1049, $1050)), ($1051, $1052, $1053, $1054, $1055, $1056, $1057, $1058, $1059, $1060, $1061, $1062, $1063, $1064, $1065, $1066, $1067, $1068, $1069, $1070, $1071, $1072, $1073, $1074, $1075, $1076, $1077, $1078, VersionRange($1079, $1080)), ($1081, $1082, $1083, $1084, $1085, $1086, $1087, $1088, $1089, $1090, $1091, $1092, $1093, $1094, $1095, $1096, $1097, $1098, $1099, $1100, $1101, $1102, $1103, $1104, $1105, $1106, $1107, $1108, VersionRange($1109, $1110)), ($1111, $1112, $1113, $1114, $1115, $1116, $1117, $1118, $1119, $1120, $1121, $1122, $1123, $1124, $1125, $1126, $1127, $1128, $1129, $1130, $1131, $1132, $1133, $1134, $1135, $1136, $1137, $1138, VersionRange($1139, $1140)), ($1141, $1142, $1143, $1144, $1145, $1146, $1147, $1148, $1149, $1150, $1151, $1152, $1153, $1154, $1155, $1156, $1157, $1158, $1159, $1160, $1161, $1162, $1163, $1164, $1165, $1166, $1167, $1168, VersionRange($1169, $1170)), ($1171, $1172, $1173, $1174, $1175, $1176, $1177, $1178, $1179, $1180, $1181, $1182, $1183, $1184, $1185, $1186, $1187, $1188, $1189, $1190, $1191, $1192, $1193, $1194, $1195, $1196, $1197, $1198, VersionRange($1199, $1200)), ($1201, $1202, $1203, $1204, $1205, $1206, $1207, $1208, $1209, $1210, $1211, $1212, $1213, $1214, $1215, $1216, $1217, $1218, $1219, $1220, $1221, $1222, $1223, $1224, $1225, $1226, $1227, $1228, VersionRange($1229, $1230)), ($1231, $1232, $1233, $1234, $1235, $1236, $1237, $1238, $1239, $1240, $1241, $1242, $1243, $1244, $1245, $1246, $1247, $1248, $1249, $1250, $1251, $1252, $1253, $1254, $1255, $1256, $1257, $1258, VersionRange($1259, $1260)), ($1261, $1262, $1263, $1264, $1265, $1266, $1267, $1268, $1269, $1270, $1271, $1272, $1273, $1274, $1275, $1276, $1277, $1278, $1279, $1280, $1281, $1282, $1283, $1284, $1285, $1286, $1287, $1288, VersionRange($1289, $1290)), ($1291, $1292, $1293, $1294, $1295, $1296, $1297, $1298, $1299, $1300, $1301, $1302, $1303, $1304, $1305, $1306, $1307, $1308, $1309, $1310, $1311, $1312, $1313, $1314, $1315, $1316, $1317, $1318, VersionRange($1319, $1320)), ($1321, $1322, $1323, $1324, $1325, $1326, $1327, $1328, $1329, $1330, $1331, $1332, $1333, $1334, $1335, $1336, $1337, $1338, $1339, $1340, $1341, $1342, $1343, $1344, $1345, $1346, $1347, $1348, VersionRange($1349, $1350)), ($1351, $1352, $1353, $1354, $1355, $1356, $1357, $1358, $1359, $1360, $1361, $1362, $1363, $1364, $1365, $1366, $1367, $1368, $1369, $1370, $1371, $1372, $1373, $1374, $1375, $1376, $1377, $1378, VersionRange($1379, $1380)), ($1381, $1382, $1383, $1384, $1385, $1386, $1387, $1388, $1389, $1390, $1391, $1392, $1393, $1394, $1395, $1396, $1397, $1398, $1399, $1400, $1401, $1402, $1403, $1404, $1405, $1406, $1407, $1408, VersionRange($1409, $1410)), ($1411, $1412, $1413, $1414, $1415, $1416, $1417, $1418, $1419, $1420, $1421, $1422, $1423, $1424, $1425, $1426, $1427, $1428, $1429, $1430, $1431, $1432, $1433, $1434, $1435, $1436, $1437, $1438, VersionRange($1439, $1440)), ($1441, $1442, $1443, $1444, $1445, $1446, $1447, $1448, $1449, $1450, $1451, $1452, $1453, $1454, $1455, $1456, $1457, $1458, $1459, $1460, $1461, $1462, $1463, $1464, $1465, $1466, $1467, $1468, VersionRange($1469, $1470)), ($1471, $1472, $1473, $1474, $1475, $1476, $1477, $1478, $1479, $1480, $1481, $1482, $1483, $1484, $1485, $1486, $1487, $1488, $1489, $1490, $1491, $1492, $1493, $1494, $1495, $1496, $1497, $1498, VersionRange($1499, $1500)), ($1501, $1502, $1503, $1504, $1505, $1506, $1507, $1508, $1509, $1510, $1511, $1512, $1513, $1514, $1515, $1516, $1517, $1518, $1519, $1520, $1521, $1522, $1523, $1524, $1525, $1526, $1527, $1528, VersionRange($1529, $1530)), ($1531, $1532, $1533, $1534, $1535, $1536, $1537, $1538, $1539, $1540, $1541, $1542, $1543, $1544, $1545, $1546, $1547, $1548, $1549, $1550, $1551, $1552, $1553, $1554, $1555, $1556, $1557, $1558, VersionRange($1559, $1560)), ($1561, $1562, $1563, $1564, $1565, $1566, $1567, $1568, $1569, $1570, $1571, $1572, $1573, $1574, $1575, $1576, $1577, $1578, $1579, $1580, $1581, $1582, $1583, $1584, $1585, $1586, $1587, $1588, VersionRange($1589, $1590)), ($1591, $1592, $1593, $1594, $1595, $1596, $1597, $1598, $1599, $1600, $1601, $1602, $1603, $1604, $1605, $1606, $1607, $1608, $1609, $1610, $1611, $1612, $1613, $1614, $1615, $1616, $1617, $1618, VersionRange($1619, $1620)), ($1621, $1622, $1623, $1624, $1625, $1626, $1627, $1628, $1629, $1630, $1631, $1632, $1633, $1634, $1635, $1636, $1637, $1638, $1639, $1640, $1641, $1642, $1643, $1644, $1645, $1646, $1647, $1648, VersionRange($1649, $1650)), ($1651, $1652, $1653, $1654, $1655, $1656, $1657, $1658, $1659, $1660, $1661, $1662, $1663, $1664, $1665, $1666, $1667, $1668, $1669, $1670, $1671, $1672, $1673, $1674, $1675, $1676, $1677, $1678, VersionRange($1679, $1680)), ($1681, $1682, $1683, $1684, $1685, $1686, $1687, $1688, $1689, $1690, $1691, $1692, $1693, $1694, $1695, $1696, $1697, $1698, $1699, $1700, $1701, $1702, $1703, $1704, $1705, $1706, $1707, $1708, VersionRange($1709, $1710)), ($1711, $1712, $1713, $1714, $1715, $1716, $1717, $1718, $1719, $1720, $1721, $1722, $1723, $1724, $1725, $1726, $1727, $1728, $1729, $1730, $1731, $1732, $1733, $1734, $1735, $1736, $1737, $1738, VersionRange($1739, $1740)), ($1741, $1742, $1743, $1744, $1745, $1746, $1747, $1748, $1749, $1750, $1751, $1752, $1753, $1754, $1755, $1756, $1757, $1758, $1759, $1760, $1761, $1762, $1763, $1764, $1765, $1766, $1767, $1768, VersionRange($1769, $1770)), ($1771, $1772, $1773, $1774, $1775, $1776, $1777, $1778, $1779, $1780, $1781, $1782, $1783, $1784, $1785, $1786, $1787, $1788, $1789, $1790, $1791, $1792, $1793, $1794, $1795, $1796, $1797, $1798, VersionRange($1799, $1800)), ($1801, $1802, $1803, $1804, $1805, $1806, $1807, $1808, $1809, $1810, $1811, $1812, $1813, $1814, $1815, $1816, $1817, $1818, $1819, $1820, $1821, $1822, $1823, $1824, $1825, $1826, $1827, $1828, VersionRange($1829, $1830)), ($1831, $1832, $1833, $1834, $1835, $1836, $1837, $1838, $1839, $1840, $1841, $1842, $1843, $1844, $1845, $1846, $1847, $1848, $1849, $1850, $1851, $1852, $1853, $1854, $1855, $1856, $1857, $1858, VersionRange($1859, $1860)), ($1861, $1862, $1863, $1864, $1865, $1866, $1867, $1868, $1869, $1870, $1871, $1872, $1873, $1874, $1875, $1876, $1877, $1878, $1879, $1880, $1881, $1882, $1883, $1884, $1885, $1886, $1887, $1888, VersionRange($1889, $1890)), ($1891, $1892, $1893, $1894, $1895, $1896, $1897, $1898, $1899, $1900, $1901, $1902, $1903, $1904, $1905, $1906, $1907, $1908, $1909, $1910, $1911, $1912, $1913, $1914, $1915, $1916, $1917, $1918, VersionRange($1919, $1920)), ($1921, $1922, $1923, $1924, $1925, $1926, $1927, $1928, $1929, $1930, $1931, $1932, $1933, $1934, $1935, $1936, $1937, $1938, $1939, $1940, $1941, $1942, $1943, $1944, $1945, $1946, $1947, $1948, VersionRange($1949, $1950)), ($1951, $1952, $1953, $1954, $1955, $1956, $1957, $1958, $1959, $1960, $1961, $1962, $1963, $1964, $1965, $1966, $1967, $1968, $1969, $1970, $1971, $1972, $1973, $1974, $1975, $1976, $1977, $1978, VersionRange($1979, $1980)), ($1981, $1982, $1983, $1984, $1985, $1986, $1987, $1988, $1989, $1990, $1991, $1992, $1993, $1994, $1995, $1996, $1997, $1998, $1999, $2000, $2001, $2002, $2003, $2004, $2005, $2006, $2007, $2008, VersionRange($2009, $2010)), ($2011, $2012, $2013, $2014, $2015, $2016, $2017, $2018, $2019, $2020, $2021, $2022, $2023, $2024, $2025, $2026, $2027, $2028, $2029, $2030, $2031, $2032, $2033, $2034, $2035, $2036, $2037, $2038, VersionRange($2039, $2040)), ($2041, $2042, $2043, $2044, $2045, $2046, $2047, $2048, $2049, $2050, $2051, $2052, $2053, $2054, $2055, $2056, $2057, $2058, $2059, $2060, $2061, $2062, $2063, $2064, $2065, $2066, $2067, $2068, VersionRange($2069, $2070)), ($2071, $2072, $2073, $2074, $2075, $2076, $2077, $2078, $2079, $2080, $2081, $2082, $2083, $2084, $2085, $2086, $2087, $2088, $2089, $2090, $2091, $2092, $2093, $2094, $2095, $2096, $2097, $2098, VersionRange($2099, $2100)), ($2101, $2102, $2103, $2104, $2105, $2106, $2107, $2108, $2109, $2110, $2111, $2112, $2113, $2114, $2115, $2116, $2117, $2118, $2119, $2120, $2121, $2122, $2123, $2124, $2125, $2126, $2127, $2128, VersionRange($2129, $2130)), ($2131, $2132, $2133, $2134, $2135, $2136, $2137, $2138, $2139, $2140, $2141, $2142, $2143, $2144, $2145, $2146, $2147, $2148, $2149, $2150, $2151, $2152, $2153, $2154, $2155, $2156, $2157, $2158, VersionRange($2159, $2160)), ($2161, $2162, $2163, $2164, $2165, $2166, $2167, $2168, $2169, $2170, $2171, $2172, $2173, $2174, $2175, $2176, $2177, $2178, $2179, $2180, $2181, $2182, $2183, $2184, $2185, $2186, $2187, $2188, VersionRange($2189, $2190)), ($2191, $2192, $2193, $2194, $2195, $2196, $2197, $2198, $2199, $2200, $2201, $2202, $2203, $2204, $2205, $2206, $2207, $2208, $2209, $2210, $2211, $2212, $2213, $2214, $2215, $2216, $2217, $2218, VersionRange($2219, $2220)), ($2221, $2222, $2223, $2224, $2225, $2226, $2227, $2228, $2229, $2230, $2231, $2232, $2233, $2234, $2235, $2236, $2237, $2238, $2239, $2240, $2241, $2242, $2243, $2244, $2245, $2246, $2247, $2248, VersionRange($2249, $2250)), ($2251, $2252, $2253, $2254, $2255, $2256, $2257, $2258, $2259, $2260, $2261, $2262, $2263, $2264, $2265, $2266, $2267, $2268, $2269, $2270, $2271, $2272, $2273, $2274, $2275, $2276, $2277, $2278, VersionRange($2279, $2280)), ($2281, $2282, $2283, $2284, $2285, $2286, $2287, $2288, $2289, $2290, $2291, $2292, $2293, $2294, $2295, $2296, $2297, $2298, $2299, $2300, $2301, $2302, $2303, $2304, $2305, $2306, $2307, $2308, VersionRange($2309, $2310)), ($2311, $2312, $2313, $2314, $2315, $2316, $2317, $2318, $2319, $2320, $2321, $2322, $2323, $2324, $2325, $2326, $2327, $2328, $2329, $2330, $2331, $2332, $2333, $2334, $2335, $2336, $2337, $2338, VersionRange($2339, $2340)), ($2341, $2342, $2343, $2344, $2345, $2346, $2347, $2348, $2349, $2350, $2351, $2352, $2353, $2354, $2355, $2356, $2357, $2358, $2359, $2360, $2361, $2362, $2363, $2364, $2365, $2366, $2367, $2368, VersionRange($2369, $2370)), ($2371, $2372, $2373, $2374, $2375, $2376, $2377, $2378, $2379, $2380, $2381, $2382, $2383, $2384, $2385, $2386, $2387, $2388, $2389, $2390, $2391, $2392, $2393, $2394, $2395, $2396, $2397, $2398, VersionRange($2399, $2400)), ($2401, $2402, $2403, $2404, $2405, $2406, $2407, $2408, $2409, $2410, $2411, $2412, $2413, $2414, $2415, $2416, $2417, $2418, $2419, $2420, $2421, $2422, $2423, $2424, $2425, $2426, $2427, $2428, VersionRange($2429, $2430)), ($2431, $2432, $2433, $2434, $2435, $2436, $2437, $2438, $2439, $2440, $2441, $2442, $2443, $2444, $2445, $2446, $2447, $2448, $2449, $2450, $2451, $2452, $2453, $2454, $2455, $2456, $2457, $2458, VersionRange($2459, $2460)), ($2461, $2462, $2463, $2464, $2465, $2466, $2467, $2468, $2469, $2470, $2471, $2472, $2473, $2474, $2475, $2476, $2477, $2478, $2479, $2480, $2481, $2482, $2483, $2484, $2485, $2486, $2487, $2488, VersionRange($2489, $2490)), ($2491, $2492, $2493, $2494, $2495, $2496, $2497, $2498, $2499, $2500, $2501, $2502, $2503, $2504, $2505, $2506, $2507, $2508, $2509, $2510, $2511, $2512, $2513, $2514, $2515, $2516, $2517, $2518, VersionRange($2519, $2520)), ($2521, $2522, $2523, $2524, $2525, $2526, $2527, $2528, $2529, $2530, $2531, $2532, $2533, $2534, $2535, $2536, $2537, $2538, $2539, $2540, $2541, $2542, $2543, $2544, $2545, $2546, $2547, $2548, VersionRange($2549, $2550)), ($2551, $2552, $2553, $2554, $2555, $2556, $2557, $2558, $2559, $2560, $2561, $2562, $2563, $2564, $2565, $2566, $2567, $2568, $2569, $2570, $2571, $2572, $2573, $2574, $2575, $2576, $2577, $2578, VersionRange($2579, $2580)), ($2581, $2582, $2583, $2584, $2585, $2586, $2587, $2588, $2589, $2590, $2591, $2592, $2593, $2594, $2595, $2596, $2597, $2598, $2599, $2600, $2601, $2602, $2603, $2604, $2605, $2606, $2607, $2608, VersionRange($2609, $2610)), ($2611, $2612, $2613, $2614, $2615, $2616, $2617, $2618, $2619, $2620, $2621, $2622, $2623, $2624, $2625, $2626, $2627, $2628, $2629, $2630, $2631, $2632, $2633, $2634, $2635, $2636, $2637, $2638, VersionRange($2639, $2640)), ($2641, $2642, $2643, $2644, $2645, $2646, $2647, $2648, $2649, $2650, $2651, $2652, $2653, $2654, $2655, $2656, $2657, $2658, $2659, $2660, $2661, $2662, $2663, $2664, $2665, $2666, $2667, $2668, VersionRange($2669, $2670)), ($2671, $2672, $2673, $2674, $2675, $2676, $2677, $2678, $2679, $2680, $2681, $2682, $2683, $2684, $2685, $2686, $2687, $2688, $2689, $2690, $2691, $2692, $2693, $2694, $2695, $2696, $2697, $2698, VersionRange($2699, $2700)), ($2701, $2702, $2703, $2704, $2705, $2706, $2707, $2708, $2709, $2710, $2711, $2712, $2713, $2714, $2715, $2716, $2717, $2718, $2719, $2720, $2721, $2722, $2723, $2724, $2725, $2726, $2727, $2728, VersionRange($2729, $2730)), ($2731, $2732, $2733, $2734, $2735, $2736, $2737, $2738, $2739, $2740, $2741, $2742, $2743, $2744, $2745, $2746, $2747, $2748, $2749, $2750, $2751, $2752, $2753, $2754, $2755, $2756, $2757, $2758, VersionRange($2759, $2760)), ($2761, $2762, $2763, $2764, $2765, $2766, $2767, $2768, $2769, $2770, $2771, $2772, $2773, $2774, $2775, $2776, $2777, $2778, $2779, $2780, $2781, $2782, $2783, $2784, $2785, $2786, $2787, $2788, VersionRange($2789, $2790)), ($2791, $2792, $2793, $2794, $2795, $2796, $2797, $2798, $2799, $2800, $2801, $2802, $2803, $2804, $2805, $2806, $2807, $2808, $2809, $2810, $2811, $2812, $2813, $2814, $2815, $2816, $2817, $2818, VersionRange($2819, $2820)), ($2821, $2822, $2823, $2824, $2825, $2826, $2827, $2828, $2829, $2830, $2831, $2832, $2833, $2834, $2835, $2836, $2837, $2838, $2839, $2840, $2841, $2842, $2843, $2844, $2845, $2846, $2847, $2848, VersionRange($2849, $2850)), ($2851, $2852, $2853, $2854, $2855, $2856, $2857, $2858, $2859, $2860, $2861, $2862, $2863, $2864, $2865, $2866, $2867, $2868, $2869, $2870, $2871, $2872, $2873, $2874, $2875, $2876, $2877, $2878, VersionRange($2879, $2880)), ($2881, $2882, $2883, $2884, $2885, $2886, $2887, $2888, $2889, $2890, $2891, $2892, $2893, $2894, $2895, $2896, $2897, $2898, $2899, $2900, $2901, $2902, $2903, $2904, $2905, $2906, $2907, $2908, VersionRange($2909, $2910)), ($2911, $2912, $2913, $2914, $2915, $2916, $2917, $2918, $2919, $2920, $2921, $2922, $2923, $2924, $2925, $2926, $2927, $2928, $2929, $2930, $2931, $2932, $2933, $2934, $2935, $2936, $2937, $2938, VersionRange($2939, $2940)), ($2941, $2942, $2943, $2944, $2945, $2946, $2947, $2948, $2949, $2950, $2951, $2952, $2953, $2954, $2955, $2956, $2957, $2958, $2959, $2960, $2961, $2962, $2963, $2964, $2965, $2966, $2967, $2968, VersionRange($2969, $2970)), ($2971, $2972, $2973, $2974, $2975, $2976, $2977, $2978, $2979, $2980, $2981, $2982, $2983, $2984, $2985, $2986, $2987, $2988, $2989, $2990, $2991, $2992, $2993, $2994, $2995, $2996, $2997, $2998, VersionRange($2999, $3000)), ($3001, $3002, $3003, $3004, $3005, $3006, $3007, $3008, $3009, $3010, $3011, $3012, $3013, $3014, $3015, $3016, $3017, $3018, $3019, $3020, $3021, $3022, $3023, $3024, $3025, $3026, $3027, $3028, VersionRange($3029, $3030)), ($3031, $3032, $3033, $3034, $3035, $3036, $3037, $3038, $3039, $3040, $3041, $3042, $3043, $3044, $3045, $3046, $3047, $3048, $3049, $3050, $3051, $3052, $3053, $3054, $3055, $3056, $3057, $3058, VersionRange($3059, $3060)), ($3061, $3062, $3063, $3064, $3065, $3066, $3067, $3068, $3069, $3070, $3071, $3072, $3073, $3074, $3075, $3076, $3077, $3078, $3079, $3080, $3081, $3082, $3083, $3084, $3085, $3086, $3087, $3088, VersionRange($3089, $3090)), ($3091, $3092, $3093, $3094, $3095, $3096, $3097, $3098, $3099, $3100, $3101, $3102, $3103, $3104, $3105, $3106, $3107, $3108, $3109, $3110, $3111, $3112, $3113, $3114, $3115, $3116, $3117, $3118, VersionRange($3119, $3120)), ($3121, $3122, $3123, $3124, $3125, $3126, $3127, $3128, $3129, $3130, $3131, $3132, $3133, $3134, $3135, $3136, $3137, $3138, $3139, $3140, $3141, $3142, $3143, $3144, $3145, $3146, $3147, $3148, VersionRange($3149, $3150)), ($3151, $3152, $3153, $3154, $3155, $3156, $3157, $3158, $3159, $3160, $3161, $3162, $3163, $3164, $3165, $3166, $3167, $3168, $3169, $3170, $3171, $3172, $3173, $3174, $3175, $3176, $3177, $3178, VersionRange($3179, $3180)), ($3181, $3182, $3183, $3184, $3185, $3186, $3187, $3188, $3189, $3190, $3191, $3192, $3193, $3194, $3195, $3196, $3197, $3198, $3199, $3200, $3201, $3202, $3203, $3204, $3205, $3206, $3207, $3208, VersionRange($3209, $3210)), ($3211, $3212, $3213, $3214, $3215, $3216, $3217, $3218, $3219, $3220, $3221, $3222, $3223, $3224, $3225, $3226, $3227, $3228, $3229, $3230, $3231, $3232, $3233, $3234, $3235, $3236, $3237, $3238, VersionRange($3239, $3240)), ($3241, $3242, $3243, $3244, $3245, $3246, $3247, $3248, $3249, $3250, $3251, $3252, $3253, $3254, $3255, $3256, $3257, $3258, $3259, $3260, $3261, $3262, $3263, $3264, $3265, $3266, $3267, $3268, VersionRange($3269, $3270)), ($3271, $3272, $3273, $3274, $3275, $3276, $3277, $3278, $3279, $3280, $3281, $3282, $3283, $3284, $3285, $3286, $3287, $3288, $3289, $3290, $3291, $3292, $3293, $3294, $3295, $3296, $3297, $3298, VersionRange($3299, $3300)), ($3301, $3302, $3303, $3304, $3305, $3306, $3307, $3308, $3309, $3310, $3311, $3312, $3313, $3314, $3315, $3316, $3317, $3318, $3319, $3320, $3321, $3322, $3323, $3324, $3325, $3326, $3327, $3328, VersionRange($3329, $3330)), ($3331, $3332, $3333, $3334, $3335, $3336, $3337, $3338, $3339, $3340, $3341, $3342, $3343, $3344, $3345, $3346, $3347, $3348, $3349, $3350, $3351, $3352, $3353, $3354, $3355, $3356, $3357, $3358, VersionRange($3359, $3360)), ($3361, $3362, $3363, $3364, $3365, $3366, $3367, $3368, $3369, $3370, $3371, $3372, $3373, $3374, $3375, $3376, $3377, $3378, $3379, $3380, $3381, $3382, $3383, $3384, $3385, $3386, $3387, $3388, VersionRange($3389, $3390)), ($3391, $3392, $3393, $3394, $3395, $3396, $3397, $3398, $3399, $3400, $3401, $3402, $3403, $3404, $3405, $3406, $3407, $3408, $3409, $3410, $3411, $3412, $3413, $3414, $3415, $3416, $3417, $3418, VersionRange($3419, $3420)), ($3421, $3422, $3423, $3424, $3425, $3426, $3427, $3428, $3429, $3430, $3431, $3432, $3433, $3434, $3435, $3436, $3437, $3438, $3439, $3440, $3441, $3442, $3443, $3444, $3445, $3446, $3447, $3448, VersionRange($3449, $3450)), ($3451, $3452, $3453, $3454, $3455, $3456, $3457, $3458, $3459, $3460, $3461, $3462, $3463, $3464, $3465, $3466, $3467, $3468, $3469, $3470, $3471, $3472, $3473, $3474, $3475, $3476, $3477, $3478, VersionRange($3479, $3480)), ($3481, $3482, $3483, $3484, $3485, $3486, $3487, $3488, $3489, $3490, $3491, $3492, $3493, $3494, $3495, $3496, $3497, $3498, $3499, $3500, $3501, $3502, $3503, $3504, $3505, $3506, $3507, $3508, VersionRange($3509, $3510)), ($3511, $3512, $3513, $3514, $3515, $3516, $3517, $3518, $3519, $3520, $3521, $3522, $3523, $3524, $3525, $3526, $3527, $3528, $3529, $3530, $3531, $3532, $3533, $3534, $3535, $3536, $3537, $3538, VersionRange($3539, $3540)), ($3541, $3542, $3543, $3544, $3545, $3546, $3547, $3548, $3549, $3550, $3551, $3552, $3553, $3554, $3555, $3556, $3557, $3558, $3559, $3560, $3561, $3562, $3563, $3564, $3565, $3566, $3567, $3568, VersionRange($3569, $3570)), ($3571, $3572, $3573, $3574, $3575, $3576, $3577, $3578, $3579, $3580, $3581, $3582, $3583, $3584, $3585, $3586, $3587, $3588, $3589, $3590, $3591, $3592, $3593, $3594, $3595, $3596, $3597, $3598, VersionRange($3599, $3600)), ($3601, $3602, $3603, $3604, $3605, $3606, $3607, $3608, $3609, $3610, $3611, $3612, $3613, $3614, $3615, $3616, $3617, $3618, $3619, $3620, $3621, $3622, $3623, $3624, $3625, $3626, $3627, $3628, VersionRange($3629, $3630)), ($3631, $3632, $3633, $3634, $3635, $3636, $3637, $3638, $3639, $3640, $3641, $3642, $3643, $3644, $3645, $3646, $3647, $3648, $3649, $3650, $3651, $3652, $3653, $3654, $3655, $3656, $3657, $3658, VersionRange($3659, $3660)), ($3661, $3662, $3663, $3664, $3665, $3666, $3667, $3668, $3669, $3670, $3671, $3672, $3673, $3674, $3675, $3676, $3677, $3678, $3679, $3680, $3681, $3682, $3683, $3684, $3685, $3686, $3687, $3688, VersionRange($3689, $3690)), ($3691, $3692, $3693, $3694, $3695, $3696, $3697, $3698, $3699, $3700, $3701, $3702, $3703, $3704, $3705, $3706, $3707, $3708, $3709, $3710, $3711, $3712, $3713, $3714, $3715, $3716, $3717, $3718, VersionRange($3719, $3720)), ($3721, $3722, $3723, $3724, $3725, $3726, $3727, $3728, $3729, $3730, $3731, $3732, $3733, $3734, $3735, $3736, $3737, $3738, $3739, $3740, $3741, $3742, $3743, $3744, $3745, $3746, $3747, $3748, VersionRange($3749, $3750)), ($3751, $3752, $3753, $3754, $3755, $3756, $3757, $3758, $3759, $3760, $3761, $3762, $3763, $3764, $3765, $3766, $3767, $3768, $3769, $3770, $3771, $3772, $3773, $3774, $3775, $3776, $3777, $3778, VersionRange($3779, $3780)), ($3781, $3782, $3783, $3784, $3785, $3786, $3787, $3788, $3789, $3790, $3791, $3792, $3793, $3794, $3795, $3796, $3797, $3798, $3799, $3800, $3801, $3802, $3803, $3804, $3805, $3806, $3807, $3808, VersionRange($3809, $3810)), ($3811, $3812, $3813, $3814, $3815, $3816, $3817, $3818, $3819, $3820, $3821, $3822, $3823, $3824, $3825, $3826, $3827, $3828, $3829, $3830, $3831, $3832, $3833, $3834, $3835, $3836, $3837, $3838, VersionRange($3839, $3840)), ($3841, $3842, $3843, $3844, $3845, $3846, $3847, $3848, $3849, $3850, $3851, $3852, $3853, $3854, $3855, $3856, $3857, $3858, $3859, $3860, $3861, $3862, $3863, $3864, $3865, $3866, $3867, $3868, VersionRange($3869, $3870)), ($3871, $3872, $3873, $3874, $3875, $3876, $3877, $3878, $3879, $3880, $3881, $3882, $3883, $3884, $3885, $3886, $3887, $3888, $3889, $3890, $3891, $3892, $3893, $3894, $3895, $3896, $3897, $3898, VersionRange($3899, $3900)), ($3901, $3902, $3903, $3904, $3905, $3906, $3907, $3908, $3909, $3910, $3911, $3912, $3913, $3914, $3915, $3916, $3917, $3918, $3919, $3920, $3921, $3922, $3923, $3924, $3925, $3926, $3927, $3928, VersionRange($3929, $3930)), ($3931, $3932, $3933, $3934, $3935, $3936, $3937, $3938, $3939, $3940, $3941, $3942, $3943, $3944, $3945, $3946, $3947, $3948, $3949, $3950, $3951, $3952, $3953, $3954, $3955, $3956, $3957, $3958, VersionRange($3959, $3960)), ($3961, $3962, $3963, $3964, $3965, $3966, $3967, $3968, $3969, $3970, $3971, $3972, $3973, $3974, $3975, $3976, $3977, $3978, $3979, $3980, $3981, $3982, $3983, $3984, $3985, $3986, $3987, $3988, VersionRange($3989, $3990)), ($3991, $3992, $3993, $3994, $3995, $3996, $3997, $3998, $3999, $4000, $4001, $4002, $4003, $4004, $4005, $4006, $4007, $4008, $4009, $4010, $4011, $4012, $4013, $4014, $4015, $4016, $4017, $4018, VersionRange($4019, $4020)), ($4021, $4022, $4023, $4024, $4025, $4026, $4027, $4028, $4029, $4030, $4031, $4032, $4033, $4034, $4035, $4036, $4037, $4038, $4039, $4040, $4041, $4042, $4043, $4044, $4045, $4046, $4047, $4048, VersionRange($4049, $4050)), ($4051, $4052, $4053, $4054, $4055, $4056, $4057, $4058, $4059, $4060, $4061, $4062, $4063, $4064, $4065, $4066, $4067, $4068, $4069, $4070, $4071, $4072, $4073, $4074, $4075, $4076, $4077, $4078, VersionRange($4079, $4080)), ($4081, $4082, $4083, $4084, $4085, $4086, $4087, $4088, $4089, $4090, $4091, $4092, $4093, $4094, $4095, $4096, $4097, $4098, $4099, $4100, $4101, $4102, $4103, $4104, $4105, $4106, $4107, $4108, VersionRange($4109, $4110)), ($4111, $4112, $4113, $4114, $4115, $4116, $4117, $4118, $4119, $4120, $4121, $4122, $4123, $4124, $4125, $4126, $4127, $4128, $4129, $4130, $4131, $4132, $4133, $4134, $4135, $4136, $4137, $4138, VersionRange($4139, $4140)), ($4141, $4142, $4143, $4144, $4145, $4146, $4147, $4148, $4149, $4150, $4151, $4152, $4153, $4154, $4155, $4156, $4157, $4158, $4159, $4160, $4161, $4162, $4163, $4164, $4165, $4166, $4167, $4168, VersionRange($4169, $4170)), ($4171, $4172, $4173, $4174, $4175, $4176, $4177, $4178, $4179, $4180, $4181, $4182, $4183, $4184, $4185, $4186, $4187, $4188, $4189, $4190, $4191, $4192, $4193, $4194, $4195, $4196, $4197, $4198, VersionRange($4199, $4200)), ($4201, $4202, $4203, $4204, $4205, $4206, $4207, $4208, $4209, $4210, $4211, $4212, $4213, $4214, $4215, $4216, $4217, $4218, $4219, $4220, $4221, $4222, $4223, $4224, $4225, $4226, $4227, $4228, VersionRange($4229, $4230)), ($4231, $4232, $4233, $4234, $4235, $4236, $4237, $4238, $4239, $4240, $4241, $4242, $4243, $4244, $4245, $4246, $4247, $4248, $4249, $4250, $4251, $4252, $4253, $4254, $4255, $4256, $4257, $4258, VersionRange($4259, $4260)), ($4261, $4262, $4263, $4264, $4265, $4266, $4267, $4268, $4269, $4270, $4271, $4272, $4273, $4274, $4275, $4276, $4277, $4278, $4279, $4280, $4281, $4282, $4283, $4284, $4285, $4286, $4287, $4288, VersionRange($4289, $4290)), ($4291, $4292, $4293, $4294, $4295, $4296, $4297, $4298, $4299, $4300, $4301, $4302, $4303, $4304, $4305, $4306, $4307, $4308, $4309, $4310, $4311, $4312, $4313, $4314, $4315, $4316, $4317, $4318, VersionRange($4319, $4320)), ($4321, $4322, $4323, $4324, $4325, $4326, $4327, $4328, $4329, $4330, $4331, $4332, $4333, $4334, $4335, $4336, $4337, $4338, $4339, $4340, $4341, $4342, $4343, $4344, $4345, $4346, $4347, $4348, VersionRange($4349, $4350)), ($4351, $4352, $4353, $4354, $4355, $4356, $4357, $4358, $4359, $4360, $4361, $4362, $4363, $4364, $4365, $4366, $4367, $4368, $4369, $4370, $4371, $4372, $4373, $4374, $4375, $4376, $4377, $4378, VersionRange($4379, $4380)), ($4381, $4382, $4383, $4384, $4385, $4386, $4387, $4388, $4389, $4390, $4391, $4392, $4393, $4394, $4395, $4396, $4397, $4398, $4399, $4400, $4401, $4402, $4403, $4404, $4405, $4406, $4407, $4408, VersionRange($4409, $4410)), ($4411, $4412, $4413, $4414, $4415, $4416, $4417, $4418, $4419, $4420, $4421, $4422, $4423, $4424, $4425, $4426, $4427, $4428, $4429, $4430, $4431, $4432, $4433, $4434, $4435, $4436, $4437, $4438, VersionRange($4439, $4440)), ($4441, $4442, $4443, $4444, $4445, $4446, $4447, $4448, $4449, $4450, $4451, $4452, $4453, $4454, $4455, $4456, $4457, $4458, $4459, $4460, $4461, $4462, $4463, $4464, $4465, $4466, $4467, $4468, VersionRange($4469, $4470)), ($4471, $4472, $4473, $4474, $4475, $4476, $4477, $4478, $4479, $4480, $4481, $4482, $4483, $4484, $4485, $4486, $4487, $4488, $4489, $4490, $4491, $4492, $4493, $4494, $4495, $4496, $4497, $4498, VersionRange($4499, $4500)), ($4501, $4502, $4503, $4504, $4505, $4506, $4507, $4508, $4509, $4510, $4511, $4512, $4513, $4514, $4515, $4516, $4517, $4518, $4519, $4520, $4521, $4522, $4523, $4524, $4525, $4526, $4527, $4528, VersionRange($4529, $4530)), ($4531, $4532, $4533, $4534, $4535, $4536, $4537, $4538, $4539, $4540, $4541, $4542, $4543, $4544, $4545, $4546, $4547, $4548, $4549, $4550, $4551, $4552, $4553, $4554, $4555, $4556, $4557, $4558, VersionRange($4559, $4560)), ($4561, $4562, $4563, $4564, $4565, $4566, $4567, $4568, $4569, $4570, $4571, $4572, $4573, $4574, $4575, $4576, $4577, $4578, $4579, $4580, $4581, $4582, $4583, $4584, $4585, $4586, $4587, $4588, VersionRange($4589, $4590)), ($4591, $4592, $4593, $4594, $4595, $4596, $4597, $4598, $4599, $4600, $4601, $4602, $4603, $4604, $4605, $4606, $4607, $4608, $4609, $4610, $4611, $4612, $4613, $4614, $4615, $4616, $4617, $4618, VersionRange($4619, $4620)), ($4621, $4622, $4623, $4624, $4625, $4626, $4627, $4628, $4629, $4630, $4631, $4632, $4633, $4634, $4635, $4636, $4637, $4638, $4639, $4640, $4641, $4642, $4643, $4644, $4645, $4646, $4647, $4648, VersionRange($4649, $4650)), ($4651, $4652, $4653, $4654, $4655, $4656, $4657, $4658, $4659, $4660, $4661, $4662, $4663, $4664, $4665, $4666, $4667, $4668, $4669, $4670, $4671, $4672, $4673, $4674, $4675, $4676, $4677, $4678, VersionRange($4679, $4680)), ($4681, $4682, $4683, $4684, $4685, $4686, $4687, $4688, $4689, $4690, $4691, $4692, $4693, $4694, $4695, $4696, $4697, $4698, $4699, $4700, $4701, $4702, $4703, $4704, $4705, $4706, $4707, $4708, VersionRange($4709, $4710)), ($4711, $4712, $4713, $4714, $4715, $4716, $4717, $4718, $4719, $4720, $4721, $4722, $4723, $4724, $4725, $4726, $4727, $4728, $4729, $4730, $4731, $4732, $4733, $4734, $4735, $4736, $4737, $4738, VersionRange($4739, $4740)), ($4741, $4742, $4743, $4744, $4745, $4746, $4747, $4748, $4749, $4750, $4751, $4752, $4753, $4754, $4755, $4756, $4757, $4758, $4759, $4760, $4761, $4762, $4763, $4764, $4765, $4766, $4767, $4768, VersionRange($4769, $4770)), ($4771, $4772, $4773, $4774, $4775, $4776, $4777, $4778, $4779, $4780, $4781, $4782, $4783, $4784, $4785, $4786, $4787, $4788, $4789, $4790, $4791, $4792, $4793, $4794, $4795, $4796, $4797, $4798, VersionRange($4799, $4800)), ($4801, $4802, $4803, $4804, $4805, $4806, $4807, $4808, $4809, $4810, $4811, $4812, $4813, $4814, $4815, $4816, $4817, $4818, $4819, $4820, $4821, $4822, $4823, $4824, $4825, $4826, $4827, $4828, VersionRange($4829, $4830)), ($4831, $4832, $4833, $4834, $4835, $4836, $4837, $4838, $4839, $4840, $4841, $4842, $4843, $4844, $4845, $4846, $4847, $4848, $4849, $4850, $4851, $4852, $4853, $4854, $4855, $4856, $4857, $4858, VersionRange($4859, $4860)), ($4861, $4862, $4863, $4864, $4865, $4866, $4867, $4868, $4869, $4870, $4871, $4872, $4873, $4874, $4875, $4876, $4877, $4878, $4879, $4880, $4881, $4882, $4883, $4884, $4885, $4886, $4887, $4888, VersionRange($4889, $4890)), ($4891, $4892, $4893, $4894, $4895, $4896, $4897, $4898, $4899, $4900, $4901, $4902, $4903, $4904, $4905, $4906, $4907, $4908, $4909, $4910, $4911, $4912, $4913, $4914, $4915, $4916, $4917, $4918, VersionRange($4919, $4920)), ($4921, $4922, $4923, $4924, $4925, $4926, $4927, $4928, $4929, $4930, $4931, $4932, $4933, $4934, $4935, $4936, $4937, $4938, $4939, $4940, $4941, $4942, $4943, $4944, $4945, $4946, $4947, $4948, VersionRange($4949, $4950)), ($4951, $4952, $4953, $4954, $4955, $4956, $4957, $4958, $4959, $4960, $4961, $4962, $4963, $4964, $4965, $4966, $4967, $4968, $4969, $4970, $4971, $4972, $4973, $4974, $4975, $4976, $4977, $4978, VersionRange($4979, $4980)), ($4981, $4982, $4983, $4984, $4985, $4986, $4987, $4988, $4989, $4990, $4991, $4992, $4993, $4994, $4995, $4996, $4997, $4998, $4999, $5000, $5001, $5002, $5003, $5004, $5005, $5006, $5007, $5008, VersionRange($5009, $5010)), ($5011, $5012, $5013, $5014, $5015, $5016, $5017, $5018, $5019, $5020, $5021, $5022, $5023, $5024, $5025, $5026, $5027, $5028, $5029, $5030, $5031, $5032, $5033, $5034, $5035, $5036, $5037, $5038, VersionRange($5039, $5040)), ($5041, $5042, $5043, $5044, $5045, $5046, $5047, $5048, $5049, $5050, $5051, $5052, $5053, $5054, $5055, $5056, $5057, $5058, $5059, $5060, $5061, $5062, $5063, $5064, $5065, $5066, $5067, $5068, VersionRange($5069, $5070)), ($5071, $5072, $5073, $5074, $5075, $5076, $5077, $5078, $5079, $5080, $5081, $5082, $5083, $5084, $5085, $5086, $5087, $5088, $5089, $5090, $5091, $5092, $5093, $5094, $5095, $5096, $5097, $5098, VersionRange($5099, $5100)), ($5101, $5102, $5103, $5104, $5105, $5106, $5107, $5108, $5109, $5110, $5111, $5112, $5113, $5114, $5115, $5116, $5117, $5118, $5119, $5120, $5121, $5122, $5123, $5124, $5125, $5126, $5127, $5128, VersionRange($5129, $5130)), ($5131, $5132, $5133, $5134, $5135, $5136, $5137, $5138, $5139, $5140, $5141, $5142, $5143, $5144, $5145, $5146, $5147, $5148, $5149, $5150, $5151, $5152, $5153, $5154, $5155, $5156, $5157, $5158, VersionRange($5159, $5160)), ($5161, $5162, $5163, $5164, $5165, $5166, $5167, $5168, $5169, $5170, $5171, $5172, $5173, $5174, $5175, $5176, $5177, $5178, $5179, $5180, $5181, $5182, $5183, $5184, $5185, $5186, $5187, $5188, VersionRange($5189, $5190)), ($5191, $5192, $5193, $5194, $5195, $5196, $5197, $5198, $5199, $5200, $5201, $5202, $5203, $5204, $5205, $5206, $5207, $5208, $5209, $5210, $5211, $5212, $5213, $5214, $5215, $5216, $5217, $5218, VersionRange($5219, $5220)), ($5221, $5222, $5223, $5224, $5225, $5226, $5227, $5228, $5229, $5230, $5231, $5232, $5233, $5234, $5235, $5236, $5237, $5238, $5239, $5240, $5241, $5242, $5243, $5244, $5245, $5246, $5247, $5248, VersionRange($5249, $5250)), ($5251, $5252, $5253, $5254, $5255, $5256, $5257, $5258, $5259, $5260, $5261, $5262, $5263, $5264, $5265, $5266, $5267, $5268, $5269, $5270, $5271, $5272, $5273, $5274, $5275, $5276, $5277, $5278, VersionRange($5279, $5280)), ($5281, $5282, $5283, $5284, $5285, $5286, $5287, $5288, $5289, $5290, $5291, $5292, $5293, $5294, $5295, $5296, $5297, $5298, $5299, $5300, $5301, $5302, $5303, $5304, $5305, $5306, $5307, $5308, VersionRange($5309, $5310)), ($5311, $5312, $5313, $5314, $5315, $5316, $5317, $5318, $5319, $5320, $5321, $5322, $5323, $5324, $5325, $5326, $5327, $5328, $5329, $5330, $5331, $5332, $5333, $5334, $5335, $5336, $5337, $5338, VersionRange($5339, $5340)), ($5341, $5342, $5343, $5344, $5345, $5346, $5347, $5348, $5349, $5350, $5351, $5352, $5353, $5354, $5355, $5356, $5357, $5358, $5359, $5360, $5361, $5362, $5363, $5364, $5365, $5366, $5367, $5368, VersionRange($5369, $5370)), ($5371, $5372, $5373, $5374, $5375, $5376, $5377, $5378, $5379, $5380, $5381, $5382, $5383, $5384, $5385, $5386, $5387, $5388, $5389, $5390, $5391, $5392, $5393, $5394, $5395, $5396, $5397, $5398, VersionRange($5399, $5400)), ($5401, $5402, $5403, $5404, $5405, $5406, $5407, $5408, $5409, $5410, $5411, $5412, $5413, $5414, $5415, $5416, $5417, $5418, $5419, $5420, $5421, $5422, $5423, $5424, $5425, $5426, $5427, $5428, VersionRange($5429, $5430)), ($5431, $5432, $5433, $5434, $5435, $5436, $5437, $5438, $5439, $5440, $5441, $5442, $5443, $5444, $5445, $5446, $5447, $5448, $5449, $5450, $5451, $5452, $5453, $5454, $5455, $5456, $5457, $5458, VersionRange($5459, $5460)), ($5461, $5462, $5463, $5464, $5465, $5466, $5467, $5468, $5469, $5470, $5471, $5472, $5473, $5474, $5475, $5476, $5477, $5478, $5479, $5480, $5481, $5482, $5483, $5484, $5485, $5486, $5487, $5488, VersionRange($5489, $5490)), ($5491, $5492, $5493, $5494, $5495, $5496, $5497, $5498, $5499, $5500, $5501, $5502, $5503, $5504, $5505, $5506, $5507, $5508, $5509, $5510, $5511, $5512, $5513, $5514, $5515, $5516, $5517, $5518, VersionRange($5519, $5520)), ($5521, $5522, $5523, $5524, $5525, $5526, $5527, $5528, $5529, $5530, $5531, $5532, $5533, $5534, $5535, $5536, $5537, $5538, $5539, $5540, $5541, $5542, $5543, $5544, $5545, $5546, $5547, $5548, VersionRange($5549, $5550)), ($5551, $5552, $5553, $5554, $5555, $5556, $5557, $5558, $5559, $5560, $5561, $5562, $5563, $5564, $5565, $5566, $5567, $5568, $5569, $5570, $5571, $5572, $5573, $5574, $5575, $5576, $5577, $5578, VersionRange($5579, $5580)), ($5581, $5582, $5583, $5584, $5585, $5586, $5587, $5588, $5589, $5590, $5591, $5592, $5593, $5594, $5595, $5596, $5597, $5598, $5599, $5600, $5601, $5602, $5603, $5604, $5605, $5606, $5607, $5608, VersionRange($5609, $5610)), ($5611, $5612, $5613, $5614, $5615, $5616, $5617, $5618, $5619, $5620, $5621, $5622, $5623, $5624, $5625, $5626, $5627, $5628, $5629, $5630, $5631, $5632, $5633, $5634, $5635, $5636, $5637, $5638, VersionRange($5639, $5640)), ($5641, $5642, $5643, $5644, $5645, $5646, $5647, $5648, $5649, $5650, $5651, $5652, $5653, $5654, $5655, $5656, $5657, $5658, $5659, $5660, $5661, $5662, $5663, $5664, $5665, $5666, $5667, $5668, VersionRange($5669, $5670)), ($5671, $5672, $5673, $5674, $5675, $5676, $5677, $5678, $5679, $5680, $5681, $5682, $5683, $5684, $5685, $5686, $5687, $5688, $5689, $5690, $5691, $5692, $5693, $5694, $5695, $5696, $5697, $5698, VersionRange($5699, $5700)), ($5701, $5702, $5703, $5704, $5705, $5706, $5707, $5708, $5709, $5710, $5711, $5712, $5713, $5714, $5715, $5716, $5717, $5718, $5719, $5720, $5721, $5722, $5723, $5724, $5725, $5726, $5727, $5728, VersionRange($5729, $5730)), ($5731, $5732, $5733, $5734, $5735, $5736, $5737, $5738, $5739, $5740, $5741, $5742, $5743, $5744, $5745, $5746, $5747, $5748, $5749, $5750, $5751, $5752, $5753, $5754, $5755, $5756, $5757, $5758, VersionRange($5759, $5760)), ($5761, $5762, $5763, $5764, $5765, $5766, $5767, $5768, $5769, $5770, $5771, $5772, $5773, $5774, $5775, $5776, $5777, $5778, $5779, $5780, $5781, $5782, $5783, $5784, $5785, $5786, $5787, $5788, VersionRange($5789, $5790)), ($5791, $5792, $5793, $5794, $5795, $5796, $5797, $5798, $5799, $5800, $5801, $5802, $5803, $5804, $5805, $5806, $5807, $5808, $5809, $5810, $5811, $5812, $5813, $5814, $5815, $5816, $5817, $5818, VersionRange($5819, $5820)), ($5821, $5822, $5823, $5824, $5825, $5826, $5827, $5828, $5829, $5830, $5831, $5832, $5833, $5834, $5835, $5836, $5837, $5838, $5839, $5840, $5841, $5842, $5843, $5844, $5845, $5846, $5847, $5848, VersionRange($5849, $5850)), ($5851, $5852, $5853, $5854, $5855, $5856, $5857, $5858, $5859, $5860, $5861, $5862, $5863, $5864, $5865, $5866, $5867, $5868, $5869, $5870, $5871, $5872, $5873, $5874, $5875, $5876, $5877, $5878, VersionRange($5879, $5880)), ($5881, $5882, $5883, $5884, $5885, $5886, $5887, $5888, $5889, $5890, $5891, $5892, $5893, $5894, $5895, $5896, $5897, $5898, $5899, $5900, $5901, $5902, $5903, $5904, $5905, $5906, $5907, $5908, VersionRange($5909, $5910)), ($5911, $5912, $5913, $5914, $5915, $5916, $5917, $5918, $5919, $5920, $5921, $5922, $5923, $5924, $5925, $5926, $5927, $5928, $5929, $5930, $5931, $5932, $5933, $5934, $5935, $5936, $5937, $5938, VersionRange($5939, $5940)), ($5941, $5942, $5943, $5944, $5945, $5946, $5947, $5948, $5949, $5950, $5951, $5952, $5953, $5954, $5955, $5956, $5957, $5958, $5959, $5960, $5961, $5962, $5963, $5964, $5965, $5966, $5967, $5968, VersionRange($5969, $5970)), ($5971, $5972, $5973, $5974, $5975, $5976, $5977, $5978, $5979, $5980, $5981, $5982, $5983, $5984, $5985, $5986, $5987, $5988, $5989, $5990, $5991, $5992, $5993, $5994, $5995, $5996, $5997, $5998, VersionRange($5999, $6000)), ($6001, $6002, $6003, $6004, $6005, $6006, $6007, $6008, $6009, $6010, $6011, $6012, $6013, $6014, $6015, $6016, $6017, $6018, $6019, $6020, $6021, $6022, $6023, $6024, $6025, $6026, $6027, $6028, VersionRange($6029, $6030)), ($6031, $6032, $6033, $6034, $6035, $6036, $6037, $6038, $6039, $6040, $6041, $6042, $6043, $6044, $6045, $6046, $6047, $6048, $6049, $6050, $6051, $6052, $6053, $6054, $6055, $6056, $6057, $6058, VersionRange($6059, $6060)), ($6061, $6062, $6063, $6064, $6065, $6066, $6067, $6068, $6069, $6070, $6071, $6072, $6073, $6074, $6075, $6076, $6077, $6078, $6079, $6080, $6081, $6082, $6083, $6084, $6085, $6086, $6087, $6088, VersionRange($6089, $6090)), ($6091, $6092, $6093, $6094, $6095, $6096, $6097, $6098, $6099, $6100, $6101, $6102, $6103, $6104, $6105, $6106, $6107, $6108, $6109, $6110, $6111, $6112, $6113, $6114, $6115, $6116, $6117, $6118, VersionRange($6119, $6120)), ($6121, $6122, $6123, $6124, $6125, $6126, $6127, $6128, $6129, $6130, $6131, $6132, $6133, $6134, $6135, $6136, $6137, $6138, $6139, $6140, $6141, $6142, $6143, $6144, $6145, $6146, $6147, $6148, VersionRange($6149, $6150)), ($6151, $6152, $6153, $6154, $6155, $6156, $6157, $6158, $6159, $6160, $6161, $6162, $6163, $6164, $6165, $6166, $6167, $6168, $6169, $6170, $6171, $6172, $6173, $6174, $6175, $6176, $6177, $6178, VersionRange($6179, $6180)), ($6181, $6182, $6183, $6184, $6185, $6186, $6187, $6188, $6189, $6190, $6191, $6192, $6193, $6194, $6195, $6196, $6197, $6198, $6199, $6200, $6201, $6202, $6203, $6204, $6205, $6206, $6207, $6208, VersionRange($6209, $6210)), ($6211, $6212, $6213, $6214, $6215, $6216, $6217, $6218, $6219, $6220, $6221, $6222, $6223, $6224, $6225, $6226, $6227, $6228, $6229, $6230, $6231, $6232, $6233, $6234, $6235, $6236, $6237, $6238, VersionRange($6239, $6240)), ($6241, $6242, $6243, $6244, $6245, $6246, $6247, $6248, $6249, $6250, $6251, $6252, $6253, $6254, $6255, $6256, $6257, $6258, $6259, $6260, $6261, $6262, $6263, $6264, $6265, $6266, $6267, $6268, VersionRange($6269, $6270)), ($6271, $6272, $6273, $6274, $6275, $6276, $6277, $6278, $6279, $6280, $6281, $6282, $6283, $6284, $6285, $6286, $6287, $6288, $6289, $6290, $6291, $6292, $6293, $6294, $6295, $6296, $6297, $6298, VersionRange($6299, $6300)), ($6301, $6302, $6303, $6304, $6305, $6306, $6307, $6308, $6309, $6310, $6311, $6312, $6313, $6314, $6315, $6316, $6317, $6318, $6319, $6320, $6321, $6322, $6323, $6324, $6325, $6326, $6327, $6328, VersionRange($6329, $6330)), ($6331, $6332, $6333, $6334, $6335, $6336, $6337, $6338, $6339, $6340, $6341, $6342, $6343, $6344, $6345, $6346, $6347, $6348, $6349, $6350, $6351, $6352, $6353, $6354, $6355, $6356, $6357, $6358, VersionRange($6359, $6360)), ($6361, $6362, $6363, $6364, $6365, $6366, $6367, $6368, $6369, $6370, $6371, $6372, $6373, $6374, $6375, $6376, $6377, $6378, $6379, $6380, $6381, $6382, $6383, $6384, $6385, $6386, $6387, $6388, VersionRange($6389, $6390)), ($6391, $6392, $6393, $6394, $6395, $6396, $6397, $6398, $6399, $6400, $6401, $6402, $6403, $6404, $6405, $6406, $6407, $6408, $6409, $6410, $6411, $6412, $6413, $6414, $6415, $6416, $6417, $6418, VersionRange($6419, $6420)), ($6421, $6422, $6423, $6424, $6425, $6426, $6427, $6428, $6429, $6430, $6431, $6432, $6433, $6434, $6435, $6436, $6437, $6438, $6439, $6440, $6441, $6442, $6443, $6444, $6445, $6446, $6447, $6448, VersionRange($6449, $6450)), ($6451, $6452, $6453, $6454, $6455, $6456, $6457, $6458, $6459, $6460, $6461, $6462, $6463, $6464, $6465, $6466, $6467, $6468, $6469, $6470, $6471, $6472, $6473, $6474, $6475, $6476, $6477, $6478, VersionRange($6479, $6480)), ($6481, $6482, $6483, $6484, $6485, $6486, $6487, $6488, $6489, $6490, $6491, $6492, $6493, $6494, $6495, $6496, $6497, $6498, $6499, $6500, $6501, $6502, $6503, $6504, $6505, $6506, $6507, $6508, VersionRange($6509, $6510)), ($6511, $6512, $6513, $6514, $6515, $6516, $6517, $6518, $6519, $6520, $6521, $6522, $6523, $6524, $6525, $6526, $6527, $6528, $6529, $6530, $6531, $6532, $6533, $6534, $6535, $6536, $6537, $6538, VersionRange($6539, $6540)), ($6541, $6542, $6543, $6544, $6545, $6546, $6547, $6548, $6549, $6550, $6551, $6552, $6553, $6554, $6555, $6556, $6557, $6558, $6559, $6560, $6561, $6562, $6563, $6564, $6565, $6566, $6567, $6568, VersionRange($6569, $6570)), ($6571, $6572, $6573, $6574, $6575, $6576, $6577, $6578, $6579, $6580, $6581, $6582, $6583, $6584, $6585, $6586, $6587, $6588, $6589, $6590, $6591, $6592, $6593, $6594, $6595, $6596, $6597, $6598, VersionRange($6599, $6600)), ($6601, $6602, $6603, $6604, $6605, $6606, $6607, $6608, $6609, $6610, $6611, $6612, $6613, $6614, $6615, $6616, $6617, $6618, $6619, $6620, $6621, $6622, $6623, $6624, $6625, $6626, $6627, $6628, VersionRange($6629, $6630)), ($6631, $6632, $6633, $6634, $6635, $6636, $6637, $6638, $6639, $6640, $6641, $6642, $6643, $6644, $6645, $6646, $6647, $6648, $6649, $6650, $6651, $6652, $6653, $6654, $6655, $6656, $6657, $6658, VersionRange($6659, $6660)), ($6661, $6662, $6663, $6664, $6665, $6666, $6667, $6668, $6669, $6670, $6671, $6672, $6673, $6674, $6675, $6676, $6677, $6678, $6679, $6680, $6681, $6682, $6683, $6684, $6685, $6686, $6687, $6688, VersionRange($6689, $6690)), ($6691, $6692, $6693, $6694, $6695, $6696, $6697, $6698, $6699, $6700, $6701, $6702, $6703, $6704, $6705, $6706, $6707, $6708, $6709, $6710, $6711, $6712, $6713, $6714, $6715, $6716, $6717, $6718, VersionRange($6719, $6720)), ($6721, $6722, $6723, $6724, $6725, $6726, $6727, $6728, $6729, $6730, $6731, $6732, $6733, $6734, $6735, $6736, $6737, $6738, $6739, $6740, $6741, $6742, $6743, $6744, $6745, $6746, $6747, $6748, VersionRange($6749, $6750)), ($6751, $6752, $6753, $6754, $6755, $6756, $6757, $6758, $6759, $6760, $6761, $6762, $6763, $6764, $6765, $6766, $6767, $6768, $6769, $6770, $6771, $6772, $6773, $6774, $6775, $6776, $6777, $6778, VersionRange($6779, $6780)), ($6781, $6782, $6783, $6784, $6785, $6786, $6787, $6788, $6789, $6790, $6791, $6792, $6793, $6794, $6795, $6796, $6797, $6798, $6799, $6800, $6801, $6802, $6803, $6804, $6805, $6806, $6807, $6808, VersionRange($6809, $6810)), ($6811, $6812, $6813, $6814, $6815, $6816, $6817, $6818, $6819, $6820, $6821, $6822, $6823, $6824, $6825, $6826, $6827, $6828, $6829, $6830, $6831, $6832, $6833, $6834, $6835, $6836, $6837, $6838, VersionRange($6839, $6840)), ($6841, $6842, $6843, $6844, $6845, $6846, $6847, $6848, $6849, $6850, $6851, $6852, $6853, $6854, $6855, $6856, $6857, $6858, $6859, $6860, $6861, $6862, $6863, $6864, $6865, $6866, $6867, $6868, VersionRange($6869, $6870)), ($6871, $6872, $6873, $6874, $6875, $6876, $6877, $6878, $6879, $6880, $6881, $6882, $6883, $6884, $6885, $6886, $6887, $6888, $6889, $6890, $6891, $6892, $6893, $6894, $6895, $6896, $6897, $6898, VersionRange($6899, $6900)), ($6901, $6902, $6903, $6904, $6905, $6906, $6907, $6908, $6909, $6910, $6911, $6912, $6913, $6914, $6915, $6916, $6917, $6918, $6919, $6920, $6921, $6922, $6923, $6924, $6925, $6926, $6927, $6928, VersionRange($6929, $6930)), ($6931, $6932, $6933, $6934, $6935, $6936, $6937, $6938, $6939, $6940, $6941, $6942, $6943, $6944, $6945, $6946, $6947, $6948, $6949, $6950, $6951, $6952, $6953, $6954, $6955, $6956, $6957, $6958, VersionRange($6959, $6960)), ($6961, $6962, $6963, $6964, $6965, $6966, $6967, $6968, $6969, $6970, $6971, $6972, $6973, $6974, $6975, $6976, $6977, $6978, $6979, $6980, $6981, $6982, $6983, $6984, $6985, $6986, $6987, $6988, VersionRange($6989, $6990)), ($6991, $6992, $6993, $6994, $6995, $6996, $6997, $6998, $6999, $7000, $7001, $7002, $7003, $7004, $7005, $7006, $7007, $7008, $7009, $7010, $7011, $7012, $7013, $7014, $7015, $7016, $7017, $7018, VersionRange($7019, $7020)), ($7021, $7022, $7023, $7024, $7025, $7026, $7027, $7028, $7029, $7030, $7031, $7032, $7033, $7034, $7035, $7036, $7037, $7038, $7039, $7040, $7041, $7042, $7043, $7044, $7045, $7046, $7047, $7048, VersionRange($7049, $7050)), ($7051, $7052, $7053, $7054, $7055, $7056, $7057, $7058, $7059, $7060, $7061, $7062, $7063, $7064, $7065, $7066, $7067, $7068, $7069, $7070, $7071, $7072, $7073, $7074, $7075, $7076, $7077, $7078, VersionRange($7079, $7080)), ($7081, $7082, $7083, $7084, $7085, $7086, $7087, $7088, $7089, $7090, $7091, $7092, $7093, $7094, $7095, $7096, $7097, $7098, $7099, $7100, $7101, $7102, $7103, $7104, $7105, $7106, $7107, $7108, VersionRange($7109, $7110)), ($7111, $7112, $7113, $7114, $7115, $7116, $7117, $7118, $7119, $7120, $7121, $7122, $7123, $7124, $7125, $7126, $7127, $7128, $7129, $7130, $7131, $7132, $7133, $7134, $7135, $7136, $7137, $7138, VersionRange($7139, $7140)), ($7141, $7142, $7143, $7144, $7145, $7146, $7147, $7148, $7149, $7150, $7151, $7152, $7153, $7154, $7155, $7156, $7157, $7158, $7159, $7160, $7161, $7162, $7163, $7164, $7165, $7166, $7167, $7168, VersionRange($7169, $7170)), ($7171, $7172, $7173, $7174, $7175, $7176, $7177, $7178, $7179, $7180, $7181, $7182, $7183, $7184, $7185, $7186, $7187, $7188, $7189, $7190, $7191, $7192, $7193, $7194, $7195, $7196, $7197, $7198, VersionRange($7199, $7200)), ($7201, $7202, $7203, $7204, $7205, $7206, $7207, $7208, $7209, $7210, $7211, $7212, $7213, $7214, $7215, $7216, $7217, $7218, $7219, $7220, $7221, $7222, $7223, $7224, $7225, $7226, $7227, $7228, VersionRange($7229, $7230)), ($7231, $7232, $7233, $7234, $7235, $7236, $7237, $7238, $7239, $7240, $7241, $7242, $7243, $7244, $7245, $7246, $7247, $7248, $7249, $7250, $7251, $7252, $7253, $7254, $7255, $7256, $7257, $7258, VersionRange($7259, $7260)), ($7261, $7262, $7263, $7264, $7265, $7266, $7267, $7268, $7269, $7270, $7271, $7272, $7273, $7274, $7275, $7276, $7277, $7278, $7279, $7280, $7281, $7282, $7283, $7284, $7285, $7286, $7287, $7288, VersionRange($7289, $7290)), ($7291, $7292, $7293, $7294, $7295, $7296, $7297, $7298, $7299, $7300, $7301, $7302, $7303, $7304, $7305, $7306, $7307, $7308, $7309, $7310, $7311, $7312, $7313, $7314, $7315, $7316, $7317, $7318, VersionRange($7319, $7320)), ($7321, $7322, $7323, $7324, $7325, $7326, $7327, $7328, $7329, $7330, $7331, $7332, $7333, $7334, $7335, $7336, $7337, $7338, $7339, $7340, $7341, $7342, $7343, $7344, $7345, $7346, $7347, $7348, VersionRange($7349, $7350)), ($7351, $7352, $7353, $7354, $7355, $7356, $7357, $7358, $7359, $7360, $7361, $7362, $7363, $7364, $7365, $7366, $7367, $7368, $7369, $7370, $7371, $7372, $7373, $7374, $7375, $7376, $7377, $7378, VersionRange($7379, $7380)), ($7381, $7382, $7383, $7384, $7385, $7386, $7387, $7388, $7389, $7390, $7391, $7392, $7393, $7394, $7395, $7396, $7397, $7398, $7399, $7400, $7401, $7402, $7403, $7404, $7405, $7406, $7407, $7408, VersionRange($7409, $7410)), ($7411, $7412, $7413, $7414, $7415, $7416, $7417, $7418, $7419, $7420, $7421, $7422, $7423, $7424, $7425, $7426, $7427, $7428, $7429, $7430, $7431, $7432, $7433, $7434, $7435, $7436, $7437, $7438, VersionRange($7439, $7440)), ($7441, $7442, $7443, $7444, $7445, $7446, $7447, $7448, $7449, $7450, $7451, $7452, $7453, $7454, $7455, $7456, $7457, $7458, $7459, $7460, $7461, $7462, $7463, $7464, $7465, $7466, $7467, $7468, VersionRange($7469, $7470)), ($7471, $7472, $7473, $7474, $7475, $7476, $7477, $7478, $7479, $7480, $7481, $7482, $7483, $7484, $7485, $7486, $7487, $7488, $7489, $7490, $7491, $7492, $7493, $7494, $7495, $7496, $7497, $7498, VersionRange($7499, $7500)), ($7501, $7502, $7503, $7504, $7505, $7506, $7507, $7508, $7509, $7510, $7511, $7512, $7513, $7514, $7515, $7516, $7517, $7518, $7519, $7520, $7521, $7522, $7523, $7524, $7525, $7526, $7527, $7528, VersionRange($7529, $7530)), ($7531, $7532, $7533, $7534, $7535, $7536, $7537, $7538, $7539, $7540, $7541, $7542, $7543, $7544, $7545, $7546, $7547, $7548, $7549, $7550, $7551, $7552, $7553, $7554, $7555, $7556, $7557, $7558, VersionRange($7559, $7560)), ($7561, $7562, $7563, $7564, $7565, $7566, $7567, $7568, $7569, $7570, $7571, $7572, $7573, $7574, $7575, $7576, $7577, $7578, $7579, $7580, $7581, $7582, $7583, $7584, $7585, $7586, $7587, $7588, VersionRange($7589, $7590)), ($7591, $7592, $7593, $7594, $7595, $7596, $7597, $7598, $7599, $7600, $7601, $7602, $7603, $7604, $7605, $7606, $7607, $7608, $7609, $7610, $7611, $7612, $7613, $7614, $7615, $7616, $7617, $7618, VersionRange($7619, $7620)), ($7621, $7622, $7623, $7624, $7625, $7626, $7627, $7628, $7629, $7630, $7631, $7632, $7633, $7634, $7635, $7636, $7637, $7638, $7639, $7640, $7641, $7642, $7643, $7644, $7645, $7646, $7647, $7648, VersionRange($7649, $7650)), ($7651, $7652, $7653, $7654, $7655, $7656, $7657, $7658, $7659, $7660, $7661, $7662, $7663, $7664, $7665, $7666, $7667, $7668, $7669, $7670, $7671, $7672, $7673, $7674, $7675, $7676, $7677, $7678, VersionRange($7679, $7680)), ($7681, $7682, $7683, $7684, $7685, $7686, $7687, $7688, $7689, $7690, $7691, $7692, $7693, $7694, $7695, $7696, $7697, $7698, $7699, $7700, $7701, $7702, $7703, $7704, $7705, $7706, $7707, $7708, VersionRange($7709, $7710)), ($7711, $7712, $7713, $7714, $7715, $7716, $7717, $7718, $7719, $7720, $7721, $7722, $7723, $7724, $7725, $7726, $7727, $7728, $7729, $7730, $7731, $7732, $7733, $7734, $7735, $7736, $7737, $7738, VersionRange($7739, $7740)), ($7741, $7742, $7743, $7744, $7745, $7746, $7747, $7748, $7749, $7750, $7751, $7752, $7753, $7754, $7755, $7756, $7757, $7758, $7759, $7760, $7761, $7762, $7763, $7764, $7765, $7766, $7767, $7768, VersionRange($7769, $7770)), ($7771, $7772, $7773, $7774, $7775, $7776, $7777, $7778, $7779, $7780, $7781, $7782, $7783, $7784, $7785, $7786, $7787, $7788, $7789, $7790, $7791, $7792, $7793, $7794, $7795, $7796, $7797, $7798, VersionRange($7799, $7800)), ($7801, $7802, $7803, $7804, $7805, $7806, $7807, $7808, $7809, $7810, $7811, $7812, $7813, $7814, $7815, $7816, $7817, $7818, $7819, $7820, $7821, $7822, $7823, $7824, $7825, $7826, $7827, $7828, VersionRange($7829, $7830)), ($7831, $7832, $7833, $7834, $7835, $7836, $7837, $7838, $7839, $7840, $7841, $7842, $7843, $7844, $7845, $7846, $7847, $7848, $7849, $7850, $7851, $7852, $7853, $7854, $7855, $7856, $7857, $7858, VersionRange($7859, $7860)), ($7861, $7862, $7863, $7864, $7865, $7866, $7867, $7868, $7869, $7870, $7871, $7872, $7873, $7874, $7875, $7876, $7877, $7878, $7879, $7880, $7881, $7882, $7883, $7884, $7885, $7886, $7887, $7888, VersionRange($7889, $7890)), ($7891, $7892, $7893, $7894, $7895, $7896, $7897, $7898, $7899, $7900, $7901, $7902, $7903, $7904, $7905, $7906, $7907, $7908, $7909, $7910, $7911, $7912, $7913, $7914, $7915, $7916, $7917, $7918, VersionRange($7919, $7920)), ($7921, $7922, $7923, $7924, $7925, $7926, $7927, $7928, $7929, $7930, $7931, $7932, $7933, $7934, $7935, $7936, $7937, $7938, $7939, $7940, $7941, $7942, $7943, $7944, $7945, $7946, $7947, $7948, VersionRange($7949, $7950)), ($7951, $7952, $7953, $7954, $7955, $7956, $7957, $7958, $7959, $7960, $7961, $7962, $7963, $7964, $7965, $7966, $7967, $7968, $7969, $7970, $7971, $7972, $7973, $7974, $7975, $7976, $7977, $7978, VersionRange($7979, $7980)), ($7981, $7982, $7983, $7984, $7985, $7986, $7987, $7988, $7989, $7990, $7991, $7992, $7993, $7994, $7995, $7996, $7997, $7998, $7999, $8000, $8001, $8002, $8003, $8004, $8005, $8006, $8007, $8008, VersionRange($8009, $8010)), ($8011, $8012, $8013, $8014, $8015, $8016, $8017, $8018, $8019, $8020, $8021, $8022, $8023, $8024, $8025, $8026, $8027, $8028, $8029, $8030, $8031, $8032, $8033, $8034, $8035, $8036, $8037, $8038, VersionRange($8039, $8040)), ($8041, $8042, $8043, $8044, $8045, $8046, $8047, $8048, $8049, $8050, $8051, $8052, $8053, $8054, $8055, $8056, $8057, $8058, $8059, $8060, $8061, $8062, $8063, $8064, $8065, $8066, $8067, $8068, VersionRange($8069, $8070)), ($8071, $8072, $8073, $8074, $8075, $8076, $8077, $8078, $8079, $8080, $8081, $8082, $8083, $8084, $8085, $8086, $8087, $8088, $8089, $8090, $8091, $8092, $8093, $8094, $8095, $8096, $8097, $8098, VersionRange($8099, $8100)), ($8101, $8102, $8103, $8104, $8105, $8106, $8107, $8108, $8109, $8110, $8111, $8112, $8113, $8114, $8115, $8116, $8117, $8118, $8119, $8120, $8121, $8122, $8123, $8124, $8125, $8126, $8127, $8128, VersionRange($8129, $8130)), ($8131, $8132, $8133, $8134, $8135, $8136, $8137, $8138, $8139, $8140, $8141, $8142, $8143, $8144, $8145, $8146, $8147, $8148, $8149, $8150, $8151, $8152, $8153, $8154, $8155, $8156, $8157, $8158, VersionRange($8159, $8160)), ($8161, $8162, $8163, $8164, $8165, $8166, $8167, $8168, $8169, $8170, $8171, $8172, $8173, $8174, $8175, $8176, $8177, $8178, $8179, $8180, $8181, $8182, $8183, $8184, $8185, $8186, $8187, $8188, VersionRange($8189, $8190)), ($8191, $8192, $8193, $8194, $8195, $8196, $8197, $8198, $8199, $8200, $8201, $8202, $8203, $8204, $8205, $8206, $8207, $8208, $8209, $8210, $8211, $8212, $8213, $8214, $8215, $8216, $8217, $8218, VersionRange($8219, $8220)), ($8221, $8222, $8223, $8224, $8225, $8226, $8227, $8228, $8229, $8230, $8231, $8232, $8233, $8234, $8235, $8236, $8237, $8238, $8239, $8240, $8241, $8242, $8243, $8244, $8245, $8246, $8247, $8248, VersionRange($8249, $8250)), ($8251, $8252, $8253, $8254, $8255, $8256, $8257, $8258, $8259, $8260, $8261, $8262, $8263, $8264, $8265, $8266, $8267, $8268, $8269, $8270, $8271, $8272, $8273, $8274, $8275, $8276, $8277, $8278, VersionRange($8279, $8280)), ($8281, $8282, $8283, $8284, $8285, $8286, $8287, $8288, $8289, $8290, $8291, $8292, $8293, $8294, $8295, $8296, $8297, $8298, $8299, $8300, $8301, $8302, $8303, $8304, $8305, $8306, $8307, $8308, VersionRange($8309, $8310)), ($8311, $8312, $8313, $8314, $8315, $8316, $8317, $8318, $8319, $8320, $8321, $8322, $8323, $8324, $8325, $8326, $8327, $8328, $8329, $8330, $8331, $8332, $8333, $8334, $8335, $8336, $8337, $8338, VersionRange($8339, $8340)), ($8341, $8342, $8343, $8344, $8345, $8346, $8347, $8348, $8349, $8350, $8351, $8352, $8353, $8354, $8355, $8356, $8357, $8358, $8359, $8360, $8361, $8362, $8363, $8364, $8365, $8366, $8367, $8368, VersionRange($8369, $8370)), ($8371, $8372, $8373, $8374, $8375, $8376, $8377, $8378, $8379, $8380, $8381, $8382, $8383, $8384, $8385, $8386, $8387, $8388, $8389, $8390, $8391, $8392, $8393, $8394, $8395, $8396, $8397, $8398, VersionRange($8399, $8400)), ($8401, $8402, $8403, $8404, $8405, $8406, $8407, $8408, $8409, $8410, $8411, $8412, $8413, $8414, $8415, $8416, $8417, $8418, $8419, $8420, $8421, $8422, $8423, $8424, $8425, $8426, $8427, $8428, VersionRange($8429, $8430)), ($8431, $8432, $8433, $8434, $8435, $8436, $8437, $8438, $8439, $8440, $8441, $8442, $8443, $8444, $8445, $8446, $8447, $8448, $8449, $8450, $8451, $8452, $8453, $8454, $8455, $8456, $8457, $8458, VersionRange($8459, $8460)), ($8461, $8462, $8463, $8464, $8465, $8466, $8467, $8468, $8469, $8470, $8471, $8472, $8473, $8474, $8475, $8476, $8477, $8478, $8479, $8480, $8481, $8482, $8483, $8484, $8485, $8486, $8487, $8488, VersionRange($8489, $8490)), ($8491, $8492, $8493, $8494, $8495, $8496, $8497, $8498, $8499, $8500, $8501, $8502, $8503, $8504, $8505, $8506, $8507, $8508, $8509, $8510, $8511, $8512, $8513, $8514, $8515, $8516, $8517, $8518, VersionRange($8519, $8520)), ($8521, $8522, $8523, $8524, $8525, $8526, $8527, $8528, $8529, $8530, $8531, $8532, $8533, $8534, $8535, $8536, $8537, $8538, $8539, $8540, $8541, $8542, $8543, $8544, $8545, $8546, $8547, $8548, VersionRange($8549, $8550)), ($8551, $8552, $8553, $8554, $8555, $8556, $8557, $8558, $8559, $8560, $8561, $8562, $8563, $8564, $8565, $8566, $8567, $8568, $8569, $8570, $8571, $8572, $8573, $8574, $8575, $8576, $8577, $8578, VersionRange($8579, $8580)), ($8581, $8582, $8583, $8584, $8585, $8586, $8587, $8588, $8589, $8590, $8591, $8592, $8593, $8594, $8595, $8596, $8597, $8598, $8599, $8600, $8601, $8602, $8603, $8604, $8605, $8606, $8607, $8608, VersionRange($8609, $8610)), ($8611, $8612, $8613, $8614, $8615, $8616, $8617, $8618, $8619, $8620, $8621, $8622, $8623, $8624, $8625, $8626, $8627, $8628, $8629, $8630, $8631, $8632, $8633, $8634, $8635, $8636, $8637, $8638, VersionRange($8639, $8640)), ($8641, $8642, $8643, $8644, $8645, $8646, $8647, $8648, $8649, $8650, $8651, $8652, $8653, $8654, $8655, $8656, $8657, $8658, $8659, $8660, $8661, $8662, $8663, $8664, $8665, $8666, $8667, $8668, VersionRange($8669, $8670)), ($8671, $8672, $8673, $8674, $8675, $8676, $8677, $8678, $8679, $8680, $8681, $8682, $8683, $8684, $8685, $8686, $8687, $8688, $8689, $8690, $8691, $8692, $8693, $8694, $8695, $8696, $8697, $8698, VersionRange($8699, $8700)), ($8701, $8702, $8703, $8704, $8705, $8706, $8707, $8708, $8709, $8710, $8711, $8712, $8713, $8714, $8715, $8716, $8717, $8718, $8719, $8720, $8721, $8722, $8723, $8724, $8725, $8726, $8727, $8728, VersionRange($8729, $8730)), ($8731, $8732, $8733, $8734, $8735, $8736, $8737, $8738, $8739, $8740, $8741, $8742, $8743, $8744, $8745, $8746, $8747, $8748, $8749, $8750, $8751, $8752, $8753, $8754, $8755, $8756, $8757, $8758, VersionRange($8759, $8760)), ($8761, $8762, $8763, $8764, $8765, $8766, $8767, $8768, $8769, $8770, $8771, $8772, $8773, $8774, $8775, $8776, $8777, $8778, $8779, $8780, $8781, $8782, $8783, $8784, $8785, $8786, $8787, $8788, VersionRange($8789, $8790)), ($8791, $8792, $8793, $8794, $8795, $8796, $8797, $8798, $8799, $8800, $8801, $8802, $8803, $8804, $8805, $8806, $8807, $8808, $8809, $8810, $8811, $8812, $8813, $8814, $8815, $8816, $8817, $8818, VersionRange($8819, $8820)), ($8821, $8822, $8823, $8824, $8825, $8826, $8827, $8828, $8829, $8830, $8831, $8832, $8833, $8834, $8835, $8836, $8837, $8838, $8839, $8840, $8841, $8842, $8843, $8844, $8845, $8846, $8847, $8848, VersionRange($8849, $8850)), ($8851, $8852, $8853, $8854, $8855, $8856, $8857, $8858, $8859, $8860, $8861, $8862, $8863, $8864, $8865, $8866, $8867, $8868, $8869, $8870, $8871, $8872, $8873, $8874, $8875, $8876, $8877, $8878, VersionRange($8879, $8880)), ($8881, $8882, $8883, $8884, $8885, $8886, $8887, $8888, $8889, $8890, $8891, $8892, $8893, $8894, $8895, $8896, $8897, $8898, $8899, $8900, $8901, $8902, $8903, $8904, $8905, $8906, $8907, $8908, VersionRange($8909, $8910)), ($8911, $8912, $8913, $8914, $8915, $8916, $8917, $8918, $8919, $8920, $8921, $8922, $8923, $8924, $8925, $8926, $8927, $8928, $8929, $8930, $8931, $8932, $8933, $8934, $8935, $8936, $8937, $8938, VersionRange($8939, $8940)), ($8941, $8942, $8943, $8944, $8945, $8946, $8947, $8948, $8949, $8950, $8951, $8952, $8953, $8954, $8955, $8956, $8957, $8958, $8959, $8960, $8961, $8962, $8963, $8964, $8965, $8966, $8967, $8968, VersionRange($8969, $8970)), ($8971, $8972, $8973, $8974, $8975, $8976, $8977, $8978, $8979, $8980, $8981, $8982, $8983, $8984, $8985, $8986, $8987, $8988, $8989, $8990, $8991, $8992, $8993, $8994, $8995, $8996, $8997, $8998, VersionRange($8999, $9000)), ($9001, $9002, $9003, $9004, $9005, $9006, $9007, $9008, $9009, $9010, $9011, $9012, $9013, $9014, $9015, $9016, $9017, $9018, $9019, $9020, $9021, $9022, $9023, $9024, $9025, $9026, $9027, $9028, VersionRange($9029, $9030)), ($9031, $9032, $9033, $9034, $9035, $9036, $9037, $9038, $9039, $9040, $9041, $9042, $9043, $9044, $9045, $9046, $9047, $9048, $9049, $9050, $9051, $9052, $9053, $9054, $9055, $9056, $9057, $9058, VersionRange($9059, $9060)), ($9061, $9062, $9063, $9064, $9065, $9066, $9067, $9068, $9069, $9070, $9071, $9072, $9073, $9074, $9075, $9076, $9077, $9078, $9079, $9080, $9081, $9082, $9083, $9084, $9085, $9086, $9087, $9088, VersionRange($9089, $9090)), ($9091, $9092, $9093, $9094, $9095, $9096, $9097, $9098, $9099, $9100, $9101, $9102, $9103, $9104, $9105, $9106, $9107, $9108, $9109, $9110, $9111, $9112, $9113, $9114, $9115, $9116, $9117, $9118, VersionRange($9119, $9120)), ($9121, $9122, $9123, $9124, $9125, $9126, $9127, $9128, $9129, $9130, $9131, $9132, $9133, $9134, $9135, $9136, $9137, $9138, $9139, $9140, $9141, $9142, $9143, $9144, $9145, $9146, $9147, $9148, VersionRange($9149, $9150)), ($9151, $9152, $9153, $9154, $9155, $9156, $9157, $9158, $9159, $9160, $9161, $9162, $9163, $9164, $9165, $9166, $9167, $9168, $9169, $9170, $9171, $9172, $9173, $9174, $9175, $9176, $9177, $9178, VersionRange($9179, $9180)), ($9181, $9182, $9183, $9184, $9185, $9186, $9187, $9188, $9189, $9190, $9191, $9192, $9193, $9194, $9195, $9196, $9197, $9198, $9199, $9200, $9201, $9202, $9203, $9204, $9205, $9206, $9207, $9208, VersionRange($9209, $9210)), ($9211, $9212, $9213, $9214, $9215, $9216, $9217, $9218, $9219, $9220, $9221, $9222, $9223, $9224, $9225, $9226, $9227, $9228, $9229, $9230, $9231, $9232, $9233, $9234, $9235, $9236, $9237, $9238, VersionRange($9239, $9240)), ($9241, $9242, $9243, $9244, $9245, $9246, $9247, $9248, $9249, $9250, $9251, $9252, $9253, $9254, $9255, $9256, $9257, $9258, $9259, $9260, $9261, $9262, $9263, $9264, $9265, $9266, $9267, $9268, VersionRange($9269, $9270)), ($9271, $9272, $9273, $9274, $9275, $9276, $9277, $9278, $9279, $9280, $9281, $9282, $9283, $9284, $9285, $9286, $9287, $9288, $9289, $9290, $9291, $9292, $9293, $9294, $9295, $9296, $9297, $9298, VersionRange($9299, $9300)), ($9301, $9302, $9303, $9304, $9305, $9306, $9307, $9308, $9309, $9310, $9311, $9312, $9313, $9314, $9315, $9316, $9317, $9318, $9319, $9320, $9321, $9322, $9323, $9324, $9325, $9326, $9327, $9328, VersionRange($9329, $9330)), ($9331, $9332, $9333, $9334, $9335, $9336, $9337, $9338, $9339, $9340, $9341, $9342, $9343, $9344, $9345, $9346, $9347, $9348, $9349, $9350, $9351, $9352, $9353, $9354, $9355, $9356, $9357, $9358, VersionRange($9359, $9360)), ($9361, $9362, $9363, $9364, $9365, $9366, $9367, $9368, $9369, $9370, $9371, $9372, $9373, $9374, $9375, $9376, $9377, $9378, $9379, $9380, $9381, $9382, $9383, $9384, $9385, $9386, $9387, $9388, VersionRange($9389, $9390)), ($9391, $9392, $9393, $9394, $9395, $9396, $9397, $9398, $9399, $9400, $9401, $9402, $9403, $9404, $9405, $9406, $9407, $9408, $9409, $9410, $9411, $9412, $9413, $9414, $9415, $9416, $9417, $9418, VersionRange($9419, $9420)), ($9421, $9422, $9423, $9424, $9425, $9426, $9427, $9428, $9429, $9430, $9431, $9432, $9433, $9434, $9435, $9436, $9437, $9438, $9439, $9440, $9441, $9442, $9443, $9444, $9445, $9446, $9447, $9448, VersionRange($9449, $9450)), ($9451, $9452, $9453, $9454, $9455, $9456, $9457, $9458, $9459, $9460, $9461, $9462, $9463, $9464, $9465, $9466, $9467, $9468, $9469, $9470, $9471, $9472, $9473, $9474, $9475, $9476, $9477, $9478, VersionRange($9479, $9480)), ($9481, $9482, $9483, $9484, $9485, $9486, $9487, $9488, $9489, $9490, $9491, $9492, $9493, $9494, $9495, $9496, $9497, $9498, $9499, $9500, $9501, $9502, $9503, $9504, $9505, $9506, $9507, $9508, VersionRange($9509, $9510)), ($9511, $9512, $9513, $9514, $9515, $9516, $9517, $9518, $9519, $9520, $9521, $9522, $9523, $9524, $9525, $9526, $9527, $9528, $9529, $9530, $9531, $9532, $9533, $9534, $9535, $9536, $9537, $9538, VersionRange($9539, $9540)), ($9541, $9542, $9543, $9544, $9545, $9546, $9547, $9548, $9549, $9550, $9551, $9552, $9553, $9554, $9555, $9556, $9557, $9558, $9559, $9560, $9561, $9562, $9563, $9564, $9565, $9566, $9567, $9568, VersionRange($9569, $9570)), ($9571, $9572, $9573, $9574, $9575, $9576, $9577, $9578, $9579, $9580, $9581, $9582, $9583, $9584, $9585, $9586, $9587, $9588, $9589, $9590, $9591, $9592, $9593, $9594, $9595, $9596, $9597, $9598, VersionRange($9599, $9600)), ($9601, $9602, $9603, $9604, $9605, $9606, $9607, $9608, $9609, $9610, $9611, $9612, $9613, $9614, $9615, $9616, $9617, $9618, $9619, $9620, $9621, $9622, $9623, $9624, $9625, $9626, $9627, $9628, VersionRange($9629, $9630)), ($9631, $9632, $9633, $9634, $9635, $9636, $9637, $9638, $9639, $9640, $9641, $9642, $9643, $9644, $9645, $9646, $9647, $9648, $9649, $9650, $9651, $9652, $9653, $9654, $9655, $9656, $9657, $9658, VersionRange($9659, $9660)), ($9661, $9662, $9663, $9664, $9665, $9666, $9667, $9668, $9669, $9670, $9671, $9672, $9673, $9674, $9675, $9676, $9677, $9678, $9679, $9680, $9681, $9682, $9683, $9684, $9685, $9686, $9687, $9688, VersionRange($9689, $9690)), ($9691, $9692, $9693, $9694, $9695, $9696, $9697, $9698, $9699, $9700, $9701, $9702, $9703, $9704, $9705, $9706, $9707, $9708, $9709, $9710, $9711, $9712, $9713, $9714, $9715, $9716, $9717, $9718, VersionRange($9719, $9720)), ($9721, $9722, $9723, $9724, $9725, $9726, $9727, $9728, $9729, $9730, $9731, $9732, $9733, $9734, $9735, $9736, $9737, $9738, $9739, $9740, $9741, $9742, $9743, $9744, $9745, $9746, $9747, $9748, VersionRange($9749, $9750)), ($9751, $9752, $9753, $9754, $9755, $9756, $9757, $9758, $9759, $9760, $9761, $9762, $9763, $9764, $9765, $9766, $9767, $9768, $9769, $9770, $9771, $9772, $9773, $9774, $9775, $9776, $9777, $9778, VersionRange($9779, $9780)), ($9781, $9782, $9783, $9784, $9785, $9786, $9787, $9788, $9789, $9790, $9791, $9792, $9793, $9794, $9795, $9796, $9797, $9798, $9799, $9800, $9801, $9802, $9803, $9804, $9805, $9806, $9807, $9808, VersionRange($9809, $9810)), ($9811, $9812, $9813, $9814, $9815, $9816, $9817, $9818, $9819, $9820, $9821, $9822, $9823, $9824, $9825, $9826, $9827, $9828, $9829, $9830, $9831, $9832, $9833, $9834, $9835, $9836, $9837, $9838, VersionRange($9839, $9840)), ($9841, $9842, $9843, $9844, $9845, $9846, $9847, $9848, $9849, $9850, $9851, $9852, $9853, $9854, $9855, $9856, $9857, $9858, $9859, $9860, $9861, $9862, $9863, $9864, $9865, $9866, $9867, $9868, VersionRange($9869, $9870)), ($9871, $9872, $9873, $9874, $9875, $9876, $9877, $9878, $9879, $9880, $9881, $9882, $9883, $9884, $9885, $9886, $9887, $9888, $9889, $9890, $9891, $9892, $9893, $9894, $9895, $9896, $9897, $9898, VersionRange($9899, $9900)), ($9901, $9902, $9903, $9904, $9905, $9906, $9907, $9908, $9909, $9910, $9911, $9912, $9913, $9914, $9915, $9916, $9917, $9918, $9919, $9920, $9921, $9922, $9923, $9924, $9925, $9926, $9927, $9928, VersionRange($9929, $9930)), ($9931, $9932, $9933, $9934, $9935, $9936, $9937, $9938, $9939, $9940, $9941, $9942, $9943, $9944, $9945, $9946, $9947, $9948, $9949, $9950, $9951, $9952, $9953, $9954, $9955, $9956, $9957, $9958, VersionRange($9959, $9960)), ($9961, $9962, $9963, $9964, $9965, $9966, $9967, $9968, $9969, $9970, $9971, $9972, $9973, $9974, $9975, $9976, $9977, $9978, $9979, $9980, $9981, $9982, $9983, $9984, $9985, $9986, $9987, $9988, VersionRange($9989, $9990)), ($9991, $9992, $9993, $9994, $9995, $9996, $9997, $9998, $9999, $10000, $10001, $10002, $10003, $10004, $10005, $10006, $10007, $10008, $10009, $10010, $10011, $10012, $10013, $10014, $10015, $10016, $10017, $10018, VersionRange($10019, $10020)), ($10021, $10022, $10023, $10024, $10025, $10026, $10027, $10028, $10029, $10030, $10031, $10032, $10033, $10034, $10035, $10036, $10037, $10038, $10039, $10040, $10041, $10042, $10043, $10044, $10045, $10046, $10047, $10048, VersionRange($10049, $10050)), ($10051, $10052, $10053, $10054, $10055, $10056, $10057, $10058, $10059, $10060, $10061, $10062, $10063, $10064, $10065, $10066, $10067, $10068, $10069, $10070, $10071, $10072, $10073, $10074, $10075, $10076, $10077, $10078, VersionRange($10079, $10080)), ($10081, $10082, $10083, $10084, $10085, $10086, $10087, $10088, $10089, $10090, $10091, $10092, $10093, $10094, $10095, $10096, $10097, $10098, $10099, $10100, $10101, $10102, $10103, $10104, $10105, $10106, $10107, $10108, VersionRange($10109, $10110)), ($10111, $10112, $10113, $10114, $10115, $10116, $10117, $10118, $10119, $10120, $10121, $10122, $10123, $10124, $10125, $10126, $10127, $10128, $10129, $10130, $10131, $10132, $10133, $10134, $10135, $10136, $10137, $10138, VersionRange($10139, $10140)), ($10141, $10142, $10143, $10144, $10145, $10146, $10147, $10148, $10149, $10150, $10151, $10152, $10153, $10154, $10155, $10156, $10157, $10158, $10159, $10160, $10161, $10162, $10163, $10164, $10165, $10166, $10167, $10168, VersionRange($10169, $10170)), ($10171, $10172, $10173, $10174, $10175, $10176, $10177, $10178, $10179, $10180, $10181, $10182, $10183, $10184, $10185, $10186, $10187, $10188, $10189, $10190, $10191, $10192, $10193, $10194, $10195, $10196, $10197, $10198, VersionRange($10199, $10200)), ($10201, $10202, $10203, $10204, $10205, $10206, $10207, $10208, $10209, $10210, $10211, $10212, $10213, $10214, $10215, $10216, $10217, $10218, $10219, $10220, $10221, $10222, $10223, $10224, $10225, $10226, $10227, $10228, VersionRange($10229, $10230)), ($10231, $10232, $10233, $10234, $10235, $10236, $10237, $10238, $10239, $10240, $10241, $10242, $10243, $10244, $10245, $10246, $10247, $10248, $10249, $10250, $10251, $10252, $10253, $10254, $10255, $10256, $10257, $10258, VersionRange($10259, $10260)), ($10261, $10262, $10263, $10264, $10265, $10266, $10267, $10268, $10269, $10270, $10271, $10272, $10273, $10274, $10275, $10276, $10277, $10278, $10279, $10280, $10281, $10282, $10283, $10284, $10285, $10286, $10287, $10288, VersionRange($10289, $10290)), ($10291, $10292, $10293, $10294, $10295, $10296, $10297, $10298, $10299, $10300, $10301, $10302, $10303, $10304, $10305, $10306, $10307, $10308, $10309, $10310, $10311, $10312, $10313, $10314, $10315, $10316, $10317, $10318, VersionRange($10319, $10320)), ($10321, $10322, $10323, $10324, $10325, $10326, $10327, $10328, $10329, $10330, $10331, $10332, $10333, $10334, $10335, $10336, $10337, $10338, $10339, $10340, $10341, $10342, $10343, $10344, $10345, $10346, $10347, $10348, VersionRange($10349, $10350)), ($10351, $10352, $10353, $10354, $10355, $10356, $10357, $10358, $10359, $10360, $10361, $10362, $10363, $10364, $10365, $10366, $10367, $10368, $10369, $10370, $10371, $10372, $10373, $10374, $10375, $10376, $10377, $10378, VersionRange($10379, $10380)), ($10381, $10382, $10383, $10384, $10385, $10386, $10387, $10388, $10389, $10390, $10391, $10392, $10393, $10394, $10395, $10396, $10397, $10398, $10399, $10400, $10401, $10402, $10403, $10404, $10405, $10406, $10407, $10408, VersionRange($10409, $10410)), ($10411, $10412, $10413, $10414, $10415, $10416, $10417, $10418, $10419, $10420, $10421, $10422, $10423, $10424, $10425, $10426, $10427, $10428, $10429, $10430, $10431, $10432, $10433, $10434, $10435, $10436, $10437, $10438, VersionRange($10439, $10440)), ($10441, $10442, $10443, $10444, $10445, $10446, $10447, $10448, $10449, $10450, $10451, $10452, $10453, $10454, $10455, $10456, $10457, $10458, $10459, $10460, $10461, $10462, $10463, $10464, $10465, $10466, $10467, $10468, VersionRange($10469, $10470)), ($10471, $10472, $10473, $10474, $10475, $10476, $10477, $10478, $10479, $10480, $10481, $10482, $10483, $10484, $10485, $10486, $10487, $10488, $10489, $10490, $10491, $10492, $10493, $10494, $10495, $10496, $10497, $10498, VersionRange($10499, $10500)), ($10501, $10502, $10503, $10504, $10505, $10506, $10507, $10508, $10509, $10510, $10511, $10512, $10513, $10514, $10515, $10516, $10517, $10518, $10519, $10520, $10521, $10522, $10523, $10524, $10525, $10526, $10527, $10528, VersionRange($10529, $10530)), ($10531, $10532, $10533, $10534, $10535, $10536, $10537, $10538, $10539, $10540, $10541, $10542, $10543, $10544, $10545, $10546, $10547, $10548, $10549, $10550, $10551, $10552, $10553, $10554, $10555, $10556, $10557, $10558, VersionRange($10559, $10560)), ($10561, $10562, $10563, $10564, $10565, $10566, $10567, $10568, $10569, $10570, $10571, $10572, $10573, $10574, $10575, $10576, $10577, $10578, $10579, $10580, $10581, $10582, $10583, $10584, $10585, $10586, $10587, $10588, VersionRange($10589, $10590)), ($10591, $10592, $10593, $10594, $10595, $10596, $10597, $10598, $10599, $10600, $10601, $10602, $10603, $10604, $10605, $10606, $10607, $10608, $10609, $10610, $10611, $10612, $10613, $10614, $10615, $10616, $10617, $10618, VersionRange($10619, $10620)), ($10621, $10622, $10623, $10624, $10625, $10626, $10627, $10628, $10629, $10630, $10631, $10632, $10633, $10634, $10635, $10636, $10637, $10638, $10639, $10640, $10641, $10642, $10643, $10644, $10645, $10646, $10647, $10648, VersionRange($10649, $10650)), ($10651, $10652, $10653, $10654, $10655, $10656, $10657, $10658, $10659, $10660, $10661, $10662, $10663, $10664, $10665, $10666, $10667, $10668, $10669, $10670, $10671, $10672, $10673, $10674, $10675, $10676, $10677, $10678, VersionRange($10679, $10680)), ($10681, $10682, $10683, $10684, $10685, $10686, $10687, $10688, $10689, $10690, $10691, $10692, $10693, $10694, $10695, $10696, $10697, $10698, $10699, $10700, $10701, $10702, $10703, $10704, $10705, $10706, $10707, $10708, VersionRange($10709, $10710)), ($10711, $10712, $10713, $10714, $10715, $10716, $10717, $10718, $10719, $10720, $10721, $10722, $10723, $10724, $10725, $10726, $10727, $10728, $10729, $10730, $10731, $10732, $10733, $10734, $10735, $10736, $10737, $10738, VersionRange($10739, $10740)), ($10741, $10742, $10743, $10744, $10745, $10746, $10747, $10748, $10749, $10750, $10751, $10752, $10753, $10754, $10755, $10756, $10757, $10758, $10759, $10760, $10761, $10762, $10763, $10764, $10765, $10766, $10767, $10768, VersionRange($10769, $10770)), ($10771, $10772, $10773, $10774, $10775, $10776, $10777, $10778, $10779, $10780, $10781, $10782, $10783, $10784, $10785, $10786, $10787, $10788, $10789, $10790, $10791, $10792, $10793, $10794, $10795, $10796, $10797, $10798, VersionRange($10799, $10800)), ($10801, $10802, $10803, $10804, $10805, $10806, $10807, $10808, $10809, $10810, $10811, $10812, $10813, $10814, $10815, $10816, $10817, $10818, $10819, $10820, $10821, $10822, $10823, $10824, $10825, $10826, $10827, $10828, VersionRange($10829, $10830)), ($10831, $10832, $10833, $10834, $10835, $10836, $10837, $10838, $10839, $10840, $10841, $10842, $10843, $10844, $10845, $10846, $10847, $10848, $10849, $10850, $10851, $10852, $10853, $10854, $10855, $10856, $10857, $10858, VersionRange($10859, $10860)), ($10861, $10862, $10863, $10864, $10865, $10866, $10867, $10868, $10869, $10870, $10871, $10872, $10873, $10874, $10875, $10876, $10877, $10878, $10879, $10880, $10881, $10882, $10883, $10884, $10885, $10886, $10887, $10888, VersionRange($10889, $10890)), ($10891, $10892, $10893, $10894, $10895, $10896, $10897, $10898, $10899, $10900, $10901, $10902, $10903, $10904, $10905, $10906, $10907, $10908, $10909, $10910, $10911, $10912, $10913, $10914, $10915, $10916, $10917, $10918, VersionRange($10919, $10920)), ($10921, $10922, $10923, $10924, $10925, $10926, $10927, $10928, $10929, $10930, $10931, $10932, $10933, $10934, $10935, $10936, $10937, $10938, $10939, $10940, $10941, $10942, $10943, $10944, $10945, $10946, $10947, $10948, VersionRange($10949, $10950)), ($10951, $10952, $10953, $10954, $10955, $10956, $10957, $10958, $10959, $10960, $10961, $10962, $10963, $10964, $10965, $10966, $10967, $10968, $10969, $10970, $10971, $10972, $10973, $10974, $10975, $10976, $10977, $10978, VersionRange($10979, $10980)), ($10981, $10982, $10983, $10984, $10985, $10986, $10987, $10988, $10989, $10990, $10991, $10992, $10993, $10994, $10995, $10996, $10997, $10998, $10999, $11000, $11001, $11002, $11003, $11004, $11005, $11006, $11007, $11008, VersionRange($11009, $11010)), ($11011, $11012, $11013, $11014, $11015, $11016, $11017, $11018, $11019, $11020, $11021, $11022, $11023, $11024, $11025, $11026, $11027, $11028, $11029, $11030, $11031, $11032, $11033, $11034, $11035, $11036, $11037, $11038, VersionRange($11039, $11040)), ($11041, $11042, $11043, $11044, $11045, $11046, $11047, $11048, $11049, $11050, $11051, $11052, $11053, $11054, $11055, $11056, $11057, $11058, $11059, $11060, $11061, $11062, $11063, $11064, $11065, $11066, $11067, $11068, VersionRange($11069, $11070)), ($11071, $11072, $11073, $11074, $11075, $11076, $11077, $11078, $11079, $11080, $11081, $11082, $11083, $11084, $11085, $11086, $11087, $11088, $11089, $11090, $11091, $11092, $11093, $11094, $11095, $11096, $11097, $11098, VersionRange($11099, $11100)), ($11101, $11102, $11103, $11104, $11105, $11106, $11107, $11108, $11109, $11110, $11111, $11112, $11113, $11114, $11115, $11116, $11117, $11118, $11119, $11120, $11121, $11122, $11123, $11124, $11125, $11126, $11127, $11128, VersionRange($11129, $11130)), ($11131, $11132, $11133, $11134, $11135, $11136, $11137, $11138, $11139, $11140, $11141, $11142, $11143, $11144, $11145, $11146, $11147, $11148, $11149, $11150, $11151, $11152, $11153, $11154, $11155, $11156, $11157, $11158, VersionRange($11159, $11160)), ($11161, $11162, $11163, $11164, $11165, $11166, $11167, $11168, $11169, $11170, $11171, $11172, $11173, $11174, $11175, $11176, $11177, $11178, $11179, $11180, $11181, $11182, $11183, $11184, $11185, $11186, $11187, $11188, VersionRange($11189, $11190)), ($11191, $11192, $11193, $11194, $11195, $11196, $11197, $11198, $11199, $11200, $11201, $11202, $11203, $11204, $11205, $11206, $11207, $11208, $11209, $11210, $11211, $11212, $11213, $11214, $11215, $11216, $11217, $11218, VersionRange($11219, $11220)), ($11221, $11222, $11223, $11224, $11225, $11226, $11227, $11228, $11229, $11230, $11231, $11232, $11233, $11234, $11235, $11236, $11237, $11238, $11239, $11240, $11241, $11242, $11243, $11244, $11245, $11246, $11247, $11248, VersionRange($11249, $11250)), ($11251, $11252, $11253, $11254, $11255, $11256, $11257, $11258, $11259, $11260, $11261, $11262, $11263, $11264, $11265, $11266, $11267, $11268, $11269, $11270, $11271, $11272, $11273, $11274, $11275, $11276, $11277, $11278, VersionRange($11279, $11280)), ($11281, $11282, $11283, $11284, $11285, $11286, $11287, $11288, $11289, $11290, $11291, $11292, $11293, $11294, $11295, $11296, $11297, $11298, $11299, $11300, $11301, $11302, $11303, $11304, $11305, $11306, $11307, $11308, VersionRange($11309, $11310)), ($11311, $11312, $11313, $11314, $11315, $11316, $11317, $11318, $11319, $11320, $11321, $11322, $11323, $11324, $11325, $11326, $11327, $11328, $11329, $11330, $11331, $11332, $11333, $11334, $11335, $11336, $11337, $11338, VersionRange($11339, $11340)), ($11341, $11342, $11343, $11344, $11345, $11346, $11347, $11348, $11349, $11350, $11351, $11352, $11353, $11354, $11355, $11356, $11357, $11358, $11359, $11360, $11361, $11362, $11363, $11364, $11365, $11366, $11367, $11368, VersionRange($11369, $11370)), ($11371, $11372, $11373, $11374, $11375, $11376, $11377, $11378, $11379, $11380, $11381, $11382, $11383, $11384, $11385, $11386, $11387, $11388, $11389, $11390, $11391, $11392, $11393, $11394, $11395, $11396, $11397, $11398, VersionRange($11399, $11400)), ($11401, $11402, $11403, $11404, $11405, $11406, $11407, $11408, $11409, $11410, $11411, $11412, $11413, $11414, $11415, $11416, $11417, $11418, $11419, $11420, $11421, $11422, $11423, $11424, $11425, $11426, $11427, $11428, VersionRange($11429, $11430)), ($11431, $11432, $11433, $11434, $11435, $11436, $11437, $11438, $11439, $11440, $11441, $11442, $11443, $11444, $11445, $11446, $11447, $11448, $11449, $11450, $11451, $11452, $11453, $11454, $11455, $11456, $11457, $11458, VersionRange($11459, $11460)), ($11461, $11462, $11463, $11464, $11465, $11466, $11467, $11468, $11469, $11470, $11471, $11472, $11473, $11474, $11475, $11476, $11477, $11478, $11479, $11480, $11481, $11482, $11483, $11484, $11485, $11486, $11487, $11488, VersionRange($11489, $11490)), ($11491, $11492, $11493, $11494, $11495, $11496, $11497, $11498, $11499, $11500, $11501, $11502, $11503, $11504, $11505, $11506, $11507, $11508, $11509, $11510, $11511, $11512, $11513, $11514, $11515, $11516, $11517, $11518, VersionRange($11519, $11520)), ($11521, $11522, $11523, $11524, $11525, $11526, $11527, $11528, $11529, $11530, $11531, $11532, $11533, $11534, $11535, $11536, $11537, $11538, $11539, $11540, $11541, $11542, $11543, $11544, $11545, $11546, $11547, $11548, VersionRange($11549, $11550)), ($11551, $11552, $11553, $11554, $11555, $11556, $11557, $11558, $11559, $11560, $11561, $11562, $11563, $11564, $11565, $11566, $11567, $11568, $11569, $11570, $11571, $11572, $11573, $11574, $11575, $11576, $11577, $11578, VersionRange($11579, $11580)), ($11581, $11582, $11583, $11584, $11585, $11586, $11587, $11588, $11589, $11590, $11591, $11592, $11593, $11594, $11595, $11596, $11597, $11598, $11599, $11600, $11601, $11602, $11603, $11604, $11605, $11606, $11607, $11608, VersionRange($11609, $11610)), ($11611, $11612, $11613, $11614, $11615, $11616, $11617, $11618, $11619, $11620, $11621, $11622, $11623, $11624, $11625, $11626, $11627, $11628, $11629, $11630, $11631, $11632, $11633, $11634, $11635, $11636, $11637, $11638, VersionRange($11639, $11640)), ($11641, $11642, $11643, $11644, $11645, $11646, $11647, $11648, $11649, $11650, $11651, $11652, $11653, $11654, $11655, $11656, $11657, $11658, $11659, $11660, $11661, $11662, $11663, $11664, $11665, $11666, $11667, $11668, VersionRange($11669, $11670)), ($11671, $11672, $11673, $11674, $11675, $11676, $11677, $11678, $11679, $11680, $11681, $11682, $11683, $11684, $11685, $11686, $11687, $11688, $11689, $11690, $11691, $11692, $11693, $11694, $11695, $11696, $11697, $11698, VersionRange($11699, $11700)), ($11701, $11702, $11703, $11704, $11705, $11706, $11707, $11708, $11709, $11710, $11711, $11712, $11713, $11714, $11715, $11716, $11717, $11718, $11719, $11720, $11721, $11722, $11723, $11724, $11725, $11726, $11727, $11728, VersionRange($11729, $11730)), ($11731, $11732, $11733, $11734, $11735, $11736, $11737, $11738, $11739, $11740, $11741, $11742, $11743, $11744, $11745, $11746, $11747, $11748, $11749, $11750, $11751, $11752, $11753, $11754, $11755, $11756, $11757, $11758, VersionRange($11759, $11760)), ($11761, $11762, $11763, $11764, $11765, $11766, $11767, $11768, $11769, $11770, $11771, $11772, $11773, $11774, $11775, $11776, $11777, $11778, $11779, $11780, $11781, $11782, $11783, $11784, $11785, $11786, $11787, $11788, VersionRange($11789, $11790)), ($11791, $11792, $11793, $11794, $11795, $11796, $11797, $11798, $11799, $11800, $11801, $11802, $11803, $11804, $11805, $11806, $11807, $11808, $11809, $11810, $11811, $11812, $11813, $11814, $11815, $11816, $11817, $11818, VersionRange($11819, $11820)), ($11821, $11822, $11823, $11824, $11825, $11826, $11827, $11828, $11829, $11830, $11831, $11832, $11833, $11834, $11835, $11836, $11837, $11838, $11839, $11840, $11841, $11842, $11843, $11844, $11845, $11846, $11847, $11848, VersionRange($11849, $11850)), ($11851, $11852, $11853, $11854, $11855, $11856, $11857, $11858, $11859, $11860, $11861, $11862, $11863, $11864, $11865, $11866, $11867, $11868, $11869, $11870, $11871, $11872, $11873, $11874, $11875, $11876, $11877, $11878, VersionRange($11879, $11880)), ($11881, $11882, $11883, $11884, $11885, $11886, $11887, $11888, $11889, $11890, $11891, $11892, $11893, $11894, $11895, $11896, $11897, $11898, $11899, $11900, $11901, $11902, $11903, $11904, $11905, $11906, $11907, $11908, VersionRange($11909, $11910)), ($11911, $11912, $11913, $11914, $11915, $11916, $11917, $11918, $11919, $11920, $11921, $11922, $11923, $11924, $11925, $11926, $11927, $11928, $11929, $11930, $11931, $11932, $11933, $11934, $11935, $11936, $11937, $11938, VersionRange($11939, $11940)), ($11941, $11942, $11943, $11944, $11945, $11946, $11947, $11948, $11949, $11950, $11951, $11952, $11953, $11954, $11955, $11956, $11957, $11958, $11959, $11960, $11961, $11962, $11963, $11964, $11965, $11966, $11967, $11968, VersionRange($11969, $11970)), ($11971, $11972, $11973, $11974, $11975, $11976, $11977, $11978, $11979, $11980, $11981, $11982, $11983, $11984, $11985, $11986, $11987, $11988, $11989, $11990, $11991, $11992, $11993, $11994, $11995, $11996, $11997, $11998, VersionRange($11999, $12000)), ($12001, $12002, $12003, $12004, $12005, $12006, $12007, $12008, $12009, $12010, $12011, $12012, $12013, $12014, $12015, $12016, $12017, $12018, $12019, $12020, $12021, $12022, $12023, $12024, $12025, $12026, $12027, $12028, VersionRange($12029, $12030)), ($12031, $12032, $12033, $12034, $12035, $12036, $12037, $12038, $12039, $12040, $12041, $12042, $12043, $12044, $12045, $12046, $12047, $12048, $12049, $12050, $12051, $12052, $12053, $12054, $12055, $12056, $12057, $12058, VersionRange($12059, $12060)), ($12061, $12062, $12063, $12064, $12065, $12066, $12067, $12068, $12069, $12070, $12071, $12072, $12073, $12074, $12075, $12076, $12077, $12078, $12079, $12080, $12081, $12082, $12083, $12084, $12085, $12086, $12087, $12088, VersionRange($12089, $12090)), ($12091, $12092, $12093, $12094, $12095, $12096, $12097, $12098, $12099, $12100, $12101, $12102, $12103, $12104, $12105, $12106, $12107, $12108, $12109, $12110, $12111, $12112, $12113, $12114, $12115, $12116, $12117, $12118, VersionRange($12119, $12120)), ($12121, $12122, $12123, $12124, $12125, $12126, $12127, $12128, $12129, $12130, $12131, $12132, $12133, $12134, $12135, $12136, $12137, $12138, $12139, $12140, $12141, $12142, $12143, $12144, $12145, $12146, $12147, $12148, VersionRange($12149, $12150)), ($12151, $12152, $12153, $12154, $12155, $12156, $12157, $12158, $12159, $12160, $12161, $12162, $12163, $12164, $12165, $12166, $12167, $12168, $12169, $12170, $12171, $12172, $12173, $12174, $12175, $12176, $12177, $12178, VersionRange($12179, $12180)), ($12181, $12182, $12183, $12184, $12185, $12186, $12187, $12188, $12189, $12190, $12191, $12192, $12193, $12194, $12195, $12196, $12197, $12198, $12199, $12200, $12201, $12202, $12203, $12204, $12205, $12206, $12207, $12208, VersionRange($12209, $12210)), ($12211, $12212, $12213, $12214, $12215, $12216, $12217, $12218, $12219, $12220, $12221, $12222, $12223, $12224, $12225, $12226, $12227, $12228, $12229, $12230, $12231, $12232, $12233, $12234, $12235, $12236, $12237, $12238, VersionRange($12239, $12240)), ($12241, $12242, $12243, $12244, $12245, $12246, $12247, $12248, $12249, $12250, $12251, $12252, $12253, $12254, $12255, $12256, $12257, $12258, $12259, $12260, $12261, $12262, $12263, $12264, $12265, $12266, $12267, $12268, VersionRange($12269, $12270)), ($12271, $12272, $12273, $12274, $12275, $12276, $12277, $12278, $12279, $12280, $12281, $12282, $12283, $12284, $12285, $12286, $12287, $12288, $12289, $12290, $12291, $12292, $12293, $12294, $12295, $12296, $12297, $12298, VersionRange($12299, $12300)), ($12301, $12302, $12303, $12304, $12305, $12306, $12307, $12308, $12309, $12310, $12311, $12312, $12313, $12314, $12315, $12316, $12317, $12318, $12319, $12320, $12321, $12322, $12323, $12324, $12325, $12326, $12327, $12328, VersionRange($12329, $12330)), ($12331, $12332, $12333, $12334, $12335, $12336, $12337, $12338, $12339, $12340, $12341, $12342, $12343, $12344, $12345, $12346, $12347, $12348, $12349, $12350, $12351, $12352, $12353, $12354, $12355, $12356, $12357, $12358, VersionRange($12359, $12360)), ($12361, $12362, $12363, $12364, $12365, $12366, $12367, $12368, $12369, $12370, $12371, $12372, $12373, $12374, $12375, $12376, $12377, $12378, $12379, $12380, $12381, $12382, $12383, $12384, $12385, $12386, $12387, $12388, VersionRange($12389, $12390)), ($12391, $12392, $12393, $12394, $12395, $12396, $12397, $12398, $12399, $12400, $12401, $12402, $12403, $12404, $12405, $12406, $12407, $12408, $12409, $12410, $12411, $12412, $12413, $12414, $12415, $12416, $12417, $12418, VersionRange($12419, $12420)), ($12421, $12422, $12423, $12424, $12425, $12426, $12427, $12428, $12429, $12430, $12431, $12432, $12433, $12434, $12435, $12436, $12437, $12438, $12439, $12440, $12441, $12442, $12443, $12444, $12445, $12446, $12447, $12448, VersionRange($12449, $12450)), ($12451, $12452, $12453, $12454, $12455, $12456, $12457, $12458, $12459, $12460, $12461, $12462, $12463, $12464, $12465, $12466, $12467, $12468, $12469, $12470, $12471, $12472, $12473, $12474, $12475, $12476, $12477, $12478, VersionRange($12479, $12480)), ($12481, $12482, $12483, $12484, $12485, $12486, $12487, $12488, $12489, $12490, $12491, $12492, $12493, $12494, $12495, $12496, $12497, $12498, $12499, $12500, $12501, $12502, $12503, $12504, $12505, $12506, $12507, $12508, VersionRange($12509, $12510)), ($12511, $12512, $12513, $12514, $12515, $12516, $12517, $12518, $12519, $12520, $12521, $12522, $12523, $12524, $12525, $12526, $12527, $12528, $12529, $12530, $12531, $12532, $12533, $12534, $12535, $12536, $12537, $12538, VersionRange($12539, $12540)), ($12541, $12542, $12543, $12544, $12545, $12546, $12547, $12548, $12549, $12550, $12551, $12552, $12553, $12554, $12555, $12556, $12557, $12558, $12559, $12560, $12561, $12562, $12563, $12564, $12565, $12566, $12567, $12568, VersionRange($12569, $12570)), ($12571, $12572, $12573, $12574, $12575, $12576, $12577, $12578, $12579, $12580, $12581, $12582, $12583, $12584, $12585, $12586, $12587, $12588, $12589, $12590, $12591, $12592, $12593, $12594, $12595, $12596, $12597, $12598, VersionRange($12599, $12600)), ($12601, $12602, $12603, $12604, $12605, $12606, $12607, $12608, $12609, $12610, $12611, $12612, $12613, $12614, $12615, $12616, $12617, $12618, $12619, $12620, $12621, $12622, $12623, $12624, $12625, $12626, $12627, $12628, VersionRange($12629, $12630)), ($12631, $12632, $12633, $12634, $12635, $12636, $12637, $12638, $12639, $12640, $12641, $12642, $12643, $12644, $12645, $12646, $12647, $12648, $12649, $12650, $12651, $12652, $12653, $12654, $12655, $12656, $12657, $12658, VersionRange($12659, $12660)), ($12661, $12662, $12663, $12664, $12665, $12666, $12667, $12668, $12669, $12670, $12671, $12672, $12673, $12674, $12675, $12676, $12677, $12678, $12679, $12680, $12681, $12682, $12683, $12684, $12685, $12686, $12687, $12688, VersionRange($12689, $12690)), ($12691, $12692, $12693, $12694, $12695, $12696, $12697, $12698, $12699, $12700, $12701, $12702, $12703, $12704, $12705, $12706, $12707, $12708, $12709, $12710, $12711, $12712, $12713, $12714, $12715, $12716, $12717, $12718, VersionRange($12719, $12720)), ($12721, $12722, $12723, $12724, $12725, $12726, $12727, $12728, $12729, $12730, $12731, $12732, $12733, $12734, $12735, $12736, $12737, $12738, $12739, $12740, $12741, $12742, $12743, $12744, $12745, $12746, $12747, $12748, VersionRange($12749, $12750)), ($12751, $12752, $12753, $12754, $12755, $12756, $12757, $12758, $12759, $12760, $12761, $12762, $12763, $12764, $12765, $12766, $12767, $12768, $12769, $12770, $12771, $12772, $12773, $12774, $12775, $12776, $12777, $12778, VersionRange($12779, $12780)), ($12781, $12782, $12783, $12784, $12785, $12786, $12787, $12788, $12789, $12790, $12791, $12792, $12793, $12794, $12795, $12796, $12797, $12798, $12799, $12800, $12801, $12802, $12803, $12804, $12805, $12806, $12807, $12808, VersionRange($12809, $12810)), ($12811, $12812, $12813, $12814, $12815, $12816, $12817, $12818, $12819, $12820, $12821, $12822, $12823, $12824, $12825, $12826, $12827, $12828, $12829, $12830, $12831, $12832, $12833, $12834, $12835, $12836, $12837, $12838, VersionRange($12839, $12840)), ($12841, $12842, $12843, $12844, $12845, $12846, $12847, $12848, $12849, $12850, $12851, $12852, $12853, $12854, $12855, $12856, $12857, $12858, $12859, $12860, $12861, $12862, $12863, $12864, $12865, $12866, $12867, $12868, VersionRange($12869, $12870)), ($12871, $12872, $12873, $12874, $12875, $12876, $12877, $12878, $12879, $12880, $12881, $12882, $12883, $12884, $12885, $12886, $12887, $12888, $12889, $12890, $12891, $12892, $12893, $12894, $12895, $12896, $12897, $12898, VersionRange($12899, $12900)), ($12901, $12902, $12903, $12904, $12905, $12906, $12907, $12908, $12909, $12910, $12911, $12912, $12913, $12914, $12915, $12916, $12917, $12918, $12919, $12920, $12921, $12922, $12923, $12924, $12925, $12926, $12927, $12928, VersionRange($12929, $12930)), ($12931, $12932, $12933, $12934, $12935, $12936, $12937, $12938, $12939, $12940, $12941, $12942, $12943, $12944, $12945, $12946, $12947, $12948, $12949, $12950, $12951, $12952, $12953, $12954, $12955, $12956, $12957, $12958, VersionRange($12959, $12960)), ($12961, $12962, $12963, $12964, $12965, $12966, $12967, $12968, $12969, $12970[...]
Date: 2023-07-04 18:46:09
3 1 1s328ms 1s328ms 1s328ms 1s328ms insert into vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange(?, ?)) on conflict (hash_kind, hash) do nothing;-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30)), ($31, $32, $33, $34, $35, $36, $37, $38, $39, $40, $41, $42, $43, $44, $45, $46, $47, $48, $49, $50, $51, $52, $53, $54, $55, $56, $57, $58, VersionRange($59, $60)), ($61, $62, $63, $64, $65, $66, $67, $68, $69, $70, $71, $72, $73, $74, $75, $76, $77, $78, $79, $80, $81, $82, $83, $84, $85, $86, $87, $88, VersionRange($89, $90)), ($91, $92, $93, $94, $95, $96, $97, $98, $99, $100, $101, $102, $103, $104, $105, $106, $107, $108, $109, $110, $111, $112, $113, $114, $115, $116, $117, $118, VersionRange($119, $120)), ($121, $122, $123, $124, $125, $126, $127, $128, $129, $130, $131, $132, $133, $134, $135, $136, $137, $138, $139, $140, $141, $142, $143, $144, $145, $146, $147, $148, VersionRange($149, $150)), ($151, $152, $153, $154, $155, $156, $157, $158, $159, $160, $161, $162, $163, $164, $165, $166, $167, $168, $169, $170, $171, $172, $173, $174, $175, $176, $177, $178, VersionRange($179, $180)), ($181, $182, $183, $184, $185, $186, $187, $188, $189, $190, $191, $192, $193, $194, $195, $196, $197, $198, $199, $200, $201, $202, $203, $204, $205, $206, $207, $208, VersionRange($209, $210)), ($211, $212, $213, $214, $215, $216, $217, $218, $219, $220, $221, $222, $223, $224, $225, $226, $227, $228, $229, $230, $231, $232, $233, $234, $235, $236, $237, $238, VersionRange($239, $240)), ($241, $242, $243, $244, $245, $246, $247, $248, $249, $250, $251, $252, $253, $254, $255, $256, $257, $258, $259, $260, $261, $262, $263, $264, $265, $266, $267, $268, VersionRange($269, $270)), ($271, $272, $273, $274, $275, $276, $277, $278, $279, $280, $281, $282, $283, $284, $285, $286, $287, $288, $289, $290, $291, $292, $293, $294, $295, $296, $297, $298, VersionRange($299, $300)), ($301, $302, $303, $304, $305, $306, $307, $308, $309, $310, $311, $312, $313, $314, $315, $316, $317, $318, $319, $320, $321, $322, $323, $324, $325, $326, $327, $328, VersionRange($329, $330)), ($331, $332, $333, $334, $335, $336, $337, $338, $339, $340, $341, $342, $343, $344, $345, $346, $347, $348, $349, $350, $351, $352, $353, $354, $355, $356, $357, $358, VersionRange($359, $360)), ($361, $362, $363, $364, $365, $366, $367, $368, $369, $370, $371, $372, $373, $374, $375, $376, $377, $378, $379, $380, $381, $382, $383, $384, $385, $386, $387, $388, VersionRange($389, $390)), ($391, $392, $393, $394, $395, $396, $397, $398, $399, $400, $401, $402, $403, $404, $405, $406, $407, $408, $409, $410, $411, $412, $413, $414, $415, $416, $417, $418, VersionRange($419, $420)), ($421, $422, $423, $424, $425, $426, $427, $428, $429, $430, $431, $432, $433, $434, $435, $436, $437, $438, $439, $440, $441, $442, $443, $444, $445, $446, $447, $448, VersionRange($449, $450)), ($451, $452, $453, $454, $455, $456, $457, $458, $459, $460, $461, $462, $463, $464, $465, $466, $467, $468, $469, $470, $471, $472, $473, $474, $475, $476, $477, $478, VersionRange($479, $480)), ($481, $482, $483, $484, $485, $486, $487, $488, $489, $490, $491, $492, $493, $494, $495, $496, $497, $498, $499, $500, $501, $502, $503, $504, $505, $506, $507, $508, VersionRange($509, $510)), ($511, $512, $513, $514, $515, $516, $517, $518, $519, $520, $521, $522, $523, $524, $525, $526, $527, $528, $529, $530, $531, $532, $533, $534, $535, $536, $537, $538, VersionRange($539, $540)), ($541, $542, $543, $544, $545, $546, $547, $548, $549, $550, $551, $552, $553, $554, $555, $556, $557, $558, $559, $560, $561, $562, $563, $564, $565, $566, $567, $568, VersionRange($569, $570)), ($571, $572, $573, $574, $575, $576, $577, $578, $579, $580, $581, $582, $583, $584, $585, $586, $587, $588, $589, $590, $591, $592, $593, $594, $595, $596, $597, $598, VersionRange($599, $600)), ($601, $602, $603, $604, $605, $606, $607, $608, $609, $610, $611, $612, $613, $614, $615, $616, $617, $618, $619, $620, $621, $622, $623, $624, $625, $626, $627, $628, VersionRange($629, $630)), ($631, $632, $633, $634, $635, $636, $637, $638, $639, $640, $641, $642, $643, $644, $645, $646, $647, $648, $649, $650, $651, $652, $653, $654, $655, $656, $657, $658, VersionRange($659, $660)), ($661, $662, $663, $664, $665, $666, $667, $668, $669, $670, $671, $672, $673, $674, $675, $676, $677, $678, $679, $680, $681, $682, $683, $684, $685, $686, $687, $688, VersionRange($689, $690)), ($691, $692, $693, $694, $695, $696, $697, $698, $699, $700, $701, $702, $703, $704, $705, $706, $707, $708, $709, $710, $711, $712, $713, $714, $715, $716, $717, $718, VersionRange($719, $720)), ($721, $722, $723, $724, $725, $726, $727, $728, $729, $730, $731, $732, $733, $734, $735, $736, $737, $738, $739, $740, $741, $742, $743, $744, $745, $746, $747, $748, VersionRange($749, $750)), ($751, $752, $753, $754, $755, $756, $757, $758, $759, $760, $761, $762, $763, $764, $765, $766, $767, $768, $769, $770, $771, $772, $773, $774, $775, $776, $777, $778, VersionRange($779, $780)), ($781, $782, $783, $784, $785, $786, $787, $788, $789, $790, $791, $792, $793, $794, $795, $796, $797, $798, $799, $800, $801, $802, $803, $804, $805, $806, $807, $808, VersionRange($809, $810)), ($811, $812, $813, $814, $815, $816, $817, $818, $819, $820, $821, $822, $823, $824, $825, $826, $827, $828, $829, $830, $831, $832, $833, $834, $835, $836, $837, $838, VersionRange($839, $840)), ($841, $842, $843, $844, $845, $846, $847, $848, $849, $850, $851, $852, $853, $854, $855, $856, $857, $858, $859, $860, $861, $862, $863, $864, $865, $866, $867, $868, VersionRange($869, $870)), ($871, $872, $873, $874, $875, $876, $877, $878, $879, $880, $881, $882, $883, $884, $885, $886, $887, $888, $889, $890, $891, $892, $893, $894, $895, $896, $897, $898, VersionRange($899, $900)), ($901, $902, $903, $904, $905, $906, $907, $908, $909, $910, $911, $912, $913, $914, $915, $916, $917, $918, $919, $920, $921, $922, $923, $924, $925, $926, $927, $928, VersionRange($929, $930)), ($931, $932, $933, $934, $935, $936, $937, $938, $939, $940, $941, $942, $943, $944, $945, $946, $947, $948, $949, $950, $951, $952, $953, $954, $955, $956, $957, $958, VersionRange($959, $960)), ($961, $962, $963, $964, $965, $966, $967, $968, $969, $970, $971, $972, $973, $974, $975, $976, $977, $978, $979, $980, $981, $982, $983, $984, $985, $986, $987, $988, VersionRange($989, $990)), ($991, $992, $993, $994, $995, $996, $997, $998, $999, $1000, $1001, $1002, $1003, $1004, $1005, $1006, $1007, $1008, $1009, $1010, $1011, $1012, $1013, $1014, $1015, $1016, $1017, $1018, VersionRange($1019, $1020)), ($1021, $1022, $1023, $1024, $1025, $1026, $1027, $1028, $1029, $1030, $1031, $1032, $1033, $1034, $1035, $1036, $1037, $1038, $1039, $1040, $1041, $1042, $1043, $1044, $1045, $1046, $1047, $1048, VersionRange($1049, $1050)), ($1051, $1052, $1053, $1054, $1055, $1056, $1057, $1058, $1059, $1060, $1061, $1062, $1063, $1064, $1065, $1066, $1067, $1068, $1069, $1070, $1071, $1072, $1073, $1074, $1075, $1076, $1077, $1078, VersionRange($1079, $1080)), ($1081, $1082, $1083, $1084, $1085, $1086, $1087, $1088, $1089, $1090, $1091, $1092, $1093, $1094, $1095, $1096, $1097, $1098, $1099, $1100, $1101, $1102, $1103, $1104, $1105, $1106, $1107, $1108, VersionRange($1109, $1110)), ($1111, $1112, $1113, $1114, $1115, $1116, $1117, $1118, $1119, $1120, $1121, $1122, $1123, $1124, $1125, $1126, $1127, $1128, $1129, $1130, $1131, $1132, $1133, $1134, $1135, $1136, $1137, $1138, VersionRange($1139, $1140)), ($1141, $1142, $1143, $1144, $1145, $1146, $1147, $1148, $1149, $1150, $1151, $1152, $1153, $1154, $1155, $1156, $1157, $1158, $1159, $1160, $1161, $1162, $1163, $1164, $1165, $1166, $1167, $1168, VersionRange($1169, $1170)), ($1171, $1172, $1173, $1174, $1175, $1176, $1177, $1178, $1179, $1180, $1181, $1182, $1183, $1184, $1185, $1186, $1187, $1188, $1189, $1190, $1191, $1192, $1193, $1194, $1195, $1196, $1197, $1198, VersionRange($1199, $1200)), ($1201, $1202, $1203, $1204, $1205, $1206, $1207, $1208, $1209, $1210, $1211, $1212, $1213, $1214, $1215, $1216, $1217, $1218, $1219, $1220, $1221, $1222, $1223, $1224, $1225, $1226, $1227, $1228, VersionRange($1229, $1230)), ($1231, $1232, $1233, $1234, $1235, $1236, $1237, $1238, $1239, $1240, $1241, $1242, $1243, $1244, $1245, $1246, $1247, $1248, $1249, $1250, $1251, $1252, $1253, $1254, $1255, $1256, $1257, $1258, VersionRange($1259, $1260)), ($1261, $1262, $1263, $1264, $1265, $1266, $1267, $1268, $1269, $1270, $1271, $1272, $1273, $1274, $1275, $1276, $1277, $1278, $1279, $1280, $1281, $1282, $1283, $1284, $1285, $1286, $1287, $1288, VersionRange($1289, $1290)), ($1291, $1292, $1293, $1294, $1295, $1296, $1297, $1298, $1299, $1300, $1301, $1302, $1303, $1304, $1305, $1306, $1307, $1308, $1309, $1310, $1311, $1312, $1313, $1314, $1315, $1316, $1317, $1318, VersionRange($1319, $1320)), ($1321, $1322, $1323, $1324, $1325, $1326, $1327, $1328, $1329, $1330, $1331, $1332, $1333, $1334, $1335, $1336, $1337, $1338, $1339, $1340, $1341, $1342, $1343, $1344, $1345, $1346, $1347, $1348, VersionRange($1349, $1350)), ($1351, $1352, $1353, $1354, $1355, $1356, $1357, $1358, $1359, $1360, $1361, $1362, $1363, $1364, $1365, $1366, $1367, $1368, $1369, $1370, $1371, $1372, $1373, $1374, $1375, $1376, $1377, $1378, VersionRange($1379, $1380)), ($1381, $1382, $1383, $1384, $1385, $1386, $1387, $1388, $1389, $1390, $1391, $1392, $1393, $1394, $1395, $1396, $1397, $1398, $1399, $1400, $1401, $1402, $1403, $1404, $1405, $1406, $1407, $1408, VersionRange($1409, $1410)), ($1411, $1412, $1413, $1414, $1415, $1416, $1417, $1418, $1419, $1420, $1421, $1422, $1423, $1424, $1425, $1426, $1427, $1428, $1429, $1430, $1431, $1432, $1433, $1434, $1435, $1436, $1437, $1438, VersionRange($1439, $1440)), ($1441, $1442, $1443, $1444, $1445, $1446, $1447, $1448, $1449, $1450, $1451, $1452, $1453, $1454, $1455, $1456, $1457, $1458, $1459, $1460, $1461, $1462, $1463, $1464, $1465, $1466, $1467, $1468, VersionRange($1469, $1470)), ($1471, $1472, $1473, $1474, $1475, $1476, $1477, $1478, $1479, $1480, $1481, $1482, $1483, $1484, $1485, $1486, $1487, $1488, $1489, $1490, $1491, $1492, $1493, $1494, $1495, $1496, $1497, $1498, VersionRange($1499, $1500)), ($1501, $1502, $1503, $1504, $1505, $1506, $1507, $1508, $1509, $1510, $1511, $1512, $1513, $1514, $1515, $1516, $1517, $1518, $1519, $1520, $1521, $1522, $1523, $1524, $1525, $1526, $1527, $1528, VersionRange($1529, $1530)), ($1531, $1532, $1533, $1534, $1535, $1536, $1537, $1538, $1539, $1540, $1541, $1542, $1543, $1544, $1545, $1546, $1547, $1548, $1549, $1550, $1551, $1552, $1553, $1554, $1555, $1556, $1557, $1558, VersionRange($1559, $1560)), ($1561, $1562, $1563, $1564, $1565, $1566, $1567, $1568, $1569, $1570, $1571, $1572, $1573, $1574, $1575, $1576, $1577, $1578, $1579, $1580, $1581, $1582, $1583, $1584, $1585, $1586, $1587, $1588, VersionRange($1589, $1590)), ($1591, $1592, $1593, $1594, $1595, $1596, $1597, $1598, $1599, $1600, $1601, $1602, $1603, $1604, $1605, $1606, $1607, $1608, $1609, $1610, $1611, $1612, $1613, $1614, $1615, $1616, $1617, $1618, VersionRange($1619, $1620)), ($1621, $1622, $1623, $1624, $1625, $1626, $1627, $1628, $1629, $1630, $1631, $1632, $1633, $1634, $1635, $1636, $1637, $1638, $1639, $1640, $1641, $1642, $1643, $1644, $1645, $1646, $1647, $1648, VersionRange($1649, $1650)), ($1651, $1652, $1653, $1654, $1655, $1656, $1657, $1658, $1659, $1660, $1661, $1662, $1663, $1664, $1665, $1666, $1667, $1668, $1669, $1670, $1671, $1672, $1673, $1674, $1675, $1676, $1677, $1678, VersionRange($1679, $1680)), ($1681, $1682, $1683, $1684, $1685, $1686, $1687, $1688, $1689, $1690, $1691, $1692, $1693, $1694, $1695, $1696, $1697, $1698, $1699, $1700, $1701, $1702, $1703, $1704, $1705, $1706, $1707, $1708, VersionRange($1709, $1710)), ($1711, $1712, $1713, $1714, $1715, $1716, $1717, $1718, $1719, $1720, $1721, $1722, $1723, $1724, $1725, $1726, $1727, $1728, $1729, $1730, $1731, $1732, $1733, $1734, $1735, $1736, $1737, $1738, VersionRange($1739, $1740)), ($1741, $1742, $1743, $1744, $1745, $1746, $1747, $1748, $1749, $1750, $1751, $1752, $1753, $1754, $1755, $1756, $1757, $1758, $1759, $1760, $1761, $1762, $1763, $1764, $1765, $1766, $1767, $1768, VersionRange($1769, $1770)), ($1771, $1772, $1773, $1774, $1775, $1776, $1777, $1778, $1779, $1780, $1781, $1782, $1783, $1784, $1785, $1786, $1787, $1788, $1789, $1790, $1791, $1792, $1793, $1794, $1795, $1796, $1797, $1798, VersionRange($1799, $1800)), ($1801, $1802, $1803, $1804, $1805, $1806, $1807, $1808, $1809, $1810, $1811, $1812, $1813, $1814, $1815, $1816, $1817, $1818, $1819, $1820, $1821, $1822, $1823, $1824, $1825, $1826, $1827, $1828, VersionRange($1829, $1830)), ($1831, $1832, $1833, $1834, $1835, $1836, $1837, $1838, $1839, $1840, $1841, $1842, $1843, $1844, $1845, $1846, $1847, $1848, $1849, $1850, $1851, $1852, $1853, $1854, $1855, $1856, $1857, $1858, VersionRange($1859, $1860)), ($1861, $1862, $1863, $1864, $1865, $1866, $1867, $1868, $1869, $1870, $1871, $1872, $1873, $1874, $1875, $1876, $1877, $1878, $1879, $1880, $1881, $1882, $1883, $1884, $1885, $1886, $1887, $1888, VersionRange($1889, $1890)), ($1891, $1892, $1893, $1894, $1895, $1896, $1897, $1898, $1899, $1900, $1901, $1902, $1903, $1904, $1905, $1906, $1907, $1908, $1909, $1910, $1911, $1912, $1913, $1914, $1915, $1916, $1917, $1918, VersionRange($1919, $1920)), ($1921, $1922, $1923, $1924, $1925, $1926, $1927, $1928, $1929, $1930, $1931, $1932, $1933, $1934, $1935, $1936, $1937, $1938, $1939, $1940, $1941, $1942, $1943, $1944, $1945, $1946, $1947, $1948, VersionRange($1949, $1950)), ($1951, $1952, $1953, $1954, $1955, $1956, $1957, $1958, $1959, $1960, $1961, $1962, $1963, $1964, $1965, $1966, $1967, $1968, $1969, $1970, $1971, $1972, $1973, $1974, $1975, $1976, $1977, $1978, VersionRange($1979, $1980)), ($1981, $1982, $1983, $1984, $1985, $1986, $1987, $1988, $1989, $1990, $1991, $1992, $1993, $1994, $1995, $1996, $1997, $1998, $1999, $2000, $2001, $2002, $2003, $2004, $2005, $2006, $2007, $2008, VersionRange($2009, $2010)), ($2011, $2012, $2013, $2014, $2015, $2016, $2017, $2018, $2019, $2020, $2021, $2022, $2023, $2024, $2025, $2026, $2027, $2028, $2029, $2030, $2031, $2032, $2033, $2034, $2035, $2036, $2037, $2038, VersionRange($2039, $2040)), ($2041, $2042, $2043, $2044, $2045, $2046, $2047, $2048, $2049, $2050, $2051, $2052, $2053, $2054, $2055, $2056, $2057, $2058, $2059, $2060, $2061, $2062, $2063, $2064, $2065, $2066, $2067, $2068, VersionRange($2069, $2070)), ($2071, $2072, $2073, $2074, $2075, $2076, $2077, $2078, $2079, $2080, $2081, $2082, $2083, $2084, $2085, $2086, $2087, $2088, $2089, $2090, $2091, $2092, $2093, $2094, $2095, $2096, $2097, $2098, VersionRange($2099, $2100)), ($2101, $2102, $2103, $2104, $2105, $2106, $2107, $2108, $2109, $2110, $2111, $2112, $2113, $2114, $2115, $2116, $2117, $2118, $2119, $2120, $2121, $2122, $2123, $2124, $2125, $2126, $2127, $2128, VersionRange($2129, $2130)), ($2131, $2132, $2133, $2134, $2135, $2136, $2137, $2138, $2139, $2140, $2141, $2142, $2143, $2144, $2145, $2146, $2147, $2148, $2149, $2150, $2151, $2152, $2153, $2154, $2155, $2156, $2157, $2158, VersionRange($2159, $2160)), ($2161, $2162, $2163, $2164, $2165, $2166, $2167, $2168, $2169, $2170, $2171, $2172, $2173, $2174, $2175, $2176, $2177, $2178, $2179, $2180, $2181, $2182, $2183, $2184, $2185, $2186, $2187, $2188, VersionRange($2189, $2190)), ($2191, $2192, $2193, $2194, $2195, $2196, $2197, $2198, $2199, $2200, $2201, $2202, $2203, $2204, $2205, $2206, $2207, $2208, $2209, $2210, $2211, $2212, $2213, $2214, $2215, $2216, $2217, $2218, VersionRange($2219, $2220)), ($2221, $2222, $2223, $2224, $2225, $2226, $2227, $2228, $2229, $2230, $2231, $2232, $2233, $2234, $2235, $2236, $2237, $2238, $2239, $2240, $2241, $2242, $2243, $2244, $2245, $2246, $2247, $2248, VersionRange($2249, $2250)), ($2251, $2252, $2253, $2254, $2255, $2256, $2257, $2258, $2259, $2260, $2261, $2262, $2263, $2264, $2265, $2266, $2267, $2268, $2269, $2270, $2271, $2272, $2273, $2274, $2275, $2276, $2277, $2278, VersionRange($2279, $2280)), ($2281, $2282, $2283, $2284, $2285, $2286, $2287, $2288, $2289, $2290, $2291, $2292, $2293, $2294, $2295, $2296, $2297, $2298, $2299, $2300, $2301, $2302, $2303, $2304, $2305, $2306, $2307, $2308, VersionRange($2309, $2310)), ($2311, $2312, $2313, $2314, $2315, $2316, $2317, $2318, $2319, $2320, $2321, $2322, $2323, $2324, $2325, $2326, $2327, $2328, $2329, $2330, $2331, $2332, $2333, $2334, $2335, $2336, $2337, $2338, VersionRange($2339, $2340)), ($2341, $2342, $2343, $2344, $2345, $2346, $2347, $2348, $2349, $2350, $2351, $2352, $2353, $2354, $2355, $2356, $2357, $2358, $2359, $2360, $2361, $2362, $2363, $2364, $2365, $2366, $2367, $2368, VersionRange($2369, $2370)), ($2371, $2372, $2373, $2374, $2375, $2376, $2377, $2378, $2379, $2380, $2381, $2382, $2383, $2384, $2385, $2386, $2387, $2388, $2389, $2390, $2391, $2392, $2393, $2394, $2395, $2396, $2397, $2398, VersionRange($2399, $2400)), ($2401, $2402, $2403, $2404, $2405, $2406, $2407, $2408, $2409, $2410, $2411, $2412, $2413, $2414, $2415, $2416, $2417, $2418, $2419, $2420, $2421, $2422, $2423, $2424, $2425, $2426, $2427, $2428, VersionRange($2429, $2430)), ($2431, $2432, $2433, $2434, $2435, $2436, $2437, $2438, $2439, $2440, $2441, $2442, $2443, $2444, $2445, $2446, $2447, $2448, $2449, $2450, $2451, $2452, $2453, $2454, $2455, $2456, $2457, $2458, VersionRange($2459, $2460)), ($2461, $2462, $2463, $2464, $2465, $2466, $2467, $2468, $2469, $2470, $2471, $2472, $2473, $2474, $2475, $2476, $2477, $2478, $2479, $2480, $2481, $2482, $2483, $2484, $2485, $2486, $2487, $2488, VersionRange($2489, $2490)), ($2491, $2492, $2493, $2494, $2495, $2496, $2497, $2498, $2499, $2500, $2501, $2502, $2503, $2504, $2505, $2506, $2507, $2508, $2509, $2510, $2511, $2512, $2513, $2514, $2515, $2516, $2517, $2518, VersionRange($2519, $2520)), ($2521, $2522, $2523, $2524, $2525, $2526, $2527, $2528, $2529, $2530, $2531, $2532, $2533, $2534, $2535, $2536, $2537, $2538, $2539, $2540, $2541, $2542, $2543, $2544, $2545, $2546, $2547, $2548, VersionRange($2549, $2550)), ($2551, $2552, $2553, $2554, $2555, $2556, $2557, $2558, $2559, $2560, $2561, $2562, $2563, $2564, $2565, $2566, $2567, $2568, $2569, $2570, $2571, $2572, $2573, $2574, $2575, $2576, $2577, $2578, VersionRange($2579, $2580)), ($2581, $2582, $2583, $2584, $2585, $2586, $2587, $2588, $2589, $2590, $2591, $2592, $2593, $2594, $2595, $2596, $2597, $2598, $2599, $2600, $2601, $2602, $2603, $2604, $2605, $2606, $2607, $2608, VersionRange($2609, $2610)), ($2611, $2612, $2613, $2614, $2615, $2616, $2617, $2618, $2619, $2620, $2621, $2622, $2623, $2624, $2625, $2626, $2627, $2628, $2629, $2630, $2631, $2632, $2633, $2634, $2635, $2636, $2637, $2638, VersionRange($2639, $2640)), ($2641, $2642, $2643, $2644, $2645, $2646, $2647, $2648, $2649, $2650, $2651, $2652, $2653, $2654, $2655, $2656, $2657, $2658, $2659, $2660, $2661, $2662, $2663, $2664, $2665, $2666, $2667, $2668, VersionRange($2669, $2670)), ($2671, $2672, $2673, $2674, $2675, $2676, $2677, $2678, $2679, $2680, $2681, $2682, $2683, $2684, $2685, $2686, $2687, $2688, $2689, $2690, $2691, $2692, $2693, $2694, $2695, $2696, $2697, $2698, VersionRange($2699, $2700)), ($2701, $2702, $2703, $2704, $2705, $2706, $2707, $2708, $2709, $2710, $2711, $2712, $2713, $2714, $2715, $2716, $2717, $2718, $2719, $2720, $2721, $2722, $2723, $2724, $2725, $2726, $2727, $2728, VersionRange($2729, $2730)), ($2731, $2732, $2733, $2734, $2735, $2736, $2737, $2738, $2739, $2740, $2741, $2742, $2743, $2744, $2745, $2746, $2747, $2748, $2749, $2750, $2751, $2752, $2753, $2754, $2755, $2756, $2757, $2758, VersionRange($2759, $2760)), ($2761, $2762, $2763, $2764, $2765, $2766, $2767, $2768, $2769, $2770, $2771, $2772, $2773, $2774, $2775, $2776, $2777, $2778, $2779, $2780, $2781, $2782, $2783, $2784, $2785, $2786, $2787, $2788, VersionRange($2789, $2790)), ($2791, $2792, $2793, $2794, $2795, $2796, $2797, $2798, $2799, $2800, $2801, $2802, $2803, $2804, $2805, $2806, $2807, $2808, $2809, $2810, $2811, $2812, $2813, $2814, $2815, $2816, $2817, $2818, VersionRange($2819, $2820)), ($2821, $2822, $2823, $2824, $2825, $2826, $2827, $2828, $2829, $2830, $2831, $2832, $2833, $2834, $2835, $2836, $2837, $2838, $2839, $2840, $2841, $2842, $2843, $2844, $2845, $2846, $2847, $2848, VersionRange($2849, $2850)), ($2851, $2852, $2853, $2854, $2855, $2856, $2857, $2858, $2859, $2860, $2861, $2862, $2863, $2864, $2865, $2866, $2867, $2868, $2869, $2870, $2871, $2872, $2873, $2874, $2875, $2876, $2877, $2878, VersionRange($2879, $2880)), ($2881, $2882, $2883, $2884, $2885, $2886, $2887, $2888, $2889, $2890, $2891, $2892, $2893, $2894, $2895, $2896, $2897, $2898, $2899, $2900, $2901, $2902, $2903, $2904, $2905, $2906, $2907, $2908, VersionRange($2909, $2910)), ($2911, $2912, $2913, $2914, $2915, $2916, $2917, $2918, $2919, $2920, $2921, $2922, $2923, $2924, $2925, $2926, $2927, $2928, $2929, $2930, $2931, $2932, $2933, $2934, $2935, $2936, $2937, $2938, VersionRange($2939, $2940)), ($2941, $2942, $2943, $2944, $2945, $2946, $2947, $2948, $2949, $2950, $2951, $2952, $2953, $2954, $2955, $2956, $2957, $2958, $2959, $2960, $2961, $2962, $2963, $2964, $2965, $2966, $2967, $2968, VersionRange($2969, $2970)), ($2971, $2972, $2973, $2974, $2975, $2976, $2977, $2978, $2979, $2980, $2981, $2982, $2983, $2984, $2985, $2986, $2987, $2988, $2989, $2990, $2991, $2992, $2993, $2994, $2995, $2996, $2997, $2998, VersionRange($2999, $3000)), ($3001, $3002, $3003, $3004, $3005, $3006, $3007, $3008, $3009, $3010, $3011, $3012, $3013, $3014, $3015, $3016, $3017, $3018, $3019, $3020, $3021, $3022, $3023, $3024, $3025, $3026, $3027, $3028, VersionRange($3029, $3030)), ($3031, $3032, $3033, $3034, $3035, $3036, $3037, $3038, $3039, $3040, $3041, $3042, $3043, $3044, $3045, $3046, $3047, $3048, $3049, $3050, $3051, $3052, $3053, $3054, $3055, $3056, $3057, $3058, VersionRange($3059, $3060)), ($3061, $3062, $3063, $3064, $3065, $3066, $3067, $3068, $3069, $3070, $3071, $3072, $3073, $3074, $3075, $3076, $3077, $3078, $3079, $3080, $3081, $3082, $3083, $3084, $3085, $3086, $3087, $3088, VersionRange($3089, $3090)), ($3091, $3092, $3093, $3094, $3095, $3096, $3097, $3098, $3099, $3100, $3101, $3102, $3103, $3104, $3105, $3106, $3107, $3108, $3109, $3110, $3111, $3112, $3113, $3114, $3115, $3116, $3117, $3118, VersionRange($3119, $3120)), ($3121, $3122, $3123, $3124, $3125, $3126, $3127, $3128, $3129, $3130, $3131, $3132, $3133, $3134, $3135, $3136, $3137, $3138, $3139, $3140, $3141, $3142, $3143, $3144, $3145, $3146, $3147, $3148, VersionRange($3149, $3150)), ($3151, $3152, $3153, $3154, $3155, $3156, $3157, $3158, $3159, $3160, $3161, $3162, $3163, $3164, $3165, $3166, $3167, $3168, $3169, $3170, $3171, $3172, $3173, $3174, $3175, $3176, $3177, $3178, VersionRange($3179, $3180)), ($3181, $3182, $3183, $3184, $3185, $3186, $3187, $3188, $3189, $3190, $3191, $3192, $3193, $3194, $3195, $3196, $3197, $3198, $3199, $3200, $3201, $3202, $3203, $3204, $3205, $3206, $3207, $3208, VersionRange($3209, $3210)), ($3211, $3212, $3213, $3214, $3215, $3216, $3217, $3218, $3219, $3220, $3221, $3222, $3223, $3224, $3225, $3226, $3227, $3228, $3229, $3230, $3231, $3232, $3233, $3234, $3235, $3236, $3237, $3238, VersionRange($3239, $3240)), ($3241, $3242, $3243, $3244, $3245, $3246, $3247, $3248, $3249, $3250, $3251, $3252, $3253, $3254, $3255, $3256, $3257, $3258, $3259, $3260, $3261, $3262, $3263, $3264, $3265, $3266, $3267, $3268, VersionRange($3269, $3270)), ($3271, $3272, $3273, $3274, $3275, $3276, $3277, $3278, $3279, $3280, $3281, $3282, $3283, $3284, $3285, $3286, $3287, $3288, $3289, $3290, $3291, $3292, $3293, $3294, $3295, $3296, $3297, $3298, VersionRange($3299, $3300)), ($3301, $3302, $3303, $3304, $3305, $3306, $3307, $3308, $3309, $3310, $3311, $3312, $3313, $3314, $3315, $3316, $3317, $3318, $3319, $3320, $3321, $3322, $3323, $3324, $3325, $3326, $3327, $3328, VersionRange($3329, $3330)), ($3331, $3332, $3333, $3334, $3335, $3336, $3337, $3338, $3339, $3340, $3341, $3342, $3343, $3344, $3345, $3346, $3347, $3348, $3349, $3350, $3351, $3352, $3353, $3354, $3355, $3356, $3357, $3358, VersionRange($3359, $3360)), ($3361, $3362, $3363, $3364, $3365, $3366, $3367, $3368, $3369, $3370, $3371, $3372, $3373, $3374, $3375, $3376, $3377, $3378, $3379, $3380, $3381, $3382, $3383, $3384, $3385, $3386, $3387, $3388, VersionRange($3389, $3390)), ($3391, $3392, $3393, $3394, $3395, $3396, $3397, $3398, $3399, $3400, $3401, $3402, $3403, $3404, $3405, $3406, $3407, $3408, $3409, $3410, $3411, $3412, $3413, $3414, $3415, $3416, $3417, $3418, VersionRange($3419, $3420)), ($3421, $3422, $3423, $3424, $3425, $3426, $3427, $3428, $3429, $3430, $3431, $3432, $3433, $3434, $3435, $3436, $3437, $3438, $3439, $3440, $3441, $3442, $3443, $3444, $3445, $3446, $3447, $3448, VersionRange($3449, $3450)), ($3451, $3452, $3453, $3454, $3455, $3456, $3457, $3458, $3459, $3460, $3461, $3462, $3463, $3464, $3465, $3466, $3467, $3468, $3469, $3470, $3471, $3472, $3473, $3474, $3475, $3476, $3477, $3478, VersionRange($3479, $3480)), ($3481, $3482, $3483, $3484, $3485, $3486, $3487, $3488, $3489, $3490, $3491, $3492, $3493, $3494, $3495, $3496, $3497, $3498, $3499, $3500, $3501, $3502, $3503, $3504, $3505, $3506, $3507, $3508, VersionRange($3509, $3510)), ($3511, $3512, $3513, $3514, $3515, $3516, $3517, $3518, $3519, $3520, $3521, $3522, $3523, $3524, $3525, $3526, $3527, $3528, $3529, $3530, $3531, $3532, $3533, $3534, $3535, $3536, $3537, $3538, VersionRange($3539, $3540)), ($3541, $3542, $3543, $3544, $3545, $3546, $3547, $3548, $3549, $3550, $3551, $3552, $3553, $3554, $3555, $3556, $3557, $3558, $3559, $3560, $3561, $3562, $3563, $3564, $3565, $3566, $3567, $3568, VersionRange($3569, $3570)), ($3571, $3572, $3573, $3574, $3575, $3576, $3577, $3578, $3579, $3580, $3581, $3582, $3583, $3584, $3585, $3586, $3587, $3588, $3589, $3590, $3591, $3592, $3593, $3594, $3595, $3596, $3597, $3598, VersionRange($3599, $3600)), ($3601, $3602, $3603, $3604, $3605, $3606, $3607, $3608, $3609, $3610, $3611, $3612, $3613, $3614, $3615, $3616, $3617, $3618, $3619, $3620, $3621, $3622, $3623, $3624, $3625, $3626, $3627, $3628, VersionRange($3629, $3630)), ($3631, $3632, $3633, $3634, $3635, $3636, $3637, $3638, $3639, $3640, $3641, $3642, $3643, $3644, $3645, $3646, $3647, $3648, $3649, $3650, $3651, $3652, $3653, $3654, $3655, $3656, $3657, $3658, VersionRange($3659, $3660)), ($3661, $3662, $3663, $3664, $3665, $3666, $3667, $3668, $3669, $3670, $3671, $3672, $3673, $3674, $3675, $3676, $3677, $3678, $3679, $3680, $3681, $3682, $3683, $3684, $3685, $3686, $3687, $3688, VersionRange($3689, $3690)), ($3691, $3692, $3693, $3694, $3695, $3696, $3697, $3698, $3699, $3700, $3701, $3702, $3703, $3704, $3705, $3706, $3707, $3708, $3709, $3710, $3711, $3712, $3713, $3714, $3715, $3716, $3717, $3718, VersionRange($3719, $3720)), ($3721, $3722, $3723, $3724, $3725, $3726, $3727, $3728, $3729, $3730, $3731, $3732, $3733, $3734, $3735, $3736, $3737, $3738, $3739, $3740, $3741, $3742, $3743, $3744, $3745, $3746, $3747, $3748, VersionRange($3749, $3750)), ($3751, $3752, $3753, $3754, $3755, $3756, $3757, $3758, $3759, $3760, $3761, $3762, $3763, $3764, $3765, $3766, $3767, $3768, $3769, $3770, $3771, $3772, $3773, $3774, $3775, $3776, $3777, $3778, VersionRange($3779, $3780)), ($3781, $3782, $3783, $3784, $3785, $3786, $3787, $3788, $3789, $3790, $3791, $3792, $3793, $3794, $3795, $3796, $3797, $3798, $3799, $3800, $3801, $3802, $3803, $3804, $3805, $3806, $3807, $3808, VersionRange($3809, $3810)), ($3811, $3812, $3813, $3814, $3815, $3816, $3817, $3818, $3819, $3820, $3821, $3822, $3823, $3824, $3825, $3826, $3827, $3828, $3829, $3830, $3831, $3832, $3833, $3834, $3835, $3836, $3837, $3838, VersionRange($3839, $3840)), ($3841, $3842, $3843, $3844, $3845, $3846, $3847, $3848, $3849, $3850, $3851, $3852, $3853, $3854, $3855, $3856, $3857, $3858, $3859, $3860, $3861, $3862, $3863, $3864, $3865, $3866, $3867, $3868, VersionRange($3869, $3870)), ($3871, $3872, $3873, $3874, $3875, $3876, $3877, $3878, $3879, $3880, $3881, $3882, $3883, $3884, $3885, $3886, $3887, $3888, $3889, $3890, $3891, $3892, $3893, $3894, $3895, $3896, $3897, $3898, VersionRange($3899, $3900)), ($3901, $3902, $3903, $3904, $3905, $3906, $3907, $3908, $3909, $3910, $3911, $3912, $3913, $3914, $3915, $3916, $3917, $3918, $3919, $3920, $3921, $3922, $3923, $3924, $3925, $3926, $3927, $3928, VersionRange($3929, $3930)), ($3931, $3932, $3933, $3934, $3935, $3936, $3937, $3938, $3939, $3940, $3941, $3942, $3943, $3944, $3945, $3946, $3947, $3948, $3949, $3950, $3951, $3952, $3953, $3954, $3955, $3956, $3957, $3958, VersionRange($3959, $3960)), ($3961, $3962, $3963, $3964, $3965, $3966, $3967, $3968, $3969, $3970, $3971, $3972, $3973, $3974, $3975, $3976, $3977, $3978, $3979, $3980, $3981, $3982, $3983, $3984, $3985, $3986, $3987, $3988, VersionRange($3989, $3990)), ($3991, $3992, $3993, $3994, $3995, $3996, $3997, $3998, $3999, $4000, $4001, $4002, $4003, $4004, $4005, $4006, $4007, $4008, $4009, $4010, $4011, $4012, $4013, $4014, $4015, $4016, $4017, $4018, VersionRange($4019, $4020)), ($4021, $4022, $4023, $4024, $4025, $4026, $4027, $4028, $4029, $4030, $4031, $4032, $4033, $4034, $4035, $4036, $4037, $4038, $4039, $4040, $4041, $4042, $4043, $4044, $4045, $4046, $4047, $4048, VersionRange($4049, $4050)), ($4051, $4052, $4053, $4054, $4055, $4056, $4057, $4058, $4059, $4060, $4061, $4062, $4063, $4064, $4065, $4066, $4067, $4068, $4069, $4070, $4071, $4072, $4073, $4074, $4075, $4076, $4077, $4078, VersionRange($4079, $4080)), ($4081, $4082, $4083, $4084, $4085, $4086, $4087, $4088, $4089, $4090, $4091, $4092, $4093, $4094, $4095, $4096, $4097, $4098, $4099, $4100, $4101, $4102, $4103, $4104, $4105, $4106, $4107, $4108, VersionRange($4109, $4110)), ($4111, $4112, $4113, $4114, $4115, $4116, $4117, $4118, $4119, $4120, $4121, $4122, $4123, $4124, $4125, $4126, $4127, $4128, $4129, $4130, $4131, $4132, $4133, $4134, $4135, $4136, $4137, $4138, VersionRange($4139, $4140)), ($4141, $4142, $4143, $4144, $4145, $4146, $4147, $4148, $4149, $4150, $4151, $4152, $4153, $4154, $4155, $4156, $4157, $4158, $4159, $4160, $4161, $4162, $4163, $4164, $4165, $4166, $4167, $4168, VersionRange($4169, $4170)), ($4171, $4172, $4173, $4174, $4175, $4176, $4177, $4178, $4179, $4180, $4181, $4182, $4183, $4184, $4185, $4186, $4187, $4188, $4189, $4190, $4191, $4192, $4193, $4194, $4195, $4196, $4197, $4198, VersionRange($4199, $4200)), ($4201, $4202, $4203, $4204, $4205, $4206, $4207, $4208, $4209, $4210, $4211, $4212, $4213, $4214, $4215, $4216, $4217, $4218, $4219, $4220, $4221, $4222, $4223, $4224, $4225, $4226, $4227, $4228, VersionRange($4229, $4230)), ($4231, $4232, $4233, $4234, $4235, $4236, $4237, $4238, $4239, $4240, $4241, $4242, $4243, $4244, $4245, $4246, $4247, $4248, $4249, $4250, $4251, $4252, $4253, $4254, $4255, $4256, $4257, $4258, VersionRange($4259, $4260)), ($4261, $4262, $4263, $4264, $4265, $4266, $4267, $4268, $4269, $4270, $4271, $4272, $4273, $4274, $4275, $4276, $4277, $4278, $4279, $4280, $4281, $4282, $4283, $4284, $4285, $4286, $4287, $4288, VersionRange($4289, $4290)), ($4291, $4292, $4293, $4294, $4295, $4296, $4297, $4298, $4299, $4300, $4301, $4302, $4303, $4304, $4305, $4306, $4307, $4308, $4309, $4310, $4311, $4312, $4313, $4314, $4315, $4316, $4317, $4318, VersionRange($4319, $4320)), ($4321, $4322, $4323, $4324, $4325, $4326, $4327, $4328, $4329, $4330, $4331, $4332, $4333, $4334, $4335, $4336, $4337, $4338, $4339, $4340, $4341, $4342, $4343, $4344, $4345, $4346, $4347, $4348, VersionRange($4349, $4350)), ($4351, $4352, $4353, $4354, $4355, $4356, $4357, $4358, $4359, $4360, $4361, $4362, $4363, $4364, $4365, $4366, $4367, $4368, $4369, $4370, $4371, $4372, $4373, $4374, $4375, $4376, $4377, $4378, VersionRange($4379, $4380)), ($4381, $4382, $4383, $4384, $4385, $4386, $4387, $4388, $4389, $4390, $4391, $4392, $4393, $4394, $4395, $4396, $4397, $4398, $4399, $4400, $4401, $4402, $4403, $4404, $4405, $4406, $4407, $4408, VersionRange($4409, $4410)), ($4411, $4412, $4413, $4414, $4415, $4416, $4417, $4418, $4419, $4420, $4421, $4422, $4423, $4424, $4425, $4426, $4427, $4428, $4429, $4430, $4431, $4432, $4433, $4434, $4435, $4436, $4437, $4438, VersionRange($4439, $4440)), ($4441, $4442, $4443, $4444, $4445, $4446, $4447, $4448, $4449, $4450, $4451, $4452, $4453, $4454, $4455, $4456, $4457, $4458, $4459, $4460, $4461, $4462, $4463, $4464, $4465, $4466, $4467, $4468, VersionRange($4469, $4470)), ($4471, $4472, $4473, $4474, $4475, $4476, $4477, $4478, $4479, $4480, $4481, $4482, $4483, $4484, $4485, $4486, $4487, $4488, $4489, $4490, $4491, $4492, $4493, $4494, $4495, $4496, $4497, $4498, VersionRange($4499, $4500)), ($4501, $4502, $4503, $4504, $4505, $4506, $4507, $4508, $4509, $4510, $4511, $4512, $4513, $4514, $4515, $4516, $4517, $4518, $4519, $4520, $4521, $4522, $4523, $4524, $4525, $4526, $4527, $4528, VersionRange($4529, $4530)), ($4531, $4532, $4533, $4534, $4535, $4536, $4537, $4538, $4539, $4540, $4541, $4542, $4543, $4544, $4545, $4546, $4547, $4548, $4549, $4550, $4551, $4552, $4553, $4554, $4555, $4556, $4557, $4558, VersionRange($4559, $4560)), ($4561, $4562, $4563, $4564, $4565, $4566, $4567, $4568, $4569, $4570, $4571, $4572, $4573, $4574, $4575, $4576, $4577, $4578, $4579, $4580, $4581, $4582, $4583, $4584, $4585, $4586, $4587, $4588, VersionRange($4589, $4590)), ($4591, $4592, $4593, $4594, $4595, $4596, $4597, $4598, $4599, $4600, $4601, $4602, $4603, $4604, $4605, $4606, $4607, $4608, $4609, $4610, $4611, $4612, $4613, $4614, $4615, $4616, $4617, $4618, VersionRange($4619, $4620)), ($4621, $4622, $4623, $4624, $4625, $4626, $4627, $4628, $4629, $4630, $4631, $4632, $4633, $4634, $4635, $4636, $4637, $4638, $4639, $4640, $4641, $4642, $4643, $4644, $4645, $4646, $4647, $4648, VersionRange($4649, $4650)), ($4651, $4652, $4653, $4654, $4655, $4656, $4657, $4658, $4659, $4660, $4661, $4662, $4663, $4664, $4665, $4666, $4667, $4668, $4669, $4670, $4671, $4672, $4673, $4674, $4675, $4676, $4677, $4678, VersionRange($4679, $4680)), ($4681, $4682, $4683, $4684, $4685, $4686, $4687, $4688, $4689, $4690, $4691, $4692, $4693, $4694, $4695, $4696, $4697, $4698, $4699, $4700, $4701, $4702, $4703, $4704, $4705, $4706, $4707, $4708, VersionRange($4709, $4710)), ($4711, $4712, $4713, $4714, $4715, $4716, $4717, $4718, $4719, $4720, $4721, $4722, $4723, $4724, $4725, $4726, $4727, $4728, $4729, $4730, $4731, $4732, $4733, $4734, $4735, $4736, $4737, $4738, VersionRange($4739, $4740)), ($4741, $4742, $4743, $4744, $4745, $4746, $4747, $4748, $4749, $4750, $4751, $4752, $4753, $4754, $4755, $4756, $4757, $4758, $4759, $4760, $4761, $4762, $4763, $4764, $4765, $4766, $4767, $4768, VersionRange($4769, $4770)), ($4771, $4772, $4773, $4774, $4775, $4776, $4777, $4778, $4779, $4780, $4781, $4782, $4783, $4784, $4785, $4786, $4787, $4788, $4789, $4790, $4791, $4792, $4793, $4794, $4795, $4796, $4797, $4798, VersionRange($4799, $4800)), ($4801, $4802, $4803, $4804, $4805, $4806, $4807, $4808, $4809, $4810, $4811, $4812, $4813, $4814, $4815, $4816, $4817, $4818, $4819, $4820, $4821, $4822, $4823, $4824, $4825, $4826, $4827, $4828, VersionRange($4829, $4830)), ($4831, $4832, $4833, $4834, $4835, $4836, $4837, $4838, $4839, $4840, $4841, $4842, $4843, $4844, $4845, $4846, $4847, $4848, $4849, $4850, $4851, $4852, $4853, $4854, $4855, $4856, $4857, $4858, VersionRange($4859, $4860)), ($4861, $4862, $4863, $4864, $4865, $4866, $4867, $4868, $4869, $4870, $4871, $4872, $4873, $4874, $4875, $4876, $4877, $4878, $4879, $4880, $4881, $4882, $4883, $4884, $4885, $4886, $4887, $4888, VersionRange($4889, $4890)), ($4891, $4892, $4893, $4894, $4895, $4896, $4897, $4898, $4899, $4900, $4901, $4902, $4903, $4904, $4905, $4906, $4907, $4908, $4909, $4910, $4911, $4912, $4913, $4914, $4915, $4916, $4917, $4918, VersionRange($4919, $4920)), ($4921, $4922, $4923, $4924, $4925, $4926, $4927, $4928, $4929, $4930, $4931, $4932, $4933, $4934, $4935, $4936, $4937, $4938, $4939, $4940, $4941, $4942, $4943, $4944, $4945, $4946, $4947, $4948, VersionRange($4949, $4950)), ($4951, $4952, $4953, $4954, $4955, $4956, $4957, $4958, $4959, $4960, $4961, $4962, $4963, $4964, $4965, $4966, $4967, $4968, $4969, $4970, $4971, $4972, $4973, $4974, $4975, $4976, $4977, $4978, VersionRange($4979, $4980)), ($4981, $4982, $4983, $4984, $4985, $4986, $4987, $4988, $4989, $4990, $4991, $4992, $4993, $4994, $4995, $4996, $4997, $4998, $4999, $5000, $5001, $5002, $5003, $5004, $5005, $5006, $5007, $5008, VersionRange($5009, $5010)), ($5011, $5012, $5013, $5014, $5015, $5016, $5017, $5018, $5019, $5020, $5021, $5022, $5023, $5024, $5025, $5026, $5027, $5028, $5029, $5030, $5031, $5032, $5033, $5034, $5035, $5036, $5037, $5038, VersionRange($5039, $5040)), ($5041, $5042, $5043, $5044, $5045, $5046, $5047, $5048, $5049, $5050, $5051, $5052, $5053, $5054, $5055, $5056, $5057, $5058, $5059, $5060, $5061, $5062, $5063, $5064, $5065, $5066, $5067, $5068, VersionRange($5069, $5070)), ($5071, $5072, $5073, $5074, $5075, $5076, $5077, $5078, $5079, $5080, $5081, $5082, $5083, $5084, $5085, $5086, $5087, $5088, $5089, $5090, $5091, $5092, $5093, $5094, $5095, $5096, $5097, $5098, VersionRange($5099, $5100)), ($5101, $5102, $5103, $5104, $5105, $5106, $5107, $5108, $5109, $5110, $5111, $5112, $5113, $5114, $5115, $5116, $5117, $5118, $5119, $5120, $5121, $5122, $5123, $5124, $5125, $5126, $5127, $5128, VersionRange($5129, $5130)), ($5131, $5132, $5133, $5134, $5135, $5136, $5137, $5138, $5139, $5140, $5141, $5142, $5143, $5144, $5145, $5146, $5147, $5148, $5149, $5150, $5151, $5152, $5153, $5154, $5155, $5156, $5157, $5158, VersionRange($5159, $5160)), ($5161, $5162, $5163, $5164, $5165, $5166, $5167, $5168, $5169, $5170, $5171, $5172, $5173, $5174, $5175, $5176, $5177, $5178, $5179, $5180, $5181, $5182, $5183, $5184, $5185, $5186, $5187, $5188, VersionRange($5189, $5190)), ($5191, $5192, $5193, $5194, $5195, $5196, $5197, $5198, $5199, $5200, $5201, $5202, $5203, $5204, $5205, $5206, $5207, $5208, $5209, $5210, $5211, $5212, $5213, $5214, $5215, $5216, $5217, $5218, VersionRange($5219, $5220)), ($5221, $5222, $5223, $5224, $5225, $5226, $5227, $5228, $5229, $5230, $5231, $5232, $5233, $5234, $5235, $5236, $5237, $5238, $5239, $5240, $5241, $5242, $5243, $5244, $5245, $5246, $5247, $5248, VersionRange($5249, $5250)), ($5251, $5252, $5253, $5254, $5255, $5256, $5257, $5258, $5259, $5260, $5261, $5262, $5263, $5264, $5265, $5266, $5267, $5268, $5269, $5270, $5271, $5272, $5273, $5274, $5275, $5276, $5277, $5278, VersionRange($5279, $5280)), ($5281, $5282, $5283, $5284, $5285, $5286, $5287, $5288, $5289, $5290, $5291, $5292, $5293, $5294, $5295, $5296, $5297, $5298, $5299, $5300, $5301, $5302, $5303, $5304, $5305, $5306, $5307, $5308, VersionRange($5309, $5310)), ($5311, $5312, $5313, $5314, $5315, $5316, $5317, $5318, $5319, $5320, $5321, $5322, $5323, $5324, $5325, $5326, $5327, $5328, $5329, $5330, $5331, $5332, $5333, $5334, $5335, $5336, $5337, $5338, VersionRange($5339, $5340)), ($5341, $5342, $5343, $5344, $5345, $5346, $5347, $5348, $5349, $5350, $5351, $5352, $5353, $5354, $5355, $5356, $5357, $5358, $5359, $5360, $5361, $5362, $5363, $5364, $5365, $5366, $5367, $5368, VersionRange($5369, $5370)), ($5371, $5372, $5373, $5374, $5375, $5376, $5377, $5378, $5379, $5380, $5381, $5382, $5383, $5384, $5385, $5386, $5387, $5388, $5389, $5390, $5391, $5392, $5393, $5394, $5395, $5396, $5397, $5398, VersionRange($5399, $5400)), ($5401, $5402, $5403, $5404, $5405, $5406, $5407, $5408, $5409, $5410, $5411, $5412, $5413, $5414, $5415, $5416, $5417, $5418, $5419, $5420, $5421, $5422, $5423, $5424, $5425, $5426, $5427, $5428, VersionRange($5429, $5430)), ($5431, $5432, $5433, $5434, $5435, $5436, $5437, $5438, $5439, $5440, $5441, $5442, $5443, $5444, $5445, $5446, $5447, $5448, $5449, $5450, $5451, $5452, $5453, $5454, $5455, $5456, $5457, $5458, VersionRange($5459, $5460)), ($5461, $5462, $5463, $5464, $5465, $5466, $5467, $5468, $5469, $5470, $5471, $5472, $5473, $5474, $5475, $5476, $5477, $5478, $5479, $5480, $5481, $5482, $5483, $5484, $5485, $5486, $5487, $5488, VersionRange($5489, $5490)), ($5491, $5492, $5493, $5494, $5495, $5496, $5497, $5498, $5499, $5500, $5501, $5502, $5503, $5504, $5505, $5506, $5507, $5508, $5509, $5510, $5511, $5512, $5513, $5514, $5515, $5516, $5517, $5518, VersionRange($5519, $5520)), ($5521, $5522, $5523, $5524, $5525, $5526, $5527, $5528, $5529, $5530, $5531, $5532, $5533, $5534, $5535, $5536, $5537, $5538, $5539, $5540, $5541, $5542, $5543, $5544, $5545, $5546, $5547, $5548, VersionRange($5549, $5550)), ($5551, $5552, $5553, $5554, $5555, $5556, $5557, $5558, $5559, $5560, $5561, $5562, $5563, $5564, $5565, $5566, $5567, $5568, $5569, $5570, $5571, $5572, $5573, $5574, $5575, $5576, $5577, $5578, VersionRange($5579, $5580)), ($5581, $5582, $5583, $5584, $5585, $5586, $5587, $5588, $5589, $5590, $5591, $5592, $5593, $5594, $5595, $5596, $5597, $5598, $5599, $5600, $5601, $5602, $5603, $5604, $5605, $5606, $5607, $5608, VersionRange($5609, $5610)), ($5611, $5612, $5613, $5614, $5615, $5616, $5617, $5618, $5619, $5620, $5621, $5622, $5623, $5624, $5625, $5626, $5627, $5628, $5629, $5630, $5631, $5632, $5633, $5634, $5635, $5636, $5637, $5638, VersionRange($5639, $5640)), ($5641, $5642, $5643, $5644, $5645, $5646, $5647, $5648, $5649, $5650, $5651, $5652, $5653, $5654, $5655, $5656, $5657, $5658, $5659, $5660, $5661, $5662, $5663, $5664, $5665, $5666, $5667, $5668, VersionRange($5669, $5670)), ($5671, $5672, $5673, $5674, $5675, $5676, $5677, $5678, $5679, $5680, $5681, $5682, $5683, $5684, $5685, $5686, $5687, $5688, $5689, $5690, $5691, $5692, $5693, $5694, $5695, $5696, $5697, $5698, VersionRange($5699, $5700)), ($5701, $5702, $5703, $5704, $5705, $5706, $5707, $5708, $5709, $5710, $5711, $5712, $5713, $5714, $5715, $5716, $5717, $5718, $5719, $5720, $5721, $5722, $5723, $5724, $5725, $5726, $5727, $5728, VersionRange($5729, $5730)), ($5731, $5732, $5733, $5734, $5735, $5736, $5737, $5738, $5739, $5740, $5741, $5742, $5743, $5744, $5745, $5746, $5747, $5748, $5749, $5750, $5751, $5752, $5753, $5754, $5755, $5756, $5757, $5758, VersionRange($5759, $5760)), ($5761, $5762, $5763, $5764, $5765, $5766, $5767, $5768, $5769, $5770, $5771, $5772, $5773, $5774, $5775, $5776, $5777, $5778, $5779, $5780, $5781, $5782, $5783, $5784, $5785, $5786, $5787, $5788, VersionRange($5789, $5790)), ($5791, $5792, $5793, $5794, $5795, $5796, $5797, $5798, $5799, $5800, $5801, $5802, $5803, $5804, $5805, $5806, $5807, $5808, $5809, $5810, $5811, $5812, $5813, $5814, $5815, $5816, $5817, $5818, VersionRange($5819, $5820)), ($5821, $5822, $5823, $5824, $5825, $5826, $5827, $5828, $5829, $5830, $5831, $5832, $5833, $5834, $5835, $5836, $5837, $5838, $5839, $5840, $5841, $5842, $5843, $5844, $5845, $5846, $5847, $5848, VersionRange($5849, $5850)), ($5851, $5852, $5853, $5854, $5855, $5856, $5857, $5858, $5859, $5860, $5861, $5862, $5863, $5864, $5865, $5866, $5867, $5868, $5869, $5870, $5871, $5872, $5873, $5874, $5875, $5876, $5877, $5878, VersionRange($5879, $5880)), ($5881, $5882, $5883, $5884, $5885, $5886, $5887, $5888, $5889, $5890, $5891, $5892, $5893, $5894, $5895, $5896, $5897, $5898, $5899, $5900, $5901, $5902, $5903, $5904, $5905, $5906, $5907, $5908, VersionRange($5909, $5910)), ($5911, $5912, $5913, $5914, $5915, $5916, $5917, $5918, $5919, $5920, $5921, $5922, $5923, $5924, $5925, $5926, $5927, $5928, $5929, $5930, $5931, $5932, $5933, $5934, $5935, $5936, $5937, $5938, VersionRange($5939, $5940)), ($5941, $5942, $5943, $5944, $5945, $5946, $5947, $5948, $5949, $5950, $5951, $5952, $5953, $5954, $5955, $5956, $5957, $5958, $5959, $5960, $5961, $5962, $5963, $5964, $5965, $5966, $5967, $5968, VersionRange($5969, $5970)), ($5971, $5972, $5973, $5974, $5975, $5976, $5977, $5978, $5979, $5980, $5981, $5982, $5983, $5984, $5985, $5986, $5987, $5988, $5989, $5990, $5991, $5992, $5993, $5994, $5995, $5996, $5997, $5998, VersionRange($5999, $6000)), ($6001, $6002, $6003, $6004, $6005, $6006, $6007, $6008, $6009, $6010, $6011, $6012, $6013, $6014, $6015, $6016, $6017, $6018, $6019, $6020, $6021, $6022, $6023, $6024, $6025, $6026, $6027, $6028, VersionRange($6029, $6030)), ($6031, $6032, $6033, $6034, $6035, $6036, $6037, $6038, $6039, $6040, $6041, $6042, $6043, $6044, $6045, $6046, $6047, $6048, $6049, $6050, $6051, $6052, $6053, $6054, $6055, $6056, $6057, $6058, VersionRange($6059, $6060)), ($6061, $6062, $6063, $6064, $6065, $6066, $6067, $6068, $6069, $6070, $6071, $6072, $6073, $6074, $6075, $6076, $6077, $6078, $6079, $6080, $6081, $6082, $6083, $6084, $6085, $6086, $6087, $6088, VersionRange($6089, $6090)), ($6091, $6092, $6093, $6094, $6095, $6096, $6097, $6098, $6099, $6100, $6101, $6102, $6103, $6104, $6105, $6106, $6107, $6108, $6109, $6110, $6111, $6112, $6113, $6114, $6115, $6116, $6117, $6118, VersionRange($6119, $6120)), ($6121, $6122, $6123, $6124, $6125, $6126, $6127, $6128, $6129, $6130, $6131, $6132, $6133, $6134, $6135, $6136, $6137, $6138, $6139, $6140, $6141, $6142, $6143, $6144, $6145, $6146, $6147, $6148, VersionRange($6149, $6150)), ($6151, $6152, $6153, $6154, $6155, $6156, $6157, $6158, $6159, $6160, $6161, $6162, $6163, $6164, $6165, $6166, $6167, $6168, $6169, $6170, $6171, $6172, $6173, $6174, $6175, $6176, $6177, $6178, VersionRange($6179, $6180)), ($6181, $6182, $6183, $6184, $6185, $6186, $6187, $6188, $6189, $6190, $6191, $6192, $6193, $6194, $6195, $6196, $6197, $6198, $6199, $6200, $6201, $6202, $6203, $6204, $6205, $6206, $6207, $6208, VersionRange($6209, $6210)), ($6211, $6212, $6213, $6214, $6215, $6216, $6217, $6218, $6219, $6220, $6221, $6222, $6223, $6224, $6225, $6226, $6227, $6228, $6229, $6230, $6231, $6232, $6233, $6234, $6235, $6236, $6237, $6238, VersionRange($6239, $6240)), ($6241, $6242, $6243, $6244, $6245, $6246, $6247, $6248, $6249, $6250, $6251, $6252, $6253, $6254, $6255, $6256, $6257, $6258, $6259, $6260, $6261, $6262, $6263, $6264, $6265, $6266, $6267, $6268, VersionRange($6269, $6270)), ($6271, $6272, $6273, $6274, $6275, $6276, $6277, $6278, $6279, $6280, $6281, $6282, $6283, $6284, $6285, $6286, $6287, $6288, $6289, $6290, $6291, $6292, $6293, $6294, $6295, $6296, $6297, $6298, VersionRange($6299, $6300)), ($6301, $6302, $6303, $6304, $6305, $6306, $6307, $6308, $6309, $6310, $6311, $6312, $6313, $6314, $6315, $6316, $6317, $6318, $6319, $6320, $6321, $6322, $6323, $6324, $6325, $6326, $6327, $6328, VersionRange($6329, $6330)), ($6331, $6332, $6333, $6334, $6335, $6336, $6337, $6338, $6339, $6340, $6341, $6342, $6343, $6344, $6345, $6346, $6347, $6348, $6349, $6350, $6351, $6352, $6353, $6354, $6355, $6356, $6357, $6358, VersionRange($6359, $6360)), ($6361, $6362, $6363, $6364, $6365, $6366, $6367, $6368, $6369, $6370, $6371, $6372, $6373, $6374, $6375, $6376, $6377, $6378, $6379, $6380, $6381, $6382, $6383, $6384, $6385, $6386, $6387, $6388, VersionRange($6389, $6390)), ($6391, $6392, $6393, $6394, $6395, $6396, $6397, $6398, $6399, $6400, $6401, $6402, $6403, $6404, $6405, $6406, $6407, $6408, $6409, $6410, $6411, $6412, $6413, $6414, $6415, $6416, $6417, $6418, VersionRange($6419, $6420)), ($6421, $6422, $6423, $6424, $6425, $6426, $6427, $6428, $6429, $6430, $6431, $6432, $6433, $6434, $6435, $6436, $6437, $6438, $6439, $6440, $6441, $6442, $6443, $6444, $6445, $6446, $6447, $6448, VersionRange($6449, $6450)), ($6451, $6452, $6453, $6454, $6455, $6456, $6457, $6458, $6459, $6460, $6461, $6462, $6463, $6464, $6465, $6466, $6467, $6468, $6469, $6470, $6471, $6472, $6473, $6474, $6475, $6476, $6477, $6478, VersionRange($6479, $6480)), ($6481, $6482, $6483, $6484, $6485, $6486, $6487, $6488, $6489, $6490, $6491, $6492, $6493, $6494, $6495, $6496, $6497, $6498, $6499, $6500, $6501, $6502, $6503, $6504, $6505, $6506, $6507, $6508, VersionRange($6509, $6510)), ($6511, $6512, $6513, $6514, $6515, $6516, $6517, $6518, $6519, $6520, $6521, $6522, $6523, $6524, $6525, $6526, $6527, $6528, $6529, $6530, $6531, $6532, $6533, $6534, $6535, $6536, $6537, $6538, VersionRange($6539, $6540)), ($6541, $6542, $6543, $6544, $6545, $6546, $6547, $6548, $6549, $6550, $6551, $6552, $6553, $6554, $6555, $6556, $6557, $6558, $6559, $6560, $6561, $6562, $6563, $6564, $6565, $6566, $6567, $6568, VersionRange($6569, $6570)), ($6571, $6572, $6573, $6574, $6575, $6576, $6577, $6578, $6579, $6580, $6581, $6582, $6583, $6584, $6585, $6586, $6587, $6588, $6589, $6590, $6591, $6592, $6593, $6594, $6595, $6596, $6597, $6598, VersionRange($6599, $6600)), ($6601, $6602, $6603, $6604, $6605, $6606, $6607, $6608, $6609, $6610, $6611, $6612, $6613, $6614, $6615, $6616, $6617, $6618, $6619, $6620, $6621, $6622, $6623, $6624, $6625, $6626, $6627, $6628, VersionRange($6629, $6630)), ($6631, $6632, $6633, $6634, $6635, $6636, $6637, $6638, $6639, $6640, $6641, $6642, $6643, $6644, $6645, $6646, $6647, $6648, $6649, $6650, $6651, $6652, $6653, $6654, $6655, $6656, $6657, $6658, VersionRange($6659, $6660)), ($6661, $6662, $6663, $6664, $6665, $6666, $6667, $6668, $6669, $6670, $6671, $6672, $6673, $6674, $6675, $6676, $6677, $6678, $6679, $6680, $6681, $6682, $6683, $6684, $6685, $6686, $6687, $6688, VersionRange($6689, $6690)), ($6691, $6692, $6693, $6694, $6695, $6696, $6697, $6698, $6699, $6700, $6701, $6702, $6703, $6704, $6705, $6706, $6707, $6708, $6709, $6710, $6711, $6712, $6713, $6714, $6715, $6716, $6717, $6718, VersionRange($6719, $6720)), ($6721, $6722, $6723, $6724, $6725, $6726, $6727, $6728, $6729, $6730, $6731, $6732, $6733, $6734, $6735, $6736, $6737, $6738, $6739, $6740, $6741, $6742, $6743, $6744, $6745, $6746, $6747, $6748, VersionRange($6749, $6750)), ($6751, $6752, $6753, $6754, $6755, $6756, $6757, $6758, $6759, $6760, $6761, $6762, $6763, $6764, $6765, $6766, $6767, $6768, $6769, $6770, $6771, $6772, $6773, $6774, $6775, $6776, $6777, $6778, VersionRange($6779, $6780)), ($6781, $6782, $6783, $6784, $6785, $6786, $6787, $6788, $6789, $6790, $6791, $6792, $6793, $6794, $6795, $6796, $6797, $6798, $6799, $6800, $6801, $6802, $6803, $6804, $6805, $6806, $6807, $6808, VersionRange($6809, $6810)), ($6811, $6812, $6813, $6814, $6815, $6816, $6817, $6818, $6819, $6820, $6821, $6822, $6823, $6824, $6825, $6826, $6827, $6828, $6829, $6830, $6831, $6832, $6833, $6834, $6835, $6836, $6837, $6838, VersionRange($6839, $6840)), ($6841, $6842, $6843, $6844, $6845, $6846, $6847, $6848, $6849, $6850, $6851, $6852, $6853, $6854, $6855, $6856, $6857, $6858, $6859, $6860, $6861, $6862, $6863, $6864, $6865, $6866, $6867, $6868, VersionRange($6869, $6870)), ($6871, $6872, $6873, $6874, $6875, $6876, $6877, $6878, $6879, $6880, $6881, $6882, $6883, $6884, $6885, $6886, $6887, $6888, $6889, $6890, $6891, $6892, $6893, $6894, $6895, $6896, $6897, $6898, VersionRange($6899, $6900)), ($6901, $6902, $6903, $6904, $6905, $6906, $6907, $6908, $6909, $6910, $6911, $6912, $6913, $6914, $6915, $6916, $6917, $6918, $6919, $6920, $6921, $6922, $6923, $6924, $6925, $6926, $6927, $6928, VersionRange($6929, $6930)), ($6931, $6932, $6933, $6934, $6935, $6936, $6937, $6938, $6939, $6940, $6941, $6942, $6943, $6944, $6945, $6946, $6947, $6948, $6949, $6950, $6951, $6952, $6953, $6954, $6955, $6956, $6957, $6958, VersionRange($6959, $6960)), ($6961, $6962, $6963, $6964, $6965, $6966, $6967, $6968, $6969, $6970, $6971, $6972, $6973, $6974, $6975, $6976, $6977, $6978, $6979, $6980, $6981, $6982, $6983, $6984, $6985, $6986, $6987, $6988, VersionRange($6989, $6990)), ($6991, $6992, $6993, $6994, $6995, $6996, $6997, $6998, $6999, $7000, $7001, $7002, $7003, $7004, $7005, $7006, $7007, $7008, $7009, $7010, $7011, $7012, $7013, $7014, $7015, $7016, $7017, $7018, VersionRange($7019, $7020)), ($7021, $7022, $7023, $7024, $7025, $7026, $7027, $7028, $7029, $7030, $7031, $7032, $7033, $7034, $7035, $7036, $7037, $7038, $7039, $7040, $7041, $7042, $7043, $7044, $7045, $7046, $7047, $7048, VersionRange($7049, $7050)), ($7051, $7052, $7053, $7054, $7055, $7056, $7057, $7058, $7059, $7060, $7061, $7062, $7063, $7064, $7065, $7066, $7067, $7068, $7069, $7070, $7071, $7072, $7073, $7074, $7075, $7076, $7077, $7078, VersionRange($7079, $7080)), ($7081, $7082, $7083, $7084, $7085, $7086, $7087, $7088, $7089, $7090, $7091, $7092, $7093, $7094, $7095, $7096, $7097, $7098, $7099, $7100, $7101, $7102, $7103, $7104, $7105, $7106, $7107, $7108, VersionRange($7109, $7110)), ($7111, $7112, $7113, $7114, $7115, $7116, $7117, $7118, $7119, $7120, $7121, $7122, $7123, $7124, $7125, $7126, $7127, $7128, $7129, $7130, $7131, $7132, $7133, $7134, $7135, $7136, $7137, $7138, VersionRange($7139, $7140)), ($7141, $7142, $7143, $7144, $7145, $7146, $7147, $7148, $7149, $7150, $7151, $7152, $7153, $7154, $7155, $7156, $7157, $7158, $7159, $7160, $7161, $7162, $7163, $7164, $7165, $7166, $7167, $7168, VersionRange($7169, $7170)), ($7171, $7172, $7173, $7174, $7175, $7176, $7177, $7178, $7179, $7180, $7181, $7182, $7183, $7184, $7185, $7186, $7187, $7188, $7189, $7190, $7191, $7192, $7193, $7194, $7195, $7196, $7197, $7198, VersionRange($7199, $7200)), ($7201, $7202, $7203, $7204, $7205, $7206, $7207, $7208, $7209, $7210, $7211, $7212, $7213, $7214, $7215, $7216, $7217, $7218, $7219, $7220, $7221, $7222, $7223, $7224, $7225, $7226, $7227, $7228, VersionRange($7229, $7230)), ($7231, $7232, $7233, $7234, $7235, $7236, $7237, $7238, $7239, $7240, $7241, $7242, $7243, $7244, $7245, $7246, $7247, $7248, $7249, $7250, $7251, $7252, $7253, $7254, $7255, $7256, $7257, $7258, VersionRange($7259, $7260)), ($7261, $7262, $7263, $7264, $7265, $7266, $7267, $7268, $7269, $7270, $7271, $7272, $7273, $7274, $7275, $7276, $7277, $7278, $7279, $7280, $7281, $7282, $7283, $7284, $7285, $7286, $7287, $7288, VersionRange($7289, $7290)), ($7291, $7292, $7293, $7294, $7295, $7296, $7297, $7298, $7299, $7300, $7301, $7302, $7303, $7304, $7305, $7306, $7307, $7308, $7309, $7310, $7311, $7312, $7313, $7314, $7315, $7316, $7317, $7318, VersionRange($7319, $7320)), ($7321, $7322, $7323, $7324, $7325, $7326, $7327, $7328, $7329, $7330, $7331, $7332, $7333, $7334, $7335, $7336, $7337, $7338, $7339, $7340, $7341, $7342, $7343, $7344, $7345, $7346, $7347, $7348, VersionRange($7349, $7350)), ($7351, $7352, $7353, $7354, $7355, $7356, $7357, $7358, $7359, $7360, $7361, $7362, $7363, $7364, $7365, $7366, $7367, $7368, $7369, $7370, $7371, $7372, $7373, $7374, $7375, $7376, $7377, $7378, VersionRange($7379, $7380)), ($7381, $7382, $7383, $7384, $7385, $7386, $7387, $7388, $7389, $7390, $7391, $7392, $7393, $7394, $7395, $7396, $7397, $7398, $7399, $7400, $7401, $7402, $7403, $7404, $7405, $7406, $7407, $7408, VersionRange($7409, $7410)), ($7411, $7412, $7413, $7414, $7415, $7416, $7417, $7418, $7419, $7420, $7421, $7422, $7423, $7424, $7425, $7426, $7427, $7428, $7429, $7430, $7431, $7432, $7433, $7434, $7435, $7436, $7437, $7438, VersionRange($7439, $7440)), ($7441, $7442, $7443, $7444, $7445, $7446, $7447, $7448, $7449, $7450, $7451, $7452, $7453, $7454, $7455, $7456, $7457, $7458, $7459, $7460, $7461, $7462, $7463, $7464, $7465, $7466, $7467, $7468, VersionRange($7469, $7470)), ($7471, $7472, $7473, $7474, $7475, $7476, $7477, $7478, $7479, $7480, $7481, $7482, $7483, $7484, $7485, $7486, $7487, $7488, $7489, $7490, $7491, $7492, $7493, $7494, $7495, $7496, $7497, $7498, VersionRange($7499, $7500)), ($7501, $7502, $7503, $7504, $7505, $7506, $7507, $7508, $7509, $7510, $7511, $7512, $7513, $7514, $7515, $7516, $7517, $7518, $7519, $7520, $7521, $7522, $7523, $7524, $7525, $7526, $7527, $7528, VersionRange($7529, $7530)), ($7531, $7532, $7533, $7534, $7535, $7536, $7537, $7538, $7539, $7540, $7541, $7542, $7543, $7544, $7545, $7546, $7547, $7548, $7549, $7550, $7551, $7552, $7553, $7554, $7555, $7556, $7557, $7558, VersionRange($7559, $7560)), ($7561, $7562, $7563, $7564, $7565, $7566, $7567, $7568, $7569, $7570, $7571, $7572, $7573, $7574, $7575, $7576, $7577, $7578, $7579, $7580, $7581, $7582, $7583, $7584, $7585, $7586, $7587, $7588, VersionRange($7589, $7590)), ($7591, $7592, $7593, $7594, $7595, $7596, $7597, $7598, $7599, $7600, $7601, $7602, $7603, $7604, $7605, $7606, $7607, $7608, $7609, $7610, $7611, $7612, $7613, $7614, $7615, $7616, $7617, $7618, VersionRange($7619, $7620)), ($7621, $7622, $7623, $7624, $7625, $7626, $7627, $7628, $7629, $7630, $7631, $7632, $7633, $7634, $7635, $7636, $7637, $7638, $7639, $7640, $7641, $7642, $7643, $7644, $7645, $7646, $7647, $7648, VersionRange($7649, $7650)), ($7651, $7652, $7653, $7654, $7655, $7656, $7657, $7658, $7659, $7660, $7661, $7662, $7663, $7664, $7665, $7666, $7667, $7668, $7669, $7670, $7671, $7672, $7673, $7674, $7675, $7676, $7677, $7678, VersionRange($7679, $7680)), ($7681, $7682, $7683, $7684, $7685, $7686, $7687, $7688, $7689, $7690, $7691, $7692, $7693, $7694, $7695, $7696, $7697, $7698, $7699, $7700, $7701, $7702, $7703, $7704, $7705, $7706, $7707, $7708, VersionRange($7709, $7710)), ($7711, $7712, $7713, $7714, $7715, $7716, $7717, $7718, $7719, $7720, $7721, $7722, $7723, $7724, $7725, $7726, $7727, $7728, $7729, $7730, $7731, $7732, $7733, $7734, $7735, $7736, $7737, $7738, VersionRange($7739, $7740)), ($7741, $7742, $7743, $7744, $7745, $7746, $7747, $7748, $7749, $7750, $7751, $7752, $7753, $7754, $7755, $7756, $7757, $7758, $7759, $7760, $7761, $7762, $7763, $7764, $7765, $7766, $7767, $7768, VersionRange($7769, $7770)), ($7771, $7772, $7773, $7774, $7775, $7776, $7777, $7778, $7779, $7780, $7781, $7782, $7783, $7784, $7785, $7786, $7787, $7788, $7789, $7790, $7791, $7792, $7793, $7794, $7795, $7796, $7797, $7798, VersionRange($7799, $7800)), ($7801, $7802, $7803, $7804, $7805, $7806, $7807, $7808, $7809, $7810, $7811, $7812, $7813, $7814, $7815, $7816, $7817, $7818, $7819, $7820, $7821, $7822, $7823, $7824, $7825, $7826, $7827, $7828, VersionRange($7829, $7830)), ($7831, $7832, $7833, $7834, $7835, $7836, $7837, $7838, $7839, $7840, $7841, $7842, $7843, $7844, $7845, $7846, $7847, $7848, $7849, $7850, $7851, $7852, $7853, $7854, $7855, $7856, $7857, $7858, VersionRange($7859, $7860)), ($7861, $7862, $7863, $7864, $7865, $7866, $7867, $7868, $7869, $7870, $7871, $7872, $7873, $7874, $7875, $7876, $7877, $7878, $7879, $7880, $7881, $7882, $7883, $7884, $7885, $7886, $7887, $7888, VersionRange($7889, $7890)), ($7891, $7892, $7893, $7894, $7895, $7896, $7897, $7898, $7899, $7900, $7901, $7902, $7903, $7904, $7905, $7906, $7907, $7908, $7909, $7910, $7911, $7912, $7913, $7914, $7915, $7916, $7917, $7918, VersionRange($7919, $7920)), ($7921, $7922, $7923, $7924, $7925, $7926, $7927, $7928, $7929, $7930, $7931, $7932, $7933, $7934, $7935, $7936, $7937, $7938, $7939, $7940, $7941, $7942, $7943, $7944, $7945, $7946, $7947, $7948, VersionRange($7949, $7950)), ($7951, $7952, $7953, $7954, $7955, $7956, $7957, $7958, $7959, $7960, $7961, $7962, $7963, $7964, $7965, $7966, $7967, $7968, $7969, $7970, $7971, $7972, $7973, $7974, $7975, $7976, $7977, $7978, VersionRange($7979, $7980)), ($7981, $7982, $7983, $7984, $7985, $7986, $7987, $7988, $7989, $7990, $7991, $7992, $7993, $7994, $7995, $7996, $7997, $7998, $7999, $8000, $8001, $8002, $8003, $8004, $8005, $8006, $8007, $8008, VersionRange($8009, $8010)), ($8011, $8012, $8013, $8014, $8015, $8016, $8017, $8018, $8019, $8020, $8021, $8022, $8023, $8024, $8025, $8026, $8027, $8028, $8029, $8030, $8031, $8032, $8033, $8034, $8035, $8036, $8037, $8038, VersionRange($8039, $8040)), ($8041, $8042, $8043, $8044, $8045, $8046, $8047, $8048, $8049, $8050, $8051, $8052, $8053, $8054, $8055, $8056, $8057, $8058, $8059, $8060, $8061, $8062, $8063, $8064, $8065, $8066, $8067, $8068, VersionRange($8069, $8070)), ($8071, $8072, $8073, $8074, $8075, $8076, $8077, $8078, $8079, $8080, $8081, $8082, $8083, $8084, $8085, $8086, $8087, $8088, $8089, $8090, $8091, $8092, $8093, $8094, $8095, $8096, $8097, $8098, VersionRange($8099, $8100)), ($8101, $8102, $8103, $8104, $8105, $8106, $8107, $8108, $8109, $8110, $8111, $8112, $8113, $8114, $8115, $8116, $8117, $8118, $8119, $8120, $8121, $8122, $8123, $8124, $8125, $8126, $8127, $8128, VersionRange($8129, $8130)), ($8131, $8132, $8133, $8134, $8135, $8136, $8137, $8138, $8139, $8140, $8141, $8142, $8143, $8144, $8145, $8146, $8147, $8148, $8149, $8150, $8151, $8152, $8153, $8154, $8155, $8156, $8157, $8158, VersionRange($8159, $8160)), ($8161, $8162, $8163, $8164, $8165, $8166, $8167, $8168, $8169, $8170, $8171, $8172, $8173, $8174, $8175, $8176, $8177, $8178, $8179, $8180, $8181, $8182, $8183, $8184, $8185, $8186, $8187, $8188, VersionRange($8189, $8190)), ($8191, $8192, $8193, $8194, $8195, $8196, $8197, $8198, $8199, $8200, $8201, $8202, $8203, $8204, $8205, $8206, $8207, $8208, $8209, $8210, $8211, $8212, $8213, $8214, $8215, $8216, $8217, $8218, VersionRange($8219, $8220)), ($8221, $8222, $8223, $8224, $8225, $8226, $8227, $8228, $8229, $8230, $8231, $8232, $8233, $8234, $8235, $8236, $8237, $8238, $8239, $8240, $8241, $8242, $8243, $8244, $8245, $8246, $8247, $8248, VersionRange($8249, $8250)), ($8251, $8252, $8253, $8254, $8255, $8256, $8257, $8258, $8259, $8260, $8261, $8262, $8263, $8264, $8265, $8266, $8267, $8268, $8269, $8270, $8271, $8272, $8273, $8274, $8275, $8276, $8277, $8278, VersionRange($8279, $8280)), ($8281, $8282, $8283, $8284, $8285, $8286, $8287, $8288, $8289, $8290, $8291, $8292, $8293, $8294, $8295, $8296, $8297, $8298, $8299, $8300, $8301, $8302, $8303, $8304, $8305, $8306, $8307, $8308, VersionRange($8309, $8310)), ($8311, $8312, $8313, $8314, $8315, $8316, $8317, $8318, $8319, $8320, $8321, $8322, $8323, $8324, $8325, $8326, $8327, $8328, $8329, $8330, $8331, $8332, $8333, $8334, $8335, $8336, $8337, $8338, VersionRange($8339, $8340)), ($8341, $8342, $8343, $8344, $8345, $8346, $8347, $8348, $8349, $8350, $8351, $8352, $8353, $8354, $8355, $8356, $8357, $8358, $8359, $8360, $8361, $8362, $8363, $8364, $8365, $8366, $8367, $8368, VersionRange($8369, $8370)), ($8371, $8372, $8373, $8374, $8375, $8376, $8377, $8378, $8379, $8380, $8381, $8382, $8383, $8384, $8385, $8386, $8387, $8388, $8389, $8390, $8391, $8392, $8393, $8394, $8395, $8396, $8397, $8398, VersionRange($8399, $8400)), ($8401, $8402, $8403, $8404, $8405, $8406, $8407, $8408, $8409, $8410, $8411, $8412, $8413, $8414, $8415, $8416, $8417, $8418, $8419, $8420, $8421, $8422, $8423, $8424, $8425, $8426, $8427, $8428, VersionRange($8429, $8430)), ($8431, $8432, $8433, $8434, $8435, $8436, $8437, $8438, $8439, $8440, $8441, $8442, $8443, $8444, $8445, $8446, $8447, $8448, $8449, $8450, $8451, $8452, $8453, $8454, $8455, $8456, $8457, $8458, VersionRange($8459, $8460)), ($8461, $8462, $8463, $8464, $8465, $8466, $8467, $8468, $8469, $8470, $8471, $8472, $8473, $8474, $8475, $8476, $8477, $8478, $8479, $8480, $8481, $8482, $8483, $8484, $8485, $8486, $8487, $8488, VersionRange($8489, $8490)), ($8491, $8492, $8493, $8494, $8495, $8496, $8497, $8498, $8499, $8500, $8501, $8502, $8503, $8504, $8505, $8506, $8507, $8508, $8509, $8510, $8511, $8512, $8513, $8514, $8515, $8516, $8517, $8518, VersionRange($8519, $8520)), ($8521, $8522, $8523, $8524, $8525, $8526, $8527, $8528, $8529, $8530, $8531, $8532, $8533, $8534, $8535, $8536, $8537, $8538, $8539, $8540, $8541, $8542, $8543, $8544, $8545, $8546, $8547, $8548, VersionRange($8549, $8550)), ($8551, $8552, $8553, $8554, $8555, $8556, $8557, $8558, $8559, $8560, $8561, $8562, $8563, $8564, $8565, $8566, $8567, $8568, $8569, $8570, $8571, $8572, $8573, $8574, $8575, $8576, $8577, $8578, VersionRange($8579, $8580)), ($8581, $8582, $8583, $8584, $8585, $8586, $8587, $8588, $8589, $8590, $8591, $8592, $8593, $8594, $8595, $8596, $8597, $8598, $8599, $8600, $8601, $8602, $8603, $8604, $8605, $8606, $8607, $8608, VersionRange($8609, $8610)), ($8611, $8612, $8613, $8614, $8615, $8616, $8617, $8618, $8619, $8620, $8621, $8622, $8623, $8624, $8625, $8626, $8627, $8628, $8629, $8630, $8631, $8632, $8633, $8634, $8635, $8636, $8637, $8638, VersionRange($8639, $8640)), ($8641, $8642, $8643, $8644, $8645, $8646, $8647, $8648, $8649, $8650, $8651, $8652, $8653, $8654, $8655, $8656, $8657, $8658, $8659, $8660, $8661, $8662, $8663, $8664, $8665, $8666, $8667, $8668, VersionRange($8669, $8670)), ($8671, $8672, $8673, $8674, $8675, $8676, $8677, $8678, $8679, $8680, $8681, $8682, $8683, $8684, $8685, $8686, $8687, $8688, $8689, $8690, $8691, $8692, $8693, $8694, $8695, $8696, $8697, $8698, VersionRange($8699, $8700)), ($8701, $8702, $8703, $8704, $8705, $8706, $8707, $8708, $8709, $8710, $8711, $8712, $8713, $8714, $8715, $8716, $8717, $8718, $8719, $8720, $8721, $8722, $8723, $8724, $8725, $8726, $8727, $8728, VersionRange($8729, $8730)), ($8731, $8732, $8733, $8734, $8735, $8736, $8737, $8738, $8739, $8740, $8741, $8742, $8743, $8744, $8745, $8746, $8747, $8748, $8749, $8750, $8751, $8752, $8753, $8754, $8755, $8756, $8757, $8758, VersionRange($8759, $8760)), ($8761, $8762, $8763, $8764, $8765, $8766, $8767, $8768, $8769, $8770, $8771, $8772, $8773, $8774, $8775, $8776, $8777, $8778, $8779, $8780, $8781, $8782, $8783, $8784, $8785, $8786, $8787, $8788, VersionRange($8789, $8790)), ($8791, $8792, $8793, $8794, $8795, $8796, $8797, $8798, $8799, $8800, $8801, $8802, $8803, $8804, $8805, $8806, $8807, $8808, $8809, $8810, $8811, $8812, $8813, $8814, $8815, $8816, $8817, $8818, VersionRange($8819, $8820)), ($8821, $8822, $8823, $8824, $8825, $8826, $8827, $8828, $8829, $8830, $8831, $8832, $8833, $8834, $8835, $8836, $8837, $8838, $8839, $8840, $8841, $8842, $8843, $8844, $8845, $8846, $8847, $8848, VersionRange($8849, $8850)), ($8851, $8852, $8853, $8854, $8855, $8856, $8857, $8858, $8859, $8860, $8861, $8862, $8863, $8864, $8865, $8866, $8867, $8868, $8869, $8870, $8871, $8872, $8873, $8874, $8875, $8876, $8877, $8878, VersionRange($8879, $8880)), ($8881, $8882, $8883, $8884, $8885, $8886, $8887, $8888, $8889, $8890, $8891, $8892, $8893, $8894, $8895, $8896, $8897, $8898, $8899, $8900, $8901, $8902, $8903, $8904, $8905, $8906, $8907, $8908, VersionRange($8909, $8910)), ($8911, $8912, $8913, $8914, $8915, $8916, $8917, $8918, $8919, $8920, $8921, $8922, $8923, $8924, $8925, $8926, $8927, $8928, $8929, $8930, $8931, $8932, $8933, $8934, $8935, $8936, $8937, $8938, VersionRange($8939, $8940)), ($8941, $8942, $8943, $8944, $8945, $8946, $8947, $8948, $8949, $8950, $8951, $8952, $8953, $8954, $8955, $8956, $8957, $8958, $8959, $8960, $8961, $8962, $8963, $8964, $8965, $8966, $8967, $8968, VersionRange($8969, $8970)), ($8971, $8972, $8973, $8974, $8975, $8976, $8977, $8978, $8979, $8980, $8981, $8982, $8983, $8984, $8985, $8986, $8987, $8988, $8989, $8990, $8991, $8992, $8993, $8994, $8995, $8996, $8997, $8998, VersionRange($8999, $9000)), ($9001, $9002, $9003, $9004, $9005, $9006, $9007, $9008, $9009, $9010, $9011, $9012, $9013, $9014, $9015, $9016, $9017, $9018, $9019, $9020, $9021, $9022, $9023, $9024, $9025, $9026, $9027, $9028, VersionRange($9029, $9030)), ($9031, $9032, $9033, $9034, $9035, $9036, $9037, $9038, $9039, $9040, $9041, $9042, $9043, $9044, $9045, $9046, $9047, $9048, $9049, $9050, $9051, $9052, $9053, $9054, $9055, $9056, $9057, $9058, VersionRange($9059, $9060)), ($9061, $9062, $9063, $9064, $9065, $9066, $9067, $9068, $9069, $9070, $9071, $9072, $9073, $9074, $9075, $9076, $9077, $9078, $9079, $9080, $9081, $9082, $9083, $9084, $9085, $9086, $9087, $9088, VersionRange($9089, $9090)), ($9091, $9092, $9093, $9094, $9095, $9096, $9097, $9098, $9099, $9100, $9101, $9102, $9103, $9104, $9105, $9106, $9107, $9108, $9109, $9110, $9111, $9112, $9113, $9114, $9115, $9116, $9117, $9118, VersionRange($9119, $9120)), ($9121, $9122, $9123, $9124, $9125, $9126, $9127, $9128, $9129, $9130, $9131, $9132, $9133, $9134, $9135, $9136, $9137, $9138, $9139, $9140, $9141, $9142, $9143, $9144, $9145, $9146, $9147, $9148, VersionRange($9149, $9150)), ($9151, $9152, $9153, $9154, $9155, $9156, $9157, $9158, $9159, $9160, $9161, $9162, $9163, $9164, $9165, $9166, $9167, $9168, $9169, $9170, $9171, $9172, $9173, $9174, $9175, $9176, $9177, $9178, VersionRange($9179, $9180)), ($9181, $9182, $9183, $9184, $9185, $9186, $9187, $9188, $9189, $9190, $9191, $9192, $9193, $9194, $9195, $9196, $9197, $9198, $9199, $9200, $9201, $9202, $9203, $9204, $9205, $9206, $9207, $9208, VersionRange($9209, $9210)), ($9211, $9212, $9213, $9214, $9215, $9216, $9217, $9218, $9219, $9220, $9221, $9222, $9223, $9224, $9225, $9226, $9227, $9228, $9229, $9230, $9231, $9232, $9233, $9234, $9235, $9236, $9237, $9238, VersionRange($9239, $9240)), ($9241, $9242, $9243, $9244, $9245, $9246, $9247, $9248, $9249, $9250, $9251, $9252, $9253, $9254, $9255, $9256, $9257, $9258, $9259, $9260, $9261, $9262, $9263, $9264, $9265, $9266, $9267, $9268, VersionRange($9269, $9270)), ($9271, $9272, $9273, $9274, $9275, $9276, $9277, $9278, $9279, $9280, $9281, $9282, $9283, $9284, $9285, $9286, $9287, $9288, $9289, $9290, $9291, $9292, $9293, $9294, $9295, $9296, $9297, $9298, VersionRange($9299, $9300)), ($9301, $9302, $9303, $9304, $9305, $9306, $9307, $9308, $9309, $9310, $9311, $9312, $9313, $9314, $9315, $9316, $9317, $9318, $9319, $9320, $9321, $9322, $9323, $9324, $9325, $9326, $9327, $9328, VersionRange($9329, $9330)), ($9331, $9332, $9333, $9334, $9335, $9336, $9337, $9338, $9339, $9340, $9341, $9342, $9343, $9344, $9345, $9346, $9347, $9348, $9349, $9350, $9351, $9352, $9353, $9354, $9355, $9356, $9357, $9358, VersionRange($9359, $9360)), ($9361, $9362, $9363, $9364, $9365, $9366, $9367, $9368, $9369, $9370, $9371, $9372, $9373, $9374, $9375, $9376, $9377, $9378, $9379, $9380, $9381, $9382, $9383, $9384, $9385, $9386, $9387, $9388, VersionRange($9389, $9390)), ($9391, $9392, $9393, $9394, $9395, $9396, $9397, $9398, $9399, $9400, $9401, $9402, $9403, $9404, $9405, $9406, $9407, $9408, $9409, $9410, $9411, $9412, $9413, $9414, $9415, $9416, $9417, $9418, VersionRange($9419, $9420)), ($9421, $9422, $9423, $9424, $9425, $9426, $9427, $9428, $9429, $9430, $9431, $9432, $9433, $9434, $9435, $9436, $9437, $9438, $9439, $9440, $9441, $9442, $9443, $9444, $9445, $9446, $9447, $9448, VersionRange($9449, $9450)), ($9451, $9452, $9453, $9454, $9455, $9456, $9457, $9458, $9459, $9460, $9461, $9462, $9463, $9464, $9465, $9466, $9467, $9468, $9469, $9470, $9471, $9472, $9473, $9474, $9475, $9476, $9477, $9478, VersionRange($9479, $9480)), ($9481, $9482, $9483, $9484, $9485, $9486, $9487, $9488, $9489, $9490, $9491, $9492, $9493, $9494, $9495, $9496, $9497, $9498, $9499, $9500, $9501, $9502, $9503, $9504, $9505, $9506, $9507, $9508, VersionRange($9509, $9510)), ($9511, $9512, $9513, $9514, $9515, $9516, $9517, $9518, $9519, $9520, $9521, $9522, $9523, $9524, $9525, $9526, $9527, $9528, $9529, $9530, $9531, $9532, $9533, $9534, $9535, $9536, $9537, $9538, VersionRange($9539, $9540)), ($9541, $9542, $9543, $9544, $9545, $9546, $9547, $9548, $9549, $9550, $9551, $9552, $9553, $9554, $9555, $9556, $9557, $9558, $9559, $9560, $9561, $9562, $9563, $9564, $9565, $9566, $9567, $9568, VersionRange($9569, $9570)), ($9571, $9572, $9573, $9574, $9575, $9576, $9577, $9578, $9579, $9580, $9581, $9582, $9583, $9584, $9585, $9586, $9587, $9588, $9589, $9590, $9591, $9592, $9593, $9594, $9595, $9596, $9597, $9598, VersionRange($9599, $9600)), ($9601, $9602, $9603, $9604, $9605, $9606, $9607, $9608, $9609, $9610, $9611, $9612, $9613, $9614, $9615, $9616, $9617, $9618, $9619, $9620, $9621, $9622, $9623, $9624, $9625, $9626, $9627, $9628, VersionRange($9629, $9630)), ($9631, $9632, $9633, $9634, $9635, $9636, $9637, $9638, $9639, $9640, $9641, $9642, $9643, $9644, $9645, $9646, $9647, $9648, $9649, $9650, $9651, $9652, $9653, $9654, $9655, $9656, $9657, $9658, VersionRange($9659, $9660)), ($9661, $9662, $9663, $9664, $9665, $9666, $9667, $9668, $9669, $9670, $9671, $9672, $9673, $9674, $9675, $9676, $9677, $9678, $9679, $9680, $9681, $9682, $9683, $9684, $9685, $9686, $9687, $9688, VersionRange($9689, $9690)), ($9691, $9692, $9693, $9694, $9695, $9696, $9697, $9698, $9699, $9700, $9701, $9702, $9703, $9704, $9705, $9706, $9707, $9708, $9709, $9710, $9711, $9712, $9713, $9714, $9715, $9716, $9717, $9718, VersionRange($9719, $9720)), ($9721, $9722, $9723, $9724, $9725, $9726, $9727, $9728, $9729, $9730, $9731, $9732, $9733, $9734, $9735, $9736, $9737, $9738, $9739, $9740, $9741, $9742, $9743, $9744, $9745, $9746, $9747, $9748, VersionRange($9749, $9750)), ($9751, $9752, $9753, $9754, $9755, $9756, $9757, $9758, $9759, $9760, $9761, $9762, $9763, $9764, $9765, $9766, $9767, $9768, $9769, $9770, $9771, $9772, $9773, $9774, $9775, $9776, $9777, $9778, VersionRange($9779, $9780)), ($9781, $9782, $9783, $9784, $9785, $9786, $9787, $9788, $9789, $9790, $9791, $9792, $9793, $9794, $9795, $9796, $9797, $9798, $9799, $9800, $9801, $9802, $9803, $9804, $9805, $9806, $9807, $9808, VersionRange($9809, $9810)), ($9811, $9812, $9813, $9814, $9815, $9816, $9817, $9818, $9819, $9820, $9821, $9822, $9823, $9824, $9825, $9826, $9827, $9828, $9829, $9830, $9831, $9832, $9833, $9834, $9835, $9836, $9837, $9838, VersionRange($9839, $9840)), ($9841, $9842, $9843, $9844, $9845, $9846, $9847, $9848, $9849, $9850, $9851, $9852, $9853, $9854, $9855, $9856, $9857, $9858, $9859, $9860, $9861, $9862, $9863, $9864, $9865, $9866, $9867, $9868, VersionRange($9869, $9870)), ($9871, $9872, $9873, $9874, $9875, $9876, $9877, $9878, $9879, $9880, $9881, $9882, $9883, $9884, $9885, $9886, $9887, $9888, $9889, $9890, $9891, $9892, $9893, $9894, $9895, $9896, $9897, $9898, VersionRange($9899, $9900)), ($9901, $9902, $9903, $9904, $9905, $9906, $9907, $9908, $9909, $9910, $9911, $9912, $9913, $9914, $9915, $9916, $9917, $9918, $9919, $9920, $9921, $9922, $9923, $9924, $9925, $9926, $9927, $9928, VersionRange($9929, $9930)), ($9931, $9932, $9933, $9934, $9935, $9936, $9937, $9938, $9939, $9940, $9941, $9942, $9943, $9944, $9945, $9946, $9947, $9948, $9949, $9950, $9951, $9952, $9953, $9954, $9955, $9956, $9957, $9958, VersionRange($9959, $9960)), ($9961, $9962, $9963, $9964, $9965, $9966, $9967, $9968, $9969, $9970, $9971, $9972, $9973, $9974, $9975, $9976, $9977, $9978, $9979, $9980, $9981, $9982, $9983, $9984, $9985, $9986, $9987, $9988, VersionRange($9989, $9990)), ($9991, $9992, $9993, $9994, $9995, $9996, $9997, $9998, $9999, $10000, $10001, $10002, $10003, $10004, $10005, $10006, $10007, $10008, $10009, $10010, $10011, $10012, $10013, $10014, $10015, $10016, $10017, $10018, VersionRange($10019, $10020)), ($10021, $10022, $10023, $10024, $10025, $10026, $10027, $10028, $10029, $10030, $10031, $10032, $10033, $10034, $10035, $10036, $10037, $10038, $10039, $10040, $10041, $10042, $10043, $10044, $10045, $10046, $10047, $10048, VersionRange($10049, $10050)), ($10051, $10052, $10053, $10054, $10055, $10056, $10057, $10058, $10059, $10060, $10061, $10062, $10063, $10064, $10065, $10066, $10067, $10068, $10069, $10070, $10071, $10072, $10073, $10074, $10075, $10076, $10077, $10078, VersionRange($10079, $10080)), ($10081, $10082, $10083, $10084, $10085, $10086, $10087, $10088, $10089, $10090, $10091, $10092, $10093, $10094, $10095, $10096, $10097, $10098, $10099, $10100, $10101, $10102, $10103, $10104, $10105, $10106, $10107, $10108, VersionRange($10109, $10110)), ($10111, $10112, $10113, $10114, $10115, $10116, $10117, $10118, $10119, $10120, $10121, $10122, $10123, $10124, $10125, $10126, $10127, $10128, $10129, $10130, $10131, $10132, $10133, $10134, $10135, $10136, $10137, $10138, VersionRange($10139, $10140)), ($10141, $10142, $10143, $10144, $10145, $10146, $10147, $10148, $10149, $10150, $10151, $10152, $10153, $10154, $10155, $10156, $10157, $10158, $10159, $10160, $10161, $10162, $10163, $10164, $10165, $10166, $10167, $10168, VersionRange($10169, $10170)), ($10171, $10172, $10173, $10174, $10175, $10176, $10177, $10178, $10179, $10180, $10181, $10182, $10183, $10184, $10185, $10186, $10187, $10188, $10189, $10190, $10191, $10192, $10193, $10194, $10195, $10196, $10197, $10198, VersionRange($10199, $10200)), ($10201, $10202, $10203, $10204, $10205, $10206, $10207, $10208, $10209, $10210, $10211, $10212, $10213, $10214, $10215, $10216, $10217, $10218, $10219, $10220, $10221, $10222, $10223, $10224, $10225, $10226, $10227, $10228, VersionRange($10229, $10230)), ($10231, $10232, $10233, $10234, $10235, $10236, $10237, $10238, $10239, $10240, $10241, $10242, $10243, $10244, $10245, $10246, $10247, $10248, $10249, $10250, $10251, $10252, $10253, $10254, $10255, $10256, $10257, $10258, VersionRange($10259, $10260)), ($10261, $10262, $10263, $10264, $10265, $10266, $10267, $10268, $10269, $10270, $10271, $10272, $10273, $10274, $10275, $10276, $10277, $10278, $10279, $10280, $10281, $10282, $10283, $10284, $10285, $10286, $10287, $10288, VersionRange($10289, $10290)), ($10291, $10292, $10293, $10294, $10295, $10296, $10297, $10298, $10299, $10300, $10301, $10302, $10303, $10304, $10305, $10306, $10307, $10308, $10309, $10310, $10311, $10312, $10313, $10314, $10315, $10316, $10317, $10318, VersionRange($10319, $10320)), ($10321, $10322, $10323, $10324, $10325, $10326, $10327, $10328, $10329, $10330, $10331, $10332, $10333, $10334, $10335, $10336, $10337, $10338, $10339, $10340, $10341, $10342, $10343, $10344, $10345, $10346, $10347, $10348, VersionRange($10349, $10350)), ($10351, $10352, $10353, $10354, $10355, $10356, $10357, $10358, $10359, $10360, $10361, $10362, $10363, $10364, $10365, $10366, $10367, $10368, $10369, $10370, $10371, $10372, $10373, $10374, $10375, $10376, $10377, $10378, VersionRange($10379, $10380)), ($10381, $10382, $10383, $10384, $10385, $10386, $10387, $10388, $10389, $10390, $10391, $10392, $10393, $10394, $10395, $10396, $10397, $10398, $10399, $10400, $10401, $10402, $10403, $10404, $10405, $10406, $10407, $10408, VersionRange($10409, $10410)), ($10411, $10412, $10413, $10414, $10415, $10416, $10417, $10418, $10419, $10420, $10421, $10422, $10423, $10424, $10425, $10426, $10427, $10428, $10429, $10430, $10431, $10432, $10433, $10434, $10435, $10436, $10437, $10438, VersionRange($10439, $10440)), ($10441, $10442, $10443, $10444, $10445, $10446, $10447, $10448, $10449, $10450, $10451, $10452, $10453, $10454, $10455, $10456, $10457, $10458, $10459, $10460, $10461, $10462, $10463, $10464, $10465, $10466, $10467, $10468, VersionRange($10469, $10470)), ($10471, $10472, $10473, $10474, $10475, $10476, $10477, $10478, $10479, $10480, $10481, $10482, $10483, $10484, $10485, $10486, $10487, $10488, $10489, $10490, $10491, $10492, $10493, $10494, $10495, $10496, $10497, $10498, VersionRange($10499, $10500)), ($10501, $10502, $10503, $10504, $10505, $10506, $10507, $10508, $10509, $10510, $10511, $10512, $10513, $10514, $10515, $10516, $10517, $10518, $10519, $10520, $10521, $10522, $10523, $10524, $10525, $10526, $10527, $10528, VersionRange($10529, $10530)), ($10531, $10532, $10533, $10534, $10535, $10536, $10537, $10538, $10539, $10540, $10541, $10542, $10543, $10544, $10545, $10546, $10547, $10548, $10549, $10550, $10551, $10552, $10553, $10554, $10555, $10556, $10557, $10558, VersionRange($10559, $10560)), ($10561, $10562, $10563, $10564, $10565, $10566, $10567, $10568, $10569, $10570, $10571, $10572, $10573, $10574, $10575, $10576, $10577, $10578, $10579, $10580, $10581, $10582, $10583, $10584, $10585, $10586, $10587, $10588, VersionRange($10589, $10590)), ($10591, $10592, $10593, $10594, $10595, $10596, $10597, $10598, $10599, $10600, $10601, $10602, $10603, $10604, $10605, $10606, $10607, $10608, $10609, $10610, $10611, $10612, $10613, $10614, $10615, $10616, $10617, $10618, VersionRange($10619, $10620)), ($10621, $10622, $10623, $10624, $10625, $10626, $10627, $10628, $10629, $10630, $10631, $10632, $10633, $10634, $10635, $10636, $10637, $10638, $10639, $10640, $10641, $10642, $10643, $10644, $10645, $10646, $10647, $10648, VersionRange($10649, $10650)), ($10651, $10652, $10653, $10654, $10655, $10656, $10657, $10658, $10659, $10660, $10661, $10662, $10663, $10664, $10665, $10666, $10667, $10668, $10669, $10670, $10671, $10672, $10673, $10674, $10675, $10676, $10677, $10678, VersionRange($10679, $10680)), ($10681, $10682, $10683, $10684, $10685, $10686, $10687, $10688, $10689, $10690, $10691, $10692, $10693, $10694, $10695, $10696, $10697, $10698, $10699, $10700, $10701, $10702, $10703, $10704, $10705, $10706, $10707, $10708, VersionRange($10709, $10710)), ($10711, $10712, $10713, $10714, $10715, $10716, $10717, $10718, $10719, $10720, $10721, $10722, $10723, $10724, $10725, $10726, $10727, $10728, $10729, $10730, $10731, $10732, $10733, $10734, $10735, $10736, $10737, $10738, VersionRange($10739, $10740)), ($10741, $10742, $10743, $10744, $10745, $10746, $10747, $10748, $10749, $10750, $10751, $10752, $10753, $10754, $10755, $10756, $10757, $10758, $10759, $10760, $10761, $10762, $10763, $10764, $10765, $10766, $10767, $10768, VersionRange($10769, $10770)), ($10771, $10772, $10773, $10774, $10775, $10776, $10777, $10778, $10779, $10780, $10781, $10782, $10783, $10784, $10785, $10786, $10787, $10788, $10789, $10790, $10791, $10792, $10793, $10794, $10795, $10796, $10797, $10798, VersionRange($10799, $10800)), ($10801, $10802, $10803, $10804, $10805, $10806, $10807, $10808, $10809, $10810, $10811, $10812, $10813, $10814, $10815, $10816, $10817, $10818, $10819, $10820, $10821, $10822, $10823, $10824, $10825, $10826, $10827, $10828, VersionRange($10829, $10830)), ($10831, $10832, $10833, $10834, $10835, $10836, $10837, $10838, $10839, $10840, $10841, $10842, $10843, $10844, $10845, $10846, $10847, $10848, $10849, $10850, $10851, $10852, $10853, $10854, $10855, $10856, $10857, $10858, VersionRange($10859, $10860)), ($10861, $10862, $10863, $10864, $10865, $10866, $10867, $10868, $10869, $10870, $10871, $10872, $10873, $10874, $10875, $10876, $10877, $10878, $10879, $10880, $10881, $10882, $10883, $10884, $10885, $10886, $10887, $10888, VersionRange($10889, $10890)), ($10891, $10892, $10893, $10894, $10895, $10896, $10897, $10898, $10899, $10900, $10901, $10902, $10903, $10904, $10905, $10906, $10907, $10908, $10909, $10910, $10911, $10912, $10913, $10914, $10915, $10916, $10917, $10918, VersionRange($10919, $10920)), ($10921, $10922, $10923, $10924, $10925, $10926, $10927, $10928, $10929, $10930, $10931, $10932, $10933, $10934, $10935, $10936, $10937, $10938, $10939, $10940, $10941, $10942, $10943, $10944, $10945, $10946, $10947, $10948, VersionRange($10949, $10950)), ($10951, $10952, $10953, $10954, $10955, $10956, $10957, $10958, $10959, $10960, $10961, $10962, $10963, $10964, $10965, $10966, $10967, $10968, $10969, $10970, $10971, $10972, $10973, $10974, $10975, $10976, $10977, $10978, VersionRange($10979, $10980)), ($10981, $10982, $10983, $10984, $10985, $10986, $10987, $10988, $10989, $10990, $10991, $10992, $10993, $10994, $10995, $10996, $10997, $10998, $10999, $11000, $11001, $11002, $11003, $11004, $11005, $11006, $11007, $11008, VersionRange($11009, $11010)), ($11011, $11012, $11013, $11014, $11015, $11016, $11017, $11018, $11019, $11020, $11021, $11022, $11023, $11024, $11025, $11026, $11027, $11028, $11029, $11030, $11031, $11032, $11033, $11034, $11035, $11036, $11037, $11038, VersionRange($11039, $11040)), ($11041, $11042, $11043, $11044, $11045, $11046, $11047, $11048, $11049, $11050, $11051, $11052, $11053, $11054, $11055, $11056, $11057, $11058, $11059, $11060, $11061, $11062, $11063, $11064, $11065, $11066, $11067, $11068, VersionRange($11069, $11070)), ($11071, $11072, $11073, $11074, $11075, $11076, $11077, $11078, $11079, $11080, $11081, $11082, $11083, $11084, $11085, $11086, $11087, $11088, $11089, $11090, $11091, $11092, $11093, $11094, $11095, $11096, $11097, $11098, VersionRange($11099, $11100)), ($11101, $11102, $11103, $11104, $11105, $11106, $11107, $11108, $11109, $11110, $11111, $11112, $11113, $11114, $11115, $11116, $11117, $11118, $11119, $11120, $11121, $11122, $11123, $11124, $11125, $11126, $11127, $11128, VersionRange($11129, $11130)), ($11131, $11132, $11133, $11134, $11135, $11136, $11137, $11138, $11139, $11140, $11141, $11142, $11143, $11144, $11145, $11146, $11147, $11148, $11149, $11150, $11151, $11152, $11153, $11154, $11155, $11156, $11157, $11158, VersionRange($11159, $11160)), ($11161, $11162, $11163, $11164, $11165, $11166, $11167, $11168, $11169, $11170, $11171, $11172, $11173, $11174, $11175, $11176, $11177, $11178, $11179, $11180, $11181, $11182, $11183, $11184, $11185, $11186, $11187, $11188, VersionRange($11189, $11190)), ($11191, $11192, $11193, $11194, $11195, $11196, $11197, $11198, $11199, $11200, $11201, $11202, $11203, $11204, $11205, $11206, $11207, $11208, $11209, $11210, $11211, $11212, $11213, $11214, $11215, $11216, $11217, $11218, VersionRange($11219, $11220)), ($11221, $11222, $11223, $11224, $11225, $11226, $11227, $11228, $11229, $11230, $11231, $11232, $11233, $11234, $11235, $11236, $11237, $11238, $11239, $11240, $11241, $11242, $11243, $11244, $11245, $11246, $11247, $11248, VersionRange($11249, $11250)), ($11251, $11252, $11253, $11254, $11255, $11256, $11257, $11258, $11259, $11260, $11261, $11262, $11263, $11264, $11265, $11266, $11267, $11268, $11269, $11270, $11271, $11272, $11273, $11274, $11275, $11276, $11277, $11278, VersionRange($11279, $11280)), ($11281, $11282, $11283, $11284, $11285, $11286, $11287, $11288, $11289, $11290, $11291, $11292, $11293, $11294, $11295, $11296, $11297, $11298, $11299, $11300, $11301, $11302, $11303, $11304, $11305, $11306, $11307, $11308, VersionRange($11309, $11310)), ($11311, $11312, $11313, $11314, $11315, $11316, $11317, $11318, $11319, $11320, $11321, $11322, $11323, $11324, $11325, $11326, $11327, $11328, $11329, $11330, $11331, $11332, $11333, $11334, $11335, $11336, $11337, $11338, VersionRange($11339, $11340)), ($11341, $11342, $11343, $11344, $11345, $11346, $11347, $11348, $11349, $11350, $11351, $11352, $11353, $11354, $11355, $11356, $11357, $11358, $11359, $11360, $11361, $11362, $11363, $11364, $11365, $11366, $11367, $11368, VersionRange($11369, $11370)), ($11371, $11372, $11373, $11374, $11375, $11376, $11377, $11378, $11379, $11380, $11381, $11382, $11383, $11384, $11385, $11386, $11387, $11388, $11389, $11390, $11391, $11392, $11393, $11394, $11395, $11396, $11397, $11398, VersionRange($11399, $11400)), ($11401, $11402, $11403, $11404, $11405, $11406, $11407, $11408, $11409, $11410, $11411, $11412, $11413, $11414, $11415, $11416, $11417, $11418, $11419, $11420, $11421, $11422, $11423, $11424, $11425, $11426, $11427, $11428, VersionRange($11429, $11430)), ($11431, $11432, $11433, $11434, $11435, $11436, $11437, $11438, $11439, $11440, $11441, $11442, $11443, $11444, $11445, $11446, $11447, $11448, $11449, $11450, $11451, $11452, $11453, $11454, $11455, $11456, $11457, $11458, VersionRange($11459, $11460)), ($11461, $11462, $11463, $11464, $11465, $11466, $11467, $11468, $11469, $11470, $11471, $11472, $11473, $11474, $11475, $11476, $11477, $11478, $11479, $11480, $11481, $11482, $11483, $11484, $11485, $11486, $11487, $11488, VersionRange($11489, $11490)), ($11491, $11492, $11493, $11494, $11495, $11496, $11497, $11498, $11499, $11500, $11501, $11502, $11503, $11504, $11505, $11506, $11507, $11508, $11509, $11510, $11511, $11512, $11513, $11514, $11515, $11516, $11517, $11518, VersionRange($11519, $11520)), ($11521, $11522, $11523, $11524, $11525, $11526, $11527, $11528, $11529, $11530, $11531, $11532, $11533, $11534, $11535, $11536, $11537, $11538, $11539, $11540, $11541, $11542, $11543, $11544, $11545, $11546, $11547, $11548, VersionRange($11549, $11550)), ($11551, $11552, $11553, $11554, $11555, $11556, $11557, $11558, $11559, $11560, $11561, $11562, $11563, $11564, $11565, $11566, $11567, $11568, $11569, $11570, $11571, $11572, $11573, $11574, $11575, $11576, $11577, $11578, VersionRange($11579, $11580)), ($11581, $11582, $11583, $11584, $11585, $11586, $11587, $11588, $11589, $11590, $11591, $11592, $11593, $11594, $11595, $11596, $11597, $11598, $11599, $11600, $11601, $11602, $11603, $11604, $11605, $11606, $11607, $11608, VersionRange($11609, $11610)), ($11611, $11612, $11613, $11614, $11615, $11616, $11617, $11618, $11619, $11620, $11621, $11622, $11623, $11624, $11625, $11626, $11627, $11628, $11629, $11630, $11631, $11632, $11633, $11634, $11635, $11636, $11637, $11638, VersionRange($11639, $11640)), ($11641, $11642, $11643, $11644, $11645, $11646, $11647, $11648, $11649, $11650, $11651, $11652, $11653, $11654, $11655, $11656, $11657, $11658, $11659, $11660, $11661, $11662, $11663, $11664, $11665, $11666, $11667, $11668, VersionRange($11669, $11670)), ($11671, $11672, $11673, $11674, $11675, $11676, $11677, $11678, $11679, $11680, $11681, $11682, $11683, $11684, $11685, $11686, $11687, $11688, $11689, $11690, $11691, $11692, $11693, $11694, $11695, $11696, $11697, $11698, VersionRange($11699, $11700)), ($11701, $11702, $11703, $11704, $11705, $11706, $11707, $11708, $11709, $11710, $11711, $11712, $11713, $11714, $11715, $11716, $11717, $11718, $11719, $11720, $11721, $11722, $11723, $11724, $11725, $11726, $11727, $11728, VersionRange($11729, $11730)), ($11731, $11732, $11733, $11734, $11735, $11736, $11737, $11738, $11739, $11740, $11741, $11742, $11743, $11744, $11745, $11746, $11747, $11748, $11749, $11750, $11751, $11752, $11753, $11754, $11755, $11756, $11757, $11758, VersionRange($11759, $11760)), ($11761, $11762, $11763, $11764, $11765, $11766, $11767, $11768, $11769, $11770, $11771, $11772, $11773, $11774, $11775, $11776, $11777, $11778, $11779, $11780, $11781, $11782, $11783, $11784, $11785, $11786, $11787, $11788, VersionRange($11789, $11790)), ($11791, $11792, $11793, $11794, $11795, $11796, $11797, $11798, $11799, $11800, $11801, $11802, $11803, $11804, $11805, $11806, $11807, $11808, $11809, $11810, $11811, $11812, $11813, $11814, $11815, $11816, $11817, $11818, VersionRange($11819, $11820)), ($11821, $11822, $11823, $11824, $11825, $11826, $11827, $11828, $11829, $11830, $11831, $11832, $11833, $11834, $11835, $11836, $11837, $11838, $11839, $11840, $11841, $11842, $11843, $11844, $11845, $11846, $11847, $11848, VersionRange($11849, $11850)), ($11851, $11852, $11853, $11854, $11855, $11856, $11857, $11858, $11859, $11860, $11861, $11862, $11863, $11864, $11865, $11866, $11867, $11868, $11869, $11870, $11871, $11872, $11873, $11874, $11875, $11876, $11877, $11878, VersionRange($11879, $11880)), ($11881, $11882, $11883, $11884, $11885, $11886, $11887, $11888, $11889, $11890, $11891, $11892, $11893, $11894, $11895, $11896, $11897, $11898, $11899, $11900, $11901, $11902, $11903, $11904, $11905, $11906, $11907, $11908, VersionRange($11909, $11910)), ($11911, $11912, $11913, $11914, $11915, $11916, $11917, $11918, $11919, $11920, $11921, $11922, $11923, $11924, $11925, $11926, $11927, $11928, $11929, $11930, $11931, $11932, $11933, $11934, $11935, $11936, $11937, $11938, VersionRange($11939, $11940)), ($11941, $11942, $11943, $11944, $11945, $11946, $11947, $11948, $11949, $11950, $11951, $11952, $11953, $11954, $11955, $11956, $11957, $11958, $11959, $11960, $11961, $11962, $11963, $11964, $11965, $11966, $11967, $11968, VersionRange($11969, $11970)), ($11971, $11972, $11973, $11974, $11975, $11976, $11977, $11978, $11979, $11980, $11981, $11982, $11983, $11984, $11985, $11986, $11987, $11988, $11989, $11990, $11991, $11992, $11993, $11994, $11995, $11996, $11997, $11998, VersionRange($11999, $12000)) ON CONFLICT (hash_kind, hash) DO NOTHING;
Date: 2023-07-04 18:40:26
Queries that waited the most
Rank Wait time Query 1 4m26s DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id;[ Date: 2023-07-04 18:46:12 ]
2 7s330ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30)), ($31, $32, $33, $34, $35, $36, $37, $38, $39, $40, $41, $42, $43, $44, $45, $46, $47, $48, $49, $50, $51, $52, $53, $54, $55, $56, $57, $58, VersionRange($59, $60)), ($61, $62, $63, $64, $65, $66, $67, $68, $69, $70, $71, $72, $73, $74, $75, $76, $77, $78, $79, $80, $81, $82, $83, $84, $85, $86, $87, $88, VersionRange($89, $90)), ($91, $92, $93, $94, $95, $96, $97, $98, $99, $100, $101, $102, $103, $104, $105, $106, $107, $108, $109, $110, $111, $112, $113, $114, $115, $116, $117, $118, VersionRange($119, $120)), ($121, $122, $123, $124, $125, $126, $127, $128, $129, $130, $131, $132, $133, $134, $135, $136, $137, $138, $139, $140, $141, $142, $143, $144, $145, $146, $147, $148, VersionRange($149, $150)), ($151, $152, $153, $154, $155, $156, $157, $158, $159, $160, $161, $162, $163, $164, $165, $166, $167, $168, $169, $170, $171, $172, $173, $174, $175, $176, $177, $178, VersionRange($179, $180)), ($181, $182, $183, $184, $185, $186, $187, $188, $189, $190, $191, $192, $193, $194, $195, $196, $197, $198, $199, $200, $201, $202, $203, $204, $205, $206, $207, $208, VersionRange($209, $210)), ($211, $212, $213, $214, $215, $216, $217, $218, $219, $220, $221, $222, $223, $224, $225, $226, $227, $228, $229, $230, $231, $232, $233, $234, $235, $236, $237, $238, VersionRange($239, $240)), ($241, $242, $243, $244, $245, $246, $247, $248, $249, $250, $251, $252, $253, $254, $255, $256, $257, $258, $259, $260, $261, $262, $263, $264, $265, $266, $267, $268, VersionRange($269, $270)), ($271, $272, $273, $274, $275, $276, $277, $278, $279, $280, $281, $282, $283, $284, $285, $286, $287, $288, $289, $290, $291, $292, $293, $294, $295, $296, $297, $298, VersionRange($299, $300)), ($301, $302, $303, $304, $305, $306, $307, $308, $309, $310, $311, $312, $313, $314, $315, $316, $317, $318, $319, $320, $321, $322, $323, $324, $325, $326, $327, $328, VersionRange($329, $330)), ($331, $332, $333, $334, $335, $336, $337, $338, $339, $340, $341, $342, $343, $344, $345, $346, $347, $348, $349, $350, $351, $352, $353, $354, $355, $356, $357, $358, VersionRange($359, $360)), ($361, $362, $363, $364, $365, $366, $367, $368, $369, $370, $371, $372, $373, $374, $375, $376, $377, $378, $379, $380, $381, $382, $383, $384, $385, $386, $387, $388, VersionRange($389, $390)), ($391, $392, $393, $394, $395, $396, $397, $398, $399, $400, $401, $402, $403, $404, $405, $406, $407, $408, $409, $410, $411, $412, $413, $414, $415, $416, $417, $418, VersionRange($419, $420)), ($421, $422, $423, $424, $425, $426, $427, $428, $429, $430, $431, $432, $433, $434, $435, $436, $437, $438, $439, $440, $441, $442, $443, $444, $445, $446, $447, $448, VersionRange($449, $450)), ($451, $452, $453, $454, $455, $456, $457, $458, $459, $460, $461, $462, $463, $464, $465, $466, $467, $468, $469, $470, $471, $472, $473, $474, $475, $476, $477, $478, VersionRange($479, $480)), ($481, $482, $483, $484, $485, $486, $487, $488, $489, $490, $491, $492, $493, $494, $495, $496, $497, $498, $499, $500, $501, $502, $503, $504, $505, $506, $507, $508, VersionRange($509, $510)), ($511, $512, $513, $514, $515, $516, $517, $518, $519, $520, $521, $522, $523, $524, $525, $526, $527, $528, $529, $530, $531, $532, $533, $534, $535, $536, $537, $538, VersionRange($539, $540)), ($541, $542, $543, $544, $545, $546, $547, $548, $549, $550, $551, $552, $553, $554, $555, $556, $557, $558, $559, $560, $561, $562, $563, $564, $565, $566, $567, $568, VersionRange($569, $570)), ($571, $572, $573, $574, $575, $576, $577, $578, $579, $580, $581, $582, $583, $584, $585, $586, $587, $588, $589, $590, $591, $592, $593, $594, $595, $596, $597, $598, VersionRange($599, $600)), ($601, $602, $603, $604, $605, $606, $607, $608, $609, $610, $611, $612, $613, $614, $615, $616, $617, $618, $619, $620, $621, $622, $623, $624, $625, $626, $627, $628, VersionRange($629, $630)), ($631, $632, $633, $634, $635, $636, $637, $638, $639, $640, $641, $642, $643, $644, $645, $646, $647, $648, $649, $650, $651, $652, $653, $654, $655, $656, $657, $658, VersionRange($659, $660)), ($661, $662, $663, $664, $665, $666, $667, $668, $669, $670, $671, $672, $673, $674, $675, $676, $677, $678, $679, $680, $681, $682, $683, $684, $685, $686, $687, $688, VersionRange($689, $690)), ($691, $692, $693, $694, $695, $696, $697, $698, $699, $700, $701, $702, $703, $704, $705, $706, $707, $708, $709, $710, $711, $712, $713, $714, $715, $716, $717, $718, VersionRange($719, $720)), ($721, $722, $723, $724, $725, $726, $727, $728, $729, $730, $731, $732, $733, $734, $735, $736, $737, $738, $739, $740, $741, $742, $743, $744, $745, $746, $747, $748, VersionRange($749, $750)), ($751, $752, $753, $754, $755, $756, $757, $758, $759, $760, $761, $762, $763, $764, $765, $766, $767, $768, $769, $770, $771, $772, $773, $774, $775, $776, $777, $778, VersionRange($779, $780)), ($781, $782, $783, $784, $785, $786, $787, $788, $789, $790, $791, $792, $793, $794, $795, $796, $797, $798, $799, $800, $801, $802, $803, $804, $805, $806, $807, $808, VersionRange($809, $810)), ($811, $812, $813, $814, $815, $816, $817, $818, $819, $820, $821, $822, $823, $824, $825, $826, $827, $828, $829, $830, $831, $832, $833, $834, $835, $836, $837, $838, VersionRange($839, $840)), ($841, $842, $843, $844, $845, $846, $847, $848, $849, $850, $851, $852, $853, $854, $855, $856, $857, $858, $859, $860, $861, $862, $863, $864, $865, $866, $867, $868, VersionRange($869, $870)), ($871, $872, $873, $874, $875, $876, $877, $878, $879, $880, $881, $882, $883, $884, $885, $886, $887, $888, $889, $890, $891, $892, $893, $894, $895, $896, $897, $898, VersionRange($899, $900)), ($901, $902, $903, $904, $905, $906, $907, $908, $909, $910, $911, $912, $913, $914, $915, $916, $917, $918, $919, $920, $921, $922, $923, $924, $925, $926, $927, $928, VersionRange($929, $930)), ($931, $932, $933, $934, $935, $936, $937, $938, $939, $940, $941, $942, $943, $944, $945, $946, $947, $948, $949, $950, $951, $952, $953, $954, $955, $956, $957, $958, VersionRange($959, $960)), ($961, $962, $963, $964, $965, $966, $967, $968, $969, $970, $971, $972, $973, $974, $975, $976, $977, $978, $979, $980, $981, $982, $983, $984, $985, $986, $987, $988, VersionRange($989, $990)), ($991, $992, $993, $994, $995, $996, $997, $998, $999, $1000, $1001, $1002, $1003, $1004, $1005, $1006, $1007, $1008, $1009, $1010, $1011, $1012, $1013, $1014, $1015, $1016, $1017, $1018, VersionRange($1019, $1020)), ($1021, $1022, $1023, $1024, $1025, $1026, $1027, $1028, $1029, $1030, $1031, $1032, $1033, $1034, $1035, $1036, $1037, $1038, $1039, $1040, $1041, $1042, $1043, $1044, $1045, $1046, $1047, $1048, VersionRange($1049, $1050)), ($1051, $1052, $1053, $1054, $1055, $1056, $1057, $1058, $1059, $1060, $1061, $1062, $1063, $1064, $1065, $1066, $1067, $1068, $1069, $1070, $1071, $1072, $1073, $1074, $1075, $1076, $1077, $1078, VersionRange($1079, $1080)), ($1081, $1082, $1083, $1084, $1085, $1086, $1087, $1088, $1089, $1090, $1091, $1092, $1093, $1094, $1095, $1096, $1097, $1098, $1099, $1100, $1101, $1102, $1103, $1104, $1105, $1106, $1107, $1108, VersionRange($1109, $1110)), ($1111, $1112, $1113, $1114, $1115, $1116, $1117, $1118, $1119, $1120, $1121, $1122, $1123, $1124, $1125, $1126, $1127, $1128, $1129, $1130, $1131, $1132, $1133, $1134, $1135, $1136, $1137, $1138, VersionRange($1139, $1140)), ($1141, $1142, $1143, $1144, $1145, $1146, $1147, $1148, $1149, $1150, $1151, $1152, $1153, $1154, $1155, $1156, $1157, $1158, $1159, $1160, $1161, $1162, $1163, $1164, $1165, $1166, $1167, $1168, VersionRange($1169, $1170)), ($1171, $1172, $1173, $1174, $1175, $1176, $1177, $1178, $1179, $1180, $1181, $1182, $1183, $1184, $1185, $1186, $1187, $1188, $1189, $1190, $1191, $1192, $1193, $1194, $1195, $1196, $1197, $1198, VersionRange($1199, $1200)), ($1201, $1202, $1203, $1204, $1205, $1206, $1207, $1208, $1209, $1210, $1211, $1212, $1213, $1214, $1215, $1216, $1217, $1218, $1219, $1220, $1221, $1222, $1223, $1224, $1225, $1226, $1227, $1228, VersionRange($1229, $1230)), ($1231, $1232, $1233, $1234, $1235, $1236, $1237, $1238, $1239, $1240, $1241, $1242, $1243, $1244, $1245, $1246, $1247, $1248, $1249, $1250, $1251, $1252, $1253, $1254, $1255, $1256, $1257, $1258, VersionRange($1259, $1260)), ($1261, $1262, $1263, $1264, $1265, $1266, $1267, $1268, $1269, $1270, $1271, $1272, $1273, $1274, $1275, $1276, $1277, $1278, $1279, $1280, $1281, $1282, $1283, $1284, $1285, $1286, $1287, $1288, VersionRange($1289, $1290)), ($1291, $1292, $1293, $1294, $1295, $1296, $1297, $1298, $1299, $1300, $1301, $1302, $1303, $1304, $1305, $1306, $1307, $1308, $1309, $1310, $1311, $1312, $1313, $1314, $1315, $1316, $1317, $1318, VersionRange($1319, $1320)), ($1321, $1322, $1323, $1324, $1325, $1326, $1327, $1328, $1329, $1330, $1331, $1332, $1333, $1334, $1335, $1336, $1337, $1338, $1339, $1340, $1341, $1342, $1343, $1344, $1345, $1346, $1347, $1348, VersionRange($1349, $1350)), ($1351, $1352, $1353, $1354, $1355, $1356, $1357, $1358, $1359, $1360, $1361, $1362, $1363, $1364, $1365, $1366, $1367, $1368, $1369, $1370, $1371, $1372, $1373, $1374, $1375, $1376, $1377, $1378, VersionRange($1379, $1380)), ($1381, $1382, $1383, $1384, $1385, $1386, $1387, $1388, $1389, $1390, $1391, $1392, $1393, $1394, $1395, $1396, $1397, $1398, $1399, $1400, $1401, $1402, $1403, $1404, $1405, $1406, $1407, $1408, VersionRange($1409, $1410)), ($1411, $1412, $1413, $1414, $1415, $1416, $1417, $1418, $1419, $1420, $1421, $1422, $1423, $1424, $1425, $1426, $1427, $1428, $1429, $1430, $1431, $1432, $1433, $1434, $1435, $1436, $1437, $1438, VersionRange($1439, $1440)), ($1441, $1442, $1443, $1444, $1445, $1446, $1447, $1448, $1449, $1450, $1451, $1452, $1453, $1454, $1455, $1456, $1457, $1458, $1459, $1460, $1461, $1462, $1463, $1464, $1465, $1466, $1467, $1468, VersionRange($1469, $1470)), ($1471, $1472, $1473, $1474, $1475, $1476, $1477, $1478, $1479, $1480, $1481, $1482, $1483, $1484, $1485, $1486, $1487, $1488, $1489, $1490, $1491, $1492, $1493, $1494, $1495, $1496, $1497, $1498, VersionRange($1499, $1500)), ($1501, $1502, $1503, $1504, $1505, $1506, $1507, $1508, $1509, $1510, $1511, $1512, $1513, $1514, $1515, $1516, $1517, $1518, $1519, $1520, $1521, $1522, $1523, $1524, $1525, $1526, $1527, $1528, VersionRange($1529, $1530)), ($1531, $1532, $1533, $1534, $1535, $1536, $1537, $1538, $1539, $1540, $1541, $1542, $1543, $1544, $1545, $1546, $1547, $1548, $1549, $1550, $1551, $1552, $1553, $1554, $1555, $1556, $1557, $1558, VersionRange($1559, $1560)), ($1561, $1562, $1563, $1564, $1565, $1566, $1567, $1568, $1569, $1570, $1571, $1572, $1573, $1574, $1575, $1576, $1577, $1578, $1579, $1580, $1581, $1582, $1583, $1584, $1585, $1586, $1587, $1588, VersionRange($1589, $1590)), ($1591, $1592, $1593, $1594, $1595, $1596, $1597, $1598, $1599, $1600, $1601, $1602, $1603, $1604, $1605, $1606, $1607, $1608, $1609, $1610, $1611, $1612, $1613, $1614, $1615, $1616, $1617, $1618, VersionRange($1619, $1620)), ($1621, $1622, $1623, $1624, $1625, $1626, $1627, $1628, $1629, $1630, $1631, $1632, $1633, $1634, $1635, $1636, $1637, $1638, $1639, $1640, $1641, $1642, $1643, $1644, $1645, $1646, $1647, $1648, VersionRange($1649, $1650)), ($1651, $1652, $1653, $1654, $1655, $1656, $1657, $1658, $1659, $1660, $1661, $1662, $1663, $1664, $1665, $1666, $1667, $1668, $1669, $1670, $1671, $1672, $1673, $1674, $1675, $1676, $1677, $1678, VersionRange($1679, $1680)), ($1681, $1682, $1683, $1684, $1685, $1686, $1687, $1688, $1689, $1690, $1691, $1692, $1693, $1694, $1695, $1696, $1697, $1698, $1699, $1700, $1701, $1702, $1703, $1704, $1705, $1706, $1707, $1708, VersionRange($1709, $1710)), ($1711, $1712, $1713, $1714, $1715, $1716, $1717, $1718, $1719, $1720, $1721, $1722, $1723, $1724, $1725, $1726, $1727, $1728, $1729, $1730, $1731, $1732, $1733, $1734, $1735, $1736, $1737, $1738, VersionRange($1739, $1740)), ($1741, $1742, $1743, $1744, $1745, $1746, $1747, $1748, $1749, $1750, $1751, $1752, $1753, $1754, $1755, $1756, $1757, $1758, $1759, $1760, $1761, $1762, $1763, $1764, $1765, $1766, $1767, $1768, VersionRange($1769, $1770)), ($1771, $1772, $1773, $1774, $1775, $1776, $1777, $1778, $1779, $1780, $1781, $1782, $1783, $1784, $1785, $1786, $1787, $1788, $1789, $1790, $1791, $1792, $1793, $1794, $1795, $1796, $1797, $1798, VersionRange($1799, $1800)), ($1801, $1802, $1803, $1804, $1805, $1806, $1807, $1808, $1809, $1810, $1811, $1812, $1813, $1814, $1815, $1816, $1817, $1818, $1819, $1820, $1821, $1822, $1823, $1824, $1825, $1826, $1827, $1828, VersionRange($1829, $1830)), ($1831, $1832, $1833, $1834, $1835, $1836, $1837, $1838, $1839, $1840, $1841, $1842, $1843, $1844, $1845, $1846, $1847, $1848, $1849, $1850, $1851, $1852, $1853, $1854, $1855, $1856, $1857, $1858, VersionRange($1859, $1860)), ($1861, $1862, $1863, $1864, $1865, $1866, $1867, $1868, $1869, $1870, $1871, $1872, $1873, $1874, $1875, $1876, $1877, $1878, $1879, $1880, $1881, $1882, $1883, $1884, $1885, $1886, $1887, $1888, VersionRange($1889, $1890)), ($1891, $1892, $1893, $1894, $1895, $1896, $1897, $1898, $1899, $1900, $1901, $1902, $1903, $1904, $1905, $1906, $1907, $1908, $1909, $1910, $1911, $1912, $1913, $1914, $1915, $1916, $1917, $1918, VersionRange($1919, $1920)), ($1921, $1922, $1923, $1924, $1925, $1926, $1927, $1928, $1929, $1930, $1931, $1932, $1933, $1934, $1935, $1936, $1937, $1938, $1939, $1940, $1941, $1942, $1943, $1944, $1945, $1946, $1947, $1948, VersionRange($1949, $1950)), ($1951, $1952, $1953, $1954, $1955, $1956, $1957, $1958, $1959, $1960, $1961, $1962, $1963, $1964, $1965, $1966, $1967, $1968, $1969, $1970, $1971, $1972, $1973, $1974, $1975, $1976, $1977, $1978, VersionRange($1979, $1980)), ($1981, $1982, $1983, $1984, $1985, $1986, $1987, $1988, $1989, $1990, $1991, $1992, $1993, $1994, $1995, $1996, $1997, $1998, $1999, $2000, $2001, $2002, $2003, $2004, $2005, $2006, $2007, $2008, VersionRange($2009, $2010)), ($2011, $2012, $2013, $2014, $2015, $2016, $2017, $2018, $2019, $2020, $2021, $2022, $2023, $2024, $2025, $2026, $2027, $2028, $2029, $2030, $2031, $2032, $2033, $2034, $2035, $2036, $2037, $2038, VersionRange($2039, $2040)), ($2041, $2042, $2043, $2044, $2045, $2046, $2047, $2048, $2049, $2050, $2051, $2052, $2053, $2054, $2055, $2056, $2057, $2058, $2059, $2060, $2061, $2062, $2063, $2064, $2065, $2066, $2067, $2068, VersionRange($2069, $2070)), ($2071, $2072, $2073, $2074, $2075, $2076, $2077, $2078, $2079, $2080, $2081, $2082, $2083, $2084, $2085, $2086, $2087, $2088, $2089, $2090, $2091, $2092, $2093, $2094, $2095, $2096, $2097, $2098, VersionRange($2099, $2100)), ($2101, $2102, $2103, $2104, $2105, $2106, $2107, $2108, $2109, $2110, $2111, $2112, $2113, $2114, $2115, $2116, $2117, $2118, $2119, $2120, $2121, $2122, $2123, $2124, $2125, $2126, $2127, $2128, VersionRange($2129, $2130)), ($2131, $2132, $2133, $2134, $2135, $2136, $2137, $2138, $2139, $2140, $2141, $2142, $2143, $2144, $2145, $2146, $2147, $2148, $2149, $2150, $2151, $2152, $2153, $2154, $2155, $2156, $2157, $2158, VersionRange($2159, $2160)), ($2161, $2162, $2163, $2164, $2165, $2166, $2167, $2168, $2169, $2170, $2171, $2172, $2173, $2174, $2175, $2176, $2177, $2178, $2179, $2180, $2181, $2182, $2183, $2184, $2185, $2186, $2187, $2188, VersionRange($2189, $2190)), ($2191, $2192, $2193, $2194, $2195, $2196, $2197, $2198, $2199, $2200, $2201, $2202, $2203, $2204, $2205, $2206, $2207, $2208, $2209, $2210, $2211, $2212, $2213, $2214, $2215, $2216, $2217, $2218, VersionRange($2219, $2220)), ($2221, $2222, $2223, $2224, $2225, $2226, $2227, $2228, $2229, $2230, $2231, $2232, $2233, $2234, $2235, $2236, $2237, $2238, $2239, $2240, $2241, $2242, $2243, $2244, $2245, $2246, $2247, $2248, VersionRange($2249, $2250)), ($2251, $2252, $2253, $2254, $2255, $2256, $2257, $2258, $2259, $2260, $2261, $2262, $2263, $2264, $2265, $2266, $2267, $2268, $2269, $2270, $2271, $2272, $2273, $2274, $2275, $2276, $2277, $2278, VersionRange($2279, $2280)), ($2281, $2282, $2283, $2284, $2285, $2286, $2287, $2288, $2289, $2290, $2291, $2292, $2293, $2294, $2295, $2296, $2297, $2298, $2299, $2300, $2301, $2302, $2303, $2304, $2305, $2306, $2307, $2308, VersionRange($2309, $2310)), ($2311, $2312, $2313, $2314, $2315, $2316, $2317, $2318, $2319, $2320, $2321, $2322, $2323, $2324, $2325, $2326, $2327, $2328, $2329, $2330, $2331, $2332, $2333, $2334, $2335, $2336, $2337, $2338, VersionRange($2339, $2340)), ($2341, $2342, $2343, $2344, $2345, $2346, $2347, $2348, $2349, $2350, $2351, $2352, $2353, $2354, $2355, $2356, $2357, $2358, $2359, $2360, $2361, $2362, $2363, $2364, $2365, $2366, $2367, $2368, VersionRange($2369, $2370)), ($2371, $2372, $2373, $2374, $2375, $2376, $2377, $2378, $2379, $2380, $2381, $2382, $2383, $2384, $2385, $2386, $2387, $2388, $2389, $2390, $2391, $2392, $2393, $2394, $2395, $2396, $2397, $2398, VersionRange($2399, $2400)), ($2401, $2402, $2403, $2404, $2405, $2406, $2407, $2408, $2409, $2410, $2411, $2412, $2413, $2414, $2415, $2416, $2417, $2418, $2419, $2420, $2421, $2422, $2423, $2424, $2425, $2426, $2427, $2428, VersionRange($2429, $2430)), ($2431, $2432, $2433, $2434, $2435, $2436, $2437, $2438, $2439, $2440, $2441, $2442, $2443, $2444, $2445, $2446, $2447, $2448, $2449, $2450, $2451, $2452, $2453, $2454, $2455, $2456, $2457, $2458, VersionRange($2459, $2460)), ($2461, $2462, $2463, $2464, $2465, $2466, $2467, $2468, $2469, $2470, $2471, $2472, $2473, $2474, $2475, $2476, $2477, $2478, $2479, $2480, $2481, $2482, $2483, $2484, $2485, $2486, $2487, $2488, VersionRange($2489, $2490)), ($2491, $2492, $2493, $2494, $2495, $2496, $2497, $2498, $2499, $2500, $2501, $2502, $2503, $2504, $2505, $2506, $2507, $2508, $2509, $2510, $2511, $2512, $2513, $2514, $2515, $2516, $2517, $2518, VersionRange($2519, $2520)), ($2521, $2522, $2523, $2524, $2525, $2526, $2527, $2528, $2529, $2530, $2531, $2532, $2533, $2534, $2535, $2536, $2537, $2538, $2539, $2540, $2541, $2542, $2543, $2544, $2545, $2546, $2547, $2548, VersionRange($2549, $2550)), ($2551, $2552, $2553, $2554, $2555, $2556, $2557, $2558, $2559, $2560, $2561, $2562, $2563, $2564, $2565, $2566, $2567, $2568, $2569, $2570, $2571, $2572, $2573, $2574, $2575, $2576, $2577, $2578, VersionRange($2579, $2580)), ($2581, $2582, $2583, $2584, $2585, $2586, $2587, $2588, $2589, $2590, $2591, $2592, $2593, $2594, $2595, $2596, $2597, $2598, $2599, $2600, $2601, $2602, $2603, $2604, $2605, $2606, $2607, $2608, VersionRange($2609, $2610)), ($2611, $2612, $2613, $2614, $2615, $2616, $2617, $2618, $2619, $2620, $2621, $2622, $2623, $2624, $2625, $2626, $2627, $2628, $2629, $2630, $2631, $2632, $2633, $2634, $2635, $2636, $2637, $2638, VersionRange($2639, $2640)), ($2641, $2642, $2643, $2644, $2645, $2646, $2647, $2648, $2649, $2650, $2651, $2652, $2653, $2654, $2655, $2656, $2657, $2658, $2659, $2660, $2661, $2662, $2663, $2664, $2665, $2666, $2667, $2668, VersionRange($2669, $2670)), ($2671, $2672, $2673, $2674, $2675, $2676, $2677, $2678, $2679, $2680, $2681, $2682, $2683, $2684, $2685, $2686, $2687, $2688, $2689, $2690, $2691, $2692, $2693, $2694, $2695, $2696, $2697, $2698, VersionRange($2699, $2700)), ($2701, $2702, $2703, $2704, $2705, $2706, $2707, $2708, $2709, $2710, $2711, $2712, $2713, $2714, $2715, $2716, $2717, $2718, $2719, $2720, $2721, $2722, $2723, $2724, $2725, $2726, $2727, $2728, VersionRange($2729, $2730)), ($2731, $2732, $2733, $2734, $2735, $2736, $2737, $2738, $2739, $2740, $2741, $2742, $2743, $2744, $2745, $2746, $2747, $2748, $2749, $2750, $2751, $2752, $2753, $2754, $2755, $2756, $2757, $2758, VersionRange($2759, $2760)), ($2761, $2762, $2763, $2764, $2765, $2766, $2767, $2768, $2769, $2770, $2771, $2772, $2773, $2774, $2775, $2776, $2777, $2778, $2779, $2780, $2781, $2782, $2783, $2784, $2785, $2786, $2787, $2788, VersionRange($2789, $2790)), ($2791, $2792, $2793, $2794, $2795, $2796, $2797, $2798, $2799, $2800, $2801, $2802, $2803, $2804, $2805, $2806, $2807, $2808, $2809, $2810, $2811, $2812, $2813, $2814, $2815, $2816, $2817, $2818, VersionRange($2819, $2820)), ($2821, $2822, $2823, $2824, $2825, $2826, $2827, $2828, $2829, $2830, $2831, $2832, $2833, $2834, $2835, $2836, $2837, $2838, $2839, $2840, $2841, $2842, $2843, $2844, $2845, $2846, $2847, $2848, VersionRange($2849, $2850)), ($2851, $2852, $2853, $2854, $2855, $2856, $2857, $2858, $2859, $2860, $2861, $2862, $2863, $2864, $2865, $2866, $2867, $2868, $2869, $2870, $2871, $2872, $2873, $2874, $2875, $2876, $2877, $2878, VersionRange($2879, $2880)), ($2881, $2882, $2883, $2884, $2885, $2886, $2887, $2888, $2889, $2890, $2891, $2892, $2893, $2894, $2895, $2896, $2897, $2898, $2899, $2900, $2901, $2902, $2903, $2904, $2905, $2906, $2907, $2908, VersionRange($2909, $2910)), ($2911, $2912, $2913, $2914, $2915, $2916, $2917, $2918, $2919, $2920, $2921, $2922, $2923, $2924, $2925, $2926, $2927, $2928, $2929, $2930, $2931, $2932, $2933, $2934, $2935, $2936, $2937, $2938, VersionRange($2939, $2940)), ($2941, $2942, $2943, $2944, $2945, $2946, $2947, $2948, $2949, $2950, $2951, $2952, $2953, $2954, $2955, $2956, $2957, $2958, $2959, $2960, $2961, $2962, $2963, $2964, $2965, $2966, $2967, $2968, VersionRange($2969, $2970)), ($2971, $2972, $2973, $2974, $2975, $2976, $2977, $2978, $2979, $2980, $2981, $2982, $2983, $2984, $2985, $2986, $2987, $2988, $2989, $2990, $2991, $2992, $2993, $2994, $2995, $2996, $2997, $2998, VersionRange($2999, $3000)), ($3001, $3002, $3003, $3004, $3005, $3006, $3007, $3008, $3009, $3010, $3011, $3012, $3013, $3014, $3015, $3016, $3017, $3018, $3019, $3020, $3021, $3022, $3023, $3024, $3025, $3026, $3027, $3028, VersionRange($3029, $3030)), ($3031, $3032, $3033, $3034, $3035, $3036, $3037, $3038, $3039, $3040, $3041, $3042, $3043, $3044, $3045, $3046, $3047, $3048, $3049, $3050, $3051, $3052, $3053, $3054, $3055, $3056, $3057, $3058, VersionRange($3059, $3060)), ($3061, $3062, $3063, $3064, $3065, $3066, $3067, $3068, $3069, $3070, $3071, $3072, $3073, $3074, $3075, $3076, $3077, $3078, $3079, $3080, $3081, $3082, $3083, $3084, $3085, $3086, $3087, $3088, VersionRange($3089, $3090)), ($3091, $3092, $3093, $3094, $3095, $3096, $3097, $3098, $3099, $3100, $3101, $3102, $3103, $3104, $3105, $3106, $3107, $3108, $3109, $3110, $3111, $3112, $3113, $3114, $3115, $3116, $3117, $3118, VersionRange($3119, $3120)), ($3121, $3122, $3123, $3124, $3125, $3126, $3127, $3128, $3129, $3130, $3131, $3132, $3133, $3134, $3135, $3136, $3137, $3138, $3139, $3140, $3141, $3142, $3143, $3144, $3145, $3146, $3147, $3148, VersionRange($3149, $3150)), ($3151, $3152, $3153, $3154, $3155, $3156, $3157, $3158, $3159, $3160, $3161, $3162, $3163, $3164, $3165, $3166, $3167, $3168, $3169, $3170, $3171, $3172, $3173, $3174, $3175, $3176, $3177, $3178, VersionRange($3179, $3180)), ($3181, $3182, $3183, $3184, $3185, $3186, $3187, $3188, $3189, $3190, $3191, $3192, $3193, $3194, $3195, $3196, $3197, $3198, $3199, $3200, $3201, $3202, $3203, $3204, $3205, $3206, $3207, $3208, VersionRange($3209, $3210)), ($3211, $3212, $3213, $3214, $3215, $3216, $3217, $3218, $3219, $3220, $3221, $3222, $3223, $3224, $3225, $3226, $3227, $3228, $3229, $3230, $3231, $3232, $3233, $3234, $3235, $3236, $3237, $3238, VersionRange($3239, $3240)), ($3241, $3242, $3243, $3244, $3245, $3246, $3247, $3248, $3249, $3250, $3251, $3252, $3253, $3254, $3255, $3256, $3257, $3258, $3259, $3260, $3261, $3262, $3263, $3264, $3265, $3266, $3267, $3268, VersionRange($3269, $3270)), ($3271, $3272, $3273, $3274, $3275, $3276, $3277, $3278, $3279, $3280, $3281, $3282, $3283, $3284, $3285, $3286, $3287, $3288, $3289, $3290, $3291, $3292, $3293, $3294, $3295, $3296, $3297, $3298, VersionRange($3299, $3300)), ($3301, $3302, $3303, $3304, $3305, $3306, $3307, $3308, $3309, $3310, $3311, $3312, $3313, $3314, $3315, $3316, $3317, $3318, $3319, $3320, $3321, $3322, $3323, $3324, $3325, $3326, $3327, $3328, VersionRange($3329, $3330)), ($3331, $3332, $3333, $3334, $3335, $3336, $3337, $3338, $3339, $3340, $3341, $3342, $3343, $3344, $3345, $3346, $3347, $3348, $3349, $3350, $3351, $3352, $3353, $3354, $3355, $3356, $3357, $3358, VersionRange($3359, $3360)), ($3361, $3362, $3363, $3364, $3365, $3366, $3367, $3368, $3369, $3370, $3371, $3372, $3373, $3374, $3375, $3376, $3377, $3378, $3379, $3380, $3381, $3382, $3383, $3384, $3385, $3386, $3387, $3388, VersionRange($3389, $3390)), ($3391, $3392, $3393, $3394, $3395, $3396, $3397, $3398, $3399, $3400, $3401, $3402, $3403, $3404, $3405, $3406, $3407, $3408, $3409, $3410, $3411, $3412, $3413, $3414, $3415, $3416, $3417, $3418, VersionRange($3419, $3420)), ($3421, $3422, $3423, $3424, $3425, $3426, $3427, $3428, $3429, $3430, $3431, $3432, $3433, $3434, $3435, $3436, $3437, $3438, $3439, $3440, $3441, $3442, $3443, $3444, $3445, $3446, $3447, $3448, VersionRange($3449, $3450)), ($3451, $3452, $3453, $3454, $3455, $3456, $3457, $3458, $3459, $3460, $3461, $3462, $3463, $3464, $3465, $3466, $3467, $3468, $3469, $3470, $3471, $3472, $3473, $3474, $3475, $3476, $3477, $3478, VersionRange($3479, $3480)), ($3481, $3482, $3483, $3484, $3485, $3486, $3487, $3488, $3489, $3490, $3491, $3492, $3493, $3494, $3495, $3496, $3497, $3498, $3499, $3500, $3501, $3502, $3503, $3504, $3505, $3506, $3507, $3508, VersionRange($3509, $3510)), ($3511, $3512, $3513, $3514, $3515, $3516, $3517, $3518, $3519, $3520, $3521, $3522, $3523, $3524, $3525, $3526, $3527, $3528, $3529, $3530, $3531, $3532, $3533, $3534, $3535, $3536, $3537, $3538, VersionRange($3539, $3540)), ($3541, $3542, $3543, $3544, $3545, $3546, $3547, $3548, $3549, $3550, $3551, $3552, $3553, $3554, $3555, $3556, $3557, $3558, $3559, $3560, $3561, $3562, $3563, $3564, $3565, $3566, $3567, $3568, VersionRange($3569, $3570)), ($3571, $3572, $3573, $3574, $3575, $3576, $3577, $3578, $3579, $3580, $3581, $3582, $3583, $3584, $3585, $3586, $3587, $3588, $3589, $3590, $3591, $3592, $3593, $3594, $3595, $3596, $3597, $3598, VersionRange($3599, $3600)), ($3601, $3602, $3603, $3604, $3605, $3606, $3607, $3608, $3609, $3610, $3611, $3612, $3613, $3614, $3615, $3616, $3617, $3618, $3619, $3620, $3621, $3622, $3623, $3624, $3625, $3626, $3627, $3628, VersionRange($3629, $3630)), ($3631, $3632, $3633, $3634, $3635, $3636, $3637, $3638, $3639, $3640, $3641, $3642, $3643, $3644, $3645, $3646, $3647, $3648, $3649, $3650, $3651, $3652, $3653, $3654, $3655, $3656, $3657, $3658, VersionRange($3659, $3660)), ($3661, $3662, $3663, $3664, $3665, $3666, $3667, $3668, $3669, $3670, $3671, $3672, $3673, $3674, $3675, $3676, $3677, $3678, $3679, $3680, $3681, $3682, $3683, $3684, $3685, $3686, $3687, $3688, VersionRange($3689, $3690)), ($3691, $3692, $3693, $3694, $3695, $3696, $3697, $3698, $3699, $3700, $3701, $3702, $3703, $3704, $3705, $3706, $3707, $3708, $3709, $3710, $3711, $3712, $3713, $3714, $3715, $3716, $3717, $3718, VersionRange($3719, $3720)), ($3721, $3722, $3723, $3724, $3725, $3726, $3727, $3728, $3729, $3730, $3731, $3732, $3733, $3734, $3735, $3736, $3737, $3738, $3739, $3740, $3741, $3742, $3743, $3744, $3745, $3746, $3747, $3748, VersionRange($3749, $3750)), ($3751, $3752, $3753, $3754, $3755, $3756, $3757, $3758, $3759, $3760, $3761, $3762, $3763, $3764, $3765, $3766, $3767, $3768, $3769, $3770, $3771, $3772, $3773, $3774, $3775, $3776, $3777, $3778, VersionRange($3779, $3780)), ($3781, $3782, $3783, $3784, $3785, $3786, $3787, $3788, $3789, $3790, $3791, $3792, $3793, $3794, $3795, $3796, $3797, $3798, $3799, $3800, $3801, $3802, $3803, $3804, $3805, $3806, $3807, $3808, VersionRange($3809, $3810)), ($3811, $3812, $3813, $3814, $3815, $3816, $3817, $3818, $3819, $3820, $3821, $3822, $3823, $3824, $3825, $3826, $3827, $3828, $3829, $3830, $3831, $3832, $3833, $3834, $3835, $3836, $3837, $3838, VersionRange($3839, $3840)), ($3841, $3842, $3843, $3844, $3845, $3846, $3847, $3848, $3849, $3850, $3851, $3852, $3853, $3854, $3855, $3856, $3857, $3858, $3859, $3860, $3861, $3862, $3863, $3864, $3865, $3866, $3867, $3868, VersionRange($3869, $3870)), ($3871, $3872, $3873, $3874, $3875, $3876, $3877, $3878, $3879, $3880, $3881, $3882, $3883, $3884, $3885, $3886, $3887, $3888, $3889, $3890, $3891, $3892, $3893, $3894, $3895, $3896, $3897, $3898, VersionRange($3899, $3900)), ($3901, $3902, $3903, $3904, $3905, $3906, $3907, $3908, $3909, $3910, $3911, $3912, $3913, $3914, $3915, $3916, $3917, $3918, $3919, $3920, $3921, $3922, $3923, $3924, $3925, $3926, $3927, $3928, VersionRange($3929, $3930)), ($3931, $3932, $3933, $3934, $3935, $3936, $3937, $3938, $3939, $3940, $3941, $3942, $3943, $3944, $3945, $3946, $3947, $3948, $3949, $3950, $3951, $3952, $3953, $3954, $3955, $3956, $3957, $3958, VersionRange($3959, $3960)), ($3961, $3962, $3963, $3964, $3965, $3966, $3967, $3968, $3969, $3970, $3971, $3972, $3973, $3974, $3975, $3976, $3977, $3978, $3979, $3980, $3981, $3982, $3983, $3984, $3985, $3986, $3987, $3988, VersionRange($3989, $3990)), ($3991, $3992, $3993, $3994, $3995, $3996, $3997, $3998, $3999, $4000, $4001, $4002, $4003, $4004, $4005, $4006, $4007, $4008, $4009, $4010, $4011, $4012, $4013, $4014, $4015, $4016, $4017, $4018, VersionRange($4019, $4020)), ($4021, $4022, $4023, $4024, $4025, $4026, $4027, $4028, $4029, $4030, $4031, $4032, $4033, $4034, $4035, $4036, $4037, $4038, $4039, $4040, $4041, $4042, $4043, $4044, $4045, $4046, $4047, $4048, VersionRange($4049, $4050)), ($4051, $4052, $4053, $4054, $4055, $4056, $4057, $4058, $4059, $4060, $4061, $4062, $4063, $4064, $4065, $4066, $4067, $4068, $4069, $4070, $4071, $4072, $4073, $4074, $4075, $4076, $4077, $4078, VersionRange($4079, $4080)), ($4081, $4082, $4083, $4084, $4085, $4086, $4087, $4088, $4089, $4090, $4091, $4092, $4093, $4094, $4095, $4096, $4097, $4098, $4099, $4100, $4101, $4102, $4103, $4104, $4105, $4106, $4107, $4108, VersionRange($4109, $4110)), ($4111, $4112, $4113, $4114, $4115, $4116, $4117, $4118, $4119, $4120, $4121, $4122, $4123, $4124, $4125, $4126, $4127, $4128, $4129, $4130, $4131, $4132, $4133, $4134, $4135, $4136, $4137, $4138, VersionRange($4139, $4140)), ($4141, $4142, $4143, $4144, $4145, $4146, $4147, $4148, $4149, $4150, $4151, $4152, $4153, $4154, $4155, $4156, $4157, $4158, $4159, $4160, $4161, $4162, $4163, $4164, $4165, $4166, $4167, $4168, VersionRange($4169, $4170)), ($4171, $4172, $4173, $4174, $4175, $4176, $4177, $4178, $4179, $4180, $4181, $4182, $4183, $4184, $4185, $4186, $4187, $4188, $4189, $4190, $4191, $4192, $4193, $4194, $4195, $4196, $4197, $4198, VersionRange($4199, $4200)), ($4201, $4202, $4203, $4204, $4205, $4206, $4207, $4208, $4209, $4210, $4211, $4212, $4213, $4214, $4215, $4216, $4217, $4218, $4219, $4220, $4221, $4222, $4223, $4224, $4225, $4226, $4227, $4228, VersionRange($4229, $4230)), ($4231, $4232, $4233, $4234, $4235, $4236, $4237, $4238, $4239, $4240, $4241, $4242, $4243, $4244, $4245, $4246, $4247, $4248, $4249, $4250, $4251, $4252, $4253, $4254, $4255, $4256, $4257, $4258, VersionRange($4259, $4260)), ($4261, $4262, $4263, $4264, $4265, $4266, $4267, $4268, $4269, $4270, $4271, $4272, $4273, $4274, $4275, $4276, $4277, $4278, $4279, $4280, $4281, $4282, $4283, $4284, $4285, $4286, $4287, $4288, VersionRange($4289, $4290)), ($4291, $4292, $4293, $4294, $4295, $4296, $4297, $4298, $4299, $4300, $4301, $4302, $4303, $4304, $4305, $4306, $4307, $4308, $4309, $4310, $4311, $4312, $4313, $4314, $4315, $4316, $4317, $4318, VersionRange($4319, $4320)), ($4321, $4322, $4323, $4324, $4325, $4326, $4327, $4328, $4329, $4330, $4331, $4332, $4333, $4334, $4335, $4336, $4337, $4338, $4339, $4340, $4341, $4342, $4343, $4344, $4345, $4346, $4347, $4348, VersionRange($4349, $4350)), ($4351, $4352, $4353, $4354, $4355, $4356, $4357, $4358, $4359, $4360, $4361, $4362, $4363, $4364, $4365, $4366, $4367, $4368, $4369, $4370, $4371, $4372, $4373, $4374, $4375, $4376, $4377, $4378, VersionRange($4379, $4380)), ($4381, $4382, $4383, $4384, $4385, $4386, $4387, $4388, $4389, $4390, $4391, $4392, $4393, $4394, $4395, $4396, $4397, $4398, $4399, $4400, $4401, $4402, $4403, $4404, $4405, $4406, $4407, $4408, VersionRange($4409, $4410)), ($4411, $4412, $4413, $4414, $4415, $4416, $4417, $4418, $4419, $4420, $4421, $4422, $4423, $4424, $4425, $4426, $4427, $4428, $4429, $4430, $4431, $4432, $4433, $4434, $4435, $4436, $4437, $4438, VersionRange($4439, $4440)), ($4441, $4442, $4443, $4444, $4445, $4446, $4447, $4448, $4449, $4450, $4451, $4452, $4453, $4454, $4455, $4456, $4457, $4458, $4459, $4460, $4461, $4462, $4463, $4464, $4465, $4466, $4467, $4468, VersionRange($4469, $4470)), ($4471, $4472, $4473, $4474, $4475, $4476, $4477, $4478, $4479, $4480, $4481, $4482, $4483, $4484, $4485, $4486, $4487, $4488, $4489, $4490, $4491, $4492, $4493, $4494, $4495, $4496, $4497, $4498, VersionRange($4499, $4500)), ($4501, $4502, $4503, $4504, $4505, $4506, $4507, $4508, $4509, $4510, $4511, $4512, $4513, $4514, $4515, $4516, $4517, $4518, $4519, $4520, $4521, $4522, $4523, $4524, $4525, $4526, $4527, $4528, VersionRange($4529, $4530)), ($4531, $4532, $4533, $4534, $4535, $4536, $4537, $4538, $4539, $4540, $4541, $4542, $4543, $4544, $4545, $4546, $4547, $4548, $4549, $4550, $4551, $4552, $4553, $4554, $4555, $4556, $4557, $4558, VersionRange($4559, $4560)), ($4561, $4562, $4563, $4564, $4565, $4566, $4567, $4568, $4569, $4570, $4571, $4572, $4573, $4574, $4575, $4576, $4577, $4578, $4579, $4580, $4581, $4582, $4583, $4584, $4585, $4586, $4587, $4588, VersionRange($4589, $4590)), ($4591, $4592, $4593, $4594, $4595, $4596, $4597, $4598, $4599, $4600, $4601, $4602, $4603, $4604, $4605, $4606, $4607, $4608, $4609, $4610, $4611, $4612, $4613, $4614, $4615, $4616, $4617, $4618, VersionRange($4619, $4620)), ($4621, $4622, $4623, $4624, $4625, $4626, $4627, $4628, $4629, $4630, $4631, $4632, $4633, $4634, $4635, $4636, $4637, $4638, $4639, $4640, $4641, $4642, $4643, $4644, $4645, $4646, $4647, $4648, VersionRange($4649, $4650)), ($4651, $4652, $4653, $4654, $4655, $4656, $4657, $4658, $4659, $4660, $4661, $4662, $4663, $4664, $4665, $4666, $4667, $4668, $4669, $4670, $4671, $4672, $4673, $4674, $4675, $4676, $4677, $4678, VersionRange($4679, $4680)), ($4681, $4682, $4683, $4684, $4685, $4686, $4687, $4688, $4689, $4690, $4691, $4692, $4693, $4694, $4695, $4696, $4697, $4698, $4699, $4700, $4701, $4702, $4703, $4704, $4705, $4706, $4707, $4708, VersionRange($4709, $4710)), ($4711, $4712, $4713, $4714, $4715, $4716, $4717, $4718, $4719, $4720, $4721, $4722, $4723, $4724, $4725, $4726, $4727, $4728, $4729, $4730, $4731, $4732, $4733, $4734, $4735, $4736, $4737, $4738, VersionRange($4739, $4740)), ($4741, $4742, $4743, $4744, $4745, $4746, $4747, $4748, $4749, $4750, $4751, $4752, $4753, $4754, $4755, $4756, $4757, $4758, $4759, $4760, $4761, $4762, $4763, $4764, $4765, $4766, $4767, $4768, VersionRange($4769, $4770)), ($4771, $4772, $4773, $4774, $4775, $4776, $4777, $4778, $4779, $4780, $4781, $4782, $4783, $4784, $4785, $4786, $4787, $4788, $4789, $4790, $4791, $4792, $4793, $4794, $4795, $4796, $4797, $4798, VersionRange($4799, $4800)), ($4801, $4802, $4803, $4804, $4805, $4806, $4807, $4808, $4809, $4810, $4811, $4812, $4813, $4814, $4815, $4816, $4817, $4818, $4819, $4820, $4821, $4822, $4823, $4824, $4825, $4826, $4827, $4828, VersionRange($4829, $4830)), ($4831, $4832, $4833, $4834, $4835, $4836, $4837, $4838, $4839, $4840, $4841, $4842, $4843, $4844, $4845, $4846, $4847, $4848, $4849, $4850, $4851, $4852, $4853, $4854, $4855, $4856, $4857, $4858, VersionRange($4859, $4860)), ($4861, $4862, $4863, $4864, $4865, $4866, $4867, $4868, $4869, $4870, $4871, $4872, $4873, $4874, $4875, $4876, $4877, $4878, $4879, $4880, $4881, $4882, $4883, $4884, $4885, $4886, $4887, $4888, VersionRange($4889, $4890)), ($4891, $4892, $4893, $4894, $4895, $4896, $4897, $4898, $4899, $4900, $4901, $4902, $4903, $4904, $4905, $4906, $4907, $4908, $4909, $4910, $4911, $4912, $4913, $4914, $4915, $4916, $4917, $4918, VersionRange($4919, $4920)), ($4921, $4922, $4923, $4924, $4925, $4926, $4927, $4928, $4929, $4930, $4931, $4932, $4933, $4934, $4935, $4936, $4937, $4938, $4939, $4940, $4941, $4942, $4943, $4944, $4945, $4946, $4947, $4948, VersionRange($4949, $4950)), ($4951, $4952, $4953, $4954, $4955, $4956, $4957, $4958, $4959, $4960, $4961, $4962, $4963, $4964, $4965, $4966, $4967, $4968, $4969, $4970, $4971, $4972, $4973, $4974, $4975, $4976, $4977, $4978, VersionRange($4979, $4980)), ($4981, $4982, $4983, $4984, $4985, $4986, $4987, $4988, $4989, $4990, $4991, $4992, $4993, $4994, $4995, $4996, $4997, $4998, $4999, $5000, $5001, $5002, $5003, $5004, $5005, $5006, $5007, $5008, VersionRange($5009, $5010)), ($5011, $5012, $5013, $5014, $5015, $5016, $5017, $5018, $5019, $5020, $5021, $5022, $5023, $5024, $5025, $5026, $5027, $5028, $5029, $5030, $5031, $5032, $5033, $5034, $5035, $5036, $5037, $5038, VersionRange($5039, $5040)), ($5041, $5042, $5043, $5044, $5045, $5046, $5047, $5048, $5049, $5050, $5051, $5052, $5053, $5054, $5055, $5056, $5057, $5058, $5059, $5060, $5061, $5062, $5063, $5064, $5065, $5066, $5067, $5068, VersionRange($5069, $5070)), ($5071, $5072, $5073, $5074, $5075, $5076, $5077, $5078, $5079, $5080, $5081, $5082, $5083, $5084, $5085, $5086, $5087, $5088, $5089, $5090, $5091, $5092, $5093, $5094, $5095, $5096, $5097, $5098, VersionRange($5099, $5100)), ($5101, $5102, $5103, $5104, $5105, $5106, $5107, $5108, $5109, $5110, $5111, $5112, $5113, $5114, $5115, $5116, $5117, $5118, $5119, $5120, $5121, $5122, $5123, $5124, $5125, $5126, $5127, $5128, VersionRange($5129, $5130)), ($5131, $5132, $5133, $5134, $5135, $5136, $5137, $5138, $5139, $5140, $5141, $5142, $5143, $5144, $5145, $5146, $5147, $5148, $5149, $5150, $5151, $5152, $5153, $5154, $5155, $5156, $5157, $5158, VersionRange($5159, $5160)), ($5161, $5162, $5163, $5164, $5165, $5166, $5167, $5168, $5169, $5170, $5171, $5172, $5173, $5174, $5175, $5176, $5177, $5178, $5179, $5180, $5181, $5182, $5183, $5184, $5185, $5186, $5187, $5188, VersionRange($5189, $5190)), ($5191, $5192, $5193, $5194, $5195, $5196, $5197, $5198, $5199, $5200, $5201, $5202, $5203, $5204, $5205, $5206, $5207, $5208, $5209, $5210, $5211, $5212, $5213, $5214, $5215, $5216, $5217, $5218, VersionRange($5219, $5220)), ($5221, $5222, $5223, $5224, $5225, $5226, $5227, $5228, $5229, $5230, $5231, $5232, $5233, $5234, $5235, $5236, $5237, $5238, $5239, $5240, $5241, $5242, $5243, $5244, $5245, $5246, $5247, $5248, VersionRange($5249, $5250)), ($5251, $5252, $5253, $5254, $5255, $5256, $5257, $5258, $5259, $5260, $5261, $5262, $5263, $5264, $5265, $5266, $5267, $5268, $5269, $5270, $5271, $5272, $5273, $5274, $5275, $5276, $5277, $5278, VersionRange($5279, $5280)), ($5281, $5282, $5283, $5284, $5285, $5286, $5287, $5288, $5289, $5290, $5291, $5292, $5293, $5294, $5295, $5296, $5297, $5298, $5299, $5300, $5301, $5302, $5303, $5304, $5305, $5306, $5307, $5308, VersionRange($5309, $5310)), ($5311, $5312, $5313, $5314, $5315, $5316, $5317, $5318, $5319, $5320, $5321, $5322, $5323, $5324, $5325, $5326, $5327, $5328, $5329, $5330, $5331, $5332, $5333, $5334, $5335, $5336, $5337, $5338, VersionRange($5339, $5340)), ($5341, $5342, $5343, $5344, $5345, $5346, $5347, $5348, $5349, $5350, $5351, $5352, $5353, $5354, $5355, $5356, $5357, $5358, $5359, $5360, $5361, $5362, $5363, $5364, $5365, $5366, $5367, $5368, VersionRange($5369, $5370)), ($5371, $5372, $5373, $5374, $5375, $5376, $5377, $5378, $5379, $5380, $5381, $5382, $5383, $5384, $5385, $5386, $5387, $5388, $5389, $5390, $5391, $5392, $5393, $5394, $5395, $5396, $5397, $5398, VersionRange($5399, $5400)), ($5401, $5402, $5403, $5404, $5405, $5406, $5407, $5408, $5409, $5410, $5411, $5412, $5413, $5414, $5415, $5416, $5417, $5418, $5419, $5420, $5421, $5422, $5423, $5424, $5425, $5426, $5427, $5428, VersionRange($5429, $5430)), ($5431, $5432, $5433, $5434, $5435, $5436, $5437, $5438, $5439, $5440, $5441, $5442, $5443, $5444, $5445, $5446, $5447, $5448, $5449, $5450, $5451, $5452, $5453, $5454, $5455, $5456, $5457, $5458, VersionRange($5459, $5460)), ($5461, $5462, $5463, $5464, $5465, $5466, $5467, $5468, $5469, $5470, $5471, $5472, $5473, $5474, $5475, $5476, $5477, $5478, $5479, $5480, $5481, $5482, $5483, $5484, $5485, $5486, $5487, $5488, VersionRange($5489, $5490)), ($5491, $5492, $5493, $5494, $5495, $5496, $5497, $5498, $5499, $5500, $5501, $5502, $5503, $5504, $5505, $5506, $5507, $5508, $5509, $5510, $5511, $5512, $5513, $5514, $5515, $5516, $5517, $5518, VersionRange($5519, $5520)), ($5521, $5522, $5523, $5524, $5525, $5526, $5527, $5528, $5529, $5530, $5531, $5532, $5533, $5534, $5535, $5536, $5537, $5538, $5539, $5540, $5541, $5542, $5543, $5544, $5545, $5546, $5547, $5548, VersionRange($5549, $5550)), ($5551, $5552, $5553, $5554, $5555, $5556, $5557, $5558, $5559, $5560, $5561, $5562, $5563, $5564, $5565, $5566, $5567, $5568, $5569, $5570, $5571, $5572, $5573, $5574, $5575, $5576, $5577, $5578, VersionRange($5579, $5580)), ($5581, $5582, $5583, $5584, $5585, $5586, $5587, $5588, $5589, $5590, $5591, $5592, $5593, $5594, $5595, $5596, $5597, $5598, $5599, $5600, $5601, $5602, $5603, $5604, $5605, $5606, $5607, $5608, VersionRange($5609, $5610)), ($5611, $5612, $5613, $5614, $5615, $5616, $5617, $5618, $5619, $5620, $5621, $5622, $5623, $5624, $5625, $5626, $5627, $5628, $5629, $5630, $5631, $5632, $5633, $5634, $5635, $5636, $5637, $5638, VersionRange($5639, $5640)), ($5641, $5642, $5643, $5644, $5645, $5646, $5647, $5648, $5649, $5650, $5651, $5652, $5653, $5654, $5655, $5656, $5657, $5658, $5659, $5660, $5661, $5662, $5663, $5664, $5665, $5666, $5667, $5668, VersionRange($5669, $5670)), ($5671, $5672, $5673, $5674, $5675, $5676, $5677, $5678, $5679, $5680, $5681, $5682, $5683, $5684, $5685, $5686, $5687, $5688, $5689, $5690, $5691, $5692, $5693, $5694, $5695, $5696, $5697, $5698, VersionRange($5699, $5700)), ($5701, $5702, $5703, $5704, $5705, $5706, $5707, $5708, $5709, $5710, $5711, $5712, $5713, $5714, $5715, $5716, $5717, $5718, $5719, $5720, $5721, $5722, $5723, $5724, $5725, $5726, $5727, $5728, VersionRange($5729, $5730)), ($5731, $5732, $5733, $5734, $5735, $5736, $5737, $5738, $5739, $5740, $5741, $5742, $5743, $5744, $5745, $5746, $5747, $5748, $5749, $5750, $5751, $5752, $5753, $5754, $5755, $5756, $5757, $5758, VersionRange($5759, $5760)), ($5761, $5762, $5763, $5764, $5765, $5766, $5767, $5768, $5769, $5770, $5771, $5772, $5773, $5774, $5775, $5776, $5777, $5778, $5779, $5780, $5781, $5782, $5783, $5784, $5785, $5786, $5787, $5788, VersionRange($5789, $5790)), ($5791, $5792, $5793, $5794, $5795, $5796, $5797, $5798, $5799, $5800, $5801, $5802, $5803, $5804, $5805, $5806, $5807, $5808, $5809, $5810, $5811, $5812, $5813, $5814, $5815, $5816, $5817, $5818, VersionRange($5819, $5820)), ($5821, $5822, $5823, $5824, $5825, $5826, $5827, $5828, $5829, $5830, $5831, $5832, $5833, $5834, $5835, $5836, $5837, $5838, $5839, $5840, $5841, $5842, $5843, $5844, $5845, $5846, $5847, $5848, VersionRange($5849, $5850)), ($5851, $5852, $5853, $5854, $5855, $5856, $5857, $5858, $5859, $5860, $5861, $5862, $5863, $5864, $5865, $5866, $5867, $5868, $5869, $5870, $5871, $5872, $5873, $5874, $5875, $5876, $5877, $5878, VersionRange($5879, $5880)), ($5881, $5882, $5883, $5884, $5885, $5886, $5887, $5888, $5889, $5890, $5891, $5892, $5893, $5894, $5895, $5896, $5897, $5898, $5899, $5900, $5901, $5902, $5903, $5904, $5905, $5906, $5907, $5908, VersionRange($5909, $5910)), ($5911, $5912, $5913, $5914, $5915, $5916, $5917, $5918, $5919, $5920, $5921, $5922, $5923, $5924, $5925, $5926, $5927, $5928, $5929, $5930, $5931, $5932, $5933, $5934, $5935, $5936, $5937, $5938, VersionRange($5939, $5940)), ($5941, $5942, $5943, $5944, $5945, $5946, $5947, $5948, $5949, $5950, $5951, $5952, $5953, $5954, $5955, $5956, $5957, $5958, $5959, $5960, $5961, $5962, $5963, $5964, $5965, $5966, $5967, $5968, VersionRange($5969, $5970)), ($5971, $5972, $5973, $5974, $5975, $5976, $5977, $5978, $5979, $5980, $5981, $5982, $5983, $5984, $5985, $5986, $5987, $5988, $5989, $5990, $5991, $5992, $5993, $5994, $5995, $5996, $5997, $5998, VersionRange($5999, $6000)), ($6001, $6002, $6003, $6004, $6005, $6006, $6007, $6008, $6009, $6010, $6011, $6012, $6013, $6014, $6015, $6016, $6017, $6018, $6019, $6020, $6021, $6022, $6023, $6024, $6025, $6026, $6027, $6028, VersionRange($6029, $6030)), ($6031, $6032, $6033, $6034, $6035, $6036, $6037, $6038, $6039, $6040, $6041, $6042, $6043, $6044, $6045, $6046, $6047, $6048, $6049, $6050, $6051, $6052, $6053, $6054, $6055, $6056, $6057, $6058, VersionRange($6059, $6060)), ($6061, $6062, $6063, $6064, $6065, $6066, $6067, $6068, $6069, $6070, $6071, $6072, $6073, $6074, $6075, $6076, $6077, $6078, $6079, $6080, $6081, $6082, $6083, $6084, $6085, $6086, $6087, $6088, VersionRange($6089, $6090)), ($6091, $6092, $6093, $6094, $6095, $6096, $6097, $6098, $6099, $6100, $6101, $6102, $6103, $6104, $6105, $6106, $6107, $6108, $6109, $6110, $6111, $6112, $6113, $6114, $6115, $6116, $6117, $6118, VersionRange($6119, $6120)), ($6121, $6122, $6123, $6124, $6125, $6126, $6127, $6128, $6129, $6130, $6131, $6132, $6133, $6134, $6135, $6136, $6137, $6138, $6139, $6140, $6141, $6142, $6143, $6144, $6145, $6146, $6147, $6148, VersionRange($6149, $6150)), ($6151, $6152, $6153, $6154, $6155, $6156, $6157, $6158, $6159, $6160, $6161, $6162, $6163, $6164, $6165, $6166, $6167, $6168, $6169, $6170, $6171, $6172, $6173, $6174, $6175, $6176, $6177, $6178, VersionRange($6179, $6180)), ($6181, $6182, $6183, $6184, $6185, $6186, $6187, $6188, $6189, $6190, $6191, $6192, $6193, $6194, $6195, $6196, $6197, $6198, $6199, $6200, $6201, $6202, $6203, $6204, $6205, $6206, $6207, $6208, VersionRange($6209, $6210)), ($6211, $6212, $6213, $6214, $6215, $6216, $6217, $6218, $6219, $6220, $6221, $6222, $6223, $6224, $6225, $6226, $6227, $6228, $6229, $6230, $6231, $6232, $6233, $6234, $6235, $6236, $6237, $6238, VersionRange($6239, $6240)), ($6241, $6242, $6243, $6244, $6245, $6246, $6247, $6248, $6249, $6250, $6251, $6252, $6253, $6254, $6255, $6256, $6257, $6258, $6259, $6260, $6261, $6262, $6263, $6264, $6265, $6266, $6267, $6268, VersionRange($6269, $6270)), ($6271, $6272, $6273, $6274, $6275, $6276, $6277, $6278, $6279, $6280, $6281, $6282, $6283, $6284, $6285, $6286, $6287, $6288, $6289, $6290, $6291, $6292, $6293, $6294, $6295, $6296, $6297, $6298, VersionRange($6299, $6300)), ($6301, $6302, $6303, $6304, $6305, $6306, $6307, $6308, $6309, $6310, $6311, $6312, $6313, $6314, $6315, $6316, $6317, $6318, $6319, $6320, $6321, $6322, $6323, $6324, $6325, $6326, $6327, $6328, VersionRange($6329, $6330)), ($6331, $6332, $6333, $6334, $6335, $6336, $6337, $6338, $6339, $6340, $6341, $6342, $6343, $6344, $6345, $6346, $6347, $6348, $6349, $6350, $6351, $6352, $6353, $6354, $6355, $6356, $6357, $6358, VersionRange($6359, $6360)), ($6361, $6362, $6363, $6364, $6365, $6366, $6367, $6368, $6369, $6370, $6371, $6372, $6373, $6374, $6375, $6376, $6377, $6378, $6379, $6380, $6381, $6382, $6383, $6384, $6385, $6386, $6387, $6388, VersionRange($6389, $6390)), ($6391, $6392, $6393, $6394, $6395, $6396, $6397, $6398, $6399, $6400, $6401, $6402, $6403, $6404, $6405, $6406, $6407, $6408, $6409, $6410, $6411, $6412, $6413, $6414, $6415, $6416, $6417, $6418, VersionRange($6419, $6420)), ($6421, $6422, $6423, $6424, $6425, $6426, $6427, $6428, $6429, $6430, $6431, $6432, $6433, $6434, $6435, $6436, $6437, $6438, $6439, $6440, $6441, $6442, $6443, $6444, $6445, $6446, $6447, $6448, VersionRange($6449, $6450)), ($6451, $6452, $6453, $6454, $6455, $6456, $6457, $6458, $6459, $6460, $6461, $6462, $6463, $6464, $6465, $6466, $6467, $6468, $6469, $6470, $6471, $6472, $6473, $6474, $6475, $6476, $6477, $6478, VersionRange($6479, $6480)), ($6481, $6482, $6483, $6484, $6485, $6486, $6487, $6488, $6489, $6490, $6491, $6492, $6493, $6494, $6495, $6496, $6497, $6498, $6499, $6500, $6501, $6502, $6503, $6504, $6505, $6506, $6507, $6508, VersionRange($6509, $6510)), ($6511, $6512, $6513, $6514, $6515, $6516, $6517, $6518, $6519, $6520, $6521, $6522, $6523, $6524, $6525, $6526, $6527, $6528, $6529, $6530, $6531, $6532, $6533, $6534, $6535, $6536, $6537, $6538, VersionRange($6539, $6540)), ($6541, $6542, $6543, $6544, $6545, $6546, $6547, $6548, $6549, $6550, $6551, $6552, $6553, $6554, $6555, $6556, $6557, $6558, $6559, $6560, $6561, $6562, $6563, $6564, $6565, $6566, $6567, $6568, VersionRange($6569, $6570)), ($6571, $6572, $6573, $6574, $6575, $6576, $6577, $6578, $6579, $6580, $6581, $6582, $6583, $6584, $6585, $6586, $6587, $6588, $6589, $6590, $6591, $6592, $6593, $6594, $6595, $6596, $6597, $6598, VersionRange($6599, $6600)), ($6601, $6602, $6603, $6604, $6605, $6606, $6607, $6608, $6609, $6610, $6611, $6612, $6613, $6614, $6615, $6616, $6617, $6618, $6619, $6620, $6621, $6622, $6623, $6624, $6625, $6626, $6627, $6628, VersionRange($6629, $6630)), ($6631, $6632, $6633, $6634, $6635, $6636, $6637, $6638, $6639, $6640, $6641, $6642, $6643, $6644, $6645, $6646, $6647, $6648, $6649, $6650, $6651, $6652, $6653, $6654, $6655, $6656, $6657, $6658, VersionRange($6659, $6660)), ($6661, $6662, $6663, $6664, $6665, $6666, $6667, $6668, $6669, $6670, $6671, $6672, $6673, $6674, $6675, $6676, $6677, $6678, $6679, $6680, $6681, $6682, $6683, $6684, $6685, $6686, $6687, $6688, VersionRange($6689, $6690)), ($6691, $6692, $6693, $6694, $6695, $6696, $6697, $6698, $6699, $6700, $6701, $6702, $6703, $6704, $6705, $6706, $6707, $6708, $6709, $6710, $6711, $6712, $6713, $6714, $6715, $6716, $6717, $6718, VersionRange($6719, $6720)), ($6721, $6722, $6723, $6724, $6725, $6726, $6727, $6728, $6729, $6730, $6731, $6732, $6733, $6734, $6735, $6736, $6737, $6738, $6739, $6740, $6741, $6742, $6743, $6744, $6745, $6746, $6747, $6748, VersionRange($6749, $6750)), ($6751, $6752, $6753, $6754, $6755, $6756, $6757, $6758, $6759, $6760, $6761, $6762, $6763, $6764, $6765, $6766, $6767, $6768, $6769, $6770, $6771, $6772, $6773, $6774, $6775, $6776, $6777, $6778, VersionRange($6779, $6780)), ($6781, $6782, $6783, $6784, $6785, $6786, $6787, $6788, $6789, $6790, $6791, $6792, $6793, $6794, $6795, $6796, $6797, $6798, $6799, $6800, $6801, $6802, $6803, $6804, $6805, $6806, $6807, $6808, VersionRange($6809, $6810)), ($6811, $6812, $6813, $6814, $6815, $6816, $6817, $6818, $6819, $6820, $6821, $6822, $6823, $6824, $6825, $6826, $6827, $6828, $6829, $6830, $6831, $6832, $6833, $6834, $6835, $6836, $6837, $6838, VersionRange($6839, $6840)), ($6841, $6842, $6843, $6844, $6845, $6846, $6847, $6848, $6849, $6850, $6851, $6852, $6853, $6854, $6855, $6856, $6857, $6858, $6859, $6860, $6861, $6862, $6863, $6864, $6865, $6866, $6867, $6868, VersionRange($6869, $6870)), ($6871, $6872, $6873, $6874, $6875, $6876, $6877, $6878, $6879, $6880, $6881, $6882, $6883, $6884, $6885, $6886, $6887, $6888, $6889, $6890, $6891, $6892, $6893, $6894, $6895, $6896, $6897, $6898, VersionRange($6899, $6900)), ($6901, $6902, $6903, $6904, $6905, $6906, $6907, $6908, $6909, $6910, $6911, $6912, $6913, $6914, $6915, $6916, $6917, $6918, $6919, $6920, $6921, $6922, $6923, $6924, $6925, $6926, $6927, $6928, VersionRange($6929, $6930)), ($6931, $6932, $6933, $6934, $6935, $6936, $6937, $6938, $6939, $6940, $6941, $6942, $6943, $6944, $6945, $6946, $6947, $6948, $6949, $6950, $6951, $6952, $6953, $6954, $6955, $6956, $6957, $6958, VersionRange($6959, $6960)), ($6961, $6962, $6963, $6964, $6965, $6966, $6967, $6968, $6969, $6970, $6971, $6972, $6973, $6974, $6975, $6976, $6977, $6978, $6979, $6980, $6981, $6982, $6983, $6984, $6985, $6986, $6987, $6988, VersionRange($6989, $6990)), ($6991, $6992, $6993, $6994, $6995, $6996, $6997, $6998, $6999, $7000, $7001, $7002, $7003, $7004, $7005, $7006, $7007, $7008, $7009, $7010, $7011, $7012, $7013, $7014, $7015, $7016, $7017, $7018, VersionRange($7019, $7020)), ($7021, $7022, $7023, $7024, $7025, $7026, $7027, $7028, $7029, $7030, $7031, $7032, $7033, $7034, $7035, $7036, $7037, $7038, $7039, $7040, $7041, $7042, $7043, $7044, $7045, $7046, $7047, $7048, VersionRange($7049, $7050)), ($7051, $7052, $7053, $7054, $7055, $7056, $7057, $7058, $7059, $7060, $7061, $7062, $7063, $7064, $7065, $7066, $7067, $7068, $7069, $7070, $7071, $7072, $7073, $7074, $7075, $7076, $7077, $7078, VersionRange($7079, $7080)), ($7081, $7082, $7083, $7084, $7085, $7086, $7087, $7088, $7089, $7090, $7091, $7092, $7093, $7094, $7095, $7096, $7097, $7098, $7099, $7100, $7101, $7102, $7103, $7104, $7105, $7106, $7107, $7108, VersionRange($7109, $7110)), ($7111, $7112, $7113, $7114, $7115, $7116, $7117, $7118, $7119, $7120, $7121, $7122, $7123, $7124, $7125, $7126, $7127, $7128, $7129, $7130, $7131, $7132, $7133, $7134, $7135, $7136, $7137, $7138, VersionRange($7139, $7140)), ($7141, $7142, $7143, $7144, $7145, $7146, $7147, $7148, $7149, $7150, $7151, $7152, $7153, $7154, $7155, $7156, $7157, $7158, $7159, $7160, $7161, $7162, $7163, $7164, $7165, $7166, $7167, $7168, VersionRange($7169, $7170)), ($7171, $7172, $7173, $7174, $7175, $7176, $7177, $7178, $7179, $7180, $7181, $7182, $7183, $7184, $7185, $7186, $7187, $7188, $7189, $7190, $7191, $7192, $7193, $7194, $7195, $7196, $7197, $7198, VersionRange($7199, $7200)), ($7201, $7202, $7203, $7204, $7205, $7206, $7207, $7208, $7209, $7210, $7211, $7212, $7213, $7214, $7215, $7216, $7217, $7218, $7219, $7220, $7221, $7222, $7223, $7224, $7225, $7226, $7227, $7228, VersionRange($7229, $7230)), ($7231, $7232, $7233, $7234, $7235, $7236, $7237, $7238, $7239, $7240, $7241, $7242, $7243, $7244, $7245, $7246, $7247, $7248, $7249, $7250, $7251, $7252, $7253, $7254, $7255, $7256, $7257, $7258, VersionRange($7259, $7260)), ($7261, $7262, $7263, $7264, $7265, $7266, $7267, $7268, $7269, $7270, $7271, $7272, $7273, $7274, $7275, $7276, $7277, $7278, $7279, $7280, $7281, $7282, $7283, $7284, $7285, $7286, $7287, $7288, VersionRange($7289, $7290)), ($7291, $7292, $7293, $7294, $7295, $7296, $7297, $7298, $7299, $7300, $7301, $7302, $7303, $7304, $7305, $7306, $7307, $7308, $7309, $7310, $7311, $7312, $7313, $7314, $7315, $7316, $7317, $7318, VersionRange($7319, $7320)), ($7321, $7322, $7323, $7324, $7325, $7326, $7327, $7328, $7329, $7330, $7331, $7332, $7333, $7334, $7335, $7336, $7337, $7338, $7339, $7340, $7341, $7342, $7343, $7344, $7345, $7346, $7347, $7348, VersionRange($7349, $7350)), ($7351, $7352, $7353, $7354, $7355, $7356, $7357, $7358, $7359, $7360, $7361, $7362, $7363, $7364, $7365, $7366, $7367, $7368, $7369, $7370, $7371, $7372, $7373, $7374, $7375, $7376, $7377, $7378, VersionRange($7379, $7380)), ($7381, $7382, $7383, $7384, $7385, $7386, $7387, $7388, $7389, $7390, $7391, $7392, $7393, $7394, $7395, $7396, $7397, $7398, $7399, $7400, $7401, $7402, $7403, $7404, $7405, $7406, $7407, $7408, VersionRange($7409, $7410)), ($7411, $7412, $7413, $7414, $7415, $7416, $7417, $7418, $7419, $7420, $7421, $7422, $7423, $7424, $7425, $7426, $7427, $7428, $7429, $7430, $7431, $7432, $7433, $7434, $7435, $7436, $7437, $7438, VersionRange($7439, $7440)), ($7441, $7442, $7443, $7444, $7445, $7446, $7447, $7448, $7449, $7450, $7451, $7452, $7453, $7454, $7455, $7456, $7457, $7458, $7459, $7460, $7461, $7462, $7463, $7464, $7465, $7466, $7467, $7468, VersionRange($7469, $7470)), ($7471, $7472, $7473, $7474, $7475, $7476, $7477, $7478, $7479, $7480, $7481, $7482, $7483, $7484, $7485, $7486, $7487, $7488, $7489, $7490, $7491, $7492, $7493, $7494, $7495, $7496, $7497, $7498, VersionRange($7499, $7500)), ($7501, $7502, $7503, $7504, $7505, $7506, $7507, $7508, $7509, $7510, $7511, $7512, $7513, $7514, $7515, $7516, $7517, $7518, $7519, $7520, $7521, $7522, $7523, $7524, $7525, $7526, $7527, $7528, VersionRange($7529, $7530)), ($7531, $7532, $7533, $7534, $7535, $7536, $7537, $7538, $7539, $7540, $7541, $7542, $7543, $7544, $7545, $7546, $7547, $7548, $7549, $7550, $7551, $7552, $7553, $7554, $7555, $7556, $7557, $7558, VersionRange($7559, $7560)), ($7561, $7562, $7563, $7564, $7565, $7566, $7567, $7568, $7569, $7570, $7571, $7572, $7573, $7574, $7575, $7576, $7577, $7578, $7579, $7580, $7581, $7582, $7583, $7584, $7585, $7586, $7587, $7588, VersionRange($7589, $7590)), ($7591, $7592, $7593, $7594, $7595, $7596, $7597, $7598, $7599, $7600, $7601, $7602, $7603, $7604, $7605, $7606, $7607, $7608, $7609, $7610, $7611, $7612, $7613, $7614, $7615, $7616, $7617, $7618, VersionRange($7619, $7620)), ($7621, $7622, $7623, $7624, $7625, $7626, $7627, $7628, $7629, $7630, $7631, $7632, $7633, $7634, $7635, $7636, $7637, $7638, $7639, $7640, $7641, $7642, $7643, $7644, $7645, $7646, $7647, $7648, VersionRange($7649, $7650)), ($7651, $7652, $7653, $7654, $7655, $7656, $7657, $7658, $7659, $7660, $7661, $7662, $7663, $7664, $7665, $7666, $7667, $7668, $7669, $7670, $7671, $7672, $7673, $7674, $7675, $7676, $7677, $7678, VersionRange($7679, $7680)), ($7681, $7682, $7683, $7684, $7685, $7686, $7687, $7688, $7689, $7690, $7691, $7692, $7693, $7694, $7695, $7696, $7697, $7698, $7699, $7700, $7701, $7702, $7703, $7704, $7705, $7706, $7707, $7708, VersionRange($7709, $7710)), ($7711, $7712, $7713, $7714, $7715, $7716, $7717, $7718, $7719, $7720, $7721, $7722, $7723, $7724, $7725, $7726, $7727, $7728, $7729, $7730, $7731, $7732, $7733, $7734, $7735, $7736, $7737, $7738, VersionRange($7739, $7740)), ($7741, $7742, $7743, $7744, $7745, $7746, $7747, $7748, $7749, $7750, $7751, $7752, $7753, $7754, $7755, $7756, $7757, $7758, $7759, $7760, $7761, $7762, $7763, $7764, $7765, $7766, $7767, $7768, VersionRange($7769, $7770)), ($7771, $7772, $7773, $7774, $7775, $7776, $7777, $7778, $7779, $7780, $7781, $7782, $7783, $7784, $7785, $7786, $7787, $7788, $7789, $7790, $7791, $7792, $7793, $7794, $7795, $7796, $7797, $7798, VersionRange($7799, $7800)), ($7801, $7802, $7803, $7804, $7805, $7806, $7807, $7808, $7809, $7810, $7811, $7812, $7813, $7814, $7815, $7816, $7817, $7818, $7819, $7820, $7821, $7822, $7823, $7824, $7825, $7826, $7827, $7828, VersionRange($7829, $7830)), ($7831, $7832, $7833, $7834, $7835, $7836, $7837, $7838, $7839, $7840, $7841, $7842, $7843, $7844, $7845, $7846, $7847, $7848, $7849, $7850, $7851, $7852, $7853, $7854, $7855, $7856, $7857, $7858, VersionRange($7859, $7860)), ($7861, $7862, $7863, $7864, $7865, $7866, $7867, $7868, $7869, $7870, $7871, $7872, $7873, $7874, $7875, $7876, $7877, $7878, $7879, $7880, $7881, $7882, $7883, $7884, $7885, $7886, $7887, $7888, VersionRange($7889, $7890)), ($7891, $7892, $7893, $7894, $7895, $7896, $7897, $7898, $7899, $7900, $7901, $7902, $7903, $7904, $7905, $7906, $7907, $7908, $7909, $7910, $7911, $7912, $7913, $7914, $7915, $7916, $7917, $7918, VersionRange($7919, $7920)), ($7921, $7922, $7923, $7924, $7925, $7926, $7927, $7928, $7929, $7930, $7931, $7932, $7933, $7934, $7935, $7936, $7937, $7938, $7939, $7940, $7941, $7942, $7943, $7944, $7945, $7946, $7947, $7948, VersionRange($7949, $7950)), ($7951, $7952, $7953, $7954, $7955, $7956, $7957, $7958, $7959, $7960, $7961, $7962, $7963, $7964, $7965, $7966, $7967, $7968, $7969, $7970, $7971, $7972, $7973, $7974, $7975, $7976, $7977, $7978, VersionRange($7979, $7980)), ($7981, $7982, $7983, $7984, $7985, $7986, $7987, $7988, $7989, $7990, $7991, $7992, $7993, $7994, $7995, $7996, $7997, $7998, $7999, $8000, $8001, $8002, $8003, $8004, $8005, $8006, $8007, $8008, VersionRange($8009, $8010)), ($8011, $8012, $8013, $8014, $8015, $8016, $8017, $8018, $8019, $8020, $8021, $8022, $8023, $8024, $8025, $8026, $8027, $8028, $8029, $8030, $8031, $8032, $8033, $8034, $8035, $8036, $8037, $8038, VersionRange($8039, $8040)), ($8041, $8042, $8043, $8044, $8045, $8046, $8047, $8048, $8049, $8050, $8051, $8052, $8053, $8054, $8055, $8056, $8057, $8058, $8059, $8060, $8061, $8062, $8063, $8064, $8065, $8066, $8067, $8068, VersionRange($8069, $8070)), ($8071, $8072, $8073, $8074, $8075, $8076, $8077, $8078, $8079, $8080, $8081, $8082, $8083, $8084, $8085, $8086, $8087, $8088, $8089, $8090, $8091, $8092, $8093, $8094, $8095, $8096, $8097, $8098, VersionRange($8099, $8100)), ($8101, $8102, $8103, $8104, $8105, $8106, $8107, $8108, $8109, $8110, $8111, $8112, $8113, $8114, $8115, $8116, $8117, $8118, $8119, $8120, $8121, $8122, $8123, $8124, $8125, $8126, $8127, $8128, VersionRange($8129, $8130)), ($8131, $8132, $8133, $8134, $8135, $8136, $8137, $8138, $8139, $8140, $8141, $8142, $8143, $8144, $8145, $8146, $8147, $8148, $8149, $8150, $8151, $8152, $8153, $8154, $8155, $8156, $8157, $8158, VersionRange($8159, $8160)), ($8161, $8162, $8163, $8164, $8165, $8166, $8167, $8168, $8169, $8170, $8171, $8172, $8173, $8174, $8175, $8176, $8177, $8178, $8179, $8180, $8181, $8182, $8183, $8184, $8185, $8186, $8187, $8188, VersionRange($8189, $8190)), ($8191, $8192, $8193, $8194, $8195, $8196, $8197, $8198, $8199, $8200, $8201, $8202, $8203, $8204, $8205, $8206, $8207, $8208, $8209, $8210, $8211, $8212, $8213, $8214, $8215, $8216, $8217, $8218, VersionRange($8219, $8220)), ($8221, $8222, $8223, $8224, $8225, $8226, $8227, $8228, $8229, $8230, $8231, $8232, $8233, $8234, $8235, $8236, $8237, $8238, $8239, $8240, $8241, $8242, $8243, $8244, $8245, $8246, $8247, $8248, VersionRange($8249, $8250)), ($8251, $8252, $8253, $8254, $8255, $8256, $8257, $8258, $8259, $8260, $8261, $8262, $8263, $8264, $8265, $8266, $8267, $8268, $8269, $8270, $8271, $8272, $8273, $8274, $8275, $8276, $8277, $8278, VersionRange($8279, $8280)), ($8281, $8282, $8283, $8284, $8285, $8286, $8287, $8288, $8289, $8290, $8291, $8292, $8293, $8294, $8295, $8296, $8297, $8298, $8299, $8300, $8301, $8302, $8303, $8304, $8305, $8306, $8307, $8308, VersionRange($8309, $8310)), ($8311, $8312, $8313, $8314, $8315, $8316, $8317, $8318, $8319, $8320, $8321, $8322, $8323, $8324, $8325, $8326, $8327, $8328, $8329, $8330, $8331, $8332, $8333, $8334, $8335, $8336, $8337, $8338, VersionRange($8339, $8340)), ($8341, $8342, $8343, $8344, $8345, $8346, $8347, $8348, $8349, $8350, $8351, $8352, $8353, $8354, $8355, $8356, $8357, $8358, $8359, $8360, $8361, $8362, $8363, $8364, $8365, $8366, $8367, $8368, VersionRange($8369, $8370)), ($8371, $8372, $8373, $8374, $8375, $8376, $8377, $8378, $8379, $8380, $8381, $8382, $8383, $8384, $8385, $8386, $8387, $8388, $8389, $8390, $8391, $8392, $8393, $8394, $8395, $8396, $8397, $8398, VersionRange($8399, $8400)), ($8401, $8402, $8403, $8404, $8405, $8406, $8407, $8408, $8409, $8410, $8411, $8412, $8413, $8414, $8415, $8416, $8417, $8418, $8419, $8420, $8421, $8422, $8423, $8424, $8425, $8426, $8427, $8428, VersionRange($8429, $8430)), ($8431, $8432, $8433, $8434, $8435, $8436, $8437, $8438, $8439, $8440, $8441, $8442, $8443, $8444, $8445, $8446, $8447, $8448, $8449, $8450, $8451, $8452, $8453, $8454, $8455, $8456, $8457, $8458, VersionRange($8459, $8460)), ($8461, $8462, $8463, $8464, $8465, $8466, $8467, $8468, $8469, $8470, $8471, $8472, $8473, $8474, $8475, $8476, $8477, $8478, $8479, $8480, $8481, $8482, $8483, $8484, $8485, $8486, $8487, $8488, VersionRange($8489, $8490)), ($8491, $8492, $8493, $8494, $8495, $8496, $8497, $8498, $8499, $8500, $8501, $8502, $8503, $8504, $8505, $8506, $8507, $8508, $8509, $8510, $8511, $8512, $8513, $8514, $8515, $8516, $8517, $8518, VersionRange($8519, $8520)), ($8521, $8522, $8523, $8524, $8525, $8526, $8527, $8528, $8529, $8530, $8531, $8532, $8533, $8534, $8535, $8536, $8537, $8538, $8539, $8540, $8541, $8542, $8543, $8544, $8545, $8546, $8547, $8548, VersionRange($8549, $8550)), ($8551, $8552, $8553, $8554, $8555, $8556, $8557, $8558, $8559, $8560, $8561, $8562, $8563, $8564, $8565, $8566, $8567, $8568, $8569, $8570, $8571, $8572, $8573, $8574, $8575, $8576, $8577, $8578, VersionRange($8579, $8580)), ($8581, $8582, $8583, $8584, $8585, $8586, $8587, $8588, $8589, $8590, $8591, $8592, $8593, $8594, $8595, $8596, $8597, $8598, $8599, $8600, $8601, $8602, $8603, $8604, $8605, $8606, $8607, $8608, VersionRange($8609, $8610)), ($8611, $8612, $8613, $8614, $8615, $8616, $8617, $8618, $8619, $8620, $8621, $8622, $8623, $8624, $8625, $8626, $8627, $8628, $8629, $8630, $8631, $8632, $8633, $8634, $8635, $8636, $8637, $8638, VersionRange($8639, $8640)), ($8641, $8642, $8643, $8644, $8645, $8646, $8647, $8648, $8649, $8650, $8651, $8652, $8653, $8654, $8655, $8656, $8657, $8658, $8659, $8660, $8661, $8662, $8663, $8664, $8665, $8666, $8667, $8668, VersionRange($8669, $8670)), ($8671, $8672, $8673, $8674, $8675, $8676, $8677, $8678, $8679, $8680, $8681, $8682, $8683, $8684, $8685, $8686, $8687, $8688, $8689, $8690, $8691, $8692, $8693, $8694, $8695, $8696, $8697, $8698, VersionRange($8699, $8700)), ($8701, $8702, $8703, $8704, $8705, $8706, $8707, $8708, $8709, $8710, $8711, $8712, $8713, $8714, $8715, $8716, $8717, $8718, $8719, $8720, $8721, $8722, $8723, $8724, $8725, $8726, $8727, $8728, VersionRange($8729, $8730)), ($8731, $8732, $8733, $8734, $8735, $8736, $8737, $8738, $8739, $8740, $8741, $8742, $8743, $8744, $8745, $8746, $8747, $8748, $8749, $8750, $8751, $8752, $8753, $8754, $8755, $8756, $8757, $8758, VersionRange($8759, $8760)), ($8761, $8762, $8763, $8764, $8765, $8766, $8767, $8768, $8769, $8770, $8771, $8772, $8773, $8774, $8775, $8776, $8777, $8778, $8779, $8780, $8781, $8782, $8783, $8784, $8785, $8786, $8787, $8788, VersionRange($8789, $8790)), ($8791, $8792, $8793, $8794, $8795, $8796, $8797, $8798, $8799, $8800, $8801, $8802, $8803, $8804, $8805, $8806, $8807, $8808, $8809, $8810, $8811, $8812, $8813, $8814, $8815, $8816, $8817, $8818, VersionRange($8819, $8820)), ($8821, $8822, $8823, $8824, $8825, $8826, $8827, $8828, $8829, $8830, $8831, $8832, $8833, $8834, $8835, $8836, $8837, $8838, $8839, $8840, $8841, $8842, $8843, $8844, $8845, $8846, $8847, $8848, VersionRange($8849, $8850)), ($8851, $8852, $8853, $8854, $8855, $8856, $8857, $8858, $8859, $8860, $8861, $8862, $8863, $8864, $8865, $8866, $8867, $8868, $8869, $8870, $8871, $8872, $8873, $8874, $8875, $8876, $8877, $8878, VersionRange($8879, $8880)), ($8881, $8882, $8883, $8884, $8885, $8886, $8887, $8888, $8889, $8890, $8891, $8892, $8893, $8894, $8895, $8896, $8897, $8898, $8899, $8900, $8901, $8902, $8903, $8904, $8905, $8906, $8907, $8908, VersionRange($8909, $8910)), ($8911, $8912, $8913, $8914, $8915, $8916, $8917, $8918, $8919, $8920, $8921, $8922, $8923, $8924, $8925, $8926, $8927, $8928, $8929, $8930, $8931, $8932, $8933, $8934, $8935, $8936, $8937, $8938, VersionRange($8939, $8940)), ($8941, $8942, $8943, $8944, $8945, $8946, $8947, $8948, $8949, $8950, $8951, $8952, $8953, $8954, $8955, $8956, $8957, $8958, $8959, $8960, $8961, $8962, $8963, $8964, $8965, $8966, $8967, $8968, VersionRange($8969, $8970)), ($8971, $8972, $8973, $8974, $8975, $8976, $8977, $8978, $8979, $8980, $8981, $8982, $8983, $8984, $8985, $8986, $8987, $8988, $8989, $8990, $8991, $8992, $8993, $8994, $8995, $8996, $8997, $8998, VersionRange($8999, $9000)), ($9001, $9002, $9003, $9004, $9005, $9006, $9007, $9008, $9009, $9010, $9011, $9012, $9013, $9014, $9015, $9016, $9017, $9018, $9019, $9020, $9021, $9022, $9023, $9024, $9025, $9026, $9027, $9028, VersionRange($9029, $9030)), ($9031, $9032, $9033, $9034, $9035, $9036, $9037, $9038, $9039, $9040, $9041, $9042, $9043, $9044, $9045, $9046, $9047, $9048, $9049, $9050, $9051, $9052, $9053, $9054, $9055, $9056, $9057, $9058, VersionRange($9059, $9060)), ($9061, $9062, $9063, $9064, $9065, $9066, $9067, $9068, $9069, $9070, $9071, $9072, $9073, $9074, $9075, $9076, $9077, $9078, $9079, $9080, $9081, $9082, $9083, $9084, $9085, $9086, $9087, $9088, VersionRange($9089, $9090)), ($9091, $9092, $9093, $9094, $9095, $9096, $9097, $9098, $9099, $9100, $9101, $9102, $9103, $9104, $9105, $9106, $9107, $9108, $9109, $9110, $9111, $9112, $9113, $9114, $9115, $9116, $9117, $9118, VersionRange($9119, $9120)), ($9121, $9122, $9123, $9124, $9125, $9126, $9127, $9128, $9129, $9130, $9131, $9132, $9133, $9134, $9135, $9136, $9137, $9138, $9139, $9140, $9141, $9142, $9143, $9144, $9145, $9146, $9147, $9148, VersionRange($9149, $9150)), ($9151, $9152, $9153, $9154, $9155, $9156, $9157, $9158, $9159, $9160, $9161, $9162, $9163, $9164, $9165, $9166, $9167, $9168, $9169, $9170, $9171, $9172, $9173, $9174, $9175, $9176, $9177, $9178, VersionRange($9179, $9180)), ($9181, $9182, $9183, $9184, $9185, $9186, $9187, $9188, $9189, $9190, $9191, $9192, $9193, $9194, $9195, $9196, $9197, $9198, $9199, $9200, $9201, $9202, $9203, $9204, $9205, $9206, $9207, $9208, VersionRange($9209, $9210)), ($9211, $9212, $9213, $9214, $9215, $9216, $9217, $9218, $9219, $9220, $9221, $9222, $9223, $9224, $9225, $9226, $9227, $9228, $9229, $9230, $9231, $9232, $9233, $9234, $9235, $9236, $9237, $9238, VersionRange($9239, $9240)), ($9241, $9242, $9243, $9244, $9245, $9246, $9247, $9248, $9249, $9250, $9251, $9252, $9253, $9254, $9255, $9256, $9257, $9258, $9259, $9260, $9261, $9262, $9263, $9264, $9265, $9266, $9267, $9268, VersionRange($9269, $9270)), ($9271, $9272, $9273, $9274, $9275, $9276, $9277, $9278, $9279, $9280, $9281, $9282, $9283, $9284, $9285, $9286, $9287, $9288, $9289, $9290, $9291, $9292, $9293, $9294, $9295, $9296, $9297, $9298, VersionRange($9299, $9300)), ($9301, $9302, $9303, $9304, $9305, $9306, $9307, $9308, $9309, $9310, $9311, $9312, $9313, $9314, $9315, $9316, $9317, $9318, $9319, $9320, $9321, $9322, $9323, $9324, $9325, $9326, $9327, $9328, VersionRange($9329, $9330)), ($9331, $9332, $9333, $9334, $9335, $9336, $9337, $9338, $9339, $9340, $9341, $9342, $9343, $9344, $9345, $9346, $9347, $9348, $9349, $9350, $9351, $9352, $9353, $9354, $9355, $9356, $9357, $9358, VersionRange($9359, $9360)), ($9361, $9362, $9363, $9364, $9365, $9366, $9367, $9368, $9369, $9370, $9371, $9372, $9373, $9374, $9375, $9376, $9377, $9378, $9379, $9380, $9381, $9382, $9383, $9384, $9385, $9386, $9387, $9388, VersionRange($9389, $9390)), ($9391, $9392, $9393, $9394, $9395, $9396, $9397, $9398, $9399, $9400, $9401, $9402, $9403, $9404, $9405, $9406, $9407, $9408, $9409, $9410, $9411, $9412, $9413, $9414, $9415, $9416, $9417, $9418, VersionRange($9419, $9420)), ($9421, $9422, $9423, $9424, $9425, $9426, $9427, $9428, $9429, $9430, $9431, $9432, $9433, $9434, $9435, $9436, $9437, $9438, $9439, $9440, $9441, $9442, $9443, $9444, $9445, $9446, $9447, $9448, VersionRange($9449, $9450)), ($9451, $9452, $9453, $9454, $9455, $9456, $9457, $9458, $9459, $9460, $9461, $9462, $9463, $9464, $9465, $9466, $9467, $9468, $9469, $9470, $9471, $9472, $9473, $9474, $9475, $9476, $9477, $9478, VersionRange($9479, $9480)), ($9481, $9482, $9483, $9484, $9485, $9486, $9487, $9488, $9489, $9490, $9491, $9492, $9493, $9494, $9495, $9496, $9497, $9498, $9499, $9500, $9501, $9502, $9503, $9504, $9505, $9506, $9507, $9508, VersionRange($9509, $9510)), ($9511, $9512, $9513, $9514, $9515, $9516, $9517, $9518, $9519, $9520, $9521, $9522, $9523, $9524, $9525, $9526, $9527, $9528, $9529, $9530, $9531, $9532, $9533, $9534, $9535, $9536, $9537, $9538, VersionRange($9539, $9540)), ($9541, $9542, $9543, $9544, $9545, $9546, $9547, $9548, $9549, $9550, $9551, $9552, $9553, $9554, $9555, $9556, $9557, $9558, $9559, $9560, $9561, $9562, $9563, $9564, $9565, $9566, $9567, $9568, VersionRange($9569, $9570)), ($9571, $9572, $9573, $9574, $9575, $9576, $9577, $9578, $9579, $9580, $9581, $9582, $9583, $9584, $9585, $9586, $9587, $9588, $9589, $9590, $9591, $9592, $9593, $9594, $9595, $9596, $9597, $9598, VersionRange($9599, $9600)), ($9601, $9602, $9603, $9604, $9605, $9606, $9607, $9608, $9609, $9610, $9611, $9612, $9613, $9614, $9615, $9616, $9617, $9618, $9619, $9620, $9621, $9622, $9623, $9624, $9625, $9626, $9627, $9628, VersionRange($9629, $9630)), ($9631, $9632, $9633, $9634, $9635, $9636, $9637, $9638, $9639, $9640, $9641, $9642, $9643, $9644, $9645, $9646, $9647, $9648, $9649, $9650, $9651, $9652, $9653, $9654, $9655, $9656, $9657, $9658, VersionRange($9659, $9660)), ($9661, $9662, $9663, $9664, $9665, $9666, $9667, $9668, $9669, $9670, $9671, $9672, $9673, $9674, $9675, $9676, $9677, $9678, $9679, $9680, $9681, $9682, $9683, $9684, $9685, $9686, $9687, $9688, VersionRange($9689, $9690)), ($9691, $9692, $9693, $9694, $9695, $9696, $9697, $9698, $9699, $9700, $9701, $9702, $9703, $9704, $9705, $9706, $9707, $9708, $9709, $9710, $9711, $9712, $9713, $9714, $9715, $9716, $9717, $9718, VersionRange($9719, $9720)), ($9721, $9722, $9723, $9724, $9725, $9726, $9727, $9728, $9729, $9730, $9731, $9732, $9733, $9734, $9735, $9736, $9737, $9738, $9739, $9740, $9741, $9742, $9743, $9744, $9745, $9746, $9747, $9748, VersionRange($9749, $9750)), ($9751, $9752, $9753, $9754, $9755, $9756, $9757, $9758, $9759, $9760, $9761, $9762, $9763, $9764, $9765, $9766, $9767, $9768, $9769, $9770, $9771, $9772, $9773, $9774, $9775, $9776, $9777, $9778, VersionRange($9779, $9780)), ($9781, $9782, $9783, $9784, $9785, $9786, $9787, $9788, $9789, $9790, $9791, $9792, $9793, $9794, $9795, $9796, $9797, $9798, $9799, $9800, $9801, $9802, $9803, $9804, $9805, $9806, $9807, $9808, VersionRange($9809, $9810)), ($9811, $9812, $9813, $9814, $9815, $9816, $9817, $9818, $9819, $9820, $9821, $9822, $9823, $9824, $9825, $9826, $9827, $9828, $9829, $9830, $9831, $9832, $9833, $9834, $9835, $9836, $9837, $9838, VersionRange($9839, $9840)), ($9841, $9842, $9843, $9844, $9845, $9846, $9847, $9848, $9849, $9850, $9851, $9852, $9853, $9854, $9855, $9856, $9857, $9858, $9859, $9860, $9861, $9862, $9863, $9864, $9865, $9866, $9867, $9868, VersionRange($9869, $9870)), ($9871, $9872, $9873, $9874, $9875, $9876, $9877, $9878, $9879, $9880, $9881, $9882, $9883, $9884, $9885, $9886, $9887, $9888, $9889, $9890, $9891, $9892, $9893, $9894, $9895, $9896, $9897, $9898, VersionRange($9899, $9900)), ($9901, $9902, $9903, $9904, $9905, $9906, $9907, $9908, $9909, $9910, $9911, $9912, $9913, $9914, $9915, $9916, $9917, $9918, $9919, $9920, $9921, $9922, $9923, $9924, $9925, $9926, $9927, $9928, VersionRange($9929, $9930)), ($9931, $9932, $9933, $9934, $9935, $9936, $9937, $9938, $9939, $9940, $9941, $9942, $9943, $9944, $9945, $9946, $9947, $9948, $9949, $9950, $9951, $9952, $9953, $9954, $9955, $9956, $9957, $9958, VersionRange($9959, $9960)), ($9961, $9962, $9963, $9964, $9965, $9966, $9967, $9968, $9969, $9970, $9971, $9972, $9973, $9974, $9975, $9976, $9977, $9978, $9979, $9980, $9981, $9982, $9983, $9984, $9985, $9986, $9987, $9988, VersionRange($9989, $9990)), ($9991, $9992, $9993, $9994, $9995, $9996, $9997, $9998, $9999, $10000, $10001, $10002, $10003, $10004, $10005, $10006, $10007, $10008, $10009, $10010, $10011, $10012, $10013, $10014, $10015, $10016, $10017, $10018, VersionRange($10019, $10020)), ($10021, $10022, $10023, $10024, $10025, $10026, $10027, $10028, $10029, $10030, $10031, $10032, $10033, $10034, $10035, $10036, $10037, $10038, $10039, $10040, $10041, $10042, $10043, $10044, $10045, $10046, $10047, $10048, VersionRange($10049, $10050)), ($10051, $10052, $10053, $10054, $10055, $10056, $10057, $10058, $10059, $10060, $10061, $10062, $10063, $10064, $10065, $10066, $10067, $10068, $10069, $10070, $10071, $10072, $10073, $10074, $10075, $10076, $10077, $10078, VersionRange($10079, $10080)), ($10081, $10082, $10083, $10084, $10085, $10086, $10087, $10088, $10089, $10090, $10091, $10092, $10093, $10094, $10095, $10096, $10097, $10098, $10099, $10100, $10101, $10102, $10103, $10104, $10105, $10106, $10107, $10108, VersionRange($10109, $10110)), ($10111, $10112, $10113, $10114, $10115, $10116, $10117, $10118, $10119, $10120, $10121, $10122, $10123, $10124, $10125, $10126, $10127, $10128, $10129, $10130, $10131, $10132, $10133, $10134, $10135, $10136, $10137, $10138, VersionRange($10139, $10140)), ($10141, $10142, $10143, $10144, $10145, $10146, $10147, $10148, $10149, $10150, $10151, $10152, $10153, $10154, $10155, $10156, $10157, $10158, $10159, $10160, $10161, $10162, $10163, $10164, $10165, $10166, $10167, $10168, VersionRange($10169, $10170)), ($10171, $10172, $10173, $10174, $10175, $10176, $10177, $10178, $10179, $10180, $10181, $10182, $10183, $10184, $10185, $10186, $10187, $10188, $10189, $10190, $10191, $10192, $10193, $10194, $10195, $10196, $10197, $10198, VersionRange($10199, $10200)), ($10201, $10202, $10203, $10204, $10205, $10206, $10207, $10208, $10209, $10210, $10211, $10212, $10213, $10214, $10215, $10216, $10217, $10218, $10219, $10220, $10221, $10222, $10223, $10224, $10225, $10226, $10227, $10228, VersionRange($10229, $10230)), ($10231, $10232, $10233, $10234, $10235, $10236, $10237, $10238, $10239, $10240, $10241, $10242, $10243, $10244, $10245, $10246, $10247, $10248, $10249, $10250, $10251, $10252, $10253, $10254, $10255, $10256, $10257, $10258, VersionRange($10259, $10260)), ($10261, $10262, $10263, $10264, $10265, $10266, $10267, $10268, $10269, $10270, $10271, $10272, $10273, $10274, $10275, $10276, $10277, $10278, $10279, $10280, $10281, $10282, $10283, $10284, $10285, $10286, $10287, $10288, VersionRange($10289, $10290)), ($10291, $10292, $10293, $10294, $10295, $10296, $10297, $10298, $10299, $10300, $10301, $10302, $10303, $10304, $10305, $10306, $10307, $10308, $10309, $10310, $10311, $10312, $10313, $10314, $10315, $10316, $10317, $10318, VersionRange($10319, $10320)), ($10321, $10322, $10323, $10324, $10325, $10326, $10327, $10328, $10329, $10330, $10331, $10332, $10333, $10334, $10335, $10336, $10337, $10338, $10339, $10340, $10341, $10342, $10343, $10344, $10345, $10346, $10347, $10348, VersionRange($10349, $10350)), ($10351, $10352, $10353, $10354, $10355, $10356, $10357, $10358, $10359, $10360, $10361, $10362, $10363, $10364, $10365, $10366, $10367, $10368, $10369, $10370, $10371, $10372, $10373, $10374, $10375, $10376, $10377, $10378, VersionRange($10379, $10380)), ($10381, $10382, $10383, $10384, $10385, $10386, $10387, $10388, $10389, $10390, $10391, $10392, $10393, $10394, $10395, $10396, $10397, $10398, $10399, $10400, $10401, $10402, $10403, $10404, $10405, $10406, $10407, $10408, VersionRange($10409, $10410)), ($10411, $10412, $10413, $10414, $10415, $10416, $10417, $10418, $10419, $10420, $10421, $10422, $10423, $10424, $10425, $10426, $10427, $10428, $10429, $10430, $10431, $10432, $10433, $10434, $10435, $10436, $10437, $10438, VersionRange($10439, $10440)), ($10441, $10442, $10443, $10444, $10445, $10446, $10447, $10448, $10449, $10450, $10451, $10452, $10453, $10454, $10455, $10456, $10457, $10458, $10459, $10460, $10461, $10462, $10463, $10464, $10465, $10466, $10467, $10468, VersionRange($10469, $10470)), ($10471, $10472, $10473, $10474, $10475, $10476, $10477, $10478, $10479, $10480, $10481, $10482, $10483, $10484, $10485, $10486, $10487, $10488, $10489, $10490, $10491, $10492, $10493, $10494, $10495, $10496, $10497, $10498, VersionRange($10499, $10500)), ($10501, $10502, $10503, $10504, $10505, $10506, $10507, $10508, $10509, $10510, $10511, $10512, $10513, $10514, $10515, $10516, $10517, $10518, $10519, $10520, $10521, $10522, $10523, $10524, $10525, $10526, $10527, $10528, VersionRange($10529, $10530)), ($10531, $10532, $10533, $10534, $10535, $10536, $10537, $10538, $10539, $10540, $10541, $10542, $10543, $10544, $10545, $10546, $10547, $10548, $10549, $10550, $10551, $10552, $10553, $10554, $10555, $10556, $10557, $10558, VersionRange($10559, $10560)), ($10561, $10562, $10563, $10564, $10565, $10566, $10567, $10568, $10569, $10570, $10571, $10572, $10573, $10574, $10575, $10576, $10577, $10578, $10579, $10580, $10581, $10582, $10583, $10584, $10585, $10586, $10587, $10588, VersionRange($10589, $10590)), ($10591, $10592, $10593, $10594, $10595, $10596, $10597, $10598, $10599, $10600, $10601, $10602, $10603, $10604, $10605, $10606, $10607, $10608, $10609, $10610, $10611, $10612, $10613, $10614, $10615, $10616, $10617, $10618, VersionRange($10619, $10620)), ($10621, $10622, $10623, $10624, $10625, $10626, $10627, $10628, $10629, $10630, $10631, $10632, $10633, $10634, $10635, $10636, $10637, $10638, $10639, $10640, $10641, $10642, $10643, $10644, $10645, $10646, $10647, $10648, VersionRange($10649, $10650)), ($10651, $10652, $10653, $10654, $10655, $10656, $10657, $10658, $10659, $10660, $10661, $10662, $10663, $10664, $10665, $10666, $10667, $10668, $10669, $10670, $10671, $10672, $10673, $10674, $10675, $10676, $10677, $10678, VersionRange($10679, $10680)), ($10681, $10682, $10683, $10684, $10685, $10686, $10687, $10688, $10689, $10690, $10691, $10692, $10693, $10694, $10695, $10696, $10697, $10698, $10699, $10700, $10701, $10702, $10703, $10704, $10705, $10706, $10707, $10708, VersionRange($10709, $10710)), ($10711, $10712, $10713, $10714, $10715, $10716, $10717, $10718, $10719, $10720, $10721, $10722, $10723, $10724, $10725, $10726, $10727, $10728, $10729, $10730, $10731, $10732, $10733, $10734, $10735, $10736, $10737, $10738, VersionRange($10739, $10740)), ($10741, $10742, $10743, $10744, $10745, $10746, $10747, $10748, $10749, $10750, $10751, $10752, $10753, $10754, $10755, $10756, $10757, $10758, $10759, $10760, $10761, $10762, $10763, $10764, $10765, $10766, $10767, $10768, VersionRange($10769, $10770)), ($10771, $10772, $10773, $10774, $10775, $10776, $10777, $10778, $10779, $10780, $10781, $10782, $10783, $10784, $10785, $10786, $10787, $10788, $10789, $10790, $10791, $10792, $10793, $10794, $10795, $10796, $10797, $10798, VersionRange($10799, $10800)), ($10801, $10802, $10803, $10804, $10805, $10806, $10807, $10808, $10809, $10810, $10811, $10812, $10813, $10814, $10815, $10816, $10817, $10818, $10819, $10820, $10821, $10822, $10823, $10824, $10825, $10826, $10827, $10828, VersionRange($10829, $10830)), ($10831, $10832, $10833, $10834, $10835, $10836, $10837, $10838, $10839, $10840, $10841, $10842, $10843, $10844, $10845, $10846, $10847, $10848, $10849, $10850, $10851, $10852, $10853, $10854, $10855, $10856, $10857, $10858, VersionRange($10859, $10860)), ($10861, $10862, $10863, $10864, $10865, $10866, $10867, $10868, $10869, $10870, $10871, $10872, $10873, $10874, $10875, $10876, $10877, $10878, $10879, $10880, $10881, $10882, $10883, $10884, $10885, $10886, $10887, $10888, VersionRange($10889, $10890)), ($10891, $10892, $10893, $10894, $10895, $10896, $10897, $10898, $10899, $10900, $10901, $10902, $10903, $10904, $10905, $10906, $10907, $10908, $10909, $10910, $10911, $10912, $10913, $10914, $10915, $10916, $10917, $10918, VersionRange($10919, $10920)), ($10921, $10922, $10923, $10924, $10925, $10926, $10927, $10928, $10929, $10930, $10931, $10932, $10933, $10934, $10935, $10936, $10937, $10938, $10939, $10940, $10941, $10942, $10943, $10944, $10945, $10946, $10947, $10948, VersionRange($10949, $10950)), ($10951, $10952, $10953, $10954, $10955, $10956, $10957, $10958, $10959, $10960, $10961, $10962, $10963, $10964, $10965, $10966, $10967, $10968, $10969, $10970, $10971, $10972, $10973, $10974, $10975, $10976, $10977, $10978, VersionRange($10979, $10980)), ($10981, $10982, $10983, $10984, $10985, $10986, $10987, $10988, $10989, $10990, $10991, $10992, $10993, $10994, $10995, $10996, $10997, $10998, $10999, $11000, $11001, $11002, $11003, $11004, $11005, $11006, $11007, $11008, VersionRange($11009, $11010)), ($11011, $11012, $11013, $11014, $11015, $11016, $11017, $11018, $11019, $11020, $11021, $11022, $11023, $11024, $11025, $11026, $11027, $11028, $11029, $11030, $11031, $11032, $11033, $11034, $11035, $11036, $11037, $11038, VersionRange($11039, $11040)), ($11041, $11042, $11043, $11044, $11045, $11046, $11047, $11048, $11049, $11050, $11051, $11052, $11053, $11054, $11055, $11056, $11057, $11058, $11059, $11060, $11061, $11062, $11063, $11064, $11065, $11066, $11067, $11068, VersionRange($11069, $11070)), ($11071, $11072, $11073, $11074, $11075, $11076, $11077, $11078, $11079, $11080, $11081, $11082, $11083, $11084, $11085, $11086, $11087, $11088, $11089, $11090, $11091, $11092, $11093, $11094, $11095, $11096, $11097, $11098, VersionRange($11099, $11100)), ($11101, $11102, $11103, $11104, $11105, $11106, $11107, $11108, $11109, $11110, $11111, $11112, $11113, $11114, $11115, $11116, $11117, $11118, $11119, $11120, $11121, $11122, $11123, $11124, $11125, $11126, $11127, $11128, VersionRange($11129, $11130)), ($11131, $11132, $11133, $11134, $11135, $11136, $11137, $11138, $11139, $11140, $11141, $11142, $11143, $11144, $11145, $11146, $11147, $11148, $11149, $11150, $11151, $11152, $11153, $11154, $11155, $11156, $11157, $11158, VersionRange($11159, $11160)), ($11161, $11162, $11163, $11164, $11165, $11166, $11167, $11168, $11169, $11170, $11171, $11172, $11173, $11174, $11175, $11176, $11177, $11178, $11179, $11180, $11181, $11182, $11183, $11184, $11185, $11186, $11187, $11188, VersionRange($11189, $11190)), ($11191, $11192, $11193, $11194, $11195, $11196, $11197, $11198, $11199, $11200, $11201, $11202, $11203, $11204, $11205, $11206, $11207, $11208, $11209, $11210, $11211, $11212, $11213, $11214, $11215, $11216, $11217, $11218, VersionRange($11219, $11220)), ($11221, $11222, $11223, $11224, $11225, $11226, $11227, $11228, $11229, $11230, $11231, $11232, $11233, $11234, $11235, $11236, $11237, $11238, $11239, $11240, $11241, $11242, $11243, $11244, $11245, $11246, $11247, $11248, VersionRange($11249, $11250)), ($11251, $11252, $11253, $11254, $11255, $11256, $11257, $11258, $11259, $11260, $11261, $11262, $11263, $11264, $11265, $11266, $11267, $11268, $11269, $11270, $11271, $11272, $11273, $11274, $11275, $11276, $11277, $11278, VersionRange($11279, $11280)), ($11281, $11282, $11283, $11284, $11285, $11286, $11287, $11288, $11289, $11290, $11291, $11292, $11293, $11294, $11295, $11296, $11297, $11298, $11299, $11300, $11301, $11302, $11303, $11304, $11305, $11306, $11307, $11308, VersionRange($11309, $11310)), ($11311, $11312, $11313, $11314, $11315, $11316, $11317, $11318, $11319, $11320, $11321, $11322, $11323, $11324, $11325, $11326, $11327, $11328, $11329, $11330, $11331, $11332, $11333, $11334, $11335, $11336, $11337, $11338, VersionRange($11339, $11340)), ($11341, $11342, $11343, $11344, $11345, $11346, $11347, $11348, $11349, $11350, $11351, $11352, $11353, $11354, $11355, $11356, $11357, $11358, $11359, $11360, $11361, $11362, $11363, $11364, $11365, $11366, $11367, $11368, VersionRange($11369, $11370)), ($11371, $11372, $11373, $11374, $11375, $11376, $11377, $11378, $11379, $11380, $11381, $11382, $11383, $11384, $11385, $11386, $11387, $11388, $11389, $11390, $11391, $11392, $11393, $11394, $11395, $11396, $11397, $11398, VersionRange($11399, $11400)), ($11401, $11402, $11403, $11404, $11405, $11406, $11407, $11408, $11409, $11410, $11411, $11412, $11413, $11414, $11415, $11416, $11417, $11418, $11419, $11420, $11421, $11422, $11423, $11424, $11425, $11426, $11427, $11428, VersionRange($11429, $11430)), ($11431, $11432, $11433, $11434, $11435, $11436, $11437, $11438, $11439, $11440, $11441, $11442, $11443, $11444, $11445, $11446, $11447, $11448, $11449, $11450, $11451, $11452, $11453, $11454, $11455, $11456, $11457, $11458, VersionRange($11459, $11460)), ($11461, $11462, $11463, $11464, $11465, $11466, $11467, $11468, $11469, $11470, $11471, $11472, $11473, $11474, $11475, $11476, $11477, $11478, $11479, $11480, $11481, $11482, $11483, $11484, $11485, $11486, $11487, $11488, VersionRange($11489, $11490)), ($11491, $11492, $11493, $11494, $11495, $11496, $11497, $11498, $11499, $11500, $11501, $11502, $11503, $11504, $11505, $11506, $11507, $11508, $11509, $11510, $11511, $11512, $11513, $11514, $11515, $11516, $11517, $11518, VersionRange($11519, $11520)), ($11521, $11522, $11523, $11524, $11525, $11526, $11527, $11528, $11529, $11530, $11531, $11532, $11533, $11534, $11535, $11536, $11537, $11538, $11539, $11540, $11541, $11542, $11543, $11544, $11545, $11546, $11547, $11548, VersionRange($11549, $11550)), ($11551, $11552, $11553, $11554, $11555, $11556, $11557, $11558, $11559, $11560, $11561, $11562, $11563, $11564, $11565, $11566, $11567, $11568, $11569, $11570, $11571, $11572, $11573, $11574, $11575, $11576, $11577, $11578, VersionRange($11579, $11580)), ($11581, $11582, $11583, $11584, $11585, $11586, $11587, $11588, $11589, $11590, $11591, $11592, $11593, $11594, $11595, $11596, $11597, $11598, $11599, $11600, $11601, $11602, $11603, $11604, $11605, $11606, $11607, $11608, VersionRange($11609, $11610)), ($11611, $11612, $11613, $11614, $11615, $11616, $11617, $11618, $11619, $11620, $11621, $11622, $11623, $11624, $11625, $11626, $11627, $11628, $11629, $11630, $11631, $11632, $11633, $11634, $11635, $11636, $11637, $11638, VersionRange($11639, $11640)), ($11641, $11642, $11643, $11644, $11645, $11646, $11647, $11648, $11649, $11650, $11651, $11652, $11653, $11654, $11655, $11656, $11657, $11658, $11659, $11660, $11661, $11662, $11663, $11664, $11665, $11666, $11667, $11668, VersionRange($11669, $11670)), ($11671, $11672, $11673, $11674, $11675, $11676, $11677, $11678, $11679, $11680, $11681, $11682, $11683, $11684, $11685, $11686, $11687, $11688, $11689, $11690, $11691, $11692, $11693, $11694, $11695, $11696, $11697, $11698, VersionRange($11699, $11700)), ($11701, $11702, $11703, $11704, $11705, $11706, $11707, $11708, $11709, $11710, $11711, $11712, $11713, $11714, $11715, $11716, $11717, $11718, $11719, $11720, $11721, $11722, $11723, $11724, $11725, $11726, $11727, $11728, VersionRange($11729, $11730)), ($11731, $11732, $11733, $11734, $11735, $11736, $11737, $11738, $11739, $11740, $11741, $11742, $11743, $11744, $11745, $11746, $11747, $11748, $11749, $11750, $11751, $11752, $11753, $11754, $11755, $11756, $11757, $11758, VersionRange($11759, $11760)), ($11761, $11762, $11763, $11764, $11765, $11766, $11767, $11768, $11769, $11770, $11771, $11772, $11773, $11774, $11775, $11776, $11777, $11778, $11779, $11780, $11781, $11782, $11783, $11784, $11785, $11786, $11787, $11788, VersionRange($11789, $11790)), ($11791, $11792, $11793, $11794, $11795, $11796, $11797, $11798, $11799, $11800, $11801, $11802, $11803, $11804, $11805, $11806, $11807, $11808, $11809, $11810, $11811, $11812, $11813, $11814, $11815, $11816, $11817, $11818, VersionRange($11819, $11820)), ($11821, $11822, $11823, $11824, $11825, $11826, $11827, $11828, $11829, $11830, $11831, $11832, $11833, $11834, $11835, $11836, $11837, $11838, $11839, $11840, $11841, $11842, $11843, $11844, $11845, $11846, $11847, $11848, VersionRange($11849, $11850)), ($11851, $11852, $11853, $11854, $11855, $11856, $11857, $11858, $11859, $11860, $11861, $11862, $11863, $11864, $11865, $11866, $11867, $11868, $11869, $11870, $11871, $11872, $11873, $11874, $11875, $11876, $11877, $11878, VersionRange($11879, $11880)), ($11881, $11882, $11883, $11884, $11885, $11886, $11887, $11888, $11889, $11890, $11891, $11892, $11893, $11894, $11895, $11896, $11897, $11898, $11899, $11900, $11901, $11902, $11903, $11904, $11905, $11906, $11907, $11908, VersionRange($11909, $11910)), ($11911, $11912, $11913, $11914, $11915, $11916, $11917, $11918, $11919, $11920, $11921, $11922, $11923, $11924, $11925, $11926, $11927, $11928, $11929, $11930, $11931, $11932, $11933, $11934, $11935, $11936, $11937, $11938, VersionRange($11939, $11940)), ($11941, $11942, $11943, $11944, $11945, $11946, $11947, $11948, $11949, $11950, $11951, $11952, $11953, $11954, $11955, $11956, $11957, $11958, $11959, $11960, $11961, $11962, $11963, $11964, $11965, $11966, $11967, $11968, VersionRange($11969, $11970)), ($11971, $11972, $11973, $11974, $11975, $11976, $11977, $11978, $11979, $11980, $11981, $11982, $11983, $11984, $11985, $11986, $11987, $11988, $11989, $11990, $11991, $11992, $11993, $11994, $11995, $11996, $11997, $11998, VersionRange($11999, $12000)), ($12001, $12002, $12003, $12004, $12005, $12006, $12007, $12008, $12009, $12010, $12011, $12012, $12013, $12014, $12015, $12016, $12017, $12018, $12019, $12020, $12021, $12022, $12023, $12024, $12025, $12026, $12027, $12028, VersionRange($12029, $12030)), ($12031, $12032, $12033, $12034, $12035, $12036, $12037, $12038, $12039, $12040, $12041, $12042, $12043, $12044, $12045, $12046, $12047, $12048, $12049, $12050, $12051, $12052, $12053, $12054, $12055, $12056, $12057, $12058, VersionRange($12059, $12060)), ($12061, $12062, $12063, $12064, $12065, $12066, $12067, $12068, $12069, $12070, $12071, $12072, $12073, $12074, $12075, $12076, $12077, $12078, $12079, $12080, $12081, $12082, $12083, $12084, $12085, $12086, $12087, $12088, VersionRange($12089, $12090)), ($12091, $12092, $12093, $12094, $12095, $12096, $12097, $12098, $12099, $12100, $12101, $12102, $12103, $12104, $12105, $12106, $12107, $12108, $12109, $12110, $12111, $12112, $12113, $12114, $12115, $12116, $12117, $12118, VersionRange($12119, $12120)), ($12121, $12122, $12123, $12124, $12125, $12126, $12127, $12128, $12129, $12130, $12131, $12132, $12133, $12134, $12135, $12136, $12137, $12138, $12139, $12140, $12141, $12142, $12143, $12144, $12145, $12146, $12147, $12148, VersionRange($12149, $12150)), ($12151, $12152, $12153, $12154, $12155, $12156, $12157, $12158, $12159, $12160, $12161, $12162, $12163, $12164, $12165, $12166, $12167, $12168, $12169, $12170, $12171, $12172, $12173, $12174, $12175, $12176, $12177, $12178, VersionRange($12179, $12180)), ($12181, $12182, $12183, $12184, $12185, $12186, $12187, $12188, $12189, $12190, $12191, $12192, $12193, $12194, $12195, $12196, $12197, $12198, $12199, $12200, $12201, $12202, $12203, $12204, $12205, $12206, $12207, $12208, VersionRange($12209, $12210)), ($12211, $12212, $12213, $12214, $12215, $12216, $12217, $12218, $12219, $12220, $12221, $12222, $12223, $12224, $12225, $12226, $12227, $12228, $12229, $12230, $12231, $12232, $12233, $12234, $12235, $12236, $12237, $12238, VersionRange($12239, $12240)), ($12241, $12242, $12243, $12244, $12245, $12246, $12247, $12248, $12249, $12250, $12251, $12252, $12253, $12254, $12255, $12256, $12257, $12258, $12259, $12260, $12261, $12262, $12263, $12264, $12265, $12266, $12267, $12268, VersionRange($12269, $12270)), ($12271, $12272, $12273, $12274, $12275, $12276, $12277, $12278, $12279, $12280, $12281, $12282, $12283, $12284, $12285, $12286, $12287, $12288, $12289, $12290, $12291, $12292, $12293, $12294, $12295, $12296, $12297, $12298, VersionRange($12299, $12300)), ($12301, $12302, $12303, $12304, $12305, $12306, $12307, $12308, $12309, $12310, $12311, $12312, $12313, $12314, $12315, $12316, $12317, $12318, $12319, $12320, $12321, $12322, $12323, $12324, $12325, $12326, $12327, $12328, VersionRange($12329, $12330)), ($12331, $12332, $12333, $12334, $12335, $12336, $12337, $12338, $12339, $12340, $12341, $12342, $12343, $12344, $12345, $12346, $12347, $12348, $12349, $12350, $12351, $12352, $12353, $12354, $12355, $12356, $12357, $12358, VersionRange($12359, $12360)), ($12361, $12362, $12363, $12364, $12365, $12366, $12367, $12368, $12369, $12370, $12371, $12372, $12373, $12374, $12375, $12376, $12377, $12378, $12379, $12380, $12381, $12382, $12383, $12384, $12385, $12386, $12387, $12388, VersionRange($12389, $12390)), ($12391, $12392, $12393, $12394, $12395, $12396, $12397, $12398, $12399, $12400, $12401, $12402, $12403, $12404, $12405, $12406, $12407, $12408, $12409, $12410, $12411, $12412, $12413, $12414, $12415, $12416, $12417, $12418, VersionRange($12419, $12420)), ($12421, $12422, $12423, $12424, $12425, $12426, $12427, $12428, $12429, $12430, $12431, $12432, $12433, $12434, $12435, $12436, $12437, $12438, $12439, $12440, $12441, $12442, $12443, $12444, $12445, $12446, $12447, $12448, VersionRange($12449, $12450)), ($12451, $12452, $12453, $12454, $12455, $12456, $12457, $12458, $12459, $12460, $12461, $12462, $12463, $12464, $12465, $12466, $12467, $12468, $12469, $12470, $12471, $12472, $12473, $12474, $12475, $12476, $12477, $12478, VersionRange($12479, $12480)), ($12481, $12482, $12483, $12484, $12485, $12486, $12487, $12488, $12489, $12490, $12491, $12492, $12493, $12494, $12495, $12496, $12497, $12498, $12499, $12500, $12501, $12502, $12503, $12504, $12505, $12506, $12507, $12508, VersionRange($12509, $12510)), ($12511, $12512, $12513, $12514, $12515, $12516, $12517, $12518, $12519, $12520, $12521, $12522, $12523, $12524, $12525, $12526, $12527, $12528, $12529, $12530, $12531, $12532, $12533, $12534, $12535, $12536, $12537, $12538, VersionRange($12539, $12540)), ($12541, $12542, $12543, $12544, $12545, $12546, $12547, $12548, $12549, $12550, $12551, $12552, $12553, $12554, $12555, $12556, $12557, $12558, $12559, $12560, $12561, $12562, $12563, $12564, $12565, $12566, $12567, $12568, VersionRange($12569, $12570)), ($12571, $12572, $12573, $12574, $12575, $12576, $12577, $12578, $12579, $12580, $12581, $12582, $12583, $12584, $12585, $12586, $12587, $12588, $12589, $12590, $12591, $12592, $12593, $12594, $12595, $12596, $12597, $12598, VersionRange($12599, $12600)), ($12601, $12602, $12603, $12604, $12605, $12606, $12607, $12608, $12609, $12610, $12611, $12612, $12613, $12614, $12615, $12616, $12617, $12618, $12619, $12620, $12621, $12622, $12623, $12624, $12625, $12626, $12627, $12628, VersionRange($12629, $12630)), ($12631, $12632, $12633, $12634, $12635, $12636, $12637, $12638, $12639, $12640, $12641, $12642, $12643, $12644, $12645, $12646, $12647, $12648, $12649, $12650, $12651, $12652, $12653, $12654, $12655, $12656, $12657, $12658, VersionRange($12659, $12660)), ($12661, $12662, $12663, $12664, $12665, $12666, $12667, $12668, $12669, $12670, $12671, $12672, $12673, $12674, $12675, $12676, $12677, $12678, $12679, $12680, $12681, $12682, $12683, $12684, $12685, $12686, $12687, $12688, VersionRange($12689, $12690)), ($12691, $12692, $12693, $12694, $12695, $12696, $12697, $12698, $12699, $12700, $12701, $12702, $12703, $12704, $12705, $12706, $12707, $12708, $12709, $12710, $12711, $12712, $12713, $12714, $12715, $12716, $12717, $12718, VersionRange($12719, $12720)), ($12721, $12722, $12723, $12724, $12725, $12726, $12727, $12728, $12729, $12730, $12731, $12732, $12733, $12734, $12735, $12736, $12737, $12738, $12739, $12740, $12741, $12742, $12743, $12744, $12745, $12746, $12747, $12748, VersionRange($12749, $12750)), ($12751, $12752, $12753, $12754, $12755, $12756, $12757, $12758, $12759, $12760, $12761, $12762, $12763, $12764, $12765, $12766, $12767, $12768, $12769, $12770, $12771, $12772, $12773, $12774, $12775, $12776, $12777, $12778, VersionRange($12779, $12780)), ($12781, $12782, $12783, $12784, $12785, $12786, $12787, $12788, $12789, $12790, $12791, $12792, $12793, $12794, $12795, $12796, $12797, $12798, $12799, $12800, $12801, $12802, $12803, $12804, $12805, $12806, $12807, $12808, VersionRange($12809, $12810)), ($12811, $12812, $12813, $12814, $12815, $12816, $12817, $12818, $12819, $12820, $12821, $12822, $12823, $12824, $12825, $12826, $12827, $12828, $12829, $12830, $12831, $12832, $12833, $12834, $12835, $12836, $12837, $12838, VersionRange($12839, $12840)), ($12841, $12842, $12843, $12844, $12845, $12846, $12847, $12848, $12849, $12850, $12851, $12852, $12853, $12854, $12855, $12856, $12857, $12858, $12859, $12860, $12861, $12862, $12863, $12864, $12865, $12866, $12867, $12868, VersionRange($12869, $12870)), ($12871, $12872, $12873, $12874, $12875, $12876, $12877, $12878, $12879, $12880, $12881, $12882, $12883, $12884, $12885, $12886, $12887, $12888, $12889, $12890, $12891, $12892, $12893, $12894, $12895, $12896, $12897, $12898, VersionRange($12899, $12900)), ($12901, $12902, $12903, $12904, $12905, $12906, $12907, $12908, $12909, $12910, $12911, $12912, $12913, $12914, $12915, $12916, $12917, $12918, $12919, $12920, $12921, $12922, $12923, $12924, $12925, $12926, $12927, $12928, VersionRange($12929, $12930)), ($12931, $12932, $12933, $12934, $12935, $12936, $12937, $12938, $12939, $12940, $12941, $12942, $12943, $12944, $12945, $12946, $12947, $12948, $12949, $12950, $12951, $12952, $12953, $12954, $12955, $12956, $12957, $12958, VersionRange($12959, $12960)), ($12961, $12962, $12963, $12964, $12965, $12966, $12967, $12968, $12969, $12970[...][ Date: 2023-07-04 18:39:16 ]
3 7s297ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30)), ($31, $32, $33, $34, $35, $36, $37, $38, $39, $40, $41, $42, $43, $44, $45, $46, $47, $48, $49, $50, $51, $52, $53, $54, $55, $56, $57, $58, VersionRange($59, $60)), ($61, $62, $63, $64, $65, $66, $67, $68, $69, $70, $71, $72, $73, $74, $75, $76, $77, $78, $79, $80, $81, $82, $83, $84, $85, $86, $87, $88, VersionRange($89, $90)), ($91, $92, $93, $94, $95, $96, $97, $98, $99, $100, $101, $102, $103, $104, $105, $106, $107, $108, $109, $110, $111, $112, $113, $114, $115, $116, $117, $118, VersionRange($119, $120)), ($121, $122, $123, $124, $125, $126, $127, $128, $129, $130, $131, $132, $133, $134, $135, $136, $137, $138, $139, $140, $141, $142, $143, $144, $145, $146, $147, $148, VersionRange($149, $150)), ($151, $152, $153, $154, $155, $156, $157, $158, $159, $160, $161, $162, $163, $164, $165, $166, $167, $168, $169, $170, $171, $172, $173, $174, $175, $176, $177, $178, VersionRange($179, $180)), ($181, $182, $183, $184, $185, $186, $187, $188, $189, $190, $191, $192, $193, $194, $195, $196, $197, $198, $199, $200, $201, $202, $203, $204, $205, $206, $207, $208, VersionRange($209, $210)), ($211, $212, $213, $214, $215, $216, $217, $218, $219, $220, $221, $222, $223, $224, $225, $226, $227, $228, $229, $230, $231, $232, $233, $234, $235, $236, $237, $238, VersionRange($239, $240)), ($241, $242, $243, $244, $245, $246, $247, $248, $249, $250, $251, $252, $253, $254, $255, $256, $257, $258, $259, $260, $261, $262, $263, $264, $265, $266, $267, $268, VersionRange($269, $270)), ($271, $272, $273, $274, $275, $276, $277, $278, $279, $280, $281, $282, $283, $284, $285, $286, $287, $288, $289, $290, $291, $292, $293, $294, $295, $296, $297, $298, VersionRange($299, $300)), ($301, $302, $303, $304, $305, $306, $307, $308, $309, $310, $311, $312, $313, $314, $315, $316, $317, $318, $319, $320, $321, $322, $323, $324, $325, $326, $327, $328, VersionRange($329, $330)), ($331, $332, $333, $334, $335, $336, $337, $338, $339, $340, $341, $342, $343, $344, $345, $346, $347, $348, $349, $350, $351, $352, $353, $354, $355, $356, $357, $358, VersionRange($359, $360)), ($361, $362, $363, $364, $365, $366, $367, $368, $369, $370, $371, $372, $373, $374, $375, $376, $377, $378, $379, $380, $381, $382, $383, $384, $385, $386, $387, $388, VersionRange($389, $390)), ($391, $392, $393, $394, $395, $396, $397, $398, $399, $400, $401, $402, $403, $404, $405, $406, $407, $408, $409, $410, $411, $412, $413, $414, $415, $416, $417, $418, VersionRange($419, $420)), ($421, $422, $423, $424, $425, $426, $427, $428, $429, $430, $431, $432, $433, $434, $435, $436, $437, $438, $439, $440, $441, $442, $443, $444, $445, $446, $447, $448, VersionRange($449, $450)), ($451, $452, $453, $454, $455, $456, $457, $458, $459, $460, $461, $462, $463, $464, $465, $466, $467, $468, $469, $470, $471, $472, $473, $474, $475, $476, $477, $478, VersionRange($479, $480)), ($481, $482, $483, $484, $485, $486, $487, $488, $489, $490, $491, $492, $493, $494, $495, $496, $497, $498, $499, $500, $501, $502, $503, $504, $505, $506, $507, $508, VersionRange($509, $510)), ($511, $512, $513, $514, $515, $516, $517, $518, $519, $520, $521, $522, $523, $524, $525, $526, $527, $528, $529, $530, $531, $532, $533, $534, $535, $536, $537, $538, VersionRange($539, $540)), ($541, $542, $543, $544, $545, $546, $547, $548, $549, $550, $551, $552, $553, $554, $555, $556, $557, $558, $559, $560, $561, $562, $563, $564, $565, $566, $567, $568, VersionRange($569, $570)), ($571, $572, $573, $574, $575, $576, $577, $578, $579, $580, $581, $582, $583, $584, $585, $586, $587, $588, $589, $590, $591, $592, $593, $594, $595, $596, $597, $598, VersionRange($599, $600)), ($601, $602, $603, $604, $605, $606, $607, $608, $609, $610, $611, $612, $613, $614, $615, $616, $617, $618, $619, $620, $621, $622, $623, $624, $625, $626, $627, $628, VersionRange($629, $630)), ($631, $632, $633, $634, $635, $636, $637, $638, $639, $640, $641, $642, $643, $644, $645, $646, $647, $648, $649, $650, $651, $652, $653, $654, $655, $656, $657, $658, VersionRange($659, $660)), ($661, $662, $663, $664, $665, $666, $667, $668, $669, $670, $671, $672, $673, $674, $675, $676, $677, $678, $679, $680, $681, $682, $683, $684, $685, $686, $687, $688, VersionRange($689, $690)), ($691, $692, $693, $694, $695, $696, $697, $698, $699, $700, $701, $702, $703, $704, $705, $706, $707, $708, $709, $710, $711, $712, $713, $714, $715, $716, $717, $718, VersionRange($719, $720)), ($721, $722, $723, $724, $725, $726, $727, $728, $729, $730, $731, $732, $733, $734, $735, $736, $737, $738, $739, $740, $741, $742, $743, $744, $745, $746, $747, $748, VersionRange($749, $750)), ($751, $752, $753, $754, $755, $756, $757, $758, $759, $760, $761, $762, $763, $764, $765, $766, $767, $768, $769, $770, $771, $772, $773, $774, $775, $776, $777, $778, VersionRange($779, $780)), ($781, $782, $783, $784, $785, $786, $787, $788, $789, $790, $791, $792, $793, $794, $795, $796, $797, $798, $799, $800, $801, $802, $803, $804, $805, $806, $807, $808, VersionRange($809, $810)), ($811, $812, $813, $814, $815, $816, $817, $818, $819, $820, $821, $822, $823, $824, $825, $826, $827, $828, $829, $830, $831, $832, $833, $834, $835, $836, $837, $838, VersionRange($839, $840)), ($841, $842, $843, $844, $845, $846, $847, $848, $849, $850, $851, $852, $853, $854, $855, $856, $857, $858, $859, $860, $861, $862, $863, $864, $865, $866, $867, $868, VersionRange($869, $870)), ($871, $872, $873, $874, $875, $876, $877, $878, $879, $880, $881, $882, $883, $884, $885, $886, $887, $888, $889, $890, $891, $892, $893, $894, $895, $896, $897, $898, VersionRange($899, $900)), ($901, $902, $903, $904, $905, $906, $907, $908, $909, $910, $911, $912, $913, $914, $915, $916, $917, $918, $919, $920, $921, $922, $923, $924, $925, $926, $927, $928, VersionRange($929, $930)), ($931, $932, $933, $934, $935, $936, $937, $938, $939, $940, $941, $942, $943, $944, $945, $946, $947, $948, $949, $950, $951, $952, $953, $954, $955, $956, $957, $958, VersionRange($959, $960)), ($961, $962, $963, $964, $965, $966, $967, $968, $969, $970, $971, $972, $973, $974, $975, $976, $977, $978, $979, $980, $981, $982, $983, $984, $985, $986, $987, $988, VersionRange($989, $990)), ($991, $992, $993, $994, $995, $996, $997, $998, $999, $1000, $1001, $1002, $1003, $1004, $1005, $1006, $1007, $1008, $1009, $1010, $1011, $1012, $1013, $1014, $1015, $1016, $1017, $1018, VersionRange($1019, $1020)), ($1021, $1022, $1023, $1024, $1025, $1026, $1027, $1028, $1029, $1030, $1031, $1032, $1033, $1034, $1035, $1036, $1037, $1038, $1039, $1040, $1041, $1042, $1043, $1044, $1045, $1046, $1047, $1048, VersionRange($1049, $1050)), ($1051, $1052, $1053, $1054, $1055, $1056, $1057, $1058, $1059, $1060, $1061, $1062, $1063, $1064, $1065, $1066, $1067, $1068, $1069, $1070, $1071, $1072, $1073, $1074, $1075, $1076, $1077, $1078, VersionRange($1079, $1080)), ($1081, $1082, $1083, $1084, $1085, $1086, $1087, $1088, $1089, $1090, $1091, $1092, $1093, $1094, $1095, $1096, $1097, $1098, $1099, $1100, $1101, $1102, $1103, $1104, $1105, $1106, $1107, $1108, VersionRange($1109, $1110)), ($1111, $1112, $1113, $1114, $1115, $1116, $1117, $1118, $1119, $1120, $1121, $1122, $1123, $1124, $1125, $1126, $1127, $1128, $1129, $1130, $1131, $1132, $1133, $1134, $1135, $1136, $1137, $1138, VersionRange($1139, $1140)), ($1141, $1142, $1143, $1144, $1145, $1146, $1147, $1148, $1149, $1150, $1151, $1152, $1153, $1154, $1155, $1156, $1157, $1158, $1159, $1160, $1161, $1162, $1163, $1164, $1165, $1166, $1167, $1168, VersionRange($1169, $1170)), ($1171, $1172, $1173, $1174, $1175, $1176, $1177, $1178, $1179, $1180, $1181, $1182, $1183, $1184, $1185, $1186, $1187, $1188, $1189, $1190, $1191, $1192, $1193, $1194, $1195, $1196, $1197, $1198, VersionRange($1199, $1200)), ($1201, $1202, $1203, $1204, $1205, $1206, $1207, $1208, $1209, $1210, $1211, $1212, $1213, $1214, $1215, $1216, $1217, $1218, $1219, $1220, $1221, $1222, $1223, $1224, $1225, $1226, $1227, $1228, VersionRange($1229, $1230)), ($1231, $1232, $1233, $1234, $1235, $1236, $1237, $1238, $1239, $1240, $1241, $1242, $1243, $1244, $1245, $1246, $1247, $1248, $1249, $1250, $1251, $1252, $1253, $1254, $1255, $1256, $1257, $1258, VersionRange($1259, $1260)), ($1261, $1262, $1263, $1264, $1265, $1266, $1267, $1268, $1269, $1270, $1271, $1272, $1273, $1274, $1275, $1276, $1277, $1278, $1279, $1280, $1281, $1282, $1283, $1284, $1285, $1286, $1287, $1288, VersionRange($1289, $1290)), ($1291, $1292, $1293, $1294, $1295, $1296, $1297, $1298, $1299, $1300, $1301, $1302, $1303, $1304, $1305, $1306, $1307, $1308, $1309, $1310, $1311, $1312, $1313, $1314, $1315, $1316, $1317, $1318, VersionRange($1319, $1320)), ($1321, $1322, $1323, $1324, $1325, $1326, $1327, $1328, $1329, $1330, $1331, $1332, $1333, $1334, $1335, $1336, $1337, $1338, $1339, $1340, $1341, $1342, $1343, $1344, $1345, $1346, $1347, $1348, VersionRange($1349, $1350)), ($1351, $1352, $1353, $1354, $1355, $1356, $1357, $1358, $1359, $1360, $1361, $1362, $1363, $1364, $1365, $1366, $1367, $1368, $1369, $1370, $1371, $1372, $1373, $1374, $1375, $1376, $1377, $1378, VersionRange($1379, $1380)), ($1381, $1382, $1383, $1384, $1385, $1386, $1387, $1388, $1389, $1390, $1391, $1392, $1393, $1394, $1395, $1396, $1397, $1398, $1399, $1400, $1401, $1402, $1403, $1404, $1405, $1406, $1407, $1408, VersionRange($1409, $1410)), ($1411, $1412, $1413, $1414, $1415, $1416, $1417, $1418, $1419, $1420, $1421, $1422, $1423, $1424, $1425, $1426, $1427, $1428, $1429, $1430, $1431, $1432, $1433, $1434, $1435, $1436, $1437, $1438, VersionRange($1439, $1440)), ($1441, $1442, $1443, $1444, $1445, $1446, $1447, $1448, $1449, $1450, $1451, $1452, $1453, $1454, $1455, $1456, $1457, $1458, $1459, $1460, $1461, $1462, $1463, $1464, $1465, $1466, $1467, $1468, VersionRange($1469, $1470)), ($1471, $1472, $1473, $1474, $1475, $1476, $1477, $1478, $1479, $1480, $1481, $1482, $1483, $1484, $1485, $1486, $1487, $1488, $1489, $1490, $1491, $1492, $1493, $1494, $1495, $1496, $1497, $1498, VersionRange($1499, $1500)), ($1501, $1502, $1503, $1504, $1505, $1506, $1507, $1508, $1509, $1510, $1511, $1512, $1513, $1514, $1515, $1516, $1517, $1518, $1519, $1520, $1521, $1522, $1523, $1524, $1525, $1526, $1527, $1528, VersionRange($1529, $1530)), ($1531, $1532, $1533, $1534, $1535, $1536, $1537, $1538, $1539, $1540, $1541, $1542, $1543, $1544, $1545, $1546, $1547, $1548, $1549, $1550, $1551, $1552, $1553, $1554, $1555, $1556, $1557, $1558, VersionRange($1559, $1560)), ($1561, $1562, $1563, $1564, $1565, $1566, $1567, $1568, $1569, $1570, $1571, $1572, $1573, $1574, $1575, $1576, $1577, $1578, $1579, $1580, $1581, $1582, $1583, $1584, $1585, $1586, $1587, $1588, VersionRange($1589, $1590)), ($1591, $1592, $1593, $1594, $1595, $1596, $1597, $1598, $1599, $1600, $1601, $1602, $1603, $1604, $1605, $1606, $1607, $1608, $1609, $1610, $1611, $1612, $1613, $1614, $1615, $1616, $1617, $1618, VersionRange($1619, $1620)), ($1621, $1622, $1623, $1624, $1625, $1626, $1627, $1628, $1629, $1630, $1631, $1632, $1633, $1634, $1635, $1636, $1637, $1638, $1639, $1640, $1641, $1642, $1643, $1644, $1645, $1646, $1647, $1648, VersionRange($1649, $1650)), ($1651, $1652, $1653, $1654, $1655, $1656, $1657, $1658, $1659, $1660, $1661, $1662, $1663, $1664, $1665, $1666, $1667, $1668, $1669, $1670, $1671, $1672, $1673, $1674, $1675, $1676, $1677, $1678, VersionRange($1679, $1680)), ($1681, $1682, $1683, $1684, $1685, $1686, $1687, $1688, $1689, $1690, $1691, $1692, $1693, $1694, $1695, $1696, $1697, $1698, $1699, $1700, $1701, $1702, $1703, $1704, $1705, $1706, $1707, $1708, VersionRange($1709, $1710)), ($1711, $1712, $1713, $1714, $1715, $1716, $1717, $1718, $1719, $1720, $1721, $1722, $1723, $1724, $1725, $1726, $1727, $1728, $1729, $1730, $1731, $1732, $1733, $1734, $1735, $1736, $1737, $1738, VersionRange($1739, $1740)), ($1741, $1742, $1743, $1744, $1745, $1746, $1747, $1748, $1749, $1750, $1751, $1752, $1753, $1754, $1755, $1756, $1757, $1758, $1759, $1760, $1761, $1762, $1763, $1764, $1765, $1766, $1767, $1768, VersionRange($1769, $1770)), ($1771, $1772, $1773, $1774, $1775, $1776, $1777, $1778, $1779, $1780, $1781, $1782, $1783, $1784, $1785, $1786, $1787, $1788, $1789, $1790, $1791, $1792, $1793, $1794, $1795, $1796, $1797, $1798, VersionRange($1799, $1800)), ($1801, $1802, $1803, $1804, $1805, $1806, $1807, $1808, $1809, $1810, $1811, $1812, $1813, $1814, $1815, $1816, $1817, $1818, $1819, $1820, $1821, $1822, $1823, $1824, $1825, $1826, $1827, $1828, VersionRange($1829, $1830)), ($1831, $1832, $1833, $1834, $1835, $1836, $1837, $1838, $1839, $1840, $1841, $1842, $1843, $1844, $1845, $1846, $1847, $1848, $1849, $1850, $1851, $1852, $1853, $1854, $1855, $1856, $1857, $1858, VersionRange($1859, $1860)), ($1861, $1862, $1863, $1864, $1865, $1866, $1867, $1868, $1869, $1870, $1871, $1872, $1873, $1874, $1875, $1876, $1877, $1878, $1879, $1880, $1881, $1882, $1883, $1884, $1885, $1886, $1887, $1888, VersionRange($1889, $1890)), ($1891, $1892, $1893, $1894, $1895, $1896, $1897, $1898, $1899, $1900, $1901, $1902, $1903, $1904, $1905, $1906, $1907, $1908, $1909, $1910, $1911, $1912, $1913, $1914, $1915, $1916, $1917, $1918, VersionRange($1919, $1920)), ($1921, $1922, $1923, $1924, $1925, $1926, $1927, $1928, $1929, $1930, $1931, $1932, $1933, $1934, $1935, $1936, $1937, $1938, $1939, $1940, $1941, $1942, $1943, $1944, $1945, $1946, $1947, $1948, VersionRange($1949, $1950)), ($1951, $1952, $1953, $1954, $1955, $1956, $1957, $1958, $1959, $1960, $1961, $1962, $1963, $1964, $1965, $1966, $1967, $1968, $1969, $1970, $1971, $1972, $1973, $1974, $1975, $1976, $1977, $1978, VersionRange($1979, $1980)), ($1981, $1982, $1983, $1984, $1985, $1986, $1987, $1988, $1989, $1990, $1991, $1992, $1993, $1994, $1995, $1996, $1997, $1998, $1999, $2000, $2001, $2002, $2003, $2004, $2005, $2006, $2007, $2008, VersionRange($2009, $2010)), ($2011, $2012, $2013, $2014, $2015, $2016, $2017, $2018, $2019, $2020, $2021, $2022, $2023, $2024, $2025, $2026, $2027, $2028, $2029, $2030, $2031, $2032, $2033, $2034, $2035, $2036, $2037, $2038, VersionRange($2039, $2040)), ($2041, $2042, $2043, $2044, $2045, $2046, $2047, $2048, $2049, $2050, $2051, $2052, $2053, $2054, $2055, $2056, $2057, $2058, $2059, $2060, $2061, $2062, $2063, $2064, $2065, $2066, $2067, $2068, VersionRange($2069, $2070)), ($2071, $2072, $2073, $2074, $2075, $2076, $2077, $2078, $2079, $2080, $2081, $2082, $2083, $2084, $2085, $2086, $2087, $2088, $2089, $2090, $2091, $2092, $2093, $2094, $2095, $2096, $2097, $2098, VersionRange($2099, $2100)), ($2101, $2102, $2103, $2104, $2105, $2106, $2107, $2108, $2109, $2110, $2111, $2112, $2113, $2114, $2115, $2116, $2117, $2118, $2119, $2120, $2121, $2122, $2123, $2124, $2125, $2126, $2127, $2128, VersionRange($2129, $2130)), ($2131, $2132, $2133, $2134, $2135, $2136, $2137, $2138, $2139, $2140, $2141, $2142, $2143, $2144, $2145, $2146, $2147, $2148, $2149, $2150, $2151, $2152, $2153, $2154, $2155, $2156, $2157, $2158, VersionRange($2159, $2160)), ($2161, $2162, $2163, $2164, $2165, $2166, $2167, $2168, $2169, $2170, $2171, $2172, $2173, $2174, $2175, $2176, $2177, $2178, $2179, $2180, $2181, $2182, $2183, $2184, $2185, $2186, $2187, $2188, VersionRange($2189, $2190)), ($2191, $2192, $2193, $2194, $2195, $2196, $2197, $2198, $2199, $2200, $2201, $2202, $2203, $2204, $2205, $2206, $2207, $2208, $2209, $2210, $2211, $2212, $2213, $2214, $2215, $2216, $2217, $2218, VersionRange($2219, $2220)), ($2221, $2222, $2223, $2224, $2225, $2226, $2227, $2228, $2229, $2230, $2231, $2232, $2233, $2234, $2235, $2236, $2237, $2238, $2239, $2240, $2241, $2242, $2243, $2244, $2245, $2246, $2247, $2248, VersionRange($2249, $2250)), ($2251, $2252, $2253, $2254, $2255, $2256, $2257, $2258, $2259, $2260, $2261, $2262, $2263, $2264, $2265, $2266, $2267, $2268, $2269, $2270, $2271, $2272, $2273, $2274, $2275, $2276, $2277, $2278, VersionRange($2279, $2280)), ($2281, $2282, $2283, $2284, $2285, $2286, $2287, $2288, $2289, $2290, $2291, $2292, $2293, $2294, $2295, $2296, $2297, $2298, $2299, $2300, $2301, $2302, $2303, $2304, $2305, $2306, $2307, $2308, VersionRange($2309, $2310)), ($2311, $2312, $2313, $2314, $2315, $2316, $2317, $2318, $2319, $2320, $2321, $2322, $2323, $2324, $2325, $2326, $2327, $2328, $2329, $2330, $2331, $2332, $2333, $2334, $2335, $2336, $2337, $2338, VersionRange($2339, $2340)), ($2341, $2342, $2343, $2344, $2345, $2346, $2347, $2348, $2349, $2350, $2351, $2352, $2353, $2354, $2355, $2356, $2357, $2358, $2359, $2360, $2361, $2362, $2363, $2364, $2365, $2366, $2367, $2368, VersionRange($2369, $2370)), ($2371, $2372, $2373, $2374, $2375, $2376, $2377, $2378, $2379, $2380, $2381, $2382, $2383, $2384, $2385, $2386, $2387, $2388, $2389, $2390, $2391, $2392, $2393, $2394, $2395, $2396, $2397, $2398, VersionRange($2399, $2400)), ($2401, $2402, $2403, $2404, $2405, $2406, $2407, $2408, $2409, $2410, $2411, $2412, $2413, $2414, $2415, $2416, $2417, $2418, $2419, $2420, $2421, $2422, $2423, $2424, $2425, $2426, $2427, $2428, VersionRange($2429, $2430)), ($2431, $2432, $2433, $2434, $2435, $2436, $2437, $2438, $2439, $2440, $2441, $2442, $2443, $2444, $2445, $2446, $2447, $2448, $2449, $2450, $2451, $2452, $2453, $2454, $2455, $2456, $2457, $2458, VersionRange($2459, $2460)), ($2461, $2462, $2463, $2464, $2465, $2466, $2467, $2468, $2469, $2470, $2471, $2472, $2473, $2474, $2475, $2476, $2477, $2478, $2479, $2480, $2481, $2482, $2483, $2484, $2485, $2486, $2487, $2488, VersionRange($2489, $2490)), ($2491, $2492, $2493, $2494, $2495, $2496, $2497, $2498, $2499, $2500, $2501, $2502, $2503, $2504, $2505, $2506, $2507, $2508, $2509, $2510, $2511, $2512, $2513, $2514, $2515, $2516, $2517, $2518, VersionRange($2519, $2520)), ($2521, $2522, $2523, $2524, $2525, $2526, $2527, $2528, $2529, $2530, $2531, $2532, $2533, $2534, $2535, $2536, $2537, $2538, $2539, $2540, $2541, $2542, $2543, $2544, $2545, $2546, $2547, $2548, VersionRange($2549, $2550)), ($2551, $2552, $2553, $2554, $2555, $2556, $2557, $2558, $2559, $2560, $2561, $2562, $2563, $2564, $2565, $2566, $2567, $2568, $2569, $2570, $2571, $2572, $2573, $2574, $2575, $2576, $2577, $2578, VersionRange($2579, $2580)), ($2581, $2582, $2583, $2584, $2585, $2586, $2587, $2588, $2589, $2590, $2591, $2592, $2593, $2594, $2595, $2596, $2597, $2598, $2599, $2600, $2601, $2602, $2603, $2604, $2605, $2606, $2607, $2608, VersionRange($2609, $2610)), ($2611, $2612, $2613, $2614, $2615, $2616, $2617, $2618, $2619, $2620, $2621, $2622, $2623, $2624, $2625, $2626, $2627, $2628, $2629, $2630, $2631, $2632, $2633, $2634, $2635, $2636, $2637, $2638, VersionRange($2639, $2640)), ($2641, $2642, $2643, $2644, $2645, $2646, $2647, $2648, $2649, $2650, $2651, $2652, $2653, $2654, $2655, $2656, $2657, $2658, $2659, $2660, $2661, $2662, $2663, $2664, $2665, $2666, $2667, $2668, VersionRange($2669, $2670)), ($2671, $2672, $2673, $2674, $2675, $2676, $2677, $2678, $2679, $2680, $2681, $2682, $2683, $2684, $2685, $2686, $2687, $2688, $2689, $2690, $2691, $2692, $2693, $2694, $2695, $2696, $2697, $2698, VersionRange($2699, $2700)), ($2701, $2702, $2703, $2704, $2705, $2706, $2707, $2708, $2709, $2710, $2711, $2712, $2713, $2714, $2715, $2716, $2717, $2718, $2719, $2720, $2721, $2722, $2723, $2724, $2725, $2726, $2727, $2728, VersionRange($2729, $2730)), ($2731, $2732, $2733, $2734, $2735, $2736, $2737, $2738, $2739, $2740, $2741, $2742, $2743, $2744, $2745, $2746, $2747, $2748, $2749, $2750, $2751, $2752, $2753, $2754, $2755, $2756, $2757, $2758, VersionRange($2759, $2760)), ($2761, $2762, $2763, $2764, $2765, $2766, $2767, $2768, $2769, $2770, $2771, $2772, $2773, $2774, $2775, $2776, $2777, $2778, $2779, $2780, $2781, $2782, $2783, $2784, $2785, $2786, $2787, $2788, VersionRange($2789, $2790)), ($2791, $2792, $2793, $2794, $2795, $2796, $2797, $2798, $2799, $2800, $2801, $2802, $2803, $2804, $2805, $2806, $2807, $2808, $2809, $2810, $2811, $2812, $2813, $2814, $2815, $2816, $2817, $2818, VersionRange($2819, $2820)), ($2821, $2822, $2823, $2824, $2825, $2826, $2827, $2828, $2829, $2830, $2831, $2832, $2833, $2834, $2835, $2836, $2837, $2838, $2839, $2840, $2841, $2842, $2843, $2844, $2845, $2846, $2847, $2848, VersionRange($2849, $2850)), ($2851, $2852, $2853, $2854, $2855, $2856, $2857, $2858, $2859, $2860, $2861, $2862, $2863, $2864, $2865, $2866, $2867, $2868, $2869, $2870, $2871, $2872, $2873, $2874, $2875, $2876, $2877, $2878, VersionRange($2879, $2880)), ($2881, $2882, $2883, $2884, $2885, $2886, $2887, $2888, $2889, $2890, $2891, $2892, $2893, $2894, $2895, $2896, $2897, $2898, $2899, $2900, $2901, $2902, $2903, $2904, $2905, $2906, $2907, $2908, VersionRange($2909, $2910)), ($2911, $2912, $2913, $2914, $2915, $2916, $2917, $2918, $2919, $2920, $2921, $2922, $2923, $2924, $2925, $2926, $2927, $2928, $2929, $2930, $2931, $2932, $2933, $2934, $2935, $2936, $2937, $2938, VersionRange($2939, $2940)), ($2941, $2942, $2943, $2944, $2945, $2946, $2947, $2948, $2949, $2950, $2951, $2952, $2953, $2954, $2955, $2956, $2957, $2958, $2959, $2960, $2961, $2962, $2963, $2964, $2965, $2966, $2967, $2968, VersionRange($2969, $2970)), ($2971, $2972, $2973, $2974, $2975, $2976, $2977, $2978, $2979, $2980, $2981, $2982, $2983, $2984, $2985, $2986, $2987, $2988, $2989, $2990, $2991, $2992, $2993, $2994, $2995, $2996, $2997, $2998, VersionRange($2999, $3000)), ($3001, $3002, $3003, $3004, $3005, $3006, $3007, $3008, $3009, $3010, $3011, $3012, $3013, $3014, $3015, $3016, $3017, $3018, $3019, $3020, $3021, $3022, $3023, $3024, $3025, $3026, $3027, $3028, VersionRange($3029, $3030)), ($3031, $3032, $3033, $3034, $3035, $3036, $3037, $3038, $3039, $3040, $3041, $3042, $3043, $3044, $3045, $3046, $3047, $3048, $3049, $3050, $3051, $3052, $3053, $3054, $3055, $3056, $3057, $3058, VersionRange($3059, $3060)), ($3061, $3062, $3063, $3064, $3065, $3066, $3067, $3068, $3069, $3070, $3071, $3072, $3073, $3074, $3075, $3076, $3077, $3078, $3079, $3080, $3081, $3082, $3083, $3084, $3085, $3086, $3087, $3088, VersionRange($3089, $3090)), ($3091, $3092, $3093, $3094, $3095, $3096, $3097, $3098, $3099, $3100, $3101, $3102, $3103, $3104, $3105, $3106, $3107, $3108, $3109, $3110, $3111, $3112, $3113, $3114, $3115, $3116, $3117, $3118, VersionRange($3119, $3120)), ($3121, $3122, $3123, $3124, $3125, $3126, $3127, $3128, $3129, $3130, $3131, $3132, $3133, $3134, $3135, $3136, $3137, $3138, $3139, $3140, $3141, $3142, $3143, $3144, $3145, $3146, $3147, $3148, VersionRange($3149, $3150)), ($3151, $3152, $3153, $3154, $3155, $3156, $3157, $3158, $3159, $3160, $3161, $3162, $3163, $3164, $3165, $3166, $3167, $3168, $3169, $3170, $3171, $3172, $3173, $3174, $3175, $3176, $3177, $3178, VersionRange($3179, $3180)), ($3181, $3182, $3183, $3184, $3185, $3186, $3187, $3188, $3189, $3190, $3191, $3192, $3193, $3194, $3195, $3196, $3197, $3198, $3199, $3200, $3201, $3202, $3203, $3204, $3205, $3206, $3207, $3208, VersionRange($3209, $3210)), ($3211, $3212, $3213, $3214, $3215, $3216, $3217, $3218, $3219, $3220, $3221, $3222, $3223, $3224, $3225, $3226, $3227, $3228, $3229, $3230, $3231, $3232, $3233, $3234, $3235, $3236, $3237, $3238, VersionRange($3239, $3240)), ($3241, $3242, $3243, $3244, $3245, $3246, $3247, $3248, $3249, $3250, $3251, $3252, $3253, $3254, $3255, $3256, $3257, $3258, $3259, $3260, $3261, $3262, $3263, $3264, $3265, $3266, $3267, $3268, VersionRange($3269, $3270)), ($3271, $3272, $3273, $3274, $3275, $3276, $3277, $3278, $3279, $3280, $3281, $3282, $3283, $3284, $3285, $3286, $3287, $3288, $3289, $3290, $3291, $3292, $3293, $3294, $3295, $3296, $3297, $3298, VersionRange($3299, $3300)), ($3301, $3302, $3303, $3304, $3305, $3306, $3307, $3308, $3309, $3310, $3311, $3312, $3313, $3314, $3315, $3316, $3317, $3318, $3319, $3320, $3321, $3322, $3323, $3324, $3325, $3326, $3327, $3328, VersionRange($3329, $3330)), ($3331, $3332, $3333, $3334, $3335, $3336, $3337, $3338, $3339, $3340, $3341, $3342, $3343, $3344, $3345, $3346, $3347, $3348, $3349, $3350, $3351, $3352, $3353, $3354, $3355, $3356, $3357, $3358, VersionRange($3359, $3360)), ($3361, $3362, $3363, $3364, $3365, $3366, $3367, $3368, $3369, $3370, $3371, $3372, $3373, $3374, $3375, $3376, $3377, $3378, $3379, $3380, $3381, $3382, $3383, $3384, $3385, $3386, $3387, $3388, VersionRange($3389, $3390)), ($3391, $3392, $3393, $3394, $3395, $3396, $3397, $3398, $3399, $3400, $3401, $3402, $3403, $3404, $3405, $3406, $3407, $3408, $3409, $3410, $3411, $3412, $3413, $3414, $3415, $3416, $3417, $3418, VersionRange($3419, $3420)), ($3421, $3422, $3423, $3424, $3425, $3426, $3427, $3428, $3429, $3430, $3431, $3432, $3433, $3434, $3435, $3436, $3437, $3438, $3439, $3440, $3441, $3442, $3443, $3444, $3445, $3446, $3447, $3448, VersionRange($3449, $3450)), ($3451, $3452, $3453, $3454, $3455, $3456, $3457, $3458, $3459, $3460, $3461, $3462, $3463, $3464, $3465, $3466, $3467, $3468, $3469, $3470, $3471, $3472, $3473, $3474, $3475, $3476, $3477, $3478, VersionRange($3479, $3480)), ($3481, $3482, $3483, $3484, $3485, $3486, $3487, $3488, $3489, $3490, $3491, $3492, $3493, $3494, $3495, $3496, $3497, $3498, $3499, $3500, $3501, $3502, $3503, $3504, $3505, $3506, $3507, $3508, VersionRange($3509, $3510)), ($3511, $3512, $3513, $3514, $3515, $3516, $3517, $3518, $3519, $3520, $3521, $3522, $3523, $3524, $3525, $3526, $3527, $3528, $3529, $3530, $3531, $3532, $3533, $3534, $3535, $3536, $3537, $3538, VersionRange($3539, $3540)), ($3541, $3542, $3543, $3544, $3545, $3546, $3547, $3548, $3549, $3550, $3551, $3552, $3553, $3554, $3555, $3556, $3557, $3558, $3559, $3560, $3561, $3562, $3563, $3564, $3565, $3566, $3567, $3568, VersionRange($3569, $3570)), ($3571, $3572, $3573, $3574, $3575, $3576, $3577, $3578, $3579, $3580, $3581, $3582, $3583, $3584, $3585, $3586, $3587, $3588, $3589, $3590, $3591, $3592, $3593, $3594, $3595, $3596, $3597, $3598, VersionRange($3599, $3600)), ($3601, $3602, $3603, $3604, $3605, $3606, $3607, $3608, $3609, $3610, $3611, $3612, $3613, $3614, $3615, $3616, $3617, $3618, $3619, $3620, $3621, $3622, $3623, $3624, $3625, $3626, $3627, $3628, VersionRange($3629, $3630)), ($3631, $3632, $3633, $3634, $3635, $3636, $3637, $3638, $3639, $3640, $3641, $3642, $3643, $3644, $3645, $3646, $3647, $3648, $3649, $3650, $3651, $3652, $3653, $3654, $3655, $3656, $3657, $3658, VersionRange($3659, $3660)), ($3661, $3662, $3663, $3664, $3665, $3666, $3667, $3668, $3669, $3670, $3671, $3672, $3673, $3674, $3675, $3676, $3677, $3678, $3679, $3680, $3681, $3682, $3683, $3684, $3685, $3686, $3687, $3688, VersionRange($3689, $3690)), ($3691, $3692, $3693, $3694, $3695, $3696, $3697, $3698, $3699, $3700, $3701, $3702, $3703, $3704, $3705, $3706, $3707, $3708, $3709, $3710, $3711, $3712, $3713, $3714, $3715, $3716, $3717, $3718, VersionRange($3719, $3720)), ($3721, $3722, $3723, $3724, $3725, $3726, $3727, $3728, $3729, $3730, $3731, $3732, $3733, $3734, $3735, $3736, $3737, $3738, $3739, $3740, $3741, $3742, $3743, $3744, $3745, $3746, $3747, $3748, VersionRange($3749, $3750)), ($3751, $3752, $3753, $3754, $3755, $3756, $3757, $3758, $3759, $3760, $3761, $3762, $3763, $3764, $3765, $3766, $3767, $3768, $3769, $3770, $3771, $3772, $3773, $3774, $3775, $3776, $3777, $3778, VersionRange($3779, $3780)), ($3781, $3782, $3783, $3784, $3785, $3786, $3787, $3788, $3789, $3790, $3791, $3792, $3793, $3794, $3795, $3796, $3797, $3798, $3799, $3800, $3801, $3802, $3803, $3804, $3805, $3806, $3807, $3808, VersionRange($3809, $3810)), ($3811, $3812, $3813, $3814, $3815, $3816, $3817, $3818, $3819, $3820, $3821, $3822, $3823, $3824, $3825, $3826, $3827, $3828, $3829, $3830, $3831, $3832, $3833, $3834, $3835, $3836, $3837, $3838, VersionRange($3839, $3840)), ($3841, $3842, $3843, $3844, $3845, $3846, $3847, $3848, $3849, $3850, $3851, $3852, $3853, $3854, $3855, $3856, $3857, $3858, $3859, $3860, $3861, $3862, $3863, $3864, $3865, $3866, $3867, $3868, VersionRange($3869, $3870)), ($3871, $3872, $3873, $3874, $3875, $3876, $3877, $3878, $3879, $3880, $3881, $3882, $3883, $3884, $3885, $3886, $3887, $3888, $3889, $3890, $3891, $3892, $3893, $3894, $3895, $3896, $3897, $3898, VersionRange($3899, $3900)), ($3901, $3902, $3903, $3904, $3905, $3906, $3907, $3908, $3909, $3910, $3911, $3912, $3913, $3914, $3915, $3916, $3917, $3918, $3919, $3920, $3921, $3922, $3923, $3924, $3925, $3926, $3927, $3928, VersionRange($3929, $3930)), ($3931, $3932, $3933, $3934, $3935, $3936, $3937, $3938, $3939, $3940, $3941, $3942, $3943, $3944, $3945, $3946, $3947, $3948, $3949, $3950, $3951, $3952, $3953, $3954, $3955, $3956, $3957, $3958, VersionRange($3959, $3960)), ($3961, $3962, $3963, $3964, $3965, $3966, $3967, $3968, $3969, $3970, $3971, $3972, $3973, $3974, $3975, $3976, $3977, $3978, $3979, $3980, $3981, $3982, $3983, $3984, $3985, $3986, $3987, $3988, VersionRange($3989, $3990)), ($3991, $3992, $3993, $3994, $3995, $3996, $3997, $3998, $3999, $4000, $4001, $4002, $4003, $4004, $4005, $4006, $4007, $4008, $4009, $4010, $4011, $4012, $4013, $4014, $4015, $4016, $4017, $4018, VersionRange($4019, $4020)), ($4021, $4022, $4023, $4024, $4025, $4026, $4027, $4028, $4029, $4030, $4031, $4032, $4033, $4034, $4035, $4036, $4037, $4038, $4039, $4040, $4041, $4042, $4043, $4044, $4045, $4046, $4047, $4048, VersionRange($4049, $4050)), ($4051, $4052, $4053, $4054, $4055, $4056, $4057, $4058, $4059, $4060, $4061, $4062, $4063, $4064, $4065, $4066, $4067, $4068, $4069, $4070, $4071, $4072, $4073, $4074, $4075, $4076, $4077, $4078, VersionRange($4079, $4080)), ($4081, $4082, $4083, $4084, $4085, $4086, $4087, $4088, $4089, $4090, $4091, $4092, $4093, $4094, $4095, $4096, $4097, $4098, $4099, $4100, $4101, $4102, $4103, $4104, $4105, $4106, $4107, $4108, VersionRange($4109, $4110)), ($4111, $4112, $4113, $4114, $4115, $4116, $4117, $4118, $4119, $4120, $4121, $4122, $4123, $4124, $4125, $4126, $4127, $4128, $4129, $4130, $4131, $4132, $4133, $4134, $4135, $4136, $4137, $4138, VersionRange($4139, $4140)), ($4141, $4142, $4143, $4144, $4145, $4146, $4147, $4148, $4149, $4150, $4151, $4152, $4153, $4154, $4155, $4156, $4157, $4158, $4159, $4160, $4161, $4162, $4163, $4164, $4165, $4166, $4167, $4168, VersionRange($4169, $4170)), ($4171, $4172, $4173, $4174, $4175, $4176, $4177, $4178, $4179, $4180, $4181, $4182, $4183, $4184, $4185, $4186, $4187, $4188, $4189, $4190, $4191, $4192, $4193, $4194, $4195, $4196, $4197, $4198, VersionRange($4199, $4200)), ($4201, $4202, $4203, $4204, $4205, $4206, $4207, $4208, $4209, $4210, $4211, $4212, $4213, $4214, $4215, $4216, $4217, $4218, $4219, $4220, $4221, $4222, $4223, $4224, $4225, $4226, $4227, $4228, VersionRange($4229, $4230)), ($4231, $4232, $4233, $4234, $4235, $4236, $4237, $4238, $4239, $4240, $4241, $4242, $4243, $4244, $4245, $4246, $4247, $4248, $4249, $4250, $4251, $4252, $4253, $4254, $4255, $4256, $4257, $4258, VersionRange($4259, $4260)), ($4261, $4262, $4263, $4264, $4265, $4266, $4267, $4268, $4269, $4270, $4271, $4272, $4273, $4274, $4275, $4276, $4277, $4278, $4279, $4280, $4281, $4282, $4283, $4284, $4285, $4286, $4287, $4288, VersionRange($4289, $4290)), ($4291, $4292, $4293, $4294, $4295, $4296, $4297, $4298, $4299, $4300, $4301, $4302, $4303, $4304, $4305, $4306, $4307, $4308, $4309, $4310, $4311, $4312, $4313, $4314, $4315, $4316, $4317, $4318, VersionRange($4319, $4320)), ($4321, $4322, $4323, $4324, $4325, $4326, $4327, $4328, $4329, $4330, $4331, $4332, $4333, $4334, $4335, $4336, $4337, $4338, $4339, $4340, $4341, $4342, $4343, $4344, $4345, $4346, $4347, $4348, VersionRange($4349, $4350)), ($4351, $4352, $4353, $4354, $4355, $4356, $4357, $4358, $4359, $4360, $4361, $4362, $4363, $4364, $4365, $4366, $4367, $4368, $4369, $4370, $4371, $4372, $4373, $4374, $4375, $4376, $4377, $4378, VersionRange($4379, $4380)), ($4381, $4382, $4383, $4384, $4385, $4386, $4387, $4388, $4389, $4390, $4391, $4392, $4393, $4394, $4395, $4396, $4397, $4398, $4399, $4400, $4401, $4402, $4403, $4404, $4405, $4406, $4407, $4408, VersionRange($4409, $4410)), ($4411, $4412, $4413, $4414, $4415, $4416, $4417, $4418, $4419, $4420, $4421, $4422, $4423, $4424, $4425, $4426, $4427, $4428, $4429, $4430, $4431, $4432, $4433, $4434, $4435, $4436, $4437, $4438, VersionRange($4439, $4440)), ($4441, $4442, $4443, $4444, $4445, $4446, $4447, $4448, $4449, $4450, $4451, $4452, $4453, $4454, $4455, $4456, $4457, $4458, $4459, $4460, $4461, $4462, $4463, $4464, $4465, $4466, $4467, $4468, VersionRange($4469, $4470)), ($4471, $4472, $4473, $4474, $4475, $4476, $4477, $4478, $4479, $4480, $4481, $4482, $4483, $4484, $4485, $4486, $4487, $4488, $4489, $4490, $4491, $4492, $4493, $4494, $4495, $4496, $4497, $4498, VersionRange($4499, $4500)), ($4501, $4502, $4503, $4504, $4505, $4506, $4507, $4508, $4509, $4510, $4511, $4512, $4513, $4514, $4515, $4516, $4517, $4518, $4519, $4520, $4521, $4522, $4523, $4524, $4525, $4526, $4527, $4528, VersionRange($4529, $4530)), ($4531, $4532, $4533, $4534, $4535, $4536, $4537, $4538, $4539, $4540, $4541, $4542, $4543, $4544, $4545, $4546, $4547, $4548, $4549, $4550, $4551, $4552, $4553, $4554, $4555, $4556, $4557, $4558, VersionRange($4559, $4560)), ($4561, $4562, $4563, $4564, $4565, $4566, $4567, $4568, $4569, $4570, $4571, $4572, $4573, $4574, $4575, $4576, $4577, $4578, $4579, $4580, $4581, $4582, $4583, $4584, $4585, $4586, $4587, $4588, VersionRange($4589, $4590)), ($4591, $4592, $4593, $4594, $4595, $4596, $4597, $4598, $4599, $4600, $4601, $4602, $4603, $4604, $4605, $4606, $4607, $4608, $4609, $4610, $4611, $4612, $4613, $4614, $4615, $4616, $4617, $4618, VersionRange($4619, $4620)), ($4621, $4622, $4623, $4624, $4625, $4626, $4627, $4628, $4629, $4630, $4631, $4632, $4633, $4634, $4635, $4636, $4637, $4638, $4639, $4640, $4641, $4642, $4643, $4644, $4645, $4646, $4647, $4648, VersionRange($4649, $4650)), ($4651, $4652, $4653, $4654, $4655, $4656, $4657, $4658, $4659, $4660, $4661, $4662, $4663, $4664, $4665, $4666, $4667, $4668, $4669, $4670, $4671, $4672, $4673, $4674, $4675, $4676, $4677, $4678, VersionRange($4679, $4680)), ($4681, $4682, $4683, $4684, $4685, $4686, $4687, $4688, $4689, $4690, $4691, $4692, $4693, $4694, $4695, $4696, $4697, $4698, $4699, $4700, $4701, $4702, $4703, $4704, $4705, $4706, $4707, $4708, VersionRange($4709, $4710)), ($4711, $4712, $4713, $4714, $4715, $4716, $4717, $4718, $4719, $4720, $4721, $4722, $4723, $4724, $4725, $4726, $4727, $4728, $4729, $4730, $4731, $4732, $4733, $4734, $4735, $4736, $4737, $4738, VersionRange($4739, $4740)), ($4741, $4742, $4743, $4744, $4745, $4746, $4747, $4748, $4749, $4750, $4751, $4752, $4753, $4754, $4755, $4756, $4757, $4758, $4759, $4760, $4761, $4762, $4763, $4764, $4765, $4766, $4767, $4768, VersionRange($4769, $4770)), ($4771, $4772, $4773, $4774, $4775, $4776, $4777, $4778, $4779, $4780, $4781, $4782, $4783, $4784, $4785, $4786, $4787, $4788, $4789, $4790, $4791, $4792, $4793, $4794, $4795, $4796, $4797, $4798, VersionRange($4799, $4800)), ($4801, $4802, $4803, $4804, $4805, $4806, $4807, $4808, $4809, $4810, $4811, $4812, $4813, $4814, $4815, $4816, $4817, $4818, $4819, $4820, $4821, $4822, $4823, $4824, $4825, $4826, $4827, $4828, VersionRange($4829, $4830)), ($4831, $4832, $4833, $4834, $4835, $4836, $4837, $4838, $4839, $4840, $4841, $4842, $4843, $4844, $4845, $4846, $4847, $4848, $4849, $4850, $4851, $4852, $4853, $4854, $4855, $4856, $4857, $4858, VersionRange($4859, $4860)), ($4861, $4862, $4863, $4864, $4865, $4866, $4867, $4868, $4869, $4870, $4871, $4872, $4873, $4874, $4875, $4876, $4877, $4878, $4879, $4880, $4881, $4882, $4883, $4884, $4885, $4886, $4887, $4888, VersionRange($4889, $4890)), ($4891, $4892, $4893, $4894, $4895, $4896, $4897, $4898, $4899, $4900, $4901, $4902, $4903, $4904, $4905, $4906, $4907, $4908, $4909, $4910, $4911, $4912, $4913, $4914, $4915, $4916, $4917, $4918, VersionRange($4919, $4920)), ($4921, $4922, $4923, $4924, $4925, $4926, $4927, $4928, $4929, $4930, $4931, $4932, $4933, $4934, $4935, $4936, $4937, $4938, $4939, $4940, $4941, $4942, $4943, $4944, $4945, $4946, $4947, $4948, VersionRange($4949, $4950)), ($4951, $4952, $4953, $4954, $4955, $4956, $4957, $4958, $4959, $4960, $4961, $4962, $4963, $4964, $4965, $4966, $4967, $4968, $4969, $4970, $4971, $4972, $4973, $4974, $4975, $4976, $4977, $4978, VersionRange($4979, $4980)), ($4981, $4982, $4983, $4984, $4985, $4986, $4987, $4988, $4989, $4990, $4991, $4992, $4993, $4994, $4995, $4996, $4997, $4998, $4999, $5000, $5001, $5002, $5003, $5004, $5005, $5006, $5007, $5008, VersionRange($5009, $5010)), ($5011, $5012, $5013, $5014, $5015, $5016, $5017, $5018, $5019, $5020, $5021, $5022, $5023, $5024, $5025, $5026, $5027, $5028, $5029, $5030, $5031, $5032, $5033, $5034, $5035, $5036, $5037, $5038, VersionRange($5039, $5040)), ($5041, $5042, $5043, $5044, $5045, $5046, $5047, $5048, $5049, $5050, $5051, $5052, $5053, $5054, $5055, $5056, $5057, $5058, $5059, $5060, $5061, $5062, $5063, $5064, $5065, $5066, $5067, $5068, VersionRange($5069, $5070)), ($5071, $5072, $5073, $5074, $5075, $5076, $5077, $5078, $5079, $5080, $5081, $5082, $5083, $5084, $5085, $5086, $5087, $5088, $5089, $5090, $5091, $5092, $5093, $5094, $5095, $5096, $5097, $5098, VersionRange($5099, $5100)), ($5101, $5102, $5103, $5104, $5105, $5106, $5107, $5108, $5109, $5110, $5111, $5112, $5113, $5114, $5115, $5116, $5117, $5118, $5119, $5120, $5121, $5122, $5123, $5124, $5125, $5126, $5127, $5128, VersionRange($5129, $5130)), ($5131, $5132, $5133, $5134, $5135, $5136, $5137, $5138, $5139, $5140, $5141, $5142, $5143, $5144, $5145, $5146, $5147, $5148, $5149, $5150, $5151, $5152, $5153, $5154, $5155, $5156, $5157, $5158, VersionRange($5159, $5160)), ($5161, $5162, $5163, $5164, $5165, $5166, $5167, $5168, $5169, $5170, $5171, $5172, $5173, $5174, $5175, $5176, $5177, $5178, $5179, $5180, $5181, $5182, $5183, $5184, $5185, $5186, $5187, $5188, VersionRange($5189, $5190)), ($5191, $5192, $5193, $5194, $5195, $5196, $5197, $5198, $5199, $5200, $5201, $5202, $5203, $5204, $5205, $5206, $5207, $5208, $5209, $5210, $5211, $5212, $5213, $5214, $5215, $5216, $5217, $5218, VersionRange($5219, $5220)), ($5221, $5222, $5223, $5224, $5225, $5226, $5227, $5228, $5229, $5230, $5231, $5232, $5233, $5234, $5235, $5236, $5237, $5238, $5239, $5240, $5241, $5242, $5243, $5244, $5245, $5246, $5247, $5248, VersionRange($5249, $5250)), ($5251, $5252, $5253, $5254, $5255, $5256, $5257, $5258, $5259, $5260, $5261, $5262, $5263, $5264, $5265, $5266, $5267, $5268, $5269, $5270, $5271, $5272, $5273, $5274, $5275, $5276, $5277, $5278, VersionRange($5279, $5280)), ($5281, $5282, $5283, $5284, $5285, $5286, $5287, $5288, $5289, $5290, $5291, $5292, $5293, $5294, $5295, $5296, $5297, $5298, $5299, $5300, $5301, $5302, $5303, $5304, $5305, $5306, $5307, $5308, VersionRange($5309, $5310)), ($5311, $5312, $5313, $5314, $5315, $5316, $5317, $5318, $5319, $5320, $5321, $5322, $5323, $5324, $5325, $5326, $5327, $5328, $5329, $5330, $5331, $5332, $5333, $5334, $5335, $5336, $5337, $5338, VersionRange($5339, $5340)), ($5341, $5342, $5343, $5344, $5345, $5346, $5347, $5348, $5349, $5350, $5351, $5352, $5353, $5354, $5355, $5356, $5357, $5358, $5359, $5360, $5361, $5362, $5363, $5364, $5365, $5366, $5367, $5368, VersionRange($5369, $5370)), ($5371, $5372, $5373, $5374, $5375, $5376, $5377, $5378, $5379, $5380, $5381, $5382, $5383, $5384, $5385, $5386, $5387, $5388, $5389, $5390, $5391, $5392, $5393, $5394, $5395, $5396, $5397, $5398, VersionRange($5399, $5400)), ($5401, $5402, $5403, $5404, $5405, $5406, $5407, $5408, $5409, $5410, $5411, $5412, $5413, $5414, $5415, $5416, $5417, $5418, $5419, $5420, $5421, $5422, $5423, $5424, $5425, $5426, $5427, $5428, VersionRange($5429, $5430)), ($5431, $5432, $5433, $5434, $5435, $5436, $5437, $5438, $5439, $5440, $5441, $5442, $5443, $5444, $5445, $5446, $5447, $5448, $5449, $5450, $5451, $5452, $5453, $5454, $5455, $5456, $5457, $5458, VersionRange($5459, $5460)), ($5461, $5462, $5463, $5464, $5465, $5466, $5467, $5468, $5469, $5470, $5471, $5472, $5473, $5474, $5475, $5476, $5477, $5478, $5479, $5480, $5481, $5482, $5483, $5484, $5485, $5486, $5487, $5488, VersionRange($5489, $5490)), ($5491, $5492, $5493, $5494, $5495, $5496, $5497, $5498, $5499, $5500, $5501, $5502, $5503, $5504, $5505, $5506, $5507, $5508, $5509, $5510, $5511, $5512, $5513, $5514, $5515, $5516, $5517, $5518, VersionRange($5519, $5520)), ($5521, $5522, $5523, $5524, $5525, $5526, $5527, $5528, $5529, $5530, $5531, $5532, $5533, $5534, $5535, $5536, $5537, $5538, $5539, $5540, $5541, $5542, $5543, $5544, $5545, $5546, $5547, $5548, VersionRange($5549, $5550)), ($5551, $5552, $5553, $5554, $5555, $5556, $5557, $5558, $5559, $5560, $5561, $5562, $5563, $5564, $5565, $5566, $5567, $5568, $5569, $5570, $5571, $5572, $5573, $5574, $5575, $5576, $5577, $5578, VersionRange($5579, $5580)), ($5581, $5582, $5583, $5584, $5585, $5586, $5587, $5588, $5589, $5590, $5591, $5592, $5593, $5594, $5595, $5596, $5597, $5598, $5599, $5600, $5601, $5602, $5603, $5604, $5605, $5606, $5607, $5608, VersionRange($5609, $5610)), ($5611, $5612, $5613, $5614, $5615, $5616, $5617, $5618, $5619, $5620, $5621, $5622, $5623, $5624, $5625, $5626, $5627, $5628, $5629, $5630, $5631, $5632, $5633, $5634, $5635, $5636, $5637, $5638, VersionRange($5639, $5640)), ($5641, $5642, $5643, $5644, $5645, $5646, $5647, $5648, $5649, $5650, $5651, $5652, $5653, $5654, $5655, $5656, $5657, $5658, $5659, $5660, $5661, $5662, $5663, $5664, $5665, $5666, $5667, $5668, VersionRange($5669, $5670)), ($5671, $5672, $5673, $5674, $5675, $5676, $5677, $5678, $5679, $5680, $5681, $5682, $5683, $5684, $5685, $5686, $5687, $5688, $5689, $5690, $5691, $5692, $5693, $5694, $5695, $5696, $5697, $5698, VersionRange($5699, $5700)), ($5701, $5702, $5703, $5704, $5705, $5706, $5707, $5708, $5709, $5710, $5711, $5712, $5713, $5714, $5715, $5716, $5717, $5718, $5719, $5720, $5721, $5722, $5723, $5724, $5725, $5726, $5727, $5728, VersionRange($5729, $5730)), ($5731, $5732, $5733, $5734, $5735, $5736, $5737, $5738, $5739, $5740, $5741, $5742, $5743, $5744, $5745, $5746, $5747, $5748, $5749, $5750, $5751, $5752, $5753, $5754, $5755, $5756, $5757, $5758, VersionRange($5759, $5760)), ($5761, $5762, $5763, $5764, $5765, $5766, $5767, $5768, $5769, $5770, $5771, $5772, $5773, $5774, $5775, $5776, $5777, $5778, $5779, $5780, $5781, $5782, $5783, $5784, $5785, $5786, $5787, $5788, VersionRange($5789, $5790)), ($5791, $5792, $5793, $5794, $5795, $5796, $5797, $5798, $5799, $5800, $5801, $5802, $5803, $5804, $5805, $5806, $5807, $5808, $5809, $5810, $5811, $5812, $5813, $5814, $5815, $5816, $5817, $5818, VersionRange($5819, $5820)), ($5821, $5822, $5823, $5824, $5825, $5826, $5827, $5828, $5829, $5830, $5831, $5832, $5833, $5834, $5835, $5836, $5837, $5838, $5839, $5840, $5841, $5842, $5843, $5844, $5845, $5846, $5847, $5848, VersionRange($5849, $5850)), ($5851, $5852, $5853, $5854, $5855, $5856, $5857, $5858, $5859, $5860, $5861, $5862, $5863, $5864, $5865, $5866, $5867, $5868, $5869, $5870, $5871, $5872, $5873, $5874, $5875, $5876, $5877, $5878, VersionRange($5879, $5880)), ($5881, $5882, $5883, $5884, $5885, $5886, $5887, $5888, $5889, $5890, $5891, $5892, $5893, $5894, $5895, $5896, $5897, $5898, $5899, $5900, $5901, $5902, $5903, $5904, $5905, $5906, $5907, $5908, VersionRange($5909, $5910)), ($5911, $5912, $5913, $5914, $5915, $5916, $5917, $5918, $5919, $5920, $5921, $5922, $5923, $5924, $5925, $5926, $5927, $5928, $5929, $5930, $5931, $5932, $5933, $5934, $5935, $5936, $5937, $5938, VersionRange($5939, $5940)), ($5941, $5942, $5943, $5944, $5945, $5946, $5947, $5948, $5949, $5950, $5951, $5952, $5953, $5954, $5955, $5956, $5957, $5958, $5959, $5960, $5961, $5962, $5963, $5964, $5965, $5966, $5967, $5968, VersionRange($5969, $5970)), ($5971, $5972, $5973, $5974, $5975, $5976, $5977, $5978, $5979, $5980, $5981, $5982, $5983, $5984, $5985, $5986, $5987, $5988, $5989, $5990, $5991, $5992, $5993, $5994, $5995, $5996, $5997, $5998, VersionRange($5999, $6000)), ($6001, $6002, $6003, $6004, $6005, $6006, $6007, $6008, $6009, $6010, $6011, $6012, $6013, $6014, $6015, $6016, $6017, $6018, $6019, $6020, $6021, $6022, $6023, $6024, $6025, $6026, $6027, $6028, VersionRange($6029, $6030)), ($6031, $6032, $6033, $6034, $6035, $6036, $6037, $6038, $6039, $6040, $6041, $6042, $6043, $6044, $6045, $6046, $6047, $6048, $6049, $6050, $6051, $6052, $6053, $6054, $6055, $6056, $6057, $6058, VersionRange($6059, $6060)), ($6061, $6062, $6063, $6064, $6065, $6066, $6067, $6068, $6069, $6070, $6071, $6072, $6073, $6074, $6075, $6076, $6077, $6078, $6079, $6080, $6081, $6082, $6083, $6084, $6085, $6086, $6087, $6088, VersionRange($6089, $6090)), ($6091, $6092, $6093, $6094, $6095, $6096, $6097, $6098, $6099, $6100, $6101, $6102, $6103, $6104, $6105, $6106, $6107, $6108, $6109, $6110, $6111, $6112, $6113, $6114, $6115, $6116, $6117, $6118, VersionRange($6119, $6120)), ($6121, $6122, $6123, $6124, $6125, $6126, $6127, $6128, $6129, $6130, $6131, $6132, $6133, $6134, $6135, $6136, $6137, $6138, $6139, $6140, $6141, $6142, $6143, $6144, $6145, $6146, $6147, $6148, VersionRange($6149, $6150)), ($6151, $6152, $6153, $6154, $6155, $6156, $6157, $6158, $6159, $6160, $6161, $6162, $6163, $6164, $6165, $6166, $6167, $6168, $6169, $6170, $6171, $6172, $6173, $6174, $6175, $6176, $6177, $6178, VersionRange($6179, $6180)), ($6181, $6182, $6183, $6184, $6185, $6186, $6187, $6188, $6189, $6190, $6191, $6192, $6193, $6194, $6195, $6196, $6197, $6198, $6199, $6200, $6201, $6202, $6203, $6204, $6205, $6206, $6207, $6208, VersionRange($6209, $6210)), ($6211, $6212, $6213, $6214, $6215, $6216, $6217, $6218, $6219, $6220, $6221, $6222, $6223, $6224, $6225, $6226, $6227, $6228, $6229, $6230, $6231, $6232, $6233, $6234, $6235, $6236, $6237, $6238, VersionRange($6239, $6240)), ($6241, $6242, $6243, $6244, $6245, $6246, $6247, $6248, $6249, $6250, $6251, $6252, $6253, $6254, $6255, $6256, $6257, $6258, $6259, $6260, $6261, $6262, $6263, $6264, $6265, $6266, $6267, $6268, VersionRange($6269, $6270)), ($6271, $6272, $6273, $6274, $6275, $6276, $6277, $6278, $6279, $6280, $6281, $6282, $6283, $6284, $6285, $6286, $6287, $6288, $6289, $6290, $6291, $6292, $6293, $6294, $6295, $6296, $6297, $6298, VersionRange($6299, $6300)), ($6301, $6302, $6303, $6304, $6305, $6306, $6307, $6308, $6309, $6310, $6311, $6312, $6313, $6314, $6315, $6316, $6317, $6318, $6319, $6320, $6321, $6322, $6323, $6324, $6325, $6326, $6327, $6328, VersionRange($6329, $6330)), ($6331, $6332, $6333, $6334, $6335, $6336, $6337, $6338, $6339, $6340, $6341, $6342, $6343, $6344, $6345, $6346, $6347, $6348, $6349, $6350, $6351, $6352, $6353, $6354, $6355, $6356, $6357, $6358, VersionRange($6359, $6360)), ($6361, $6362, $6363, $6364, $6365, $6366, $6367, $6368, $6369, $6370, $6371, $6372, $6373, $6374, $6375, $6376, $6377, $6378, $6379, $6380, $6381, $6382, $6383, $6384, $6385, $6386, $6387, $6388, VersionRange($6389, $6390)), ($6391, $6392, $6393, $6394, $6395, $6396, $6397, $6398, $6399, $6400, $6401, $6402, $6403, $6404, $6405, $6406, $6407, $6408, $6409, $6410, $6411, $6412, $6413, $6414, $6415, $6416, $6417, $6418, VersionRange($6419, $6420)), ($6421, $6422, $6423, $6424, $6425, $6426, $6427, $6428, $6429, $6430, $6431, $6432, $6433, $6434, $6435, $6436, $6437, $6438, $6439, $6440, $6441, $6442, $6443, $6444, $6445, $6446, $6447, $6448, VersionRange($6449, $6450)), ($6451, $6452, $6453, $6454, $6455, $6456, $6457, $6458, $6459, $6460, $6461, $6462, $6463, $6464, $6465, $6466, $6467, $6468, $6469, $6470, $6471, $6472, $6473, $6474, $6475, $6476, $6477, $6478, VersionRange($6479, $6480)), ($6481, $6482, $6483, $6484, $6485, $6486, $6487, $6488, $6489, $6490, $6491, $6492, $6493, $6494, $6495, $6496, $6497, $6498, $6499, $6500, $6501, $6502, $6503, $6504, $6505, $6506, $6507, $6508, VersionRange($6509, $6510)), ($6511, $6512, $6513, $6514, $6515, $6516, $6517, $6518, $6519, $6520, $6521, $6522, $6523, $6524, $6525, $6526, $6527, $6528, $6529, $6530, $6531, $6532, $6533, $6534, $6535, $6536, $6537, $6538, VersionRange($6539, $6540)), ($6541, $6542, $6543, $6544, $6545, $6546, $6547, $6548, $6549, $6550, $6551, $6552, $6553, $6554, $6555, $6556, $6557, $6558, $6559, $6560, $6561, $6562, $6563, $6564, $6565, $6566, $6567, $6568, VersionRange($6569, $6570)), ($6571, $6572, $6573, $6574, $6575, $6576, $6577, $6578, $6579, $6580, $6581, $6582, $6583, $6584, $6585, $6586, $6587, $6588, $6589, $6590, $6591, $6592, $6593, $6594, $6595, $6596, $6597, $6598, VersionRange($6599, $6600)), ($6601, $6602, $6603, $6604, $6605, $6606, $6607, $6608, $6609, $6610, $6611, $6612, $6613, $6614, $6615, $6616, $6617, $6618, $6619, $6620, $6621, $6622, $6623, $6624, $6625, $6626, $6627, $6628, VersionRange($6629, $6630)), ($6631, $6632, $6633, $6634, $6635, $6636, $6637, $6638, $6639, $6640, $6641, $6642, $6643, $6644, $6645, $6646, $6647, $6648, $6649, $6650, $6651, $6652, $6653, $6654, $6655, $6656, $6657, $6658, VersionRange($6659, $6660)), ($6661, $6662, $6663, $6664, $6665, $6666, $6667, $6668, $6669, $6670, $6671, $6672, $6673, $6674, $6675, $6676, $6677, $6678, $6679, $6680, $6681, $6682, $6683, $6684, $6685, $6686, $6687, $6688, VersionRange($6689, $6690)), ($6691, $6692, $6693, $6694, $6695, $6696, $6697, $6698, $6699, $6700, $6701, $6702, $6703, $6704, $6705, $6706, $6707, $6708, $6709, $6710, $6711, $6712, $6713, $6714, $6715, $6716, $6717, $6718, VersionRange($6719, $6720)), ($6721, $6722, $6723, $6724, $6725, $6726, $6727, $6728, $6729, $6730, $6731, $6732, $6733, $6734, $6735, $6736, $6737, $6738, $6739, $6740, $6741, $6742, $6743, $6744, $6745, $6746, $6747, $6748, VersionRange($6749, $6750)), ($6751, $6752, $6753, $6754, $6755, $6756, $6757, $6758, $6759, $6760, $6761, $6762, $6763, $6764, $6765, $6766, $6767, $6768, $6769, $6770, $6771, $6772, $6773, $6774, $6775, $6776, $6777, $6778, VersionRange($6779, $6780)), ($6781, $6782, $6783, $6784, $6785, $6786, $6787, $6788, $6789, $6790, $6791, $6792, $6793, $6794, $6795, $6796, $6797, $6798, $6799, $6800, $6801, $6802, $6803, $6804, $6805, $6806, $6807, $6808, VersionRange($6809, $6810)), ($6811, $6812, $6813, $6814, $6815, $6816, $6817, $6818, $6819, $6820, $6821, $6822, $6823, $6824, $6825, $6826, $6827, $6828, $6829, $6830, $6831, $6832, $6833, $6834, $6835, $6836, $6837, $6838, VersionRange($6839, $6840)), ($6841, $6842, $6843, $6844, $6845, $6846, $6847, $6848, $6849, $6850, $6851, $6852, $6853, $6854, $6855, $6856, $6857, $6858, $6859, $6860, $6861, $6862, $6863, $6864, $6865, $6866, $6867, $6868, VersionRange($6869, $6870)), ($6871, $6872, $6873, $6874, $6875, $6876, $6877, $6878, $6879, $6880, $6881, $6882, $6883, $6884, $6885, $6886, $6887, $6888, $6889, $6890, $6891, $6892, $6893, $6894, $6895, $6896, $6897, $6898, VersionRange($6899, $6900)), ($6901, $6902, $6903, $6904, $6905, $6906, $6907, $6908, $6909, $6910, $6911, $6912, $6913, $6914, $6915, $6916, $6917, $6918, $6919, $6920, $6921, $6922, $6923, $6924, $6925, $6926, $6927, $6928, VersionRange($6929, $6930)), ($6931, $6932, $6933, $6934, $6935, $6936, $6937, $6938, $6939, $6940, $6941, $6942, $6943, $6944, $6945, $6946, $6947, $6948, $6949, $6950, $6951, $6952, $6953, $6954, $6955, $6956, $6957, $6958, VersionRange($6959, $6960)), ($6961, $6962, $6963, $6964, $6965, $6966, $6967, $6968, $6969, $6970, $6971, $6972, $6973, $6974, $6975, $6976, $6977, $6978, $6979, $6980, $6981, $6982, $6983, $6984, $6985, $6986, $6987, $6988, VersionRange($6989, $6990)), ($6991, $6992, $6993, $6994, $6995, $6996, $6997, $6998, $6999, $7000, $7001, $7002, $7003, $7004, $7005, $7006, $7007, $7008, $7009, $7010, $7011, $7012, $7013, $7014, $7015, $7016, $7017, $7018, VersionRange($7019, $7020)), ($7021, $7022, $7023, $7024, $7025, $7026, $7027, $7028, $7029, $7030, $7031, $7032, $7033, $7034, $7035, $7036, $7037, $7038, $7039, $7040, $7041, $7042, $7043, $7044, $7045, $7046, $7047, $7048, VersionRange($7049, $7050)), ($7051, $7052, $7053, $7054, $7055, $7056, $7057, $7058, $7059, $7060, $7061, $7062, $7063, $7064, $7065, $7066, $7067, $7068, $7069, $7070, $7071, $7072, $7073, $7074, $7075, $7076, $7077, $7078, VersionRange($7079, $7080)), ($7081, $7082, $7083, $7084, $7085, $7086, $7087, $7088, $7089, $7090, $7091, $7092, $7093, $7094, $7095, $7096, $7097, $7098, $7099, $7100, $7101, $7102, $7103, $7104, $7105, $7106, $7107, $7108, VersionRange($7109, $7110)), ($7111, $7112, $7113, $7114, $7115, $7116, $7117, $7118, $7119, $7120, $7121, $7122, $7123, $7124, $7125, $7126, $7127, $7128, $7129, $7130, $7131, $7132, $7133, $7134, $7135, $7136, $7137, $7138, VersionRange($7139, $7140)), ($7141, $7142, $7143, $7144, $7145, $7146, $7147, $7148, $7149, $7150, $7151, $7152, $7153, $7154, $7155, $7156, $7157, $7158, $7159, $7160, $7161, $7162, $7163, $7164, $7165, $7166, $7167, $7168, VersionRange($7169, $7170)), ($7171, $7172, $7173, $7174, $7175, $7176, $7177, $7178, $7179, $7180, $7181, $7182, $7183, $7184, $7185, $7186, $7187, $7188, $7189, $7190, $7191, $7192, $7193, $7194, $7195, $7196, $7197, $7198, VersionRange($7199, $7200)), ($7201, $7202, $7203, $7204, $7205, $7206, $7207, $7208, $7209, $7210, $7211, $7212, $7213, $7214, $7215, $7216, $7217, $7218, $7219, $7220, $7221, $7222, $7223, $7224, $7225, $7226, $7227, $7228, VersionRange($7229, $7230)), ($7231, $7232, $7233, $7234, $7235, $7236, $7237, $7238, $7239, $7240, $7241, $7242, $7243, $7244, $7245, $7246, $7247, $7248, $7249, $7250, $7251, $7252, $7253, $7254, $7255, $7256, $7257, $7258, VersionRange($7259, $7260)), ($7261, $7262, $7263, $7264, $7265, $7266, $7267, $7268, $7269, $7270, $7271, $7272, $7273, $7274, $7275, $7276, $7277, $7278, $7279, $7280, $7281, $7282, $7283, $7284, $7285, $7286, $7287, $7288, VersionRange($7289, $7290)), ($7291, $7292, $7293, $7294, $7295, $7296, $7297, $7298, $7299, $7300, $7301, $7302, $7303, $7304, $7305, $7306, $7307, $7308, $7309, $7310, $7311, $7312, $7313, $7314, $7315, $7316, $7317, $7318, VersionRange($7319, $7320)), ($7321, $7322, $7323, $7324, $7325, $7326, $7327, $7328, $7329, $7330, $7331, $7332, $7333, $7334, $7335, $7336, $7337, $7338, $7339, $7340, $7341, $7342, $7343, $7344, $7345, $7346, $7347, $7348, VersionRange($7349, $7350)), ($7351, $7352, $7353, $7354, $7355, $7356, $7357, $7358, $7359, $7360, $7361, $7362, $7363, $7364, $7365, $7366, $7367, $7368, $7369, $7370, $7371, $7372, $7373, $7374, $7375, $7376, $7377, $7378, VersionRange($7379, $7380)), ($7381, $7382, $7383, $7384, $7385, $7386, $7387, $7388, $7389, $7390, $7391, $7392, $7393, $7394, $7395, $7396, $7397, $7398, $7399, $7400, $7401, $7402, $7403, $7404, $7405, $7406, $7407, $7408, VersionRange($7409, $7410)), ($7411, $7412, $7413, $7414, $7415, $7416, $7417, $7418, $7419, $7420, $7421, $7422, $7423, $7424, $7425, $7426, $7427, $7428, $7429, $7430, $7431, $7432, $7433, $7434, $7435, $7436, $7437, $7438, VersionRange($7439, $7440)), ($7441, $7442, $7443, $7444, $7445, $7446, $7447, $7448, $7449, $7450, $7451, $7452, $7453, $7454, $7455, $7456, $7457, $7458, $7459, $7460, $7461, $7462, $7463, $7464, $7465, $7466, $7467, $7468, VersionRange($7469, $7470)), ($7471, $7472, $7473, $7474, $7475, $7476, $7477, $7478, $7479, $7480, $7481, $7482, $7483, $7484, $7485, $7486, $7487, $7488, $7489, $7490, $7491, $7492, $7493, $7494, $7495, $7496, $7497, $7498, VersionRange($7499, $7500)), ($7501, $7502, $7503, $7504, $7505, $7506, $7507, $7508, $7509, $7510, $7511, $7512, $7513, $7514, $7515, $7516, $7517, $7518, $7519, $7520, $7521, $7522, $7523, $7524, $7525, $7526, $7527, $7528, VersionRange($7529, $7530)), ($7531, $7532, $7533, $7534, $7535, $7536, $7537, $7538, $7539, $7540, $7541, $7542, $7543, $7544, $7545, $7546, $7547, $7548, $7549, $7550, $7551, $7552, $7553, $7554, $7555, $7556, $7557, $7558, VersionRange($7559, $7560)), ($7561, $7562, $7563, $7564, $7565, $7566, $7567, $7568, $7569, $7570, $7571, $7572, $7573, $7574, $7575, $7576, $7577, $7578, $7579, $7580, $7581, $7582, $7583, $7584, $7585, $7586, $7587, $7588, VersionRange($7589, $7590)), ($7591, $7592, $7593, $7594, $7595, $7596, $7597, $7598, $7599, $7600, $7601, $7602, $7603, $7604, $7605, $7606, $7607, $7608, $7609, $7610, $7611, $7612, $7613, $7614, $7615, $7616, $7617, $7618, VersionRange($7619, $7620)), ($7621, $7622, $7623, $7624, $7625, $7626, $7627, $7628, $7629, $7630, $7631, $7632, $7633, $7634, $7635, $7636, $7637, $7638, $7639, $7640, $7641, $7642, $7643, $7644, $7645, $7646, $7647, $7648, VersionRange($7649, $7650)), ($7651, $7652, $7653, $7654, $7655, $7656, $7657, $7658, $7659, $7660, $7661, $7662, $7663, $7664, $7665, $7666, $7667, $7668, $7669, $7670, $7671, $7672, $7673, $7674, $7675, $7676, $7677, $7678, VersionRange($7679, $7680)), ($7681, $7682, $7683, $7684, $7685, $7686, $7687, $7688, $7689, $7690, $7691, $7692, $7693, $7694, $7695, $7696, $7697, $7698, $7699, $7700, $7701, $7702, $7703, $7704, $7705, $7706, $7707, $7708, VersionRange($7709, $7710)), ($7711, $7712, $7713, $7714, $7715, $7716, $7717, $7718, $7719, $7720, $7721, $7722, $7723, $7724, $7725, $7726, $7727, $7728, $7729, $7730, $7731, $7732, $7733, $7734, $7735, $7736, $7737, $7738, VersionRange($7739, $7740)), ($7741, $7742, $7743, $7744, $7745, $7746, $7747, $7748, $7749, $7750, $7751, $7752, $7753, $7754, $7755, $7756, $7757, $7758, $7759, $7760, $7761, $7762, $7763, $7764, $7765, $7766, $7767, $7768, VersionRange($7769, $7770)), ($7771, $7772, $7773, $7774, $7775, $7776, $7777, $7778, $7779, $7780, $7781, $7782, $7783, $7784, $7785, $7786, $7787, $7788, $7789, $7790, $7791, $7792, $7793, $7794, $7795, $7796, $7797, $7798, VersionRange($7799, $7800)), ($7801, $7802, $7803, $7804, $7805, $7806, $7807, $7808, $7809, $7810, $7811, $7812, $7813, $7814, $7815, $7816, $7817, $7818, $7819, $7820, $7821, $7822, $7823, $7824, $7825, $7826, $7827, $7828, VersionRange($7829, $7830)), ($7831, $7832, $7833, $7834, $7835, $7836, $7837, $7838, $7839, $7840, $7841, $7842, $7843, $7844, $7845, $7846, $7847, $7848, $7849, $7850, $7851, $7852, $7853, $7854, $7855, $7856, $7857, $7858, VersionRange($7859, $7860)), ($7861, $7862, $7863, $7864, $7865, $7866, $7867, $7868, $7869, $7870, $7871, $7872, $7873, $7874, $7875, $7876, $7877, $7878, $7879, $7880, $7881, $7882, $7883, $7884, $7885, $7886, $7887, $7888, VersionRange($7889, $7890)), ($7891, $7892, $7893, $7894, $7895, $7896, $7897, $7898, $7899, $7900, $7901, $7902, $7903, $7904, $7905, $7906, $7907, $7908, $7909, $7910, $7911, $7912, $7913, $7914, $7915, $7916, $7917, $7918, VersionRange($7919, $7920)), ($7921, $7922, $7923, $7924, $7925, $7926, $7927, $7928, $7929, $7930, $7931, $7932, $7933, $7934, $7935, $7936, $7937, $7938, $7939, $7940, $7941, $7942, $7943, $7944, $7945, $7946, $7947, $7948, VersionRange($7949, $7950)), ($7951, $7952, $7953, $7954, $7955, $7956, $7957, $7958, $7959, $7960, $7961, $7962, $7963, $7964, $7965, $7966, $7967, $7968, $7969, $7970, $7971, $7972, $7973, $7974, $7975, $7976, $7977, $7978, VersionRange($7979, $7980)), ($7981, $7982, $7983, $7984, $7985, $7986, $7987, $7988, $7989, $7990, $7991, $7992, $7993, $7994, $7995, $7996, $7997, $7998, $7999, $8000, $8001, $8002, $8003, $8004, $8005, $8006, $8007, $8008, VersionRange($8009, $8010)), ($8011, $8012, $8013, $8014, $8015, $8016, $8017, $8018, $8019, $8020, $8021, $8022, $8023, $8024, $8025, $8026, $8027, $8028, $8029, $8030, $8031, $8032, $8033, $8034, $8035, $8036, $8037, $8038, VersionRange($8039, $8040)), ($8041, $8042, $8043, $8044, $8045, $8046, $8047, $8048, $8049, $8050, $8051, $8052, $8053, $8054, $8055, $8056, $8057, $8058, $8059, $8060, $8061, $8062, $8063, $8064, $8065, $8066, $8067, $8068, VersionRange($8069, $8070)), ($8071, $8072, $8073, $8074, $8075, $8076, $8077, $8078, $8079, $8080, $8081, $8082, $8083, $8084, $8085, $8086, $8087, $8088, $8089, $8090, $8091, $8092, $8093, $8094, $8095, $8096, $8097, $8098, VersionRange($8099, $8100)), ($8101, $8102, $8103, $8104, $8105, $8106, $8107, $8108, $8109, $8110, $8111, $8112, $8113, $8114, $8115, $8116, $8117, $8118, $8119, $8120, $8121, $8122, $8123, $8124, $8125, $8126, $8127, $8128, VersionRange($8129, $8130)), ($8131, $8132, $8133, $8134, $8135, $8136, $8137, $8138, $8139, $8140, $8141, $8142, $8143, $8144, $8145, $8146, $8147, $8148, $8149, $8150, $8151, $8152, $8153, $8154, $8155, $8156, $8157, $8158, VersionRange($8159, $8160)), ($8161, $8162, $8163, $8164, $8165, $8166, $8167, $8168, $8169, $8170, $8171, $8172, $8173, $8174, $8175, $8176, $8177, $8178, $8179, $8180, $8181, $8182, $8183, $8184, $8185, $8186, $8187, $8188, VersionRange($8189, $8190)), ($8191, $8192, $8193, $8194, $8195, $8196, $8197, $8198, $8199, $8200, $8201, $8202, $8203, $8204, $8205, $8206, $8207, $8208, $8209, $8210, $8211, $8212, $8213, $8214, $8215, $8216, $8217, $8218, VersionRange($8219, $8220)), ($8221, $8222, $8223, $8224, $8225, $8226, $8227, $8228, $8229, $8230, $8231, $8232, $8233, $8234, $8235, $8236, $8237, $8238, $8239, $8240, $8241, $8242, $8243, $8244, $8245, $8246, $8247, $8248, VersionRange($8249, $8250)), ($8251, $8252, $8253, $8254, $8255, $8256, $8257, $8258, $8259, $8260, $8261, $8262, $8263, $8264, $8265, $8266, $8267, $8268, $8269, $8270, $8271, $8272, $8273, $8274, $8275, $8276, $8277, $8278, VersionRange($8279, $8280)), ($8281, $8282, $8283, $8284, $8285, $8286, $8287, $8288, $8289, $8290, $8291, $8292, $8293, $8294, $8295, $8296, $8297, $8298, $8299, $8300, $8301, $8302, $8303, $8304, $8305, $8306, $8307, $8308, VersionRange($8309, $8310)), ($8311, $8312, $8313, $8314, $8315, $8316, $8317, $8318, $8319, $8320, $8321, $8322, $8323, $8324, $8325, $8326, $8327, $8328, $8329, $8330, $8331, $8332, $8333, $8334, $8335, $8336, $8337, $8338, VersionRange($8339, $8340)), ($8341, $8342, $8343, $8344, $8345, $8346, $8347, $8348, $8349, $8350, $8351, $8352, $8353, $8354, $8355, $8356, $8357, $8358, $8359, $8360, $8361, $8362, $8363, $8364, $8365, $8366, $8367, $8368, VersionRange($8369, $8370)), ($8371, $8372, $8373, $8374, $8375, $8376, $8377, $8378, $8379, $8380, $8381, $8382, $8383, $8384, $8385, $8386, $8387, $8388, $8389, $8390, $8391, $8392, $8393, $8394, $8395, $8396, $8397, $8398, VersionRange($8399, $8400)), ($8401, $8402, $8403, $8404, $8405, $8406, $8407, $8408, $8409, $8410, $8411, $8412, $8413, $8414, $8415, $8416, $8417, $8418, $8419, $8420, $8421, $8422, $8423, $8424, $8425, $8426, $8427, $8428, VersionRange($8429, $8430)), ($8431, $8432, $8433, $8434, $8435, $8436, $8437, $8438, $8439, $8440, $8441, $8442, $8443, $8444, $8445, $8446, $8447, $8448, $8449, $8450, $8451, $8452, $8453, $8454, $8455, $8456, $8457, $8458, VersionRange($8459, $8460)), ($8461, $8462, $8463, $8464, $8465, $8466, $8467, $8468, $8469, $8470, $8471, $8472, $8473, $8474, $8475, $8476, $8477, $8478, $8479, $8480, $8481, $8482, $8483, $8484, $8485, $8486, $8487, $8488, VersionRange($8489, $8490)), ($8491, $8492, $8493, $8494, $8495, $8496, $8497, $8498, $8499, $8500, $8501, $8502, $8503, $8504, $8505, $8506, $8507, $8508, $8509, $8510, $8511, $8512, $8513, $8514, $8515, $8516, $8517, $8518, VersionRange($8519, $8520)), ($8521, $8522, $8523, $8524, $8525, $8526, $8527, $8528, $8529, $8530, $8531, $8532, $8533, $8534, $8535, $8536, $8537, $8538, $8539, $8540, $8541, $8542, $8543, $8544, $8545, $8546, $8547, $8548, VersionRange($8549, $8550)), ($8551, $8552, $8553, $8554, $8555, $8556, $8557, $8558, $8559, $8560, $8561, $8562, $8563, $8564, $8565, $8566, $8567, $8568, $8569, $8570, $8571, $8572, $8573, $8574, $8575, $8576, $8577, $8578, VersionRange($8579, $8580)), ($8581, $8582, $8583, $8584, $8585, $8586, $8587, $8588, $8589, $8590, $8591, $8592, $8593, $8594, $8595, $8596, $8597, $8598, $8599, $8600, $8601, $8602, $8603, $8604, $8605, $8606, $8607, $8608, VersionRange($8609, $8610)), ($8611, $8612, $8613, $8614, $8615, $8616, $8617, $8618, $8619, $8620, $8621, $8622, $8623, $8624, $8625, $8626, $8627, $8628, $8629, $8630, $8631, $8632, $8633, $8634, $8635, $8636, $8637, $8638, VersionRange($8639, $8640)), ($8641, $8642, $8643, $8644, $8645, $8646, $8647, $8648, $8649, $8650, $8651, $8652, $8653, $8654, $8655, $8656, $8657, $8658, $8659, $8660, $8661, $8662, $8663, $8664, $8665, $8666, $8667, $8668, VersionRange($8669, $8670)), ($8671, $8672, $8673, $8674, $8675, $8676, $8677, $8678, $8679, $8680, $8681, $8682, $8683, $8684, $8685, $8686, $8687, $8688, $8689, $8690, $8691, $8692, $8693, $8694, $8695, $8696, $8697, $8698, VersionRange($8699, $8700)), ($8701, $8702, $8703, $8704, $8705, $8706, $8707, $8708, $8709, $8710, $8711, $8712, $8713, $8714, $8715, $8716, $8717, $8718, $8719, $8720, $8721, $8722, $8723, $8724, $8725, $8726, $8727, $8728, VersionRange($8729, $8730)), ($8731, $8732, $8733, $8734, $8735, $8736, $8737, $8738, $8739, $8740, $8741, $8742, $8743, $8744, $8745, $8746, $8747, $8748, $8749, $8750, $8751, $8752, $8753, $8754, $8755, $8756, $8757, $8758, VersionRange($8759, $8760)), ($8761, $8762, $8763, $8764, $8765, $8766, $8767, $8768, $8769, $8770, $8771, $8772, $8773, $8774, $8775, $8776, $8777, $8778, $8779, $8780, $8781, $8782, $8783, $8784, $8785, $8786, $8787, $8788, VersionRange($8789, $8790)), ($8791, $8792, $8793, $8794, $8795, $8796, $8797, $8798, $8799, $8800, $8801, $8802, $8803, $8804, $8805, $8806, $8807, $8808, $8809, $8810, $8811, $8812, $8813, $8814, $8815, $8816, $8817, $8818, VersionRange($8819, $8820)), ($8821, $8822, $8823, $8824, $8825, $8826, $8827, $8828, $8829, $8830, $8831, $8832, $8833, $8834, $8835, $8836, $8837, $8838, $8839, $8840, $8841, $8842, $8843, $8844, $8845, $8846, $8847, $8848, VersionRange($8849, $8850)), ($8851, $8852, $8853, $8854, $8855, $8856, $8857, $8858, $8859, $8860, $8861, $8862, $8863, $8864, $8865, $8866, $8867, $8868, $8869, $8870, $8871, $8872, $8873, $8874, $8875, $8876, $8877, $8878, VersionRange($8879, $8880)), ($8881, $8882, $8883, $8884, $8885, $8886, $8887, $8888, $8889, $8890, $8891, $8892, $8893, $8894, $8895, $8896, $8897, $8898, $8899, $8900, $8901, $8902, $8903, $8904, $8905, $8906, $8907, $8908, VersionRange($8909, $8910)), ($8911, $8912, $8913, $8914, $8915, $8916, $8917, $8918, $8919, $8920, $8921, $8922, $8923, $8924, $8925, $8926, $8927, $8928, $8929, $8930, $8931, $8932, $8933, $8934, $8935, $8936, $8937, $8938, VersionRange($8939, $8940)), ($8941, $8942, $8943, $8944, $8945, $8946, $8947, $8948, $8949, $8950, $8951, $8952, $8953, $8954, $8955, $8956, $8957, $8958, $8959, $8960, $8961, $8962, $8963, $8964, $8965, $8966, $8967, $8968, VersionRange($8969, $8970)), ($8971, $8972, $8973, $8974, $8975, $8976, $8977, $8978, $8979, $8980, $8981, $8982, $8983, $8984, $8985, $8986, $8987, $8988, $8989, $8990, $8991, $8992, $8993, $8994, $8995, $8996, $8997, $8998, VersionRange($8999, $9000)), ($9001, $9002, $9003, $9004, $9005, $9006, $9007, $9008, $9009, $9010, $9011, $9012, $9013, $9014, $9015, $9016, $9017, $9018, $9019, $9020, $9021, $9022, $9023, $9024, $9025, $9026, $9027, $9028, VersionRange($9029, $9030)), ($9031, $9032, $9033, $9034, $9035, $9036, $9037, $9038, $9039, $9040, $9041, $9042, $9043, $9044, $9045, $9046, $9047, $9048, $9049, $9050, $9051, $9052, $9053, $9054, $9055, $9056, $9057, $9058, VersionRange($9059, $9060)), ($9061, $9062, $9063, $9064, $9065, $9066, $9067, $9068, $9069, $9070, $9071, $9072, $9073, $9074, $9075, $9076, $9077, $9078, $9079, $9080, $9081, $9082, $9083, $9084, $9085, $9086, $9087, $9088, VersionRange($9089, $9090)), ($9091, $9092, $9093, $9094, $9095, $9096, $9097, $9098, $9099, $9100, $9101, $9102, $9103, $9104, $9105, $9106, $9107, $9108, $9109, $9110, $9111, $9112, $9113, $9114, $9115, $9116, $9117, $9118, VersionRange($9119, $9120)), ($9121, $9122, $9123, $9124, $9125, $9126, $9127, $9128, $9129, $9130, $9131, $9132, $9133, $9134, $9135, $9136, $9137, $9138, $9139, $9140, $9141, $9142, $9143, $9144, $9145, $9146, $9147, $9148, VersionRange($9149, $9150)), ($9151, $9152, $9153, $9154, $9155, $9156, $9157, $9158, $9159, $9160, $9161, $9162, $9163, $9164, $9165, $9166, $9167, $9168, $9169, $9170, $9171, $9172, $9173, $9174, $9175, $9176, $9177, $9178, VersionRange($9179, $9180)), ($9181, $9182, $9183, $9184, $9185, $9186, $9187, $9188, $9189, $9190, $9191, $9192, $9193, $9194, $9195, $9196, $9197, $9198, $9199, $9200, $9201, $9202, $9203, $9204, $9205, $9206, $9207, $9208, VersionRange($9209, $9210)), ($9211, $9212, $9213, $9214, $9215, $9216, $9217, $9218, $9219, $9220, $9221, $9222, $9223, $9224, $9225, $9226, $9227, $9228, $9229, $9230, $9231, $9232, $9233, $9234, $9235, $9236, $9237, $9238, VersionRange($9239, $9240)), ($9241, $9242, $9243, $9244, $9245, $9246, $9247, $9248, $9249, $9250, $9251, $9252, $9253, $9254, $9255, $9256, $9257, $9258, $9259, $9260, $9261, $9262, $9263, $9264, $9265, $9266, $9267, $9268, VersionRange($9269, $9270)), ($9271, $9272, $9273, $9274, $9275, $9276, $9277, $9278, $9279, $9280, $9281, $9282, $9283, $9284, $9285, $9286, $9287, $9288, $9289, $9290, $9291, $9292, $9293, $9294, $9295, $9296, $9297, $9298, VersionRange($9299, $9300)), ($9301, $9302, $9303, $9304, $9305, $9306, $9307, $9308, $9309, $9310, $9311, $9312, $9313, $9314, $9315, $9316, $9317, $9318, $9319, $9320, $9321, $9322, $9323, $9324, $9325, $9326, $9327, $9328, VersionRange($9329, $9330)), ($9331, $9332, $9333, $9334, $9335, $9336, $9337, $9338, $9339, $9340, $9341, $9342, $9343, $9344, $9345, $9346, $9347, $9348, $9349, $9350, $9351, $9352, $9353, $9354, $9355, $9356, $9357, $9358, VersionRange($9359, $9360)), ($9361, $9362, $9363, $9364, $9365, $9366, $9367, $9368, $9369, $9370, $9371, $9372, $9373, $9374, $9375, $9376, $9377, $9378, $9379, $9380, $9381, $9382, $9383, $9384, $9385, $9386, $9387, $9388, VersionRange($9389, $9390)), ($9391, $9392, $9393, $9394, $9395, $9396, $9397, $9398, $9399, $9400, $9401, $9402, $9403, $9404, $9405, $9406, $9407, $9408, $9409, $9410, $9411, $9412, $9413, $9414, $9415, $9416, $9417, $9418, VersionRange($9419, $9420)), ($9421, $9422, $9423, $9424, $9425, $9426, $9427, $9428, $9429, $9430, $9431, $9432, $9433, $9434, $9435, $9436, $9437, $9438, $9439, $9440, $9441, $9442, $9443, $9444, $9445, $9446, $9447, $9448, VersionRange($9449, $9450)), ($9451, $9452, $9453, $9454, $9455, $9456, $9457, $9458, $9459, $9460, $9461, $9462, $9463, $9464, $9465, $9466, $9467, $9468, $9469, $9470, $9471, $9472, $9473, $9474, $9475, $9476, $9477, $9478, VersionRange($9479, $9480)), ($9481, $9482, $9483, $9484, $9485, $9486, $9487, $9488, $9489, $9490, $9491, $9492, $9493, $9494, $9495, $9496, $9497, $9498, $9499, $9500, $9501, $9502, $9503, $9504, $9505, $9506, $9507, $9508, VersionRange($9509, $9510)), ($9511, $9512, $9513, $9514, $9515, $9516, $9517, $9518, $9519, $9520, $9521, $9522, $9523, $9524, $9525, $9526, $9527, $9528, $9529, $9530, $9531, $9532, $9533, $9534, $9535, $9536, $9537, $9538, VersionRange($9539, $9540)), ($9541, $9542, $9543, $9544, $9545, $9546, $9547, $9548, $9549, $9550, $9551, $9552, $9553, $9554, $9555, $9556, $9557, $9558, $9559, $9560, $9561, $9562, $9563, $9564, $9565, $9566, $9567, $9568, VersionRange($9569, $9570)), ($9571, $9572, $9573, $9574, $9575, $9576, $9577, $9578, $9579, $9580, $9581, $9582, $9583, $9584, $9585, $9586, $9587, $9588, $9589, $9590, $9591, $9592, $9593, $9594, $9595, $9596, $9597, $9598, VersionRange($9599, $9600)), ($9601, $9602, $9603, $9604, $9605, $9606, $9607, $9608, $9609, $9610, $9611, $9612, $9613, $9614, $9615, $9616, $9617, $9618, $9619, $9620, $9621, $9622, $9623, $9624, $9625, $9626, $9627, $9628, VersionRange($9629, $9630)), ($9631, $9632, $9633, $9634, $9635, $9636, $9637, $9638, $9639, $9640, $9641, $9642, $9643, $9644, $9645, $9646, $9647, $9648, $9649, $9650, $9651, $9652, $9653, $9654, $9655, $9656, $9657, $9658, VersionRange($9659, $9660)), ($9661, $9662, $9663, $9664, $9665, $9666, $9667, $9668, $9669, $9670, $9671, $9672, $9673, $9674, $9675, $9676, $9677, $9678, $9679, $9680, $9681, $9682, $9683, $9684, $9685, $9686, $9687, $9688, VersionRange($9689, $9690)), ($9691, $9692, $9693, $9694, $9695, $9696, $9697, $9698, $9699, $9700, $9701, $9702, $9703, $9704, $9705, $9706, $9707, $9708, $9709, $9710, $9711, $9712, $9713, $9714, $9715, $9716, $9717, $9718, VersionRange($9719, $9720)), ($9721, $9722, $9723, $9724, $9725, $9726, $9727, $9728, $9729, $9730, $9731, $9732, $9733, $9734, $9735, $9736, $9737, $9738, $9739, $9740, $9741, $9742, $9743, $9744, $9745, $9746, $9747, $9748, VersionRange($9749, $9750)), ($9751, $9752, $9753, $9754, $9755, $9756, $9757, $9758, $9759, $9760, $9761, $9762, $9763, $9764, $9765, $9766, $9767, $9768, $9769, $9770, $9771, $9772, $9773, $9774, $9775, $9776, $9777, $9778, VersionRange($9779, $9780)), ($9781, $9782, $9783, $9784, $9785, $9786, $9787, $9788, $9789, $9790, $9791, $9792, $9793, $9794, $9795, $9796, $9797, $9798, $9799, $9800, $9801, $9802, $9803, $9804, $9805, $9806, $9807, $9808, VersionRange($9809, $9810)), ($9811, $9812, $9813, $9814, $9815, $9816, $9817, $9818, $9819, $9820, $9821, $9822, $9823, $9824, $9825, $9826, $9827, $9828, $9829, $9830, $9831, $9832, $9833, $9834, $9835, $9836, $9837, $9838, VersionRange($9839, $9840)), ($9841, $9842, $9843, $9844, $9845, $9846, $9847, $9848, $9849, $9850, $9851, $9852, $9853, $9854, $9855, $9856, $9857, $9858, $9859, $9860, $9861, $9862, $9863, $9864, $9865, $9866, $9867, $9868, VersionRange($9869, $9870)), ($9871, $9872, $9873, $9874, $9875, $9876, $9877, $9878, $9879, $9880, $9881, $9882, $9883, $9884, $9885, $9886, $9887, $9888, $9889, $9890, $9891, $9892, $9893, $9894, $9895, $9896, $9897, $9898, VersionRange($9899, $9900)), ($9901, $9902, $9903, $9904, $9905, $9906, $9907, $9908, $9909, $9910, $9911, $9912, $9913, $9914, $9915, $9916, $9917, $9918, $9919, $9920, $9921, $9922, $9923, $9924, $9925, $9926, $9927, $9928, VersionRange($9929, $9930)), ($9931, $9932, $9933, $9934, $9935, $9936, $9937, $9938, $9939, $9940, $9941, $9942, $9943, $9944, $9945, $9946, $9947, $9948, $9949, $9950, $9951, $9952, $9953, $9954, $9955, $9956, $9957, $9958, VersionRange($9959, $9960)), ($9961, $9962, $9963, $9964, $9965, $9966, $9967, $9968, $9969, $9970, $9971, $9972, $9973, $9974, $9975, $9976, $9977, $9978, $9979, $9980, $9981, $9982, $9983, $9984, $9985, $9986, $9987, $9988, VersionRange($9989, $9990)), ($9991, $9992, $9993, $9994, $9995, $9996, $9997, $9998, $9999, $10000, $10001, $10002, $10003, $10004, $10005, $10006, $10007, $10008, $10009, $10010, $10011, $10012, $10013, $10014, $10015, $10016, $10017, $10018, VersionRange($10019, $10020)), ($10021, $10022, $10023, $10024, $10025, $10026, $10027, $10028, $10029, $10030, $10031, $10032, $10033, $10034, $10035, $10036, $10037, $10038, $10039, $10040, $10041, $10042, $10043, $10044, $10045, $10046, $10047, $10048, VersionRange($10049, $10050)), ($10051, $10052, $10053, $10054, $10055, $10056, $10057, $10058, $10059, $10060, $10061, $10062, $10063, $10064, $10065, $10066, $10067, $10068, $10069, $10070, $10071, $10072, $10073, $10074, $10075, $10076, $10077, $10078, VersionRange($10079, $10080)), ($10081, $10082, $10083, $10084, $10085, $10086, $10087, $10088, $10089, $10090, $10091, $10092, $10093, $10094, $10095, $10096, $10097, $10098, $10099, $10100, $10101, $10102, $10103, $10104, $10105, $10106, $10107, $10108, VersionRange($10109, $10110)), ($10111, $10112, $10113, $10114, $10115, $10116, $10117, $10118, $10119, $10120, $10121, $10122, $10123, $10124, $10125, $10126, $10127, $10128, $10129, $10130, $10131, $10132, $10133, $10134, $10135, $10136, $10137, $10138, VersionRange($10139, $10140)), ($10141, $10142, $10143, $10144, $10145, $10146, $10147, $10148, $10149, $10150, $10151, $10152, $10153, $10154, $10155, $10156, $10157, $10158, $10159, $10160, $10161, $10162, $10163, $10164, $10165, $10166, $10167, $10168, VersionRange($10169, $10170)), ($10171, $10172, $10173, $10174, $10175, $10176, $10177, $10178, $10179, $10180, $10181, $10182, $10183, $10184, $10185, $10186, $10187, $10188, $10189, $10190, $10191, $10192, $10193, $10194, $10195, $10196, $10197, $10198, VersionRange($10199, $10200)), ($10201, $10202, $10203, $10204, $10205, $10206, $10207, $10208, $10209, $10210, $10211, $10212, $10213, $10214, $10215, $10216, $10217, $10218, $10219, $10220, $10221, $10222, $10223, $10224, $10225, $10226, $10227, $10228, VersionRange($10229, $10230)), ($10231, $10232, $10233, $10234, $10235, $10236, $10237, $10238, $10239, $10240, $10241, $10242, $10243, $10244, $10245, $10246, $10247, $10248, $10249, $10250, $10251, $10252, $10253, $10254, $10255, $10256, $10257, $10258, VersionRange($10259, $10260)), ($10261, $10262, $10263, $10264, $10265, $10266, $10267, $10268, $10269, $10270, $10271, $10272, $10273, $10274, $10275, $10276, $10277, $10278, $10279, $10280, $10281, $10282, $10283, $10284, $10285, $10286, $10287, $10288, VersionRange($10289, $10290)), ($10291, $10292, $10293, $10294, $10295, $10296, $10297, $10298, $10299, $10300, $10301, $10302, $10303, $10304, $10305, $10306, $10307, $10308, $10309, $10310, $10311, $10312, $10313, $10314, $10315, $10316, $10317, $10318, VersionRange($10319, $10320)), ($10321, $10322, $10323, $10324, $10325, $10326, $10327, $10328, $10329, $10330, $10331, $10332, $10333, $10334, $10335, $10336, $10337, $10338, $10339, $10340, $10341, $10342, $10343, $10344, $10345, $10346, $10347, $10348, VersionRange($10349, $10350)), ($10351, $10352, $10353, $10354, $10355, $10356, $10357, $10358, $10359, $10360, $10361, $10362, $10363, $10364, $10365, $10366, $10367, $10368, $10369, $10370, $10371, $10372, $10373, $10374, $10375, $10376, $10377, $10378, VersionRange($10379, $10380)), ($10381, $10382, $10383, $10384, $10385, $10386, $10387, $10388, $10389, $10390, $10391, $10392, $10393, $10394, $10395, $10396, $10397, $10398, $10399, $10400, $10401, $10402, $10403, $10404, $10405, $10406, $10407, $10408, VersionRange($10409, $10410)), ($10411, $10412, $10413, $10414, $10415, $10416, $10417, $10418, $10419, $10420, $10421, $10422, $10423, $10424, $10425, $10426, $10427, $10428, $10429, $10430, $10431, $10432, $10433, $10434, $10435, $10436, $10437, $10438, VersionRange($10439, $10440)), ($10441, $10442, $10443, $10444, $10445, $10446, $10447, $10448, $10449, $10450, $10451, $10452, $10453, $10454, $10455, $10456, $10457, $10458, $10459, $10460, $10461, $10462, $10463, $10464, $10465, $10466, $10467, $10468, VersionRange($10469, $10470)), ($10471, $10472, $10473, $10474, $10475, $10476, $10477, $10478, $10479, $10480, $10481, $10482, $10483, $10484, $10485, $10486, $10487, $10488, $10489, $10490, $10491, $10492, $10493, $10494, $10495, $10496, $10497, $10498, VersionRange($10499, $10500)), ($10501, $10502, $10503, $10504, $10505, $10506, $10507, $10508, $10509, $10510, $10511, $10512, $10513, $10514, $10515, $10516, $10517, $10518, $10519, $10520, $10521, $10522, $10523, $10524, $10525, $10526, $10527, $10528, VersionRange($10529, $10530)), ($10531, $10532, $10533, $10534, $10535, $10536, $10537, $10538, $10539, $10540, $10541, $10542, $10543, $10544, $10545, $10546, $10547, $10548, $10549, $10550, $10551, $10552, $10553, $10554, $10555, $10556, $10557, $10558, VersionRange($10559, $10560)), ($10561, $10562, $10563, $10564, $10565, $10566, $10567, $10568, $10569, $10570, $10571, $10572, $10573, $10574, $10575, $10576, $10577, $10578, $10579, $10580, $10581, $10582, $10583, $10584, $10585, $10586, $10587, $10588, VersionRange($10589, $10590)), ($10591, $10592, $10593, $10594, $10595, $10596, $10597, $10598, $10599, $10600, $10601, $10602, $10603, $10604, $10605, $10606, $10607, $10608, $10609, $10610, $10611, $10612, $10613, $10614, $10615, $10616, $10617, $10618, VersionRange($10619, $10620)), ($10621, $10622, $10623, $10624, $10625, $10626, $10627, $10628, $10629, $10630, $10631, $10632, $10633, $10634, $10635, $10636, $10637, $10638, $10639, $10640, $10641, $10642, $10643, $10644, $10645, $10646, $10647, $10648, VersionRange($10649, $10650)), ($10651, $10652, $10653, $10654, $10655, $10656, $10657, $10658, $10659, $10660, $10661, $10662, $10663, $10664, $10665, $10666, $10667, $10668, $10669, $10670, $10671, $10672, $10673, $10674, $10675, $10676, $10677, $10678, VersionRange($10679, $10680)), ($10681, $10682, $10683, $10684, $10685, $10686, $10687, $10688, $10689, $10690, $10691, $10692, $10693, $10694, $10695, $10696, $10697, $10698, $10699, $10700, $10701, $10702, $10703, $10704, $10705, $10706, $10707, $10708, VersionRange($10709, $10710)), ($10711, $10712, $10713, $10714, $10715, $10716, $10717, $10718, $10719, $10720, $10721, $10722, $10723, $10724, $10725, $10726, $10727, $10728, $10729, $10730, $10731, $10732, $10733, $10734, $10735, $10736, $10737, $10738, VersionRange($10739, $10740)), ($10741, $10742, $10743, $10744, $10745, $10746, $10747, $10748, $10749, $10750, $10751, $10752, $10753, $10754, $10755, $10756, $10757, $10758, $10759, $10760, $10761, $10762, $10763, $10764, $10765, $10766, $10767, $10768, VersionRange($10769, $10770)), ($10771, $10772, $10773, $10774, $10775, $10776, $10777, $10778, $10779, $10780, $10781, $10782, $10783, $10784, $10785, $10786, $10787, $10788, $10789, $10790, $10791, $10792, $10793, $10794, $10795, $10796, $10797, $10798, VersionRange($10799, $10800)), ($10801, $10802, $10803, $10804, $10805, $10806, $10807, $10808, $10809, $10810, $10811, $10812, $10813, $10814, $10815, $10816, $10817, $10818, $10819, $10820, $10821, $10822, $10823, $10824, $10825, $10826, $10827, $10828, VersionRange($10829, $10830)), ($10831, $10832, $10833, $10834, $10835, $10836, $10837, $10838, $10839, $10840, $10841, $10842, $10843, $10844, $10845, $10846, $10847, $10848, $10849, $10850, $10851, $10852, $10853, $10854, $10855, $10856, $10857, $10858, VersionRange($10859, $10860)), ($10861, $10862, $10863, $10864, $10865, $10866, $10867, $10868, $10869, $10870, $10871, $10872, $10873, $10874, $10875, $10876, $10877, $10878, $10879, $10880, $10881, $10882, $10883, $10884, $10885, $10886, $10887, $10888, VersionRange($10889, $10890)), ($10891, $10892, $10893, $10894, $10895, $10896, $10897, $10898, $10899, $10900, $10901, $10902, $10903, $10904, $10905, $10906, $10907, $10908, $10909, $10910, $10911, $10912, $10913, $10914, $10915, $10916, $10917, $10918, VersionRange($10919, $10920)), ($10921, $10922, $10923, $10924, $10925, $10926, $10927, $10928, $10929, $10930, $10931, $10932, $10933, $10934, $10935, $10936, $10937, $10938, $10939, $10940, $10941, $10942, $10943, $10944, $10945, $10946, $10947, $10948, VersionRange($10949, $10950)), ($10951, $10952, $10953, $10954, $10955, $10956, $10957, $10958, $10959, $10960, $10961, $10962, $10963, $10964, $10965, $10966, $10967, $10968, $10969, $10970, $10971, $10972, $10973, $10974, $10975, $10976, $10977, $10978, VersionRange($10979, $10980)), ($10981, $10982, $10983, $10984, $10985, $10986, $10987, $10988, $10989, $10990, $10991, $10992, $10993, $10994, $10995, $10996, $10997, $10998, $10999, $11000, $11001, $11002, $11003, $11004, $11005, $11006, $11007, $11008, VersionRange($11009, $11010)), ($11011, $11012, $11013, $11014, $11015, $11016, $11017, $11018, $11019, $11020, $11021, $11022, $11023, $11024, $11025, $11026, $11027, $11028, $11029, $11030, $11031, $11032, $11033, $11034, $11035, $11036, $11037, $11038, VersionRange($11039, $11040)), ($11041, $11042, $11043, $11044, $11045, $11046, $11047, $11048, $11049, $11050, $11051, $11052, $11053, $11054, $11055, $11056, $11057, $11058, $11059, $11060, $11061, $11062, $11063, $11064, $11065, $11066, $11067, $11068, VersionRange($11069, $11070)), ($11071, $11072, $11073, $11074, $11075, $11076, $11077, $11078, $11079, $11080, $11081, $11082, $11083, $11084, $11085, $11086, $11087, $11088, $11089, $11090, $11091, $11092, $11093, $11094, $11095, $11096, $11097, $11098, VersionRange($11099, $11100)), ($11101, $11102, $11103, $11104, $11105, $11106, $11107, $11108, $11109, $11110, $11111, $11112, $11113, $11114, $11115, $11116, $11117, $11118, $11119, $11120, $11121, $11122, $11123, $11124, $11125, $11126, $11127, $11128, VersionRange($11129, $11130)), ($11131, $11132, $11133, $11134, $11135, $11136, $11137, $11138, $11139, $11140, $11141, $11142, $11143, $11144, $11145, $11146, $11147, $11148, $11149, $11150, $11151, $11152, $11153, $11154, $11155, $11156, $11157, $11158, VersionRange($11159, $11160)), ($11161, $11162, $11163, $11164, $11165, $11166, $11167, $11168, $11169, $11170, $11171, $11172, $11173, $11174, $11175, $11176, $11177, $11178, $11179, $11180, $11181, $11182, $11183, $11184, $11185, $11186, $11187, $11188, VersionRange($11189, $11190)), ($11191, $11192, $11193, $11194, $11195, $11196, $11197, $11198, $11199, $11200, $11201, $11202, $11203, $11204, $11205, $11206, $11207, $11208, $11209, $11210, $11211, $11212, $11213, $11214, $11215, $11216, $11217, $11218, VersionRange($11219, $11220)), ($11221, $11222, $11223, $11224, $11225, $11226, $11227, $11228, $11229, $11230, $11231, $11232, $11233, $11234, $11235, $11236, $11237, $11238, $11239, $11240, $11241, $11242, $11243, $11244, $11245, $11246, $11247, $11248, VersionRange($11249, $11250)), ($11251, $11252, $11253, $11254, $11255, $11256, $11257, $11258, $11259, $11260, $11261, $11262, $11263, $11264, $11265, $11266, $11267, $11268, $11269, $11270, $11271, $11272, $11273, $11274, $11275, $11276, $11277, $11278, VersionRange($11279, $11280)), ($11281, $11282, $11283, $11284, $11285, $11286, $11287, $11288, $11289, $11290, $11291, $11292, $11293, $11294, $11295, $11296, $11297, $11298, $11299, $11300, $11301, $11302, $11303, $11304, $11305, $11306, $11307, $11308, VersionRange($11309, $11310)), ($11311, $11312, $11313, $11314, $11315, $11316, $11317, $11318, $11319, $11320, $11321, $11322, $11323, $11324, $11325, $11326, $11327, $11328, $11329, $11330, $11331, $11332, $11333, $11334, $11335, $11336, $11337, $11338, VersionRange($11339, $11340)), ($11341, $11342, $11343, $11344, $11345, $11346, $11347, $11348, $11349, $11350, $11351, $11352, $11353, $11354, $11355, $11356, $11357, $11358, $11359, $11360, $11361, $11362, $11363, $11364, $11365, $11366, $11367, $11368, VersionRange($11369, $11370)), ($11371, $11372, $11373, $11374, $11375, $11376, $11377, $11378, $11379, $11380, $11381, $11382, $11383, $11384, $11385, $11386, $11387, $11388, $11389, $11390, $11391, $11392, $11393, $11394, $11395, $11396, $11397, $11398, VersionRange($11399, $11400)), ($11401, $11402, $11403, $11404, $11405, $11406, $11407, $11408, $11409, $11410, $11411, $11412, $11413, $11414, $11415, $11416, $11417, $11418, $11419, $11420, $11421, $11422, $11423, $11424, $11425, $11426, $11427, $11428, VersionRange($11429, $11430)), ($11431, $11432, $11433, $11434, $11435, $11436, $11437, $11438, $11439, $11440, $11441, $11442, $11443, $11444, $11445, $11446, $11447, $11448, $11449, $11450, $11451, $11452, $11453, $11454, $11455, $11456, $11457, $11458, VersionRange($11459, $11460)), ($11461, $11462, $11463, $11464, $11465, $11466, $11467, $11468, $11469, $11470, $11471, $11472, $11473, $11474, $11475, $11476, $11477, $11478, $11479, $11480, $11481, $11482, $11483, $11484, $11485, $11486, $11487, $11488, VersionRange($11489, $11490)), ($11491, $11492, $11493, $11494, $11495, $11496, $11497, $11498, $11499, $11500, $11501, $11502, $11503, $11504, $11505, $11506, $11507, $11508, $11509, $11510, $11511, $11512, $11513, $11514, $11515, $11516, $11517, $11518, VersionRange($11519, $11520)), ($11521, $11522, $11523, $11524, $11525, $11526, $11527, $11528, $11529, $11530, $11531, $11532, $11533, $11534, $11535, $11536, $11537, $11538, $11539, $11540, $11541, $11542, $11543, $11544, $11545, $11546, $11547, $11548, VersionRange($11549, $11550)), ($11551, $11552, $11553, $11554, $11555, $11556, $11557, $11558, $11559, $11560, $11561, $11562, $11563, $11564, $11565, $11566, $11567, $11568, $11569, $11570, $11571, $11572, $11573, $11574, $11575, $11576, $11577, $11578, VersionRange($11579, $11580)), ($11581, $11582, $11583, $11584, $11585, $11586, $11587, $11588, $11589, $11590, $11591, $11592, $11593, $11594, $11595, $11596, $11597, $11598, $11599, $11600, $11601, $11602, $11603, $11604, $11605, $11606, $11607, $11608, VersionRange($11609, $11610)), ($11611, $11612, $11613, $11614, $11615, $11616, $11617, $11618, $11619, $11620, $11621, $11622, $11623, $11624, $11625, $11626, $11627, $11628, $11629, $11630, $11631, $11632, $11633, $11634, $11635, $11636, $11637, $11638, VersionRange($11639, $11640)), ($11641, $11642, $11643, $11644, $11645, $11646, $11647, $11648, $11649, $11650, $11651, $11652, $11653, $11654, $11655, $11656, $11657, $11658, $11659, $11660, $11661, $11662, $11663, $11664, $11665, $11666, $11667, $11668, VersionRange($11669, $11670)), ($11671, $11672, $11673, $11674, $11675, $11676, $11677, $11678, $11679, $11680, $11681, $11682, $11683, $11684, $11685, $11686, $11687, $11688, $11689, $11690, $11691, $11692, $11693, $11694, $11695, $11696, $11697, $11698, VersionRange($11699, $11700)), ($11701, $11702, $11703, $11704, $11705, $11706, $11707, $11708, $11709, $11710, $11711, $11712, $11713, $11714, $11715, $11716, $11717, $11718, $11719, $11720, $11721, $11722, $11723, $11724, $11725, $11726, $11727, $11728, VersionRange($11729, $11730)), ($11731, $11732, $11733, $11734, $11735, $11736, $11737, $11738, $11739, $11740, $11741, $11742, $11743, $11744, $11745, $11746, $11747, $11748, $11749, $11750, $11751, $11752, $11753, $11754, $11755, $11756, $11757, $11758, VersionRange($11759, $11760)), ($11761, $11762, $11763, $11764, $11765, $11766, $11767, $11768, $11769, $11770, $11771, $11772, $11773, $11774, $11775, $11776, $11777, $11778, $11779, $11780, $11781, $11782, $11783, $11784, $11785, $11786, $11787, $11788, VersionRange($11789, $11790)), ($11791, $11792, $11793, $11794, $11795, $11796, $11797, $11798, $11799, $11800, $11801, $11802, $11803, $11804, $11805, $11806, $11807, $11808, $11809, $11810, $11811, $11812, $11813, $11814, $11815, $11816, $11817, $11818, VersionRange($11819, $11820)), ($11821, $11822, $11823, $11824, $11825, $11826, $11827, $11828, $11829, $11830, $11831, $11832, $11833, $11834, $11835, $11836, $11837, $11838, $11839, $11840, $11841, $11842, $11843, $11844, $11845, $11846, $11847, $11848, VersionRange($11849, $11850)), ($11851, $11852, $11853, $11854, $11855, $11856, $11857, $11858, $11859, $11860, $11861, $11862, $11863, $11864, $11865, $11866, $11867, $11868, $11869, $11870, $11871, $11872, $11873, $11874, $11875, $11876, $11877, $11878, VersionRange($11879, $11880)), ($11881, $11882, $11883, $11884, $11885, $11886, $11887, $11888, $11889, $11890, $11891, $11892, $11893, $11894, $11895, $11896, $11897, $11898, $11899, $11900, $11901, $11902, $11903, $11904, $11905, $11906, $11907, $11908, VersionRange($11909, $11910)), ($11911, $11912, $11913, $11914, $11915, $11916, $11917, $11918, $11919, $11920, $11921, $11922, $11923, $11924, $11925, $11926, $11927, $11928, $11929, $11930, $11931, $11932, $11933, $11934, $11935, $11936, $11937, $11938, VersionRange($11939, $11940)), ($11941, $11942, $11943, $11944, $11945, $11946, $11947, $11948, $11949, $11950, $11951, $11952, $11953, $11954, $11955, $11956, $11957, $11958, $11959, $11960, $11961, $11962, $11963, $11964, $11965, $11966, $11967, $11968, VersionRange($11969, $11970)), ($11971, $11972, $11973, $11974, $11975, $11976, $11977, $11978, $11979, $11980, $11981, $11982, $11983, $11984, $11985, $11986, $11987, $11988, $11989, $11990, $11991, $11992, $11993, $11994, $11995, $11996, $11997, $11998, VersionRange($11999, $12000)), ($12001, $12002, $12003, $12004, $12005, $12006, $12007, $12008, $12009, $12010, $12011, $12012, $12013, $12014, $12015, $12016, $12017, $12018, $12019, $12020, $12021, $12022, $12023, $12024, $12025, $12026, $12027, $12028, VersionRange($12029, $12030)), ($12031, $12032, $12033, $12034, $12035, $12036, $12037, $12038, $12039, $12040, $12041, $12042, $12043, $12044, $12045, $12046, $12047, $12048, $12049, $12050, $12051, $12052, $12053, $12054, $12055, $12056, $12057, $12058, VersionRange($12059, $12060)), ($12061, $12062, $12063, $12064, $12065, $12066, $12067, $12068, $12069, $12070, $12071, $12072, $12073, $12074, $12075, $12076, $12077, $12078, $12079, $12080, $12081, $12082, $12083, $12084, $12085, $12086, $12087, $12088, VersionRange($12089, $12090)), ($12091, $12092, $12093, $12094, $12095, $12096, $12097, $12098, $12099, $12100, $12101, $12102, $12103, $12104, $12105, $12106, $12107, $12108, $12109, $12110, $12111, $12112, $12113, $12114, $12115, $12116, $12117, $12118, VersionRange($12119, $12120)), ($12121, $12122, $12123, $12124, $12125, $12126, $12127, $12128, $12129, $12130, $12131, $12132, $12133, $12134, $12135, $12136, $12137, $12138, $12139, $12140, $12141, $12142, $12143, $12144, $12145, $12146, $12147, $12148, VersionRange($12149, $12150)), ($12151, $12152, $12153, $12154, $12155, $12156, $12157, $12158, $12159, $12160, $12161, $12162, $12163, $12164, $12165, $12166, $12167, $12168, $12169, $12170, $12171, $12172, $12173, $12174, $12175, $12176, $12177, $12178, VersionRange($12179, $12180)), ($12181, $12182, $12183, $12184, $12185, $12186, $12187, $12188, $12189, $12190, $12191, $12192, $12193, $12194, $12195, $12196, $12197, $12198, $12199, $12200, $12201, $12202, $12203, $12204, $12205, $12206, $12207, $12208, VersionRange($12209, $12210)), ($12211, $12212, $12213, $12214, $12215, $12216, $12217, $12218, $12219, $12220, $12221, $12222, $12223, $12224, $12225, $12226, $12227, $12228, $12229, $12230, $12231, $12232, $12233, $12234, $12235, $12236, $12237, $12238, VersionRange($12239, $12240)), ($12241, $12242, $12243, $12244, $12245, $12246, $12247, $12248, $12249, $12250, $12251, $12252, $12253, $12254, $12255, $12256, $12257, $12258, $12259, $12260, $12261, $12262, $12263, $12264, $12265, $12266, $12267, $12268, VersionRange($12269, $12270)), ($12271, $12272, $12273, $12274, $12275, $12276, $12277, $12278, $12279, $12280, $12281, $12282, $12283, $12284, $12285, $12286, $12287, $12288, $12289, $12290, $12291, $12292, $12293, $12294, $12295, $12296, $12297, $12298, VersionRange($12299, $12300)), ($12301, $12302, $12303, $12304, $12305, $12306, $12307, $12308, $12309, $12310, $12311, $12312, $12313, $12314, $12315, $12316, $12317, $12318, $12319, $12320, $12321, $12322, $12323, $12324, $12325, $12326, $12327, $12328, VersionRange($12329, $12330)), ($12331, $12332, $12333, $12334, $12335, $12336, $12337, $12338, $12339, $12340, $12341, $12342, $12343, $12344, $12345, $12346, $12347, $12348, $12349, $12350, $12351, $12352, $12353, $12354, $12355, $12356, $12357, $12358, VersionRange($12359, $12360)), ($12361, $12362, $12363, $12364, $12365, $12366, $12367, $12368, $12369, $12370, $12371, $12372, $12373, $12374, $12375, $12376, $12377, $12378, $12379, $12380, $12381, $12382, $12383, $12384, $12385, $12386, $12387, $12388, VersionRange($12389, $12390)), ($12391, $12392, $12393, $12394, $12395, $12396, $12397, $12398, $12399, $12400, $12401, $12402, $12403, $12404, $12405, $12406, $12407, $12408, $12409, $12410, $12411, $12412, $12413, $12414, $12415, $12416, $12417, $12418, VersionRange($12419, $12420)), ($12421, $12422, $12423, $12424, $12425, $12426, $12427, $12428, $12429, $12430, $12431, $12432, $12433, $12434, $12435, $12436, $12437, $12438, $12439, $12440, $12441, $12442, $12443, $12444, $12445, $12446, $12447, $12448, VersionRange($12449, $12450)), ($12451, $12452, $12453, $12454, $12455, $12456, $12457, $12458, $12459, $12460, $12461, $12462, $12463, $12464, $12465, $12466, $12467, $12468, $12469, $12470, $12471, $12472, $12473, $12474, $12475, $12476, $12477, $12478, VersionRange($12479, $12480)), ($12481, $12482, $12483, $12484, $12485, $12486, $12487, $12488, $12489, $12490, $12491, $12492, $12493, $12494, $12495, $12496, $12497, $12498, $12499, $12500, $12501, $12502, $12503, $12504, $12505, $12506, $12507, $12508, VersionRange($12509, $12510)), ($12511, $12512, $12513, $12514, $12515, $12516, $12517, $12518, $12519, $12520, $12521, $12522, $12523, $12524, $12525, $12526, $12527, $12528, $12529, $12530, $12531, $12532, $12533, $12534, $12535, $12536, $12537, $12538, VersionRange($12539, $12540)), ($12541, $12542, $12543, $12544, $12545, $12546, $12547, $12548, $12549, $12550, $12551, $12552, $12553, $12554, $12555, $12556, $12557, $12558, $12559, $12560, $12561, $12562, $12563, $12564, $12565, $12566, $12567, $12568, VersionRange($12569, $12570)), ($12571, $12572, $12573, $12574, $12575, $12576, $12577, $12578, $12579, $12580, $12581, $12582, $12583, $12584, $12585, $12586, $12587, $12588, $12589, $12590, $12591, $12592, $12593, $12594, $12595, $12596, $12597, $12598, VersionRange($12599, $12600)), ($12601, $12602, $12603, $12604, $12605, $12606, $12607, $12608, $12609, $12610, $12611, $12612, $12613, $12614, $12615, $12616, $12617, $12618, $12619, $12620, $12621, $12622, $12623, $12624, $12625, $12626, $12627, $12628, VersionRange($12629, $12630)), ($12631, $12632, $12633, $12634, $12635, $12636, $12637, $12638, $12639, $12640, $12641, $12642, $12643, $12644, $12645, $12646, $12647, $12648, $12649, $12650, $12651, $12652, $12653, $12654, $12655, $12656, $12657, $12658, VersionRange($12659, $12660)), ($12661, $12662, $12663, $12664, $12665, $12666, $12667, $12668, $12669, $12670, $12671, $12672, $12673, $12674, $12675, $12676, $12677, $12678, $12679, $12680, $12681, $12682, $12683, $12684, $12685, $12686, $12687, $12688, VersionRange($12689, $12690)), ($12691, $12692, $12693, $12694, $12695, $12696, $12697, $12698, $12699, $12700, $12701, $12702, $12703, $12704, $12705, $12706, $12707, $12708, $12709, $12710, $12711, $12712, $12713, $12714, $12715, $12716, $12717, $12718, VersionRange($12719, $12720)), ($12721, $12722, $12723, $12724, $12725, $12726, $12727, $12728, $12729, $12730, $12731, $12732, $12733, $12734, $12735, $12736, $12737, $12738, $12739, $12740, $12741, $12742, $12743, $12744, $12745, $12746, $12747, $12748, VersionRange($12749, $12750)), ($12751, $12752, $12753, $12754, $12755, $12756, $12757, $12758, $12759, $12760, $12761, $12762, $12763, $12764, $12765, $12766, $12767, $12768, $12769, $12770, $12771, $12772, $12773, $12774, $12775, $12776, $12777, $12778, VersionRange($12779, $12780)), ($12781, $12782, $12783, $12784, $12785, $12786, $12787, $12788, $12789, $12790, $12791, $12792, $12793, $12794, $12795, $12796, $12797, $12798, $12799, $12800, $12801, $12802, $12803, $12804, $12805, $12806, $12807, $12808, VersionRange($12809, $12810)), ($12811, $12812, $12813, $12814, $12815, $12816, $12817, $12818, $12819, $12820, $12821, $12822, $12823, $12824, $12825, $12826, $12827, $12828, $12829, $12830, $12831, $12832, $12833, $12834, $12835, $12836, $12837, $12838, VersionRange($12839, $12840)), ($12841, $12842, $12843, $12844, $12845, $12846, $12847, $12848, $12849, $12850, $12851, $12852, $12853, $12854, $12855, $12856, $12857, $12858, $12859, $12860, $12861, $12862, $12863, $12864, $12865, $12866, $12867, $12868, VersionRange($12869, $12870)), ($12871, $12872, $12873, $12874, $12875, $12876, $12877, $12878, $12879, $12880, $12881, $12882, $12883, $12884, $12885, $12886, $12887, $12888, $12889, $12890, $12891, $12892, $12893, $12894, $12895, $12896, $12897, $12898, VersionRange($12899, $12900)), ($12901, $12902, $12903, $12904, $12905, $12906, $12907, $12908, $12909, $12910, $12911, $12912, $12913, $12914, $12915, $12916, $12917, $12918, $12919, $12920, $12921, $12922, $12923, $12924, $12925, $12926, $12927, $12928, VersionRange($12929, $12930)), ($12931, $12932, $12933, $12934, $12935, $12936, $12937, $12938, $12939, $12940, $12941, $12942, $12943, $12944, $12945, $12946, $12947, $12948, $12949, $12950, $12951, $12952, $12953, $12954, $12955, $12956, $12957, $12958, VersionRange($12959, $12960)), ($12961, $12962, $12963, $12964, $12965, $12966, $12967, $12968, $12969, $12970[...][ Date: 2023-07-04 18:39:54 ]
4 5s569ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30)), ($31, $32, $33, $34, $35, $36, $37, $38, $39, $40, $41, $42, $43, $44, $45, $46, $47, $48, $49, $50, $51, $52, $53, $54, $55, $56, $57, $58, VersionRange($59, $60)), ($61, $62, $63, $64, $65, $66, $67, $68, $69, $70, $71, $72, $73, $74, $75, $76, $77, $78, $79, $80, $81, $82, $83, $84, $85, $86, $87, $88, VersionRange($89, $90)), ($91, $92, $93, $94, $95, $96, $97, $98, $99, $100, $101, $102, $103, $104, $105, $106, $107, $108, $109, $110, $111, $112, $113, $114, $115, $116, $117, $118, VersionRange($119, $120)), ($121, $122, $123, $124, $125, $126, $127, $128, $129, $130, $131, $132, $133, $134, $135, $136, $137, $138, $139, $140, $141, $142, $143, $144, $145, $146, $147, $148, VersionRange($149, $150)), ($151, $152, $153, $154, $155, $156, $157, $158, $159, $160, $161, $162, $163, $164, $165, $166, $167, $168, $169, $170, $171, $172, $173, $174, $175, $176, $177, $178, VersionRange($179, $180)), ($181, $182, $183, $184, $185, $186, $187, $188, $189, $190, $191, $192, $193, $194, $195, $196, $197, $198, $199, $200, $201, $202, $203, $204, $205, $206, $207, $208, VersionRange($209, $210)), ($211, $212, $213, $214, $215, $216, $217, $218, $219, $220, $221, $222, $223, $224, $225, $226, $227, $228, $229, $230, $231, $232, $233, $234, $235, $236, $237, $238, VersionRange($239, $240)), ($241, $242, $243, $244, $245, $246, $247, $248, $249, $250, $251, $252, $253, $254, $255, $256, $257, $258, $259, $260, $261, $262, $263, $264, $265, $266, $267, $268, VersionRange($269, $270)), ($271, $272, $273, $274, $275, $276, $277, $278, $279, $280, $281, $282, $283, $284, $285, $286, $287, $288, $289, $290, $291, $292, $293, $294, $295, $296, $297, $298, VersionRange($299, $300)), ($301, $302, $303, $304, $305, $306, $307, $308, $309, $310, $311, $312, $313, $314, $315, $316, $317, $318, $319, $320, $321, $322, $323, $324, $325, $326, $327, $328, VersionRange($329, $330)), ($331, $332, $333, $334, $335, $336, $337, $338, $339, $340, $341, $342, $343, $344, $345, $346, $347, $348, $349, $350, $351, $352, $353, $354, $355, $356, $357, $358, VersionRange($359, $360)), ($361, $362, $363, $364, $365, $366, $367, $368, $369, $370, $371, $372, $373, $374, $375, $376, $377, $378, $379, $380, $381, $382, $383, $384, $385, $386, $387, $388, VersionRange($389, $390)), ($391, $392, $393, $394, $395, $396, $397, $398, $399, $400, $401, $402, $403, $404, $405, $406, $407, $408, $409, $410, $411, $412, $413, $414, $415, $416, $417, $418, VersionRange($419, $420)), ($421, $422, $423, $424, $425, $426, $427, $428, $429, $430, $431, $432, $433, $434, $435, $436, $437, $438, $439, $440, $441, $442, $443, $444, $445, $446, $447, $448, VersionRange($449, $450)), ($451, $452, $453, $454, $455, $456, $457, $458, $459, $460, $461, $462, $463, $464, $465, $466, $467, $468, $469, $470, $471, $472, $473, $474, $475, $476, $477, $478, VersionRange($479, $480)), ($481, $482, $483, $484, $485, $486, $487, $488, $489, $490, $491, $492, $493, $494, $495, $496, $497, $498, $499, $500, $501, $502, $503, $504, $505, $506, $507, $508, VersionRange($509, $510)), ($511, $512, $513, $514, $515, $516, $517, $518, $519, $520, $521, $522, $523, $524, $525, $526, $527, $528, $529, $530, $531, $532, $533, $534, $535, $536, $537, $538, VersionRange($539, $540)), ($541, $542, $543, $544, $545, $546, $547, $548, $549, $550, $551, $552, $553, $554, $555, $556, $557, $558, $559, $560, $561, $562, $563, $564, $565, $566, $567, $568, VersionRange($569, $570)), ($571, $572, $573, $574, $575, $576, $577, $578, $579, $580, $581, $582, $583, $584, $585, $586, $587, $588, $589, $590, $591, $592, $593, $594, $595, $596, $597, $598, VersionRange($599, $600)), ($601, $602, $603, $604, $605, $606, $607, $608, $609, $610, $611, $612, $613, $614, $615, $616, $617, $618, $619, $620, $621, $622, $623, $624, $625, $626, $627, $628, VersionRange($629, $630)), ($631, $632, $633, $634, $635, $636, $637, $638, $639, $640, $641, $642, $643, $644, $645, $646, $647, $648, $649, $650, $651, $652, $653, $654, $655, $656, $657, $658, VersionRange($659, $660)), ($661, $662, $663, $664, $665, $666, $667, $668, $669, $670, $671, $672, $673, $674, $675, $676, $677, $678, $679, $680, $681, $682, $683, $684, $685, $686, $687, $688, VersionRange($689, $690)), ($691, $692, $693, $694, $695, $696, $697, $698, $699, $700, $701, $702, $703, $704, $705, $706, $707, $708, $709, $710, $711, $712, $713, $714, $715, $716, $717, $718, VersionRange($719, $720)), ($721, $722, $723, $724, $725, $726, $727, $728, $729, $730, $731, $732, $733, $734, $735, $736, $737, $738, $739, $740, $741, $742, $743, $744, $745, $746, $747, $748, VersionRange($749, $750)), ($751, $752, $753, $754, $755, $756, $757, $758, $759, $760, $761, $762, $763, $764, $765, $766, $767, $768, $769, $770, $771, $772, $773, $774, $775, $776, $777, $778, VersionRange($779, $780)), ($781, $782, $783, $784, $785, $786, $787, $788, $789, $790, $791, $792, $793, $794, $795, $796, $797, $798, $799, $800, $801, $802, $803, $804, $805, $806, $807, $808, VersionRange($809, $810)), ($811, $812, $813, $814, $815, $816, $817, $818, $819, $820, $821, $822, $823, $824, $825, $826, $827, $828, $829, $830, $831, $832, $833, $834, $835, $836, $837, $838, VersionRange($839, $840)), ($841, $842, $843, $844, $845, $846, $847, $848, $849, $850, $851, $852, $853, $854, $855, $856, $857, $858, $859, $860, $861, $862, $863, $864, $865, $866, $867, $868, VersionRange($869, $870)), ($871, $872, $873, $874, $875, $876, $877, $878, $879, $880, $881, $882, $883, $884, $885, $886, $887, $888, $889, $890, $891, $892, $893, $894, $895, $896, $897, $898, VersionRange($899, $900)), ($901, $902, $903, $904, $905, $906, $907, $908, $909, $910, $911, $912, $913, $914, $915, $916, $917, $918, $919, $920, $921, $922, $923, $924, $925, $926, $927, $928, VersionRange($929, $930)), ($931, $932, $933, $934, $935, $936, $937, $938, $939, $940, $941, $942, $943, $944, $945, $946, $947, $948, $949, $950, $951, $952, $953, $954, $955, $956, $957, $958, VersionRange($959, $960)), ($961, $962, $963, $964, $965, $966, $967, $968, $969, $970, $971, $972, $973, $974, $975, $976, $977, $978, $979, $980, $981, $982, $983, $984, $985, $986, $987, $988, VersionRange($989, $990)), ($991, $992, $993, $994, $995, $996, $997, $998, $999, $1000, $1001, $1002, $1003, $1004, $1005, $1006, $1007, $1008, $1009, $1010, $1011, $1012, $1013, $1014, $1015, $1016, $1017, $1018, VersionRange($1019, $1020)), ($1021, $1022, $1023, $1024, $1025, $1026, $1027, $1028, $1029, $1030, $1031, $1032, $1033, $1034, $1035, $1036, $1037, $1038, $1039, $1040, $1041, $1042, $1043, $1044, $1045, $1046, $1047, $1048, VersionRange($1049, $1050)), ($1051, $1052, $1053, $1054, $1055, $1056, $1057, $1058, $1059, $1060, $1061, $1062, $1063, $1064, $1065, $1066, $1067, $1068, $1069, $1070, $1071, $1072, $1073, $1074, $1075, $1076, $1077, $1078, VersionRange($1079, $1080)), ($1081, $1082, $1083, $1084, $1085, $1086, $1087, $1088, $1089, $1090, $1091, $1092, $1093, $1094, $1095, $1096, $1097, $1098, $1099, $1100, $1101, $1102, $1103, $1104, $1105, $1106, $1107, $1108, VersionRange($1109, $1110)), ($1111, $1112, $1113, $1114, $1115, $1116, $1117, $1118, $1119, $1120, $1121, $1122, $1123, $1124, $1125, $1126, $1127, $1128, $1129, $1130, $1131, $1132, $1133, $1134, $1135, $1136, $1137, $1138, VersionRange($1139, $1140)), ($1141, $1142, $1143, $1144, $1145, $1146, $1147, $1148, $1149, $1150, $1151, $1152, $1153, $1154, $1155, $1156, $1157, $1158, $1159, $1160, $1161, $1162, $1163, $1164, $1165, $1166, $1167, $1168, VersionRange($1169, $1170)), ($1171, $1172, $1173, $1174, $1175, $1176, $1177, $1178, $1179, $1180, $1181, $1182, $1183, $1184, $1185, $1186, $1187, $1188, $1189, $1190, $1191, $1192, $1193, $1194, $1195, $1196, $1197, $1198, VersionRange($1199, $1200)), ($1201, $1202, $1203, $1204, $1205, $1206, $1207, $1208, $1209, $1210, $1211, $1212, $1213, $1214, $1215, $1216, $1217, $1218, $1219, $1220, $1221, $1222, $1223, $1224, $1225, $1226, $1227, $1228, VersionRange($1229, $1230)), ($1231, $1232, $1233, $1234, $1235, $1236, $1237, $1238, $1239, $1240, $1241, $1242, $1243, $1244, $1245, $1246, $1247, $1248, $1249, $1250, $1251, $1252, $1253, $1254, $1255, $1256, $1257, $1258, VersionRange($1259, $1260)), ($1261, $1262, $1263, $1264, $1265, $1266, $1267, $1268, $1269, $1270, $1271, $1272, $1273, $1274, $1275, $1276, $1277, $1278, $1279, $1280, $1281, $1282, $1283, $1284, $1285, $1286, $1287, $1288, VersionRange($1289, $1290)), ($1291, $1292, $1293, $1294, $1295, $1296, $1297, $1298, $1299, $1300, $1301, $1302, $1303, $1304, $1305, $1306, $1307, $1308, $1309, $1310, $1311, $1312, $1313, $1314, $1315, $1316, $1317, $1318, VersionRange($1319, $1320)), ($1321, $1322, $1323, $1324, $1325, $1326, $1327, $1328, $1329, $1330, $1331, $1332, $1333, $1334, $1335, $1336, $1337, $1338, $1339, $1340, $1341, $1342, $1343, $1344, $1345, $1346, $1347, $1348, VersionRange($1349, $1350)), ($1351, $1352, $1353, $1354, $1355, $1356, $1357, $1358, $1359, $1360, $1361, $1362, $1363, $1364, $1365, $1366, $1367, $1368, $1369, $1370, $1371, $1372, $1373, $1374, $1375, $1376, $1377, $1378, VersionRange($1379, $1380)), ($1381, $1382, $1383, $1384, $1385, $1386, $1387, $1388, $1389, $1390, $1391, $1392, $1393, $1394, $1395, $1396, $1397, $1398, $1399, $1400, $1401, $1402, $1403, $1404, $1405, $1406, $1407, $1408, VersionRange($1409, $1410)), ($1411, $1412, $1413, $1414, $1415, $1416, $1417, $1418, $1419, $1420, $1421, $1422, $1423, $1424, $1425, $1426, $1427, $1428, $1429, $1430, $1431, $1432, $1433, $1434, $1435, $1436, $1437, $1438, VersionRange($1439, $1440)), ($1441, $1442, $1443, $1444, $1445, $1446, $1447, $1448, $1449, $1450, $1451, $1452, $1453, $1454, $1455, $1456, $1457, $1458, $1459, $1460, $1461, $1462, $1463, $1464, $1465, $1466, $1467, $1468, VersionRange($1469, $1470)), ($1471, $1472, $1473, $1474, $1475, $1476, $1477, $1478, $1479, $1480, $1481, $1482, $1483, $1484, $1485, $1486, $1487, $1488, $1489, $1490, $1491, $1492, $1493, $1494, $1495, $1496, $1497, $1498, VersionRange($1499, $1500)), ($1501, $1502, $1503, $1504, $1505, $1506, $1507, $1508, $1509, $1510, $1511, $1512, $1513, $1514, $1515, $1516, $1517, $1518, $1519, $1520, $1521, $1522, $1523, $1524, $1525, $1526, $1527, $1528, VersionRange($1529, $1530)), ($1531, $1532, $1533, $1534, $1535, $1536, $1537, $1538, $1539, $1540, $1541, $1542, $1543, $1544, $1545, $1546, $1547, $1548, $1549, $1550, $1551, $1552, $1553, $1554, $1555, $1556, $1557, $1558, VersionRange($1559, $1560)), ($1561, $1562, $1563, $1564, $1565, $1566, $1567, $1568, $1569, $1570, $1571, $1572, $1573, $1574, $1575, $1576, $1577, $1578, $1579, $1580, $1581, $1582, $1583, $1584, $1585, $1586, $1587, $1588, VersionRange($1589, $1590)), ($1591, $1592, $1593, $1594, $1595, $1596, $1597, $1598, $1599, $1600, $1601, $1602, $1603, $1604, $1605, $1606, $1607, $1608, $1609, $1610, $1611, $1612, $1613, $1614, $1615, $1616, $1617, $1618, VersionRange($1619, $1620)), ($1621, $1622, $1623, $1624, $1625, $1626, $1627, $1628, $1629, $1630, $1631, $1632, $1633, $1634, $1635, $1636, $1637, $1638, $1639, $1640, $1641, $1642, $1643, $1644, $1645, $1646, $1647, $1648, VersionRange($1649, $1650)), ($1651, $1652, $1653, $1654, $1655, $1656, $1657, $1658, $1659, $1660, $1661, $1662, $1663, $1664, $1665, $1666, $1667, $1668, $1669, $1670, $1671, $1672, $1673, $1674, $1675, $1676, $1677, $1678, VersionRange($1679, $1680)), ($1681, $1682, $1683, $1684, $1685, $1686, $1687, $1688, $1689, $1690, $1691, $1692, $1693, $1694, $1695, $1696, $1697, $1698, $1699, $1700, $1701, $1702, $1703, $1704, $1705, $1706, $1707, $1708, VersionRange($1709, $1710)), ($1711, $1712, $1713, $1714, $1715, $1716, $1717, $1718, $1719, $1720, $1721, $1722, $1723, $1724, $1725, $1726, $1727, $1728, $1729, $1730, $1731, $1732, $1733, $1734, $1735, $1736, $1737, $1738, VersionRange($1739, $1740)), ($1741, $1742, $1743, $1744, $1745, $1746, $1747, $1748, $1749, $1750, $1751, $1752, $1753, $1754, $1755, $1756, $1757, $1758, $1759, $1760, $1761, $1762, $1763, $1764, $1765, $1766, $1767, $1768, VersionRange($1769, $1770)), ($1771, $1772, $1773, $1774, $1775, $1776, $1777, $1778, $1779, $1780, $1781, $1782, $1783, $1784, $1785, $1786, $1787, $1788, $1789, $1790, $1791, $1792, $1793, $1794, $1795, $1796, $1797, $1798, VersionRange($1799, $1800)), ($1801, $1802, $1803, $1804, $1805, $1806, $1807, $1808, $1809, $1810, $1811, $1812, $1813, $1814, $1815, $1816, $1817, $1818, $1819, $1820, $1821, $1822, $1823, $1824, $1825, $1826, $1827, $1828, VersionRange($1829, $1830)), ($1831, $1832, $1833, $1834, $1835, $1836, $1837, $1838, $1839, $1840, $1841, $1842, $1843, $1844, $1845, $1846, $1847, $1848, $1849, $1850, $1851, $1852, $1853, $1854, $1855, $1856, $1857, $1858, VersionRange($1859, $1860)), ($1861, $1862, $1863, $1864, $1865, $1866, $1867, $1868, $1869, $1870, $1871, $1872, $1873, $1874, $1875, $1876, $1877, $1878, $1879, $1880, $1881, $1882, $1883, $1884, $1885, $1886, $1887, $1888, VersionRange($1889, $1890)), ($1891, $1892, $1893, $1894, $1895, $1896, $1897, $1898, $1899, $1900, $1901, $1902, $1903, $1904, $1905, $1906, $1907, $1908, $1909, $1910, $1911, $1912, $1913, $1914, $1915, $1916, $1917, $1918, VersionRange($1919, $1920)), ($1921, $1922, $1923, $1924, $1925, $1926, $1927, $1928, $1929, $1930, $1931, $1932, $1933, $1934, $1935, $1936, $1937, $1938, $1939, $1940, $1941, $1942, $1943, $1944, $1945, $1946, $1947, $1948, VersionRange($1949, $1950)), ($1951, $1952, $1953, $1954, $1955, $1956, $1957, $1958, $1959, $1960, $1961, $1962, $1963, $1964, $1965, $1966, $1967, $1968, $1969, $1970, $1971, $1972, $1973, $1974, $1975, $1976, $1977, $1978, VersionRange($1979, $1980)), ($1981, $1982, $1983, $1984, $1985, $1986, $1987, $1988, $1989, $1990, $1991, $1992, $1993, $1994, $1995, $1996, $1997, $1998, $1999, $2000, $2001, $2002, $2003, $2004, $2005, $2006, $2007, $2008, VersionRange($2009, $2010)), ($2011, $2012, $2013, $2014, $2015, $2016, $2017, $2018, $2019, $2020, $2021, $2022, $2023, $2024, $2025, $2026, $2027, $2028, $2029, $2030, $2031, $2032, $2033, $2034, $2035, $2036, $2037, $2038, VersionRange($2039, $2040)), ($2041, $2042, $2043, $2044, $2045, $2046, $2047, $2048, $2049, $2050, $2051, $2052, $2053, $2054, $2055, $2056, $2057, $2058, $2059, $2060, $2061, $2062, $2063, $2064, $2065, $2066, $2067, $2068, VersionRange($2069, $2070)), ($2071, $2072, $2073, $2074, $2075, $2076, $2077, $2078, $2079, $2080, $2081, $2082, $2083, $2084, $2085, $2086, $2087, $2088, $2089, $2090, $2091, $2092, $2093, $2094, $2095, $2096, $2097, $2098, VersionRange($2099, $2100)), ($2101, $2102, $2103, $2104, $2105, $2106, $2107, $2108, $2109, $2110, $2111, $2112, $2113, $2114, $2115, $2116, $2117, $2118, $2119, $2120, $2121, $2122, $2123, $2124, $2125, $2126, $2127, $2128, VersionRange($2129, $2130)), ($2131, $2132, $2133, $2134, $2135, $2136, $2137, $2138, $2139, $2140, $2141, $2142, $2143, $2144, $2145, $2146, $2147, $2148, $2149, $2150, $2151, $2152, $2153, $2154, $2155, $2156, $2157, $2158, VersionRange($2159, $2160)), ($2161, $2162, $2163, $2164, $2165, $2166, $2167, $2168, $2169, $2170, $2171, $2172, $2173, $2174, $2175, $2176, $2177, $2178, $2179, $2180, $2181, $2182, $2183, $2184, $2185, $2186, $2187, $2188, VersionRange($2189, $2190)), ($2191, $2192, $2193, $2194, $2195, $2196, $2197, $2198, $2199, $2200, $2201, $2202, $2203, $2204, $2205, $2206, $2207, $2208, $2209, $2210, $2211, $2212, $2213, $2214, $2215, $2216, $2217, $2218, VersionRange($2219, $2220)), ($2221, $2222, $2223, $2224, $2225, $2226, $2227, $2228, $2229, $2230, $2231, $2232, $2233, $2234, $2235, $2236, $2237, $2238, $2239, $2240, $2241, $2242, $2243, $2244, $2245, $2246, $2247, $2248, VersionRange($2249, $2250)), ($2251, $2252, $2253, $2254, $2255, $2256, $2257, $2258, $2259, $2260, $2261, $2262, $2263, $2264, $2265, $2266, $2267, $2268, $2269, $2270, $2271, $2272, $2273, $2274, $2275, $2276, $2277, $2278, VersionRange($2279, $2280)), ($2281, $2282, $2283, $2284, $2285, $2286, $2287, $2288, $2289, $2290, $2291, $2292, $2293, $2294, $2295, $2296, $2297, $2298, $2299, $2300, $2301, $2302, $2303, $2304, $2305, $2306, $2307, $2308, VersionRange($2309, $2310)), ($2311, $2312, $2313, $2314, $2315, $2316, $2317, $2318, $2319, $2320, $2321, $2322, $2323, $2324, $2325, $2326, $2327, $2328, $2329, $2330, $2331, $2332, $2333, $2334, $2335, $2336, $2337, $2338, VersionRange($2339, $2340)), ($2341, $2342, $2343, $2344, $2345, $2346, $2347, $2348, $2349, $2350, $2351, $2352, $2353, $2354, $2355, $2356, $2357, $2358, $2359, $2360, $2361, $2362, $2363, $2364, $2365, $2366, $2367, $2368, VersionRange($2369, $2370)), ($2371, $2372, $2373, $2374, $2375, $2376, $2377, $2378, $2379, $2380, $2381, $2382, $2383, $2384, $2385, $2386, $2387, $2388, $2389, $2390, $2391, $2392, $2393, $2394, $2395, $2396, $2397, $2398, VersionRange($2399, $2400)), ($2401, $2402, $2403, $2404, $2405, $2406, $2407, $2408, $2409, $2410, $2411, $2412, $2413, $2414, $2415, $2416, $2417, $2418, $2419, $2420, $2421, $2422, $2423, $2424, $2425, $2426, $2427, $2428, VersionRange($2429, $2430)), ($2431, $2432, $2433, $2434, $2435, $2436, $2437, $2438, $2439, $2440, $2441, $2442, $2443, $2444, $2445, $2446, $2447, $2448, $2449, $2450, $2451, $2452, $2453, $2454, $2455, $2456, $2457, $2458, VersionRange($2459, $2460)), ($2461, $2462, $2463, $2464, $2465, $2466, $2467, $2468, $2469, $2470, $2471, $2472, $2473, $2474, $2475, $2476, $2477, $2478, $2479, $2480, $2481, $2482, $2483, $2484, $2485, $2486, $2487, $2488, VersionRange($2489, $2490)), ($2491, $2492, $2493, $2494, $2495, $2496, $2497, $2498, $2499, $2500, $2501, $2502, $2503, $2504, $2505, $2506, $2507, $2508, $2509, $2510, $2511, $2512, $2513, $2514, $2515, $2516, $2517, $2518, VersionRange($2519, $2520)), ($2521, $2522, $2523, $2524, $2525, $2526, $2527, $2528, $2529, $2530, $2531, $2532, $2533, $2534, $2535, $2536, $2537, $2538, $2539, $2540, $2541, $2542, $2543, $2544, $2545, $2546, $2547, $2548, VersionRange($2549, $2550)), ($2551, $2552, $2553, $2554, $2555, $2556, $2557, $2558, $2559, $2560, $2561, $2562, $2563, $2564, $2565, $2566, $2567, $2568, $2569, $2570, $2571, $2572, $2573, $2574, $2575, $2576, $2577, $2578, VersionRange($2579, $2580)), ($2581, $2582, $2583, $2584, $2585, $2586, $2587, $2588, $2589, $2590, $2591, $2592, $2593, $2594, $2595, $2596, $2597, $2598, $2599, $2600, $2601, $2602, $2603, $2604, $2605, $2606, $2607, $2608, VersionRange($2609, $2610)), ($2611, $2612, $2613, $2614, $2615, $2616, $2617, $2618, $2619, $2620, $2621, $2622, $2623, $2624, $2625, $2626, $2627, $2628, $2629, $2630, $2631, $2632, $2633, $2634, $2635, $2636, $2637, $2638, VersionRange($2639, $2640)), ($2641, $2642, $2643, $2644, $2645, $2646, $2647, $2648, $2649, $2650, $2651, $2652, $2653, $2654, $2655, $2656, $2657, $2658, $2659, $2660, $2661, $2662, $2663, $2664, $2665, $2666, $2667, $2668, VersionRange($2669, $2670)), ($2671, $2672, $2673, $2674, $2675, $2676, $2677, $2678, $2679, $2680, $2681, $2682, $2683, $2684, $2685, $2686, $2687, $2688, $2689, $2690, $2691, $2692, $2693, $2694, $2695, $2696, $2697, $2698, VersionRange($2699, $2700)), ($2701, $2702, $2703, $2704, $2705, $2706, $2707, $2708, $2709, $2710, $2711, $2712, $2713, $2714, $2715, $2716, $2717, $2718, $2719, $2720, $2721, $2722, $2723, $2724, $2725, $2726, $2727, $2728, VersionRange($2729, $2730)), ($2731, $2732, $2733, $2734, $2735, $2736, $2737, $2738, $2739, $2740, $2741, $2742, $2743, $2744, $2745, $2746, $2747, $2748, $2749, $2750, $2751, $2752, $2753, $2754, $2755, $2756, $2757, $2758, VersionRange($2759, $2760)), ($2761, $2762, $2763, $2764, $2765, $2766, $2767, $2768, $2769, $2770, $2771, $2772, $2773, $2774, $2775, $2776, $2777, $2778, $2779, $2780, $2781, $2782, $2783, $2784, $2785, $2786, $2787, $2788, VersionRange($2789, $2790)), ($2791, $2792, $2793, $2794, $2795, $2796, $2797, $2798, $2799, $2800, $2801, $2802, $2803, $2804, $2805, $2806, $2807, $2808, $2809, $2810, $2811, $2812, $2813, $2814, $2815, $2816, $2817, $2818, VersionRange($2819, $2820)), ($2821, $2822, $2823, $2824, $2825, $2826, $2827, $2828, $2829, $2830, $2831, $2832, $2833, $2834, $2835, $2836, $2837, $2838, $2839, $2840, $2841, $2842, $2843, $2844, $2845, $2846, $2847, $2848, VersionRange($2849, $2850)), ($2851, $2852, $2853, $2854, $2855, $2856, $2857, $2858, $2859, $2860, $2861, $2862, $2863, $2864, $2865, $2866, $2867, $2868, $2869, $2870, $2871, $2872, $2873, $2874, $2875, $2876, $2877, $2878, VersionRange($2879, $2880)), ($2881, $2882, $2883, $2884, $2885, $2886, $2887, $2888, $2889, $2890, $2891, $2892, $2893, $2894, $2895, $2896, $2897, $2898, $2899, $2900, $2901, $2902, $2903, $2904, $2905, $2906, $2907, $2908, VersionRange($2909, $2910)), ($2911, $2912, $2913, $2914, $2915, $2916, $2917, $2918, $2919, $2920, $2921, $2922, $2923, $2924, $2925, $2926, $2927, $2928, $2929, $2930, $2931, $2932, $2933, $2934, $2935, $2936, $2937, $2938, VersionRange($2939, $2940)), ($2941, $2942, $2943, $2944, $2945, $2946, $2947, $2948, $2949, $2950, $2951, $2952, $2953, $2954, $2955, $2956, $2957, $2958, $2959, $2960, $2961, $2962, $2963, $2964, $2965, $2966, $2967, $2968, VersionRange($2969, $2970)), ($2971, $2972, $2973, $2974, $2975, $2976, $2977, $2978, $2979, $2980, $2981, $2982, $2983, $2984, $2985, $2986, $2987, $2988, $2989, $2990, $2991, $2992, $2993, $2994, $2995, $2996, $2997, $2998, VersionRange($2999, $3000)), ($3001, $3002, $3003, $3004, $3005, $3006, $3007, $3008, $3009, $3010, $3011, $3012, $3013, $3014, $3015, $3016, $3017, $3018, $3019, $3020, $3021, $3022, $3023, $3024, $3025, $3026, $3027, $3028, VersionRange($3029, $3030)), ($3031, $3032, $3033, $3034, $3035, $3036, $3037, $3038, $3039, $3040, $3041, $3042, $3043, $3044, $3045, $3046, $3047, $3048, $3049, $3050, $3051, $3052, $3053, $3054, $3055, $3056, $3057, $3058, VersionRange($3059, $3060)), ($3061, $3062, $3063, $3064, $3065, $3066, $3067, $3068, $3069, $3070, $3071, $3072, $3073, $3074, $3075, $3076, $3077, $3078, $3079, $3080, $3081, $3082, $3083, $3084, $3085, $3086, $3087, $3088, VersionRange($3089, $3090)), ($3091, $3092, $3093, $3094, $3095, $3096, $3097, $3098, $3099, $3100, $3101, $3102, $3103, $3104, $3105, $3106, $3107, $3108, $3109, $3110, $3111, $3112, $3113, $3114, $3115, $3116, $3117, $3118, VersionRange($3119, $3120)), ($3121, $3122, $3123, $3124, $3125, $3126, $3127, $3128, $3129, $3130, $3131, $3132, $3133, $3134, $3135, $3136, $3137, $3138, $3139, $3140, $3141, $3142, $3143, $3144, $3145, $3146, $3147, $3148, VersionRange($3149, $3150)), ($3151, $3152, $3153, $3154, $3155, $3156, $3157, $3158, $3159, $3160, $3161, $3162, $3163, $3164, $3165, $3166, $3167, $3168, $3169, $3170, $3171, $3172, $3173, $3174, $3175, $3176, $3177, $3178, VersionRange($3179, $3180)), ($3181, $3182, $3183, $3184, $3185, $3186, $3187, $3188, $3189, $3190, $3191, $3192, $3193, $3194, $3195, $3196, $3197, $3198, $3199, $3200, $3201, $3202, $3203, $3204, $3205, $3206, $3207, $3208, VersionRange($3209, $3210)), ($3211, $3212, $3213, $3214, $3215, $3216, $3217, $3218, $3219, $3220, $3221, $3222, $3223, $3224, $3225, $3226, $3227, $3228, $3229, $3230, $3231, $3232, $3233, $3234, $3235, $3236, $3237, $3238, VersionRange($3239, $3240)), ($3241, $3242, $3243, $3244, $3245, $3246, $3247, $3248, $3249, $3250, $3251, $3252, $3253, $3254, $3255, $3256, $3257, $3258, $3259, $3260, $3261, $3262, $3263, $3264, $3265, $3266, $3267, $3268, VersionRange($3269, $3270)), ($3271, $3272, $3273, $3274, $3275, $3276, $3277, $3278, $3279, $3280, $3281, $3282, $3283, $3284, $3285, $3286, $3287, $3288, $3289, $3290, $3291, $3292, $3293, $3294, $3295, $3296, $3297, $3298, VersionRange($3299, $3300)), ($3301, $3302, $3303, $3304, $3305, $3306, $3307, $3308, $3309, $3310, $3311, $3312, $3313, $3314, $3315, $3316, $3317, $3318, $3319, $3320, $3321, $3322, $3323, $3324, $3325, $3326, $3327, $3328, VersionRange($3329, $3330)), ($3331, $3332, $3333, $3334, $3335, $3336, $3337, $3338, $3339, $3340, $3341, $3342, $3343, $3344, $3345, $3346, $3347, $3348, $3349, $3350, $3351, $3352, $3353, $3354, $3355, $3356, $3357, $3358, VersionRange($3359, $3360)), ($3361, $3362, $3363, $3364, $3365, $3366, $3367, $3368, $3369, $3370, $3371, $3372, $3373, $3374, $3375, $3376, $3377, $3378, $3379, $3380, $3381, $3382, $3383, $3384, $3385, $3386, $3387, $3388, VersionRange($3389, $3390)), ($3391, $3392, $3393, $3394, $3395, $3396, $3397, $3398, $3399, $3400, $3401, $3402, $3403, $3404, $3405, $3406, $3407, $3408, $3409, $3410, $3411, $3412, $3413, $3414, $3415, $3416, $3417, $3418, VersionRange($3419, $3420)), ($3421, $3422, $3423, $3424, $3425, $3426, $3427, $3428, $3429, $3430, $3431, $3432, $3433, $3434, $3435, $3436, $3437, $3438, $3439, $3440, $3441, $3442, $3443, $3444, $3445, $3446, $3447, $3448, VersionRange($3449, $3450)), ($3451, $3452, $3453, $3454, $3455, $3456, $3457, $3458, $3459, $3460, $3461, $3462, $3463, $3464, $3465, $3466, $3467, $3468, $3469, $3470, $3471, $3472, $3473, $3474, $3475, $3476, $3477, $3478, VersionRange($3479, $3480)), ($3481, $3482, $3483, $3484, $3485, $3486, $3487, $3488, $3489, $3490, $3491, $3492, $3493, $3494, $3495, $3496, $3497, $3498, $3499, $3500, $3501, $3502, $3503, $3504, $3505, $3506, $3507, $3508, VersionRange($3509, $3510)), ($3511, $3512, $3513, $3514, $3515, $3516, $3517, $3518, $3519, $3520, $3521, $3522, $3523, $3524, $3525, $3526, $3527, $3528, $3529, $3530, $3531, $3532, $3533, $3534, $3535, $3536, $3537, $3538, VersionRange($3539, $3540)), ($3541, $3542, $3543, $3544, $3545, $3546, $3547, $3548, $3549, $3550, $3551, $3552, $3553, $3554, $3555, $3556, $3557, $3558, $3559, $3560, $3561, $3562, $3563, $3564, $3565, $3566, $3567, $3568, VersionRange($3569, $3570)), ($3571, $3572, $3573, $3574, $3575, $3576, $3577, $3578, $3579, $3580, $3581, $3582, $3583, $3584, $3585, $3586, $3587, $3588, $3589, $3590, $3591, $3592, $3593, $3594, $3595, $3596, $3597, $3598, VersionRange($3599, $3600)), ($3601, $3602, $3603, $3604, $3605, $3606, $3607, $3608, $3609, $3610, $3611, $3612, $3613, $3614, $3615, $3616, $3617, $3618, $3619, $3620, $3621, $3622, $3623, $3624, $3625, $3626, $3627, $3628, VersionRange($3629, $3630)), ($3631, $3632, $3633, $3634, $3635, $3636, $3637, $3638, $3639, $3640, $3641, $3642, $3643, $3644, $3645, $3646, $3647, $3648, $3649, $3650, $3651, $3652, $3653, $3654, $3655, $3656, $3657, $3658, VersionRange($3659, $3660)), ($3661, $3662, $3663, $3664, $3665, $3666, $3667, $3668, $3669, $3670, $3671, $3672, $3673, $3674, $3675, $3676, $3677, $3678, $3679, $3680, $3681, $3682, $3683, $3684, $3685, $3686, $3687, $3688, VersionRange($3689, $3690)), ($3691, $3692, $3693, $3694, $3695, $3696, $3697, $3698, $3699, $3700, $3701, $3702, $3703, $3704, $3705, $3706, $3707, $3708, $3709, $3710, $3711, $3712, $3713, $3714, $3715, $3716, $3717, $3718, VersionRange($3719, $3720)), ($3721, $3722, $3723, $3724, $3725, $3726, $3727, $3728, $3729, $3730, $3731, $3732, $3733, $3734, $3735, $3736, $3737, $3738, $3739, $3740, $3741, $3742, $3743, $3744, $3745, $3746, $3747, $3748, VersionRange($3749, $3750)), ($3751, $3752, $3753, $3754, $3755, $3756, $3757, $3758, $3759, $3760, $3761, $3762, $3763, $3764, $3765, $3766, $3767, $3768, $3769, $3770, $3771, $3772, $3773, $3774, $3775, $3776, $3777, $3778, VersionRange($3779, $3780)), ($3781, $3782, $3783, $3784, $3785, $3786, $3787, $3788, $3789, $3790, $3791, $3792, $3793, $3794, $3795, $3796, $3797, $3798, $3799, $3800, $3801, $3802, $3803, $3804, $3805, $3806, $3807, $3808, VersionRange($3809, $3810)), ($3811, $3812, $3813, $3814, $3815, $3816, $3817, $3818, $3819, $3820, $3821, $3822, $3823, $3824, $3825, $3826, $3827, $3828, $3829, $3830, $3831, $3832, $3833, $3834, $3835, $3836, $3837, $3838, VersionRange($3839, $3840)), ($3841, $3842, $3843, $3844, $3845, $3846, $3847, $3848, $3849, $3850, $3851, $3852, $3853, $3854, $3855, $3856, $3857, $3858, $3859, $3860, $3861, $3862, $3863, $3864, $3865, $3866, $3867, $3868, VersionRange($3869, $3870)), ($3871, $3872, $3873, $3874, $3875, $3876, $3877, $3878, $3879, $3880, $3881, $3882, $3883, $3884, $3885, $3886, $3887, $3888, $3889, $3890, $3891, $3892, $3893, $3894, $3895, $3896, $3897, $3898, VersionRange($3899, $3900)), ($3901, $3902, $3903, $3904, $3905, $3906, $3907, $3908, $3909, $3910, $3911, $3912, $3913, $3914, $3915, $3916, $3917, $3918, $3919, $3920, $3921, $3922, $3923, $3924, $3925, $3926, $3927, $3928, VersionRange($3929, $3930)), ($3931, $3932, $3933, $3934, $3935, $3936, $3937, $3938, $3939, $3940, $3941, $3942, $3943, $3944, $3945, $3946, $3947, $3948, $3949, $3950, $3951, $3952, $3953, $3954, $3955, $3956, $3957, $3958, VersionRange($3959, $3960)), ($3961, $3962, $3963, $3964, $3965, $3966, $3967, $3968, $3969, $3970, $3971, $3972, $3973, $3974, $3975, $3976, $3977, $3978, $3979, $3980, $3981, $3982, $3983, $3984, $3985, $3986, $3987, $3988, VersionRange($3989, $3990)), ($3991, $3992, $3993, $3994, $3995, $3996, $3997, $3998, $3999, $4000, $4001, $4002, $4003, $4004, $4005, $4006, $4007, $4008, $4009, $4010, $4011, $4012, $4013, $4014, $4015, $4016, $4017, $4018, VersionRange($4019, $4020)), ($4021, $4022, $4023, $4024, $4025, $4026, $4027, $4028, $4029, $4030, $4031, $4032, $4033, $4034, $4035, $4036, $4037, $4038, $4039, $4040, $4041, $4042, $4043, $4044, $4045, $4046, $4047, $4048, VersionRange($4049, $4050)), ($4051, $4052, $4053, $4054, $4055, $4056, $4057, $4058, $4059, $4060, $4061, $4062, $4063, $4064, $4065, $4066, $4067, $4068, $4069, $4070, $4071, $4072, $4073, $4074, $4075, $4076, $4077, $4078, VersionRange($4079, $4080)), ($4081, $4082, $4083, $4084, $4085, $4086, $4087, $4088, $4089, $4090, $4091, $4092, $4093, $4094, $4095, $4096, $4097, $4098, $4099, $4100, $4101, $4102, $4103, $4104, $4105, $4106, $4107, $4108, VersionRange($4109, $4110)), ($4111, $4112, $4113, $4114, $4115, $4116, $4117, $4118, $4119, $4120, $4121, $4122, $4123, $4124, $4125, $4126, $4127, $4128, $4129, $4130, $4131, $4132, $4133, $4134, $4135, $4136, $4137, $4138, VersionRange($4139, $4140)), ($4141, $4142, $4143, $4144, $4145, $4146, $4147, $4148, $4149, $4150, $4151, $4152, $4153, $4154, $4155, $4156, $4157, $4158, $4159, $4160, $4161, $4162, $4163, $4164, $4165, $4166, $4167, $4168, VersionRange($4169, $4170)), ($4171, $4172, $4173, $4174, $4175, $4176, $4177, $4178, $4179, $4180, $4181, $4182, $4183, $4184, $4185, $4186, $4187, $4188, $4189, $4190, $4191, $4192, $4193, $4194, $4195, $4196, $4197, $4198, VersionRange($4199, $4200)), ($4201, $4202, $4203, $4204, $4205, $4206, $4207, $4208, $4209, $4210, $4211, $4212, $4213, $4214, $4215, $4216, $4217, $4218, $4219, $4220, $4221, $4222, $4223, $4224, $4225, $4226, $4227, $4228, VersionRange($4229, $4230)), ($4231, $4232, $4233, $4234, $4235, $4236, $4237, $4238, $4239, $4240, $4241, $4242, $4243, $4244, $4245, $4246, $4247, $4248, $4249, $4250, $4251, $4252, $4253, $4254, $4255, $4256, $4257, $4258, VersionRange($4259, $4260)), ($4261, $4262, $4263, $4264, $4265, $4266, $4267, $4268, $4269, $4270, $4271, $4272, $4273, $4274, $4275, $4276, $4277, $4278, $4279, $4280, $4281, $4282, $4283, $4284, $4285, $4286, $4287, $4288, VersionRange($4289, $4290)), ($4291, $4292, $4293, $4294, $4295, $4296, $4297, $4298, $4299, $4300, $4301, $4302, $4303, $4304, $4305, $4306, $4307, $4308, $4309, $4310, $4311, $4312, $4313, $4314, $4315, $4316, $4317, $4318, VersionRange($4319, $4320)), ($4321, $4322, $4323, $4324, $4325, $4326, $4327, $4328, $4329, $4330, $4331, $4332, $4333, $4334, $4335, $4336, $4337, $4338, $4339, $4340, $4341, $4342, $4343, $4344, $4345, $4346, $4347, $4348, VersionRange($4349, $4350)), ($4351, $4352, $4353, $4354, $4355, $4356, $4357, $4358, $4359, $4360, $4361, $4362, $4363, $4364, $4365, $4366, $4367, $4368, $4369, $4370, $4371, $4372, $4373, $4374, $4375, $4376, $4377, $4378, VersionRange($4379, $4380)), ($4381, $4382, $4383, $4384, $4385, $4386, $4387, $4388, $4389, $4390, $4391, $4392, $4393, $4394, $4395, $4396, $4397, $4398, $4399, $4400, $4401, $4402, $4403, $4404, $4405, $4406, $4407, $4408, VersionRange($4409, $4410)), ($4411, $4412, $4413, $4414, $4415, $4416, $4417, $4418, $4419, $4420, $4421, $4422, $4423, $4424, $4425, $4426, $4427, $4428, $4429, $4430, $4431, $4432, $4433, $4434, $4435, $4436, $4437, $4438, VersionRange($4439, $4440)), ($4441, $4442, $4443, $4444, $4445, $4446, $4447, $4448, $4449, $4450, $4451, $4452, $4453, $4454, $4455, $4456, $4457, $4458, $4459, $4460, $4461, $4462, $4463, $4464, $4465, $4466, $4467, $4468, VersionRange($4469, $4470)), ($4471, $4472, $4473, $4474, $4475, $4476, $4477, $4478, $4479, $4480, $4481, $4482, $4483, $4484, $4485, $4486, $4487, $4488, $4489, $4490, $4491, $4492, $4493, $4494, $4495, $4496, $4497, $4498, VersionRange($4499, $4500)), ($4501, $4502, $4503, $4504, $4505, $4506, $4507, $4508, $4509, $4510, $4511, $4512, $4513, $4514, $4515, $4516, $4517, $4518, $4519, $4520, $4521, $4522, $4523, $4524, $4525, $4526, $4527, $4528, VersionRange($4529, $4530)), ($4531, $4532, $4533, $4534, $4535, $4536, $4537, $4538, $4539, $4540, $4541, $4542, $4543, $4544, $4545, $4546, $4547, $4548, $4549, $4550, $4551, $4552, $4553, $4554, $4555, $4556, $4557, $4558, VersionRange($4559, $4560)), ($4561, $4562, $4563, $4564, $4565, $4566, $4567, $4568, $4569, $4570, $4571, $4572, $4573, $4574, $4575, $4576, $4577, $4578, $4579, $4580, $4581, $4582, $4583, $4584, $4585, $4586, $4587, $4588, VersionRange($4589, $4590)), ($4591, $4592, $4593, $4594, $4595, $4596, $4597, $4598, $4599, $4600, $4601, $4602, $4603, $4604, $4605, $4606, $4607, $4608, $4609, $4610, $4611, $4612, $4613, $4614, $4615, $4616, $4617, $4618, VersionRange($4619, $4620)), ($4621, $4622, $4623, $4624, $4625, $4626, $4627, $4628, $4629, $4630, $4631, $4632, $4633, $4634, $4635, $4636, $4637, $4638, $4639, $4640, $4641, $4642, $4643, $4644, $4645, $4646, $4647, $4648, VersionRange($4649, $4650)), ($4651, $4652, $4653, $4654, $4655, $4656, $4657, $4658, $4659, $4660, $4661, $4662, $4663, $4664, $4665, $4666, $4667, $4668, $4669, $4670, $4671, $4672, $4673, $4674, $4675, $4676, $4677, $4678, VersionRange($4679, $4680)), ($4681, $4682, $4683, $4684, $4685, $4686, $4687, $4688, $4689, $4690, $4691, $4692, $4693, $4694, $4695, $4696, $4697, $4698, $4699, $4700, $4701, $4702, $4703, $4704, $4705, $4706, $4707, $4708, VersionRange($4709, $4710)), ($4711, $4712, $4713, $4714, $4715, $4716, $4717, $4718, $4719, $4720, $4721, $4722, $4723, $4724, $4725, $4726, $4727, $4728, $4729, $4730, $4731, $4732, $4733, $4734, $4735, $4736, $4737, $4738, VersionRange($4739, $4740)), ($4741, $4742, $4743, $4744, $4745, $4746, $4747, $4748, $4749, $4750, $4751, $4752, $4753, $4754, $4755, $4756, $4757, $4758, $4759, $4760, $4761, $4762, $4763, $4764, $4765, $4766, $4767, $4768, VersionRange($4769, $4770)), ($4771, $4772, $4773, $4774, $4775, $4776, $4777, $4778, $4779, $4780, $4781, $4782, $4783, $4784, $4785, $4786, $4787, $4788, $4789, $4790, $4791, $4792, $4793, $4794, $4795, $4796, $4797, $4798, VersionRange($4799, $4800)), ($4801, $4802, $4803, $4804, $4805, $4806, $4807, $4808, $4809, $4810, $4811, $4812, $4813, $4814, $4815, $4816, $4817, $4818, $4819, $4820, $4821, $4822, $4823, $4824, $4825, $4826, $4827, $4828, VersionRange($4829, $4830)), ($4831, $4832, $4833, $4834, $4835, $4836, $4837, $4838, $4839, $4840, $4841, $4842, $4843, $4844, $4845, $4846, $4847, $4848, $4849, $4850, $4851, $4852, $4853, $4854, $4855, $4856, $4857, $4858, VersionRange($4859, $4860)), ($4861, $4862, $4863, $4864, $4865, $4866, $4867, $4868, $4869, $4870, $4871, $4872, $4873, $4874, $4875, $4876, $4877, $4878, $4879, $4880, $4881, $4882, $4883, $4884, $4885, $4886, $4887, $4888, VersionRange($4889, $4890)), ($4891, $4892, $4893, $4894, $4895, $4896, $4897, $4898, $4899, $4900, $4901, $4902, $4903, $4904, $4905, $4906, $4907, $4908, $4909, $4910, $4911, $4912, $4913, $4914, $4915, $4916, $4917, $4918, VersionRange($4919, $4920)), ($4921, $4922, $4923, $4924, $4925, $4926, $4927, $4928, $4929, $4930, $4931, $4932, $4933, $4934, $4935, $4936, $4937, $4938, $4939, $4940, $4941, $4942, $4943, $4944, $4945, $4946, $4947, $4948, VersionRange($4949, $4950)), ($4951, $4952, $4953, $4954, $4955, $4956, $4957, $4958, $4959, $4960, $4961, $4962, $4963, $4964, $4965, $4966, $4967, $4968, $4969, $4970, $4971, $4972, $4973, $4974, $4975, $4976, $4977, $4978, VersionRange($4979, $4980)), ($4981, $4982, $4983, $4984, $4985, $4986, $4987, $4988, $4989, $4990, $4991, $4992, $4993, $4994, $4995, $4996, $4997, $4998, $4999, $5000, $5001, $5002, $5003, $5004, $5005, $5006, $5007, $5008, VersionRange($5009, $5010)), ($5011, $5012, $5013, $5014, $5015, $5016, $5017, $5018, $5019, $5020, $5021, $5022, $5023, $5024, $5025, $5026, $5027, $5028, $5029, $5030, $5031, $5032, $5033, $5034, $5035, $5036, $5037, $5038, VersionRange($5039, $5040)), ($5041, $5042, $5043, $5044, $5045, $5046, $5047, $5048, $5049, $5050, $5051, $5052, $5053, $5054, $5055, $5056, $5057, $5058, $5059, $5060, $5061, $5062, $5063, $5064, $5065, $5066, $5067, $5068, VersionRange($5069, $5070)), ($5071, $5072, $5073, $5074, $5075, $5076, $5077, $5078, $5079, $5080, $5081, $5082, $5083, $5084, $5085, $5086, $5087, $5088, $5089, $5090, $5091, $5092, $5093, $5094, $5095, $5096, $5097, $5098, VersionRange($5099, $5100)), ($5101, $5102, $5103, $5104, $5105, $5106, $5107, $5108, $5109, $5110, $5111, $5112, $5113, $5114, $5115, $5116, $5117, $5118, $5119, $5120, $5121, $5122, $5123, $5124, $5125, $5126, $5127, $5128, VersionRange($5129, $5130)), ($5131, $5132, $5133, $5134, $5135, $5136, $5137, $5138, $5139, $5140, $5141, $5142, $5143, $5144, $5145, $5146, $5147, $5148, $5149, $5150, $5151, $5152, $5153, $5154, $5155, $5156, $5157, $5158, VersionRange($5159, $5160)), ($5161, $5162, $5163, $5164, $5165, $5166, $5167, $5168, $5169, $5170, $5171, $5172, $5173, $5174, $5175, $5176, $5177, $5178, $5179, $5180, $5181, $5182, $5183, $5184, $5185, $5186, $5187, $5188, VersionRange($5189, $5190)), ($5191, $5192, $5193, $5194, $5195, $5196, $5197, $5198, $5199, $5200, $5201, $5202, $5203, $5204, $5205, $5206, $5207, $5208, $5209, $5210, $5211, $5212, $5213, $5214, $5215, $5216, $5217, $5218, VersionRange($5219, $5220)), ($5221, $5222, $5223, $5224, $5225, $5226, $5227, $5228, $5229, $5230, $5231, $5232, $5233, $5234, $5235, $5236, $5237, $5238, $5239, $5240, $5241, $5242, $5243, $5244, $5245, $5246, $5247, $5248, VersionRange($5249, $5250)), ($5251, $5252, $5253, $5254, $5255, $5256, $5257, $5258, $5259, $5260, $5261, $5262, $5263, $5264, $5265, $5266, $5267, $5268, $5269, $5270, $5271, $5272, $5273, $5274, $5275, $5276, $5277, $5278, VersionRange($5279, $5280)), ($5281, $5282, $5283, $5284, $5285, $5286, $5287, $5288, $5289, $5290, $5291, $5292, $5293, $5294, $5295, $5296, $5297, $5298, $5299, $5300, $5301, $5302, $5303, $5304, $5305, $5306, $5307, $5308, VersionRange($5309, $5310)), ($5311, $5312, $5313, $5314, $5315, $5316, $5317, $5318, $5319, $5320, $5321, $5322, $5323, $5324, $5325, $5326, $5327, $5328, $5329, $5330, $5331, $5332, $5333, $5334, $5335, $5336, $5337, $5338, VersionRange($5339, $5340)), ($5341, $5342, $5343, $5344, $5345, $5346, $5347, $5348, $5349, $5350, $5351, $5352, $5353, $5354, $5355, $5356, $5357, $5358, $5359, $5360, $5361, $5362, $5363, $5364, $5365, $5366, $5367, $5368, VersionRange($5369, $5370)), ($5371, $5372, $5373, $5374, $5375, $5376, $5377, $5378, $5379, $5380, $5381, $5382, $5383, $5384, $5385, $5386, $5387, $5388, $5389, $5390, $5391, $5392, $5393, $5394, $5395, $5396, $5397, $5398, VersionRange($5399, $5400)), ($5401, $5402, $5403, $5404, $5405, $5406, $5407, $5408, $5409, $5410, $5411, $5412, $5413, $5414, $5415, $5416, $5417, $5418, $5419, $5420, $5421, $5422, $5423, $5424, $5425, $5426, $5427, $5428, VersionRange($5429, $5430)), ($5431, $5432, $5433, $5434, $5435, $5436, $5437, $5438, $5439, $5440, $5441, $5442, $5443, $5444, $5445, $5446, $5447, $5448, $5449, $5450, $5451, $5452, $5453, $5454, $5455, $5456, $5457, $5458, VersionRange($5459, $5460)), ($5461, $5462, $5463, $5464, $5465, $5466, $5467, $5468, $5469, $5470, $5471, $5472, $5473, $5474, $5475, $5476, $5477, $5478, $5479, $5480, $5481, $5482, $5483, $5484, $5485, $5486, $5487, $5488, VersionRange($5489, $5490)), ($5491, $5492, $5493, $5494, $5495, $5496, $5497, $5498, $5499, $5500, $5501, $5502, $5503, $5504, $5505, $5506, $5507, $5508, $5509, $5510, $5511, $5512, $5513, $5514, $5515, $5516, $5517, $5518, VersionRange($5519, $5520)), ($5521, $5522, $5523, $5524, $5525, $5526, $5527, $5528, $5529, $5530, $5531, $5532, $5533, $5534, $5535, $5536, $5537, $5538, $5539, $5540, $5541, $5542, $5543, $5544, $5545, $5546, $5547, $5548, VersionRange($5549, $5550)), ($5551, $5552, $5553, $5554, $5555, $5556, $5557, $5558, $5559, $5560, $5561, $5562, $5563, $5564, $5565, $5566, $5567, $5568, $5569, $5570, $5571, $5572, $5573, $5574, $5575, $5576, $5577, $5578, VersionRange($5579, $5580)), ($5581, $5582, $5583, $5584, $5585, $5586, $5587, $5588, $5589, $5590, $5591, $5592, $5593, $5594, $5595, $5596, $5597, $5598, $5599, $5600, $5601, $5602, $5603, $5604, $5605, $5606, $5607, $5608, VersionRange($5609, $5610)), ($5611, $5612, $5613, $5614, $5615, $5616, $5617, $5618, $5619, $5620, $5621, $5622, $5623, $5624, $5625, $5626, $5627, $5628, $5629, $5630, $5631, $5632, $5633, $5634, $5635, $5636, $5637, $5638, VersionRange($5639, $5640)), ($5641, $5642, $5643, $5644, $5645, $5646, $5647, $5648, $5649, $5650, $5651, $5652, $5653, $5654, $5655, $5656, $5657, $5658, $5659, $5660, $5661, $5662, $5663, $5664, $5665, $5666, $5667, $5668, VersionRange($5669, $5670)), ($5671, $5672, $5673, $5674, $5675, $5676, $5677, $5678, $5679, $5680, $5681, $5682, $5683, $5684, $5685, $5686, $5687, $5688, $5689, $5690, $5691, $5692, $5693, $5694, $5695, $5696, $5697, $5698, VersionRange($5699, $5700)), ($5701, $5702, $5703, $5704, $5705, $5706, $5707, $5708, $5709, $5710, $5711, $5712, $5713, $5714, $5715, $5716, $5717, $5718, $5719, $5720, $5721, $5722, $5723, $5724, $5725, $5726, $5727, $5728, VersionRange($5729, $5730)), ($5731, $5732, $5733, $5734, $5735, $5736, $5737, $5738, $5739, $5740, $5741, $5742, $5743, $5744, $5745, $5746, $5747, $5748, $5749, $5750, $5751, $5752, $5753, $5754, $5755, $5756, $5757, $5758, VersionRange($5759, $5760)), ($5761, $5762, $5763, $5764, $5765, $5766, $5767, $5768, $5769, $5770, $5771, $5772, $5773, $5774, $5775, $5776, $5777, $5778, $5779, $5780, $5781, $5782, $5783, $5784, $5785, $5786, $5787, $5788, VersionRange($5789, $5790)), ($5791, $5792, $5793, $5794, $5795, $5796, $5797, $5798, $5799, $5800, $5801, $5802, $5803, $5804, $5805, $5806, $5807, $5808, $5809, $5810, $5811, $5812, $5813, $5814, $5815, $5816, $5817, $5818, VersionRange($5819, $5820)), ($5821, $5822, $5823, $5824, $5825, $5826, $5827, $5828, $5829, $5830, $5831, $5832, $5833, $5834, $5835, $5836, $5837, $5838, $5839, $5840, $5841, $5842, $5843, $5844, $5845, $5846, $5847, $5848, VersionRange($5849, $5850)), ($5851, $5852, $5853, $5854, $5855, $5856, $5857, $5858, $5859, $5860, $5861, $5862, $5863, $5864, $5865, $5866, $5867, $5868, $5869, $5870, $5871, $5872, $5873, $5874, $5875, $5876, $5877, $5878, VersionRange($5879, $5880)), ($5881, $5882, $5883, $5884, $5885, $5886, $5887, $5888, $5889, $5890, $5891, $5892, $5893, $5894, $5895, $5896, $5897, $5898, $5899, $5900, $5901, $5902, $5903, $5904, $5905, $5906, $5907, $5908, VersionRange($5909, $5910)), ($5911, $5912, $5913, $5914, $5915, $5916, $5917, $5918, $5919, $5920, $5921, $5922, $5923, $5924, $5925, $5926, $5927, $5928, $5929, $5930, $5931, $5932, $5933, $5934, $5935, $5936, $5937, $5938, VersionRange($5939, $5940)), ($5941, $5942, $5943, $5944, $5945, $5946, $5947, $5948, $5949, $5950, $5951, $5952, $5953, $5954, $5955, $5956, $5957, $5958, $5959, $5960, $5961, $5962, $5963, $5964, $5965, $5966, $5967, $5968, VersionRange($5969, $5970)), ($5971, $5972, $5973, $5974, $5975, $5976, $5977, $5978, $5979, $5980, $5981, $5982, $5983, $5984, $5985, $5986, $5987, $5988, $5989, $5990, $5991, $5992, $5993, $5994, $5995, $5996, $5997, $5998, VersionRange($5999, $6000)), ($6001, $6002, $6003, $6004, $6005, $6006, $6007, $6008, $6009, $6010, $6011, $6012, $6013, $6014, $6015, $6016, $6017, $6018, $6019, $6020, $6021, $6022, $6023, $6024, $6025, $6026, $6027, $6028, VersionRange($6029, $6030)), ($6031, $6032, $6033, $6034, $6035, $6036, $6037, $6038, $6039, $6040, $6041, $6042, $6043, $6044, $6045, $6046, $6047, $6048, $6049, $6050, $6051, $6052, $6053, $6054, $6055, $6056, $6057, $6058, VersionRange($6059, $6060)), ($6061, $6062, $6063, $6064, $6065, $6066, $6067, $6068, $6069, $6070, $6071, $6072, $6073, $6074, $6075, $6076, $6077, $6078, $6079, $6080, $6081, $6082, $6083, $6084, $6085, $6086, $6087, $6088, VersionRange($6089, $6090)), ($6091, $6092, $6093, $6094, $6095, $6096, $6097, $6098, $6099, $6100, $6101, $6102, $6103, $6104, $6105, $6106, $6107, $6108, $6109, $6110, $6111, $6112, $6113, $6114, $6115, $6116, $6117, $6118, VersionRange($6119, $6120)), ($6121, $6122, $6123, $6124, $6125, $6126, $6127, $6128, $6129, $6130, $6131, $6132, $6133, $6134, $6135, $6136, $6137, $6138, $6139, $6140, $6141, $6142, $6143, $6144, $6145, $6146, $6147, $6148, VersionRange($6149, $6150)), ($6151, $6152, $6153, $6154, $6155, $6156, $6157, $6158, $6159, $6160, $6161, $6162, $6163, $6164, $6165, $6166, $6167, $6168, $6169, $6170, $6171, $6172, $6173, $6174, $6175, $6176, $6177, $6178, VersionRange($6179, $6180)), ($6181, $6182, $6183, $6184, $6185, $6186, $6187, $6188, $6189, $6190, $6191, $6192, $6193, $6194, $6195, $6196, $6197, $6198, $6199, $6200, $6201, $6202, $6203, $6204, $6205, $6206, $6207, $6208, VersionRange($6209, $6210)), ($6211, $6212, $6213, $6214, $6215, $6216, $6217, $6218, $6219, $6220, $6221, $6222, $6223, $6224, $6225, $6226, $6227, $6228, $6229, $6230, $6231, $6232, $6233, $6234, $6235, $6236, $6237, $6238, VersionRange($6239, $6240)), ($6241, $6242, $6243, $6244, $6245, $6246, $6247, $6248, $6249, $6250, $6251, $6252, $6253, $6254, $6255, $6256, $6257, $6258, $6259, $6260, $6261, $6262, $6263, $6264, $6265, $6266, $6267, $6268, VersionRange($6269, $6270)), ($6271, $6272, $6273, $6274, $6275, $6276, $6277, $6278, $6279, $6280, $6281, $6282, $6283, $6284, $6285, $6286, $6287, $6288, $6289, $6290, $6291, $6292, $6293, $6294, $6295, $6296, $6297, $6298, VersionRange($6299, $6300)), ($6301, $6302, $6303, $6304, $6305, $6306, $6307, $6308, $6309, $6310, $6311, $6312, $6313, $6314, $6315, $6316, $6317, $6318, $6319, $6320, $6321, $6322, $6323, $6324, $6325, $6326, $6327, $6328, VersionRange($6329, $6330)), ($6331, $6332, $6333, $6334, $6335, $6336, $6337, $6338, $6339, $6340, $6341, $6342, $6343, $6344, $6345, $6346, $6347, $6348, $6349, $6350, $6351, $6352, $6353, $6354, $6355, $6356, $6357, $6358, VersionRange($6359, $6360)), ($6361, $6362, $6363, $6364, $6365, $6366, $6367, $6368, $6369, $6370, $6371, $6372, $6373, $6374, $6375, $6376, $6377, $6378, $6379, $6380, $6381, $6382, $6383, $6384, $6385, $6386, $6387, $6388, VersionRange($6389, $6390)), ($6391, $6392, $6393, $6394, $6395, $6396, $6397, $6398, $6399, $6400, $6401, $6402, $6403, $6404, $6405, $6406, $6407, $6408, $6409, $6410, $6411, $6412, $6413, $6414, $6415, $6416, $6417, $6418, VersionRange($6419, $6420)), ($6421, $6422, $6423, $6424, $6425, $6426, $6427, $6428, $6429, $6430, $6431, $6432, $6433, $6434, $6435, $6436, $6437, $6438, $6439, $6440, $6441, $6442, $6443, $6444, $6445, $6446, $6447, $6448, VersionRange($6449, $6450)), ($6451, $6452, $6453, $6454, $6455, $6456, $6457, $6458, $6459, $6460, $6461, $6462, $6463, $6464, $6465, $6466, $6467, $6468, $6469, $6470, $6471, $6472, $6473, $6474, $6475, $6476, $6477, $6478, VersionRange($6479, $6480)), ($6481, $6482, $6483, $6484, $6485, $6486, $6487, $6488, $6489, $6490, $6491, $6492, $6493, $6494, $6495, $6496, $6497, $6498, $6499, $6500, $6501, $6502, $6503, $6504, $6505, $6506, $6507, $6508, VersionRange($6509, $6510)), ($6511, $6512, $6513, $6514, $6515, $6516, $6517, $6518, $6519, $6520, $6521, $6522, $6523, $6524, $6525, $6526, $6527, $6528, $6529, $6530, $6531, $6532, $6533, $6534, $6535, $6536, $6537, $6538, VersionRange($6539, $6540)), ($6541, $6542, $6543, $6544, $6545, $6546, $6547, $6548, $6549, $6550, $6551, $6552, $6553, $6554, $6555, $6556, $6557, $6558, $6559, $6560, $6561, $6562, $6563, $6564, $6565, $6566, $6567, $6568, VersionRange($6569, $6570)), ($6571, $6572, $6573, $6574, $6575, $6576, $6577, $6578, $6579, $6580, $6581, $6582, $6583, $6584, $6585, $6586, $6587, $6588, $6589, $6590, $6591, $6592, $6593, $6594, $6595, $6596, $6597, $6598, VersionRange($6599, $6600)), ($6601, $6602, $6603, $6604, $6605, $6606, $6607, $6608, $6609, $6610, $6611, $6612, $6613, $6614, $6615, $6616, $6617, $6618, $6619, $6620, $6621, $6622, $6623, $6624, $6625, $6626, $6627, $6628, VersionRange($6629, $6630)), ($6631, $6632, $6633, $6634, $6635, $6636, $6637, $6638, $6639, $6640, $6641, $6642, $6643, $6644, $6645, $6646, $6647, $6648, $6649, $6650, $6651, $6652, $6653, $6654, $6655, $6656, $6657, $6658, VersionRange($6659, $6660)), ($6661, $6662, $6663, $6664, $6665, $6666, $6667, $6668, $6669, $6670, $6671, $6672, $6673, $6674, $6675, $6676, $6677, $6678, $6679, $6680, $6681, $6682, $6683, $6684, $6685, $6686, $6687, $6688, VersionRange($6689, $6690)), ($6691, $6692, $6693, $6694, $6695, $6696, $6697, $6698, $6699, $6700, $6701, $6702, $6703, $6704, $6705, $6706, $6707, $6708, $6709, $6710, $6711, $6712, $6713, $6714, $6715, $6716, $6717, $6718, VersionRange($6719, $6720)), ($6721, $6722, $6723, $6724, $6725, $6726, $6727, $6728, $6729, $6730, $6731, $6732, $6733, $6734, $6735, $6736, $6737, $6738, $6739, $6740, $6741, $6742, $6743, $6744, $6745, $6746, $6747, $6748, VersionRange($6749, $6750)), ($6751, $6752, $6753, $6754, $6755, $6756, $6757, $6758, $6759, $6760, $6761, $6762, $6763, $6764, $6765, $6766, $6767, $6768, $6769, $6770, $6771, $6772, $6773, $6774, $6775, $6776, $6777, $6778, VersionRange($6779, $6780)), ($6781, $6782, $6783, $6784, $6785, $6786, $6787, $6788, $6789, $6790, $6791, $6792, $6793, $6794, $6795, $6796, $6797, $6798, $6799, $6800, $6801, $6802, $6803, $6804, $6805, $6806, $6807, $6808, VersionRange($6809, $6810)), ($6811, $6812, $6813, $6814, $6815, $6816, $6817, $6818, $6819, $6820, $6821, $6822, $6823, $6824, $6825, $6826, $6827, $6828, $6829, $6830, $6831, $6832, $6833, $6834, $6835, $6836, $6837, $6838, VersionRange($6839, $6840)), ($6841, $6842, $6843, $6844, $6845, $6846, $6847, $6848, $6849, $6850, $6851, $6852, $6853, $6854, $6855, $6856, $6857, $6858, $6859, $6860, $6861, $6862, $6863, $6864, $6865, $6866, $6867, $6868, VersionRange($6869, $6870)), ($6871, $6872, $6873, $6874, $6875, $6876, $6877, $6878, $6879, $6880, $6881, $6882, $6883, $6884, $6885, $6886, $6887, $6888, $6889, $6890, $6891, $6892, $6893, $6894, $6895, $6896, $6897, $6898, VersionRange($6899, $6900)), ($6901, $6902, $6903, $6904, $6905, $6906, $6907, $6908, $6909, $6910, $6911, $6912, $6913, $6914, $6915, $6916, $6917, $6918, $6919, $6920, $6921, $6922, $6923, $6924, $6925, $6926, $6927, $6928, VersionRange($6929, $6930)), ($6931, $6932, $6933, $6934, $6935, $6936, $6937, $6938, $6939, $6940, $6941, $6942, $6943, $6944, $6945, $6946, $6947, $6948, $6949, $6950, $6951, $6952, $6953, $6954, $6955, $6956, $6957, $6958, VersionRange($6959, $6960)), ($6961, $6962, $6963, $6964, $6965, $6966, $6967, $6968, $6969, $6970, $6971, $6972, $6973, $6974, $6975, $6976, $6977, $6978, $6979, $6980, $6981, $6982, $6983, $6984, $6985, $6986, $6987, $6988, VersionRange($6989, $6990)), ($6991, $6992, $6993, $6994, $6995, $6996, $6997, $6998, $6999, $7000, $7001, $7002, $7003, $7004, $7005, $7006, $7007, $7008, $7009, $7010, $7011, $7012, $7013, $7014, $7015, $7016, $7017, $7018, VersionRange($7019, $7020)), ($7021, $7022, $7023, $7024, $7025, $7026, $7027, $7028, $7029, $7030, $7031, $7032, $7033, $7034, $7035, $7036, $7037, $7038, $7039, $7040, $7041, $7042, $7043, $7044, $7045, $7046, $7047, $7048, VersionRange($7049, $7050)), ($7051, $7052, $7053, $7054, $7055, $7056, $7057, $7058, $7059, $7060, $7061, $7062, $7063, $7064, $7065, $7066, $7067, $7068, $7069, $7070, $7071, $7072, $7073, $7074, $7075, $7076, $7077, $7078, VersionRange($7079, $7080)), ($7081, $7082, $7083, $7084, $7085, $7086, $7087, $7088, $7089, $7090, $7091, $7092, $7093, $7094, $7095, $7096, $7097, $7098, $7099, $7100, $7101, $7102, $7103, $7104, $7105, $7106, $7107, $7108, VersionRange($7109, $7110)), ($7111, $7112, $7113, $7114, $7115, $7116, $7117, $7118, $7119, $7120, $7121, $7122, $7123, $7124, $7125, $7126, $7127, $7128, $7129, $7130, $7131, $7132, $7133, $7134, $7135, $7136, $7137, $7138, VersionRange($7139, $7140)), ($7141, $7142, $7143, $7144, $7145, $7146, $7147, $7148, $7149, $7150, $7151, $7152, $7153, $7154, $7155, $7156, $7157, $7158, $7159, $7160, $7161, $7162, $7163, $7164, $7165, $7166, $7167, $7168, VersionRange($7169, $7170)), ($7171, $7172, $7173, $7174, $7175, $7176, $7177, $7178, $7179, $7180, $7181, $7182, $7183, $7184, $7185, $7186, $7187, $7188, $7189, $7190, $7191, $7192, $7193, $7194, $7195, $7196, $7197, $7198, VersionRange($7199, $7200)), ($7201, $7202, $7203, $7204, $7205, $7206, $7207, $7208, $7209, $7210, $7211, $7212, $7213, $7214, $7215, $7216, $7217, $7218, $7219, $7220, $7221, $7222, $7223, $7224, $7225, $7226, $7227, $7228, VersionRange($7229, $7230)), ($7231, $7232, $7233, $7234, $7235, $7236, $7237, $7238, $7239, $7240, $7241, $7242, $7243, $7244, $7245, $7246, $7247, $7248, $7249, $7250, $7251, $7252, $7253, $7254, $7255, $7256, $7257, $7258, VersionRange($7259, $7260)), ($7261, $7262, $7263, $7264, $7265, $7266, $7267, $7268, $7269, $7270, $7271, $7272, $7273, $7274, $7275, $7276, $7277, $7278, $7279, $7280, $7281, $7282, $7283, $7284, $7285, $7286, $7287, $7288, VersionRange($7289, $7290)), ($7291, $7292, $7293, $7294, $7295, $7296, $7297, $7298, $7299, $7300, $7301, $7302, $7303, $7304, $7305, $7306, $7307, $7308, $7309, $7310, $7311, $7312, $7313, $7314, $7315, $7316, $7317, $7318, VersionRange($7319, $7320)), ($7321, $7322, $7323, $7324, $7325, $7326, $7327, $7328, $7329, $7330, $7331, $7332, $7333, $7334, $7335, $7336, $7337, $7338, $7339, $7340, $7341, $7342, $7343, $7344, $7345, $7346, $7347, $7348, VersionRange($7349, $7350)), ($7351, $7352, $7353, $7354, $7355, $7356, $7357, $7358, $7359, $7360, $7361, $7362, $7363, $7364, $7365, $7366, $7367, $7368, $7369, $7370, $7371, $7372, $7373, $7374, $7375, $7376, $7377, $7378, VersionRange($7379, $7380)), ($7381, $7382, $7383, $7384, $7385, $7386, $7387, $7388, $7389, $7390, $7391, $7392, $7393, $7394, $7395, $7396, $7397, $7398, $7399, $7400, $7401, $7402, $7403, $7404, $7405, $7406, $7407, $7408, VersionRange($7409, $7410)), ($7411, $7412, $7413, $7414, $7415, $7416, $7417, $7418, $7419, $7420, $7421, $7422, $7423, $7424, $7425, $7426, $7427, $7428, $7429, $7430, $7431, $7432, $7433, $7434, $7435, $7436, $7437, $7438, VersionRange($7439, $7440)), ($7441, $7442, $7443, $7444, $7445, $7446, $7447, $7448, $7449, $7450, $7451, $7452, $7453, $7454, $7455, $7456, $7457, $7458, $7459, $7460, $7461, $7462, $7463, $7464, $7465, $7466, $7467, $7468, VersionRange($7469, $7470)), ($7471, $7472, $7473, $7474, $7475, $7476, $7477, $7478, $7479, $7480, $7481, $7482, $7483, $7484, $7485, $7486, $7487, $7488, $7489, $7490, $7491, $7492, $7493, $7494, $7495, $7496, $7497, $7498, VersionRange($7499, $7500)), ($7501, $7502, $7503, $7504, $7505, $7506, $7507, $7508, $7509, $7510, $7511, $7512, $7513, $7514, $7515, $7516, $7517, $7518, $7519, $7520, $7521, $7522, $7523, $7524, $7525, $7526, $7527, $7528, VersionRange($7529, $7530)), ($7531, $7532, $7533, $7534, $7535, $7536, $7537, $7538, $7539, $7540, $7541, $7542, $7543, $7544, $7545, $7546, $7547, $7548, $7549, $7550, $7551, $7552, $7553, $7554, $7555, $7556, $7557, $7558, VersionRange($7559, $7560)), ($7561, $7562, $7563, $7564, $7565, $7566, $7567, $7568, $7569, $7570, $7571, $7572, $7573, $7574, $7575, $7576, $7577, $7578, $7579, $7580, $7581, $7582, $7583, $7584, $7585, $7586, $7587, $7588, VersionRange($7589, $7590)), ($7591, $7592, $7593, $7594, $7595, $7596, $7597, $7598, $7599, $7600, $7601, $7602, $7603, $7604, $7605, $7606, $7607, $7608, $7609, $7610, $7611, $7612, $7613, $7614, $7615, $7616, $7617, $7618, VersionRange($7619, $7620)), ($7621, $7622, $7623, $7624, $7625, $7626, $7627, $7628, $7629, $7630, $7631, $7632, $7633, $7634, $7635, $7636, $7637, $7638, $7639, $7640, $7641, $7642, $7643, $7644, $7645, $7646, $7647, $7648, VersionRange($7649, $7650)), ($7651, $7652, $7653, $7654, $7655, $7656, $7657, $7658, $7659, $7660, $7661, $7662, $7663, $7664, $7665, $7666, $7667, $7668, $7669, $7670, $7671, $7672, $7673, $7674, $7675, $7676, $7677, $7678, VersionRange($7679, $7680)), ($7681, $7682, $7683, $7684, $7685, $7686, $7687, $7688, $7689, $7690, $7691, $7692, $7693, $7694, $7695, $7696, $7697, $7698, $7699, $7700, $7701, $7702, $7703, $7704, $7705, $7706, $7707, $7708, VersionRange($7709, $7710)), ($7711, $7712, $7713, $7714, $7715, $7716, $7717, $7718, $7719, $7720, $7721, $7722, $7723, $7724, $7725, $7726, $7727, $7728, $7729, $7730, $7731, $7732, $7733, $7734, $7735, $7736, $7737, $7738, VersionRange($7739, $7740)), ($7741, $7742, $7743, $7744, $7745, $7746, $7747, $7748, $7749, $7750, $7751, $7752, $7753, $7754, $7755, $7756, $7757, $7758, $7759, $7760, $7761, $7762, $7763, $7764, $7765, $7766, $7767, $7768, VersionRange($7769, $7770)), ($7771, $7772, $7773, $7774, $7775, $7776, $7777, $7778, $7779, $7780, $7781, $7782, $7783, $7784, $7785, $7786, $7787, $7788, $7789, $7790, $7791, $7792, $7793, $7794, $7795, $7796, $7797, $7798, VersionRange($7799, $7800)), ($7801, $7802, $7803, $7804, $7805, $7806, $7807, $7808, $7809, $7810, $7811, $7812, $7813, $7814, $7815, $7816, $7817, $7818, $7819, $7820, $7821, $7822, $7823, $7824, $7825, $7826, $7827, $7828, VersionRange($7829, $7830)), ($7831, $7832, $7833, $7834, $7835, $7836, $7837, $7838, $7839, $7840, $7841, $7842, $7843, $7844, $7845, $7846, $7847, $7848, $7849, $7850, $7851, $7852, $7853, $7854, $7855, $7856, $7857, $7858, VersionRange($7859, $7860)), ($7861, $7862, $7863, $7864, $7865, $7866, $7867, $7868, $7869, $7870, $7871, $7872, $7873, $7874, $7875, $7876, $7877, $7878, $7879, $7880, $7881, $7882, $7883, $7884, $7885, $7886, $7887, $7888, VersionRange($7889, $7890)), ($7891, $7892, $7893, $7894, $7895, $7896, $7897, $7898, $7899, $7900, $7901, $7902, $7903, $7904, $7905, $7906, $7907, $7908, $7909, $7910, $7911, $7912, $7913, $7914, $7915, $7916, $7917, $7918, VersionRange($7919, $7920)), ($7921, $7922, $7923, $7924, $7925, $7926, $7927, $7928, $7929, $7930, $7931, $7932, $7933, $7934, $7935, $7936, $7937, $7938, $7939, $7940, $7941, $7942, $7943, $7944, $7945, $7946, $7947, $7948, VersionRange($7949, $7950)), ($7951, $7952, $7953, $7954, $7955, $7956, $7957, $7958, $7959, $7960, $7961, $7962, $7963, $7964, $7965, $7966, $7967, $7968, $7969, $7970, $7971, $7972, $7973, $7974, $7975, $7976, $7977, $7978, VersionRange($7979, $7980)), ($7981, $7982, $7983, $7984, $7985, $7986, $7987, $7988, $7989, $7990, $7991, $7992, $7993, $7994, $7995, $7996, $7997, $7998, $7999, $8000, $8001, $8002, $8003, $8004, $8005, $8006, $8007, $8008, VersionRange($8009, $8010)), ($8011, $8012, $8013, $8014, $8015, $8016, $8017, $8018, $8019, $8020, $8021, $8022, $8023, $8024, $8025, $8026, $8027, $8028, $8029, $8030, $8031, $8032, $8033, $8034, $8035, $8036, $8037, $8038, VersionRange($8039, $8040)), ($8041, $8042, $8043, $8044, $8045, $8046, $8047, $8048, $8049, $8050, $8051, $8052, $8053, $8054, $8055, $8056, $8057, $8058, $8059, $8060, $8061, $8062, $8063, $8064, $8065, $8066, $8067, $8068, VersionRange($8069, $8070)), ($8071, $8072, $8073, $8074, $8075, $8076, $8077, $8078, $8079, $8080, $8081, $8082, $8083, $8084, $8085, $8086, $8087, $8088, $8089, $8090, $8091, $8092, $8093, $8094, $8095, $8096, $8097, $8098, VersionRange($8099, $8100)), ($8101, $8102, $8103, $8104, $8105, $8106, $8107, $8108, $8109, $8110, $8111, $8112, $8113, $8114, $8115, $8116, $8117, $8118, $8119, $8120, $8121, $8122, $8123, $8124, $8125, $8126, $8127, $8128, VersionRange($8129, $8130)), ($8131, $8132, $8133, $8134, $8135, $8136, $8137, $8138, $8139, $8140, $8141, $8142, $8143, $8144, $8145, $8146, $8147, $8148, $8149, $8150, $8151, $8152, $8153, $8154, $8155, $8156, $8157, $8158, VersionRange($8159, $8160)), ($8161, $8162, $8163, $8164, $8165, $8166, $8167, $8168, $8169, $8170, $8171, $8172, $8173, $8174, $8175, $8176, $8177, $8178, $8179, $8180, $8181, $8182, $8183, $8184, $8185, $8186, $8187, $8188, VersionRange($8189, $8190)), ($8191, $8192, $8193, $8194, $8195, $8196, $8197, $8198, $8199, $8200, $8201, $8202, $8203, $8204, $8205, $8206, $8207, $8208, $8209, $8210, $8211, $8212, $8213, $8214, $8215, $8216, $8217, $8218, VersionRange($8219, $8220)), ($8221, $8222, $8223, $8224, $8225, $8226, $8227, $8228, $8229, $8230, $8231, $8232, $8233, $8234, $8235, $8236, $8237, $8238, $8239, $8240, $8241, $8242, $8243, $8244, $8245, $8246, $8247, $8248, VersionRange($8249, $8250)), ($8251, $8252, $8253, $8254, $8255, $8256, $8257, $8258, $8259, $8260, $8261, $8262, $8263, $8264, $8265, $8266, $8267, $8268, $8269, $8270, $8271, $8272, $8273, $8274, $8275, $8276, $8277, $8278, VersionRange($8279, $8280)), ($8281, $8282, $8283, $8284, $8285, $8286, $8287, $8288, $8289, $8290, $8291, $8292, $8293, $8294, $8295, $8296, $8297, $8298, $8299, $8300, $8301, $8302, $8303, $8304, $8305, $8306, $8307, $8308, VersionRange($8309, $8310)), ($8311, $8312, $8313, $8314, $8315, $8316, $8317, $8318, $8319, $8320, $8321, $8322, $8323, $8324, $8325, $8326, $8327, $8328, $8329, $8330, $8331, $8332, $8333, $8334, $8335, $8336, $8337, $8338, VersionRange($8339, $8340)), ($8341, $8342, $8343, $8344, $8345, $8346, $8347, $8348, $8349, $8350, $8351, $8352, $8353, $8354, $8355, $8356, $8357, $8358, $8359, $8360, $8361, $8362, $8363, $8364, $8365, $8366, $8367, $8368, VersionRange($8369, $8370)), ($8371, $8372, $8373, $8374, $8375, $8376, $8377, $8378, $8379, $8380, $8381, $8382, $8383, $8384, $8385, $8386, $8387, $8388, $8389, $8390, $8391, $8392, $8393, $8394, $8395, $8396, $8397, $8398, VersionRange($8399, $8400)), ($8401, $8402, $8403, $8404, $8405, $8406, $8407, $8408, $8409, $8410, $8411, $8412, $8413, $8414, $8415, $8416, $8417, $8418, $8419, $8420, $8421, $8422, $8423, $8424, $8425, $8426, $8427, $8428, VersionRange($8429, $8430)), ($8431, $8432, $8433, $8434, $8435, $8436, $8437, $8438, $8439, $8440, $8441, $8442, $8443, $8444, $8445, $8446, $8447, $8448, $8449, $8450, $8451, $8452, $8453, $8454, $8455, $8456, $8457, $8458, VersionRange($8459, $8460)), ($8461, $8462, $8463, $8464, $8465, $8466, $8467, $8468, $8469, $8470, $8471, $8472, $8473, $8474, $8475, $8476, $8477, $8478, $8479, $8480, $8481, $8482, $8483, $8484, $8485, $8486, $8487, $8488, VersionRange($8489, $8490)), ($8491, $8492, $8493, $8494, $8495, $8496, $8497, $8498, $8499, $8500, $8501, $8502, $8503, $8504, $8505, $8506, $8507, $8508, $8509, $8510, $8511, $8512, $8513, $8514, $8515, $8516, $8517, $8518, VersionRange($8519, $8520)), ($8521, $8522, $8523, $8524, $8525, $8526, $8527, $8528, $8529, $8530, $8531, $8532, $8533, $8534, $8535, $8536, $8537, $8538, $8539, $8540, $8541, $8542, $8543, $8544, $8545, $8546, $8547, $8548, VersionRange($8549, $8550)), ($8551, $8552, $8553, $8554, $8555, $8556, $8557, $8558, $8559, $8560, $8561, $8562, $8563, $8564, $8565, $8566, $8567, $8568, $8569, $8570, $8571, $8572, $8573, $8574, $8575, $8576, $8577, $8578, VersionRange($8579, $8580)), ($8581, $8582, $8583, $8584, $8585, $8586, $8587, $8588, $8589, $8590, $8591, $8592, $8593, $8594, $8595, $8596, $8597, $8598, $8599, $8600, $8601, $8602, $8603, $8604, $8605, $8606, $8607, $8608, VersionRange($8609, $8610)), ($8611, $8612, $8613, $8614, $8615, $8616, $8617, $8618, $8619, $8620, $8621, $8622, $8623, $8624, $8625, $8626, $8627, $8628, $8629, $8630, $8631, $8632, $8633, $8634, $8635, $8636, $8637, $8638, VersionRange($8639, $8640)), ($8641, $8642, $8643, $8644, $8645, $8646, $8647, $8648, $8649, $8650, $8651, $8652, $8653, $8654, $8655, $8656, $8657, $8658, $8659, $8660, $8661, $8662, $8663, $8664, $8665, $8666, $8667, $8668, VersionRange($8669, $8670)), ($8671, $8672, $8673, $8674, $8675, $8676, $8677, $8678, $8679, $8680, $8681, $8682, $8683, $8684, $8685, $8686, $8687, $8688, $8689, $8690, $8691, $8692, $8693, $8694, $8695, $8696, $8697, $8698, VersionRange($8699, $8700)), ($8701, $8702, $8703, $8704, $8705, $8706, $8707, $8708, $8709, $8710, $8711, $8712, $8713, $8714, $8715, $8716, $8717, $8718, $8719, $8720, $8721, $8722, $8723, $8724, $8725, $8726, $8727, $8728, VersionRange($8729, $8730)), ($8731, $8732, $8733, $8734, $8735, $8736, $8737, $8738, $8739, $8740, $8741, $8742, $8743, $8744, $8745, $8746, $8747, $8748, $8749, $8750, $8751, $8752, $8753, $8754, $8755, $8756, $8757, $8758, VersionRange($8759, $8760)), ($8761, $8762, $8763, $8764, $8765, $8766, $8767, $8768, $8769, $8770, $8771, $8772, $8773, $8774, $8775, $8776, $8777, $8778, $8779, $8780, $8781, $8782, $8783, $8784, $8785, $8786, $8787, $8788, VersionRange($8789, $8790)), ($8791, $8792, $8793, $8794, $8795, $8796, $8797, $8798, $8799, $8800, $8801, $8802, $8803, $8804, $8805, $8806, $8807, $8808, $8809, $8810, $8811, $8812, $8813, $8814, $8815, $8816, $8817, $8818, VersionRange($8819, $8820)), ($8821, $8822, $8823, $8824, $8825, $8826, $8827, $8828, $8829, $8830, $8831, $8832, $8833, $8834, $8835, $8836, $8837, $8838, $8839, $8840, $8841, $8842, $8843, $8844, $8845, $8846, $8847, $8848, VersionRange($8849, $8850)), ($8851, $8852, $8853, $8854, $8855, $8856, $8857, $8858, $8859, $8860, $8861, $8862, $8863, $8864, $8865, $8866, $8867, $8868, $8869, $8870, $8871, $8872, $8873, $8874, $8875, $8876, $8877, $8878, VersionRange($8879, $8880)), ($8881, $8882, $8883, $8884, $8885, $8886, $8887, $8888, $8889, $8890, $8891, $8892, $8893, $8894, $8895, $8896, $8897, $8898, $8899, $8900, $8901, $8902, $8903, $8904, $8905, $8906, $8907, $8908, VersionRange($8909, $8910)), ($8911, $8912, $8913, $8914, $8915, $8916, $8917, $8918, $8919, $8920, $8921, $8922, $8923, $8924, $8925, $8926, $8927, $8928, $8929, $8930, $8931, $8932, $8933, $8934, $8935, $8936, $8937, $8938, VersionRange($8939, $8940)), ($8941, $8942, $8943, $8944, $8945, $8946, $8947, $8948, $8949, $8950, $8951, $8952, $8953, $8954, $8955, $8956, $8957, $8958, $8959, $8960, $8961, $8962, $8963, $8964, $8965, $8966, $8967, $8968, VersionRange($8969, $8970)), ($8971, $8972, $8973, $8974, $8975, $8976, $8977, $8978, $8979, $8980, $8981, $8982, $8983, $8984, $8985, $8986, $8987, $8988, $8989, $8990, $8991, $8992, $8993, $8994, $8995, $8996, $8997, $8998, VersionRange($8999, $9000)), ($9001, $9002, $9003, $9004, $9005, $9006, $9007, $9008, $9009, $9010, $9011, $9012, $9013, $9014, $9015, $9016, $9017, $9018, $9019, $9020, $9021, $9022, $9023, $9024, $9025, $9026, $9027, $9028, VersionRange($9029, $9030)), ($9031, $9032, $9033, $9034, $9035, $9036, $9037, $9038, $9039, $9040, $9041, $9042, $9043, $9044, $9045, $9046, $9047, $9048, $9049, $9050, $9051, $9052, $9053, $9054, $9055, $9056, $9057, $9058, VersionRange($9059, $9060)), ($9061, $9062, $9063, $9064, $9065, $9066, $9067, $9068, $9069, $9070, $9071, $9072, $9073, $9074, $9075, $9076, $9077, $9078, $9079, $9080, $9081, $9082, $9083, $9084, $9085, $9086, $9087, $9088, VersionRange($9089, $9090)), ($9091, $9092, $9093, $9094, $9095, $9096, $9097, $9098, $9099, $9100, $9101, $9102, $9103, $9104, $9105, $9106, $9107, $9108, $9109, $9110, $9111, $9112, $9113, $9114, $9115, $9116, $9117, $9118, VersionRange($9119, $9120)), ($9121, $9122, $9123, $9124, $9125, $9126, $9127, $9128, $9129, $9130, $9131, $9132, $9133, $9134, $9135, $9136, $9137, $9138, $9139, $9140, $9141, $9142, $9143, $9144, $9145, $9146, $9147, $9148, VersionRange($9149, $9150)), ($9151, $9152, $9153, $9154, $9155, $9156, $9157, $9158, $9159, $9160, $9161, $9162, $9163, $9164, $9165, $9166, $9167, $9168, $9169, $9170, $9171, $9172, $9173, $9174, $9175, $9176, $9177, $9178, VersionRange($9179, $9180)), ($9181, $9182, $9183, $9184, $9185, $9186, $9187, $9188, $9189, $9190, $9191, $9192, $9193, $9194, $9195, $9196, $9197, $9198, $9199, $9200, $9201, $9202, $9203, $9204, $9205, $9206, $9207, $9208, VersionRange($9209, $9210)), ($9211, $9212, $9213, $9214, $9215, $9216, $9217, $9218, $9219, $9220, $9221, $9222, $9223, $9224, $9225, $9226, $9227, $9228, $9229, $9230, $9231, $9232, $9233, $9234, $9235, $9236, $9237, $9238, VersionRange($9239, $9240)), ($9241, $9242, $9243, $9244, $9245, $9246, $9247, $9248, $9249, $9250, $9251, $9252, $9253, $9254, $9255, $9256, $9257, $9258, $9259, $9260, $9261, $9262, $9263, $9264, $9265, $9266, $9267, $9268, VersionRange($9269, $9270)), ($9271, $9272, $9273, $9274, $9275, $9276, $9277, $9278, $9279, $9280, $9281, $9282, $9283, $9284, $9285, $9286, $9287, $9288, $9289, $9290, $9291, $9292, $9293, $9294, $9295, $9296, $9297, $9298, VersionRange($9299, $9300)), ($9301, $9302, $9303, $9304, $9305, $9306, $9307, $9308, $9309, $9310, $9311, $9312, $9313, $9314, $9315, $9316, $9317, $9318, $9319, $9320, $9321, $9322, $9323, $9324, $9325, $9326, $9327, $9328, VersionRange($9329, $9330)), ($9331, $9332, $9333, $9334, $9335, $9336, $9337, $9338, $9339, $9340, $9341, $9342, $9343, $9344, $9345, $9346, $9347, $9348, $9349, $9350, $9351, $9352, $9353, $9354, $9355, $9356, $9357, $9358, VersionRange($9359, $9360)), ($9361, $9362, $9363, $9364, $9365, $9366, $9367, $9368, $9369, $9370, $9371, $9372, $9373, $9374, $9375, $9376, $9377, $9378, $9379, $9380, $9381, $9382, $9383, $9384, $9385, $9386, $9387, $9388, VersionRange($9389, $9390)), ($9391, $9392, $9393, $9394, $9395, $9396, $9397, $9398, $9399, $9400, $9401, $9402, $9403, $9404, $9405, $9406, $9407, $9408, $9409, $9410, $9411, $9412, $9413, $9414, $9415, $9416, $9417, $9418, VersionRange($9419, $9420)), ($9421, $9422, $9423, $9424, $9425, $9426, $9427, $9428, $9429, $9430, $9431, $9432, $9433, $9434, $9435, $9436, $9437, $9438, $9439, $9440, $9441, $9442, $9443, $9444, $9445, $9446, $9447, $9448, VersionRange($9449, $9450)), ($9451, $9452, $9453, $9454, $9455, $9456, $9457, $9458, $9459, $9460, $9461, $9462, $9463, $9464, $9465, $9466, $9467, $9468, $9469, $9470, $9471, $9472, $9473, $9474, $9475, $9476, $9477, $9478, VersionRange($9479, $9480)), ($9481, $9482, $9483, $9484, $9485, $9486, $9487, $9488, $9489, $9490, $9491, $9492, $9493, $9494, $9495, $9496, $9497, $9498, $9499, $9500, $9501, $9502, $9503, $9504, $9505, $9506, $9507, $9508, VersionRange($9509, $9510)), ($9511, $9512, $9513, $9514, $9515, $9516, $9517, $9518, $9519, $9520, $9521, $9522, $9523, $9524, $9525, $9526, $9527, $9528, $9529, $9530, $9531, $9532, $9533, $9534, $9535, $9536, $9537, $9538, VersionRange($9539, $9540)), ($9541, $9542, $9543, $9544, $9545, $9546, $9547, $9548, $9549, $9550, $9551, $9552, $9553, $9554, $9555, $9556, $9557, $9558, $9559, $9560, $9561, $9562, $9563, $9564, $9565, $9566, $9567, $9568, VersionRange($9569, $9570)), ($9571, $9572, $9573, $9574, $9575, $9576, $9577, $9578, $9579, $9580, $9581, $9582, $9583, $9584, $9585, $9586, $9587, $9588, $9589, $9590, $9591, $9592, $9593, $9594, $9595, $9596, $9597, $9598, VersionRange($9599, $9600)), ($9601, $9602, $9603, $9604, $9605, $9606, $9607, $9608, $9609, $9610, $9611, $9612, $9613, $9614, $9615, $9616, $9617, $9618, $9619, $9620, $9621, $9622, $9623, $9624, $9625, $9626, $9627, $9628, VersionRange($9629, $9630)), ($9631, $9632, $9633, $9634, $9635, $9636, $9637, $9638, $9639, $9640, $9641, $9642, $9643, $9644, $9645, $9646, $9647, $9648, $9649, $9650, $9651, $9652, $9653, $9654, $9655, $9656, $9657, $9658, VersionRange($9659, $9660)), ($9661, $9662, $9663, $9664, $9665, $9666, $9667, $9668, $9669, $9670, $9671, $9672, $9673, $9674, $9675, $9676, $9677, $9678, $9679, $9680, $9681, $9682, $9683, $9684, $9685, $9686, $9687, $9688, VersionRange($9689, $9690)), ($9691, $9692, $9693, $9694, $9695, $9696, $9697, $9698, $9699, $9700, $9701, $9702, $9703, $9704, $9705, $9706, $9707, $9708, $9709, $9710, $9711, $9712, $9713, $9714, $9715, $9716, $9717, $9718, VersionRange($9719, $9720)), ($9721, $9722, $9723, $9724, $9725, $9726, $9727, $9728, $9729, $9730, $9731, $9732, $9733, $9734, $9735, $9736, $9737, $9738, $9739, $9740, $9741, $9742, $9743, $9744, $9745, $9746, $9747, $9748, VersionRange($9749, $9750)), ($9751, $9752, $9753, $9754, $9755, $9756, $9757, $9758, $9759, $9760, $9761, $9762, $9763, $9764, $9765, $9766, $9767, $9768, $9769, $9770, $9771, $9772, $9773, $9774, $9775, $9776, $9777, $9778, VersionRange($9779, $9780)), ($9781, $9782, $9783, $9784, $9785, $9786, $9787, $9788, $9789, $9790, $9791, $9792, $9793, $9794, $9795, $9796, $9797, $9798, $9799, $9800, $9801, $9802, $9803, $9804, $9805, $9806, $9807, $9808, VersionRange($9809, $9810)), ($9811, $9812, $9813, $9814, $9815, $9816, $9817, $9818, $9819, $9820, $9821, $9822, $9823, $9824, $9825, $9826, $9827, $9828, $9829, $9830, $9831, $9832, $9833, $9834, $9835, $9836, $9837, $9838, VersionRange($9839, $9840)), ($9841, $9842, $9843, $9844, $9845, $9846, $9847, $9848, $9849, $9850, $9851, $9852, $9853, $9854, $9855, $9856, $9857, $9858, $9859, $9860, $9861, $9862, $9863, $9864, $9865, $9866, $9867, $9868, VersionRange($9869, $9870)), ($9871, $9872, $9873, $9874, $9875, $9876, $9877, $9878, $9879, $9880, $9881, $9882, $9883, $9884, $9885, $9886, $9887, $9888, $9889, $9890, $9891, $9892, $9893, $9894, $9895, $9896, $9897, $9898, VersionRange($9899, $9900)), ($9901, $9902, $9903, $9904, $9905, $9906, $9907, $9908, $9909, $9910, $9911, $9912, $9913, $9914, $9915, $9916, $9917, $9918, $9919, $9920, $9921, $9922, $9923, $9924, $9925, $9926, $9927, $9928, VersionRange($9929, $9930)), ($9931, $9932, $9933, $9934, $9935, $9936, $9937, $9938, $9939, $9940, $9941, $9942, $9943, $9944, $9945, $9946, $9947, $9948, $9949, $9950, $9951, $9952, $9953, $9954, $9955, $9956, $9957, $9958, VersionRange($9959, $9960)), ($9961, $9962, $9963, $9964, $9965, $9966, $9967, $9968, $9969, $9970, $9971, $9972, $9973, $9974, $9975, $9976, $9977, $9978, $9979, $9980, $9981, $9982, $9983, $9984, $9985, $9986, $9987, $9988, VersionRange($9989, $9990)), ($9991, $9992, $9993, $9994, $9995, $9996, $9997, $9998, $9999, $10000, $10001, $10002, $10003, $10004, $10005, $10006, $10007, $10008, $10009, $10010, $10011, $10012, $10013, $10014, $10015, $10016, $10017, $10018, VersionRange($10019, $10020)), ($10021, $10022, $10023, $10024, $10025, $10026, $10027, $10028, $10029, $10030, $10031, $10032, $10033, $10034, $10035, $10036, $10037, $10038, $10039, $10040, $10041, $10042, $10043, $10044, $10045, $10046, $10047, $10048, VersionRange($10049, $10050)), ($10051, $10052, $10053, $10054, $10055, $10056, $10057, $10058, $10059, $10060, $10061, $10062, $10063, $10064, $10065, $10066, $10067, $10068, $10069, $10070, $10071, $10072, $10073, $10074, $10075, $10076, $10077, $10078, VersionRange($10079, $10080)), ($10081, $10082, $10083, $10084, $10085, $10086, $10087, $10088, $10089, $10090, $10091, $10092, $10093, $10094, $10095, $10096, $10097, $10098, $10099, $10100, $10101, $10102, $10103, $10104, $10105, $10106, $10107, $10108, VersionRange($10109, $10110)), ($10111, $10112, $10113, $10114, $10115, $10116, $10117, $10118, $10119, $10120, $10121, $10122, $10123, $10124, $10125, $10126, $10127, $10128, $10129, $10130, $10131, $10132, $10133, $10134, $10135, $10136, $10137, $10138, VersionRange($10139, $10140)), ($10141, $10142, $10143, $10144, $10145, $10146, $10147, $10148, $10149, $10150, $10151, $10152, $10153, $10154, $10155, $10156, $10157, $10158, $10159, $10160, $10161, $10162, $10163, $10164, $10165, $10166, $10167, $10168, VersionRange($10169, $10170)), ($10171, $10172, $10173, $10174, $10175, $10176, $10177, $10178, $10179, $10180, $10181, $10182, $10183, $10184, $10185, $10186, $10187, $10188, $10189, $10190, $10191, $10192, $10193, $10194, $10195, $10196, $10197, $10198, VersionRange($10199, $10200)), ($10201, $10202, $10203, $10204, $10205, $10206, $10207, $10208, $10209, $10210, $10211, $10212, $10213, $10214, $10215, $10216, $10217, $10218, $10219, $10220, $10221, $10222, $10223, $10224, $10225, $10226, $10227, $10228, VersionRange($10229, $10230)), ($10231, $10232, $10233, $10234, $10235, $10236, $10237, $10238, $10239, $10240, $10241, $10242, $10243, $10244, $10245, $10246, $10247, $10248, $10249, $10250, $10251, $10252, $10253, $10254, $10255, $10256, $10257, $10258, VersionRange($10259, $10260)), ($10261, $10262, $10263, $10264, $10265, $10266, $10267, $10268, $10269, $10270, $10271, $10272, $10273, $10274, $10275, $10276, $10277, $10278, $10279, $10280, $10281, $10282, $10283, $10284, $10285, $10286, $10287, $10288, VersionRange($10289, $10290)), ($10291, $10292, $10293, $10294, $10295, $10296, $10297, $10298, $10299, $10300, $10301, $10302, $10303, $10304, $10305, $10306, $10307, $10308, $10309, $10310, $10311, $10312, $10313, $10314, $10315, $10316, $10317, $10318, VersionRange($10319, $10320)), ($10321, $10322, $10323, $10324, $10325, $10326, $10327, $10328, $10329, $10330, $10331, $10332, $10333, $10334, $10335, $10336, $10337, $10338, $10339, $10340, $10341, $10342, $10343, $10344, $10345, $10346, $10347, $10348, VersionRange($10349, $10350)), ($10351, $10352, $10353, $10354, $10355, $10356, $10357, $10358, $10359, $10360, $10361, $10362, $10363, $10364, $10365, $10366, $10367, $10368, $10369, $10370, $10371, $10372, $10373, $10374, $10375, $10376, $10377, $10378, VersionRange($10379, $10380)), ($10381, $10382, $10383, $10384, $10385, $10386, $10387, $10388, $10389, $10390, $10391, $10392, $10393, $10394, $10395, $10396, $10397, $10398, $10399, $10400, $10401, $10402, $10403, $10404, $10405, $10406, $10407, $10408, VersionRange($10409, $10410)), ($10411, $10412, $10413, $10414, $10415, $10416, $10417, $10418, $10419, $10420, $10421, $10422, $10423, $10424, $10425, $10426, $10427, $10428, $10429, $10430, $10431, $10432, $10433, $10434, $10435, $10436, $10437, $10438, VersionRange($10439, $10440)), ($10441, $10442, $10443, $10444, $10445, $10446, $10447, $10448, $10449, $10450, $10451, $10452, $10453, $10454, $10455, $10456, $10457, $10458, $10459, $10460, $10461, $10462, $10463, $10464, $10465, $10466, $10467, $10468, VersionRange($10469, $10470)), ($10471, $10472, $10473, $10474, $10475, $10476, $10477, $10478, $10479, $10480, $10481, $10482, $10483, $10484, $10485, $10486, $10487, $10488, $10489, $10490, $10491, $10492, $10493, $10494, $10495, $10496, $10497, $10498, VersionRange($10499, $10500)), ($10501, $10502, $10503, $10504, $10505, $10506, $10507, $10508, $10509, $10510, $10511, $10512, $10513, $10514, $10515, $10516, $10517, $10518, $10519, $10520, $10521, $10522, $10523, $10524, $10525, $10526, $10527, $10528, VersionRange($10529, $10530)), ($10531, $10532, $10533, $10534, $10535, $10536, $10537, $10538, $10539, $10540, $10541, $10542, $10543, $10544, $10545, $10546, $10547, $10548, $10549, $10550, $10551, $10552, $10553, $10554, $10555, $10556, $10557, $10558, VersionRange($10559, $10560)), ($10561, $10562, $10563, $10564, $10565, $10566, $10567, $10568, $10569, $10570, $10571, $10572, $10573, $10574, $10575, $10576, $10577, $10578, $10579, $10580, $10581, $10582, $10583, $10584, $10585, $10586, $10587, $10588, VersionRange($10589, $10590)), ($10591, $10592, $10593, $10594, $10595, $10596, $10597, $10598, $10599, $10600, $10601, $10602, $10603, $10604, $10605, $10606, $10607, $10608, $10609, $10610, $10611, $10612, $10613, $10614, $10615, $10616, $10617, $10618, VersionRange($10619, $10620)), ($10621, $10622, $10623, $10624, $10625, $10626, $10627, $10628, $10629, $10630, $10631, $10632, $10633, $10634, $10635, $10636, $10637, $10638, $10639, $10640, $10641, $10642, $10643, $10644, $10645, $10646, $10647, $10648, VersionRange($10649, $10650)), ($10651, $10652, $10653, $10654, $10655, $10656, $10657, $10658, $10659, $10660, $10661, $10662, $10663, $10664, $10665, $10666, $10667, $10668, $10669, $10670, $10671, $10672, $10673, $10674, $10675, $10676, $10677, $10678, VersionRange($10679, $10680)), ($10681, $10682, $10683, $10684, $10685, $10686, $10687, $10688, $10689, $10690, $10691, $10692, $10693, $10694, $10695, $10696, $10697, $10698, $10699, $10700, $10701, $10702, $10703, $10704, $10705, $10706, $10707, $10708, VersionRange($10709, $10710)), ($10711, $10712, $10713, $10714, $10715, $10716, $10717, $10718, $10719, $10720, $10721, $10722, $10723, $10724, $10725, $10726, $10727, $10728, $10729, $10730, $10731, $10732, $10733, $10734, $10735, $10736, $10737, $10738, VersionRange($10739, $10740)), ($10741, $10742, $10743, $10744, $10745, $10746, $10747, $10748, $10749, $10750, $10751, $10752, $10753, $10754, $10755, $10756, $10757, $10758, $10759, $10760, $10761, $10762, $10763, $10764, $10765, $10766, $10767, $10768, VersionRange($10769, $10770)), ($10771, $10772, $10773, $10774, $10775, $10776, $10777, $10778, $10779, $10780, $10781, $10782, $10783, $10784, $10785, $10786, $10787, $10788, $10789, $10790, $10791, $10792, $10793, $10794, $10795, $10796, $10797, $10798, VersionRange($10799, $10800)), ($10801, $10802, $10803, $10804, $10805, $10806, $10807, $10808, $10809, $10810, $10811, $10812, $10813, $10814, $10815, $10816, $10817, $10818, $10819, $10820, $10821, $10822, $10823, $10824, $10825, $10826, $10827, $10828, VersionRange($10829, $10830)), ($10831, $10832, $10833, $10834, $10835, $10836, $10837, $10838, $10839, $10840, $10841, $10842, $10843, $10844, $10845, $10846, $10847, $10848, $10849, $10850, $10851, $10852, $10853, $10854, $10855, $10856, $10857, $10858, VersionRange($10859, $10860)), ($10861, $10862, $10863, $10864, $10865, $10866, $10867, $10868, $10869, $10870, $10871, $10872, $10873, $10874, $10875, $10876, $10877, $10878, $10879, $10880, $10881, $10882, $10883, $10884, $10885, $10886, $10887, $10888, VersionRange($10889, $10890)), ($10891, $10892, $10893, $10894, $10895, $10896, $10897, $10898, $10899, $10900, $10901, $10902, $10903, $10904, $10905, $10906, $10907, $10908, $10909, $10910, $10911, $10912, $10913, $10914, $10915, $10916, $10917, $10918, VersionRange($10919, $10920)), ($10921, $10922, $10923, $10924, $10925, $10926, $10927, $10928, $10929, $10930, $10931, $10932, $10933, $10934, $10935, $10936, $10937, $10938, $10939, $10940, $10941, $10942, $10943, $10944, $10945, $10946, $10947, $10948, VersionRange($10949, $10950)), ($10951, $10952, $10953, $10954, $10955, $10956, $10957, $10958, $10959, $10960, $10961, $10962, $10963, $10964, $10965, $10966, $10967, $10968, $10969, $10970, $10971, $10972, $10973, $10974, $10975, $10976, $10977, $10978, VersionRange($10979, $10980)), ($10981, $10982, $10983, $10984, $10985, $10986, $10987, $10988, $10989, $10990, $10991, $10992, $10993, $10994, $10995, $10996, $10997, $10998, $10999, $11000, $11001, $11002, $11003, $11004, $11005, $11006, $11007, $11008, VersionRange($11009, $11010)), ($11011, $11012, $11013, $11014, $11015, $11016, $11017, $11018, $11019, $11020, $11021, $11022, $11023, $11024, $11025, $11026, $11027, $11028, $11029, $11030, $11031, $11032, $11033, $11034, $11035, $11036, $11037, $11038, VersionRange($11039, $11040)), ($11041, $11042, $11043, $11044, $11045, $11046, $11047, $11048, $11049, $11050, $11051, $11052, $11053, $11054, $11055, $11056, $11057, $11058, $11059, $11060, $11061, $11062, $11063, $11064, $11065, $11066, $11067, $11068, VersionRange($11069, $11070)), ($11071, $11072, $11073, $11074, $11075, $11076, $11077, $11078, $11079, $11080, $11081, $11082, $11083, $11084, $11085, $11086, $11087, $11088, $11089, $11090, $11091, $11092, $11093, $11094, $11095, $11096, $11097, $11098, VersionRange($11099, $11100)), ($11101, $11102, $11103, $11104, $11105, $11106, $11107, $11108, $11109, $11110, $11111, $11112, $11113, $11114, $11115, $11116, $11117, $11118, $11119, $11120, $11121, $11122, $11123, $11124, $11125, $11126, $11127, $11128, VersionRange($11129, $11130)), ($11131, $11132, $11133, $11134, $11135, $11136, $11137, $11138, $11139, $11140, $11141, $11142, $11143, $11144, $11145, $11146, $11147, $11148, $11149, $11150, $11151, $11152, $11153, $11154, $11155, $11156, $11157, $11158, VersionRange($11159, $11160)), ($11161, $11162, $11163, $11164, $11165, $11166, $11167, $11168, $11169, $11170, $11171, $11172, $11173, $11174, $11175, $11176, $11177, $11178, $11179, $11180, $11181, $11182, $11183, $11184, $11185, $11186, $11187, $11188, VersionRange($11189, $11190)), ($11191, $11192, $11193, $11194, $11195, $11196, $11197, $11198, $11199, $11200, $11201, $11202, $11203, $11204, $11205, $11206, $11207, $11208, $11209, $11210, $11211, $11212, $11213, $11214, $11215, $11216, $11217, $11218, VersionRange($11219, $11220)), ($11221, $11222, $11223, $11224, $11225, $11226, $11227, $11228, $11229, $11230, $11231, $11232, $11233, $11234, $11235, $11236, $11237, $11238, $11239, $11240, $11241, $11242, $11243, $11244, $11245, $11246, $11247, $11248, VersionRange($11249, $11250)), ($11251, $11252, $11253, $11254, $11255, $11256, $11257, $11258, $11259, $11260, $11261, $11262, $11263, $11264, $11265, $11266, $11267, $11268, $11269, $11270, $11271, $11272, $11273, $11274, $11275, $11276, $11277, $11278, VersionRange($11279, $11280)), ($11281, $11282, $11283, $11284, $11285, $11286, $11287, $11288, $11289, $11290, $11291, $11292, $11293, $11294, $11295, $11296, $11297, $11298, $11299, $11300, $11301, $11302, $11303, $11304, $11305, $11306, $11307, $11308, VersionRange($11309, $11310)), ($11311, $11312, $11313, $11314, $11315, $11316, $11317, $11318, $11319, $11320, $11321, $11322, $11323, $11324, $11325, $11326, $11327, $11328, $11329, $11330, $11331, $11332, $11333, $11334, $11335, $11336, $11337, $11338, VersionRange($11339, $11340)), ($11341, $11342, $11343, $11344, $11345, $11346, $11347, $11348, $11349, $11350, $11351, $11352, $11353, $11354, $11355, $11356, $11357, $11358, $11359, $11360, $11361, $11362, $11363, $11364, $11365, $11366, $11367, $11368, VersionRange($11369, $11370)), ($11371, $11372, $11373, $11374, $11375, $11376, $11377, $11378, $11379, $11380, $11381, $11382, $11383, $11384, $11385, $11386, $11387, $11388, $11389, $11390, $11391, $11392, $11393, $11394, $11395, $11396, $11397, $11398, VersionRange($11399, $11400)), ($11401, $11402, $11403, $11404, $11405, $11406, $11407, $11408, $11409, $11410, $11411, $11412, $11413, $11414, $11415, $11416, $11417, $11418, $11419, $11420, $11421, $11422, $11423, $11424, $11425, $11426, $11427, $11428, VersionRange($11429, $11430)), ($11431, $11432, $11433, $11434, $11435, $11436, $11437, $11438, $11439, $11440, $11441, $11442, $11443, $11444, $11445, $11446, $11447, $11448, $11449, $11450, $11451, $11452, $11453, $11454, $11455, $11456, $11457, $11458, VersionRange($11459, $11460)), ($11461, $11462, $11463, $11464, $11465, $11466, $11467, $11468, $11469, $11470, $11471, $11472, $11473, $11474, $11475, $11476, $11477, $11478, $11479, $11480, $11481, $11482, $11483, $11484, $11485, $11486, $11487, $11488, VersionRange($11489, $11490)), ($11491, $11492, $11493, $11494, $11495, $11496, $11497, $11498, $11499, $11500, $11501, $11502, $11503, $11504, $11505, $11506, $11507, $11508, $11509, $11510, $11511, $11512, $11513, $11514, $11515, $11516, $11517, $11518, VersionRange($11519, $11520)), ($11521, $11522, $11523, $11524, $11525, $11526, $11527, $11528, $11529, $11530, $11531, $11532, $11533, $11534, $11535, $11536, $11537, $11538, $11539, $11540, $11541, $11542, $11543, $11544, $11545, $11546, $11547, $11548, VersionRange($11549, $11550)), ($11551, $11552, $11553, $11554, $11555, $11556, $11557, $11558, $11559, $11560, $11561, $11562, $11563, $11564, $11565, $11566, $11567, $11568, $11569, $11570, $11571, $11572, $11573, $11574, $11575, $11576, $11577, $11578, VersionRange($11579, $11580)), ($11581, $11582, $11583, $11584, $11585, $11586, $11587, $11588, $11589, $11590, $11591, $11592, $11593, $11594, $11595, $11596, $11597, $11598, $11599, $11600, $11601, $11602, $11603, $11604, $11605, $11606, $11607, $11608, VersionRange($11609, $11610)), ($11611, $11612, $11613, $11614, $11615, $11616, $11617, $11618, $11619, $11620, $11621, $11622, $11623, $11624, $11625, $11626, $11627, $11628, $11629, $11630, $11631, $11632, $11633, $11634, $11635, $11636, $11637, $11638, VersionRange($11639, $11640)), ($11641, $11642, $11643, $11644, $11645, $11646, $11647, $11648, $11649, $11650, $11651, $11652, $11653, $11654, $11655, $11656, $11657, $11658, $11659, $11660, $11661, $11662, $11663, $11664, $11665, $11666, $11667, $11668, VersionRange($11669, $11670)), ($11671, $11672, $11673, $11674, $11675, $11676, $11677, $11678, $11679, $11680, $11681, $11682, $11683, $11684, $11685, $11686, $11687, $11688, $11689, $11690, $11691, $11692, $11693, $11694, $11695, $11696, $11697, $11698, VersionRange($11699, $11700)), ($11701, $11702, $11703, $11704, $11705, $11706, $11707, $11708, $11709, $11710, $11711, $11712, $11713, $11714, $11715, $11716, $11717, $11718, $11719, $11720, $11721, $11722, $11723, $11724, $11725, $11726, $11727, $11728, VersionRange($11729, $11730)), ($11731, $11732, $11733, $11734, $11735, $11736, $11737, $11738, $11739, $11740, $11741, $11742, $11743, $11744, $11745, $11746, $11747, $11748, $11749, $11750, $11751, $11752, $11753, $11754, $11755, $11756, $11757, $11758, VersionRange($11759, $11760)), ($11761, $11762, $11763, $11764, $11765, $11766, $11767, $11768, $11769, $11770, $11771, $11772, $11773, $11774, $11775, $11776, $11777, $11778, $11779, $11780, $11781, $11782, $11783, $11784, $11785, $11786, $11787, $11788, VersionRange($11789, $11790)), ($11791, $11792, $11793, $11794, $11795, $11796, $11797, $11798, $11799, $11800, $11801, $11802, $11803, $11804, $11805, $11806, $11807, $11808, $11809, $11810, $11811, $11812, $11813, $11814, $11815, $11816, $11817, $11818, VersionRange($11819, $11820)), ($11821, $11822, $11823, $11824, $11825, $11826, $11827, $11828, $11829, $11830, $11831, $11832, $11833, $11834, $11835, $11836, $11837, $11838, $11839, $11840, $11841, $11842, $11843, $11844, $11845, $11846, $11847, $11848, VersionRange($11849, $11850)), ($11851, $11852, $11853, $11854, $11855, $11856, $11857, $11858, $11859, $11860, $11861, $11862, $11863, $11864, $11865, $11866, $11867, $11868, $11869, $11870, $11871, $11872, $11873, $11874, $11875, $11876, $11877, $11878, VersionRange($11879, $11880)), ($11881, $11882, $11883, $11884, $11885, $11886, $11887, $11888, $11889, $11890, $11891, $11892, $11893, $11894, $11895, $11896, $11897, $11898, $11899, $11900, $11901, $11902, $11903, $11904, $11905, $11906, $11907, $11908, VersionRange($11909, $11910)), ($11911, $11912, $11913, $11914, $11915, $11916, $11917, $11918, $11919, $11920, $11921, $11922, $11923, $11924, $11925, $11926, $11927, $11928, $11929, $11930, $11931, $11932, $11933, $11934, $11935, $11936, $11937, $11938, VersionRange($11939, $11940)), ($11941, $11942, $11943, $11944, $11945, $11946, $11947, $11948, $11949, $11950, $11951, $11952, $11953, $11954, $11955, $11956, $11957, $11958, $11959, $11960, $11961, $11962, $11963, $11964, $11965, $11966, $11967, $11968, VersionRange($11969, $11970)), ($11971, $11972, $11973, $11974, $11975, $11976, $11977, $11978, $11979, $11980, $11981, $11982, $11983, $11984, $11985, $11986, $11987, $11988, $11989, $11990, $11991, $11992, $11993, $11994, $11995, $11996, $11997, $11998, VersionRange($11999, $12000)), ($12001, $12002, $12003, $12004, $12005, $12006, $12007, $12008, $12009, $12010, $12011, $12012, $12013, $12014, $12015, $12016, $12017, $12018, $12019, $12020, $12021, $12022, $12023, $12024, $12025, $12026, $12027, $12028, VersionRange($12029, $12030)), ($12031, $12032, $12033, $12034, $12035, $12036, $12037, $12038, $12039, $12040, $12041, $12042, $12043, $12044, $12045, $12046, $12047, $12048, $12049, $12050, $12051, $12052, $12053, $12054, $12055, $12056, $12057, $12058, VersionRange($12059, $12060)), ($12061, $12062, $12063, $12064, $12065, $12066, $12067, $12068, $12069, $12070, $12071, $12072, $12073, $12074, $12075, $12076, $12077, $12078, $12079, $12080, $12081, $12082, $12083, $12084, $12085, $12086, $12087, $12088, VersionRange($12089, $12090)), ($12091, $12092, $12093, $12094, $12095, $12096, $12097, $12098, $12099, $12100, $12101, $12102, $12103, $12104, $12105, $12106, $12107, $12108, $12109, $12110, $12111, $12112, $12113, $12114, $12115, $12116, $12117, $12118, VersionRange($12119, $12120)), ($12121, $12122, $12123, $12124, $12125, $12126, $12127, $12128, $12129, $12130, $12131, $12132, $12133, $12134, $12135, $12136, $12137, $12138, $12139, $12140, $12141, $12142, $12143, $12144, $12145, $12146, $12147, $12148, VersionRange($12149, $12150)), ($12151, $12152, $12153, $12154, $12155, $12156, $12157, $12158, $12159, $12160, $12161, $12162, $12163, $12164, $12165, $12166, $12167, $12168, $12169, $12170, $12171, $12172, $12173, $12174, $12175, $12176, $12177, $12178, VersionRange($12179, $12180)), ($12181, $12182, $12183, $12184, $12185, $12186, $12187, $12188, $12189, $12190, $12191, $12192, $12193, $12194, $12195, $12196, $12197, $12198, $12199, $12200, $12201, $12202, $12203, $12204, $12205, $12206, $12207, $12208, VersionRange($12209, $12210)), ($12211, $12212, $12213, $12214, $12215, $12216, $12217, $12218, $12219, $12220, $12221, $12222, $12223, $12224, $12225, $12226, $12227, $12228, $12229, $12230, $12231, $12232, $12233, $12234, $12235, $12236, $12237, $12238, VersionRange($12239, $12240)), ($12241, $12242, $12243, $12244, $12245, $12246, $12247, $12248, $12249, $12250, $12251, $12252, $12253, $12254, $12255, $12256, $12257, $12258, $12259, $12260, $12261, $12262, $12263, $12264, $12265, $12266, $12267, $12268, VersionRange($12269, $12270)), ($12271, $12272, $12273, $12274, $12275, $12276, $12277, $12278, $12279, $12280, $12281, $12282, $12283, $12284, $12285, $12286, $12287, $12288, $12289, $12290, $12291, $12292, $12293, $12294, $12295, $12296, $12297, $12298, VersionRange($12299, $12300)), ($12301, $12302, $12303, $12304, $12305, $12306, $12307, $12308, $12309, $12310, $12311, $12312, $12313, $12314, $12315, $12316, $12317, $12318, $12319, $12320, $12321, $12322, $12323, $12324, $12325, $12326, $12327, $12328, VersionRange($12329, $12330)), ($12331, $12332, $12333, $12334, $12335, $12336, $12337, $12338, $12339, $12340, $12341, $12342, $12343, $12344, $12345, $12346, $12347, $12348, $12349, $12350, $12351, $12352, $12353, $12354, $12355, $12356, $12357, $12358, VersionRange($12359, $12360)), ($12361, $12362, $12363, $12364, $12365, $12366, $12367, $12368, $12369, $12370, $12371, $12372, $12373, $12374, $12375, $12376, $12377, $12378, $12379, $12380, $12381, $12382, $12383, $12384, $12385, $12386, $12387, $12388, VersionRange($12389, $12390)), ($12391, $12392, $12393, $12394, $12395, $12396, $12397, $12398, $12399, $12400, $12401, $12402, $12403, $12404, $12405, $12406, $12407, $12408, $12409, $12410, $12411, $12412, $12413, $12414, $12415, $12416, $12417, $12418, VersionRange($12419, $12420)), ($12421, $12422, $12423, $12424, $12425, $12426, $12427, $12428, $12429, $12430, $12431, $12432, $12433, $12434, $12435, $12436, $12437, $12438, $12439, $12440, $12441, $12442, $12443, $12444, $12445, $12446, $12447, $12448, VersionRange($12449, $12450)), ($12451, $12452, $12453, $12454, $12455, $12456, $12457, $12458, $12459, $12460, $12461, $12462, $12463, $12464, $12465, $12466, $12467, $12468, $12469, $12470, $12471, $12472, $12473, $12474, $12475, $12476, $12477, $12478, VersionRange($12479, $12480)), ($12481, $12482, $12483, $12484, $12485, $12486, $12487, $12488, $12489, $12490, $12491, $12492, $12493, $12494, $12495, $12496, $12497, $12498, $12499, $12500, $12501, $12502, $12503, $12504, $12505, $12506, $12507, $12508, VersionRange($12509, $12510)), ($12511, $12512, $12513, $12514, $12515, $12516, $12517, $12518, $12519, $12520, $12521, $12522, $12523, $12524, $12525, $12526, $12527, $12528, $12529, $12530, $12531, $12532, $12533, $12534, $12535, $12536, $12537, $12538, VersionRange($12539, $12540)), ($12541, $12542, $12543, $12544, $12545, $12546, $12547, $12548, $12549, $12550, $12551, $12552, $12553, $12554, $12555, $12556, $12557, $12558, $12559, $12560, $12561, $12562, $12563, $12564, $12565, $12566, $12567, $12568, VersionRange($12569, $12570)), ($12571, $12572, $12573, $12574, $12575, $12576, $12577, $12578, $12579, $12580, $12581, $12582, $12583, $12584, $12585, $12586, $12587, $12588, $12589, $12590, $12591, $12592, $12593, $12594, $12595, $12596, $12597, $12598, VersionRange($12599, $12600)), ($12601, $12602, $12603, $12604, $12605, $12606, $12607, $12608, $12609, $12610, $12611, $12612, $12613, $12614, $12615, $12616, $12617, $12618, $12619, $12620, $12621, $12622, $12623, $12624, $12625, $12626, $12627, $12628, VersionRange($12629, $12630)), ($12631, $12632, $12633, $12634, $12635, $12636, $12637, $12638, $12639, $12640, $12641, $12642, $12643, $12644, $12645, $12646, $12647, $12648, $12649, $12650, $12651, $12652, $12653, $12654, $12655, $12656, $12657, $12658, VersionRange($12659, $12660)), ($12661, $12662, $12663, $12664, $12665, $12666, $12667, $12668, $12669, $12670, $12671, $12672, $12673, $12674, $12675, $12676, $12677, $12678, $12679, $12680, $12681, $12682, $12683, $12684, $12685, $12686, $12687, $12688, VersionRange($12689, $12690)), ($12691, $12692, $12693, $12694, $12695, $12696, $12697, $12698, $12699, $12700, $12701, $12702, $12703, $12704, $12705, $12706, $12707, $12708, $12709, $12710, $12711, $12712, $12713, $12714, $12715, $12716, $12717, $12718, VersionRange($12719, $12720)), ($12721, $12722, $12723, $12724, $12725, $12726, $12727, $12728, $12729, $12730, $12731, $12732, $12733, $12734, $12735, $12736, $12737, $12738, $12739, $12740, $12741, $12742, $12743, $12744, $12745, $12746, $12747, $12748, VersionRange($12749, $12750)), ($12751, $12752, $12753, $12754, $12755, $12756, $12757, $12758, $12759, $12760, $12761, $12762, $12763, $12764, $12765, $12766, $12767, $12768, $12769, $12770, $12771, $12772, $12773, $12774, $12775, $12776, $12777, $12778, VersionRange($12779, $12780)), ($12781, $12782, $12783, $12784, $12785, $12786, $12787, $12788, $12789, $12790, $12791, $12792, $12793, $12794, $12795, $12796, $12797, $12798, $12799, $12800, $12801, $12802, $12803, $12804, $12805, $12806, $12807, $12808, VersionRange($12809, $12810)), ($12811, $12812, $12813, $12814, $12815, $12816, $12817, $12818, $12819, $12820, $12821, $12822, $12823, $12824, $12825, $12826, $12827, $12828, $12829, $12830, $12831, $12832, $12833, $12834, $12835, $12836, $12837, $12838, VersionRange($12839, $12840)), ($12841, $12842, $12843, $12844, $12845, $12846, $12847, $12848, $12849, $12850, $12851, $12852, $12853, $12854, $12855, $12856, $12857, $12858, $12859, $12860, $12861, $12862, $12863, $12864, $12865, $12866, $12867, $12868, VersionRange($12869, $12870)), ($12871, $12872, $12873, $12874, $12875, $12876, $12877, $12878, $12879, $12880, $12881, $12882, $12883, $12884, $12885, $12886, $12887, $12888, $12889, $12890, $12891, $12892, $12893, $12894, $12895, $12896, $12897, $12898, VersionRange($12899, $12900)), ($12901, $12902, $12903, $12904, $12905, $12906, $12907, $12908, $12909, $12910, $12911, $12912, $12913, $12914, $12915, $12916, $12917, $12918, $12919, $12920, $12921, $12922, $12923, $12924, $12925, $12926, $12927, $12928, VersionRange($12929, $12930)), ($12931, $12932, $12933, $12934, $12935, $12936, $12937, $12938, $12939, $12940, $12941, $12942, $12943, $12944, $12945, $12946, $12947, $12948, $12949, $12950, $12951, $12952, $12953, $12954, $12955, $12956, $12957, $12958, VersionRange($12959, $12960)), ($12961, $12962, $12963, $12964, $12965, $12966, $12967, $12968, $12969, $12970[...][ Date: 2023-07-04 18:39:55 ]
5 5s126ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30)), ($31, $32, $33, $34, $35, $36, $37, $38, $39, $40, $41, $42, $43, $44, $45, $46, $47, $48, $49, $50, $51, $52, $53, $54, $55, $56, $57, $58, VersionRange($59, $60)), ($61, $62, $63, $64, $65, $66, $67, $68, $69, $70, $71, $72, $73, $74, $75, $76, $77, $78, $79, $80, $81, $82, $83, $84, $85, $86, $87, $88, VersionRange($89, $90)), ($91, $92, $93, $94, $95, $96, $97, $98, $99, $100, $101, $102, $103, $104, $105, $106, $107, $108, $109, $110, $111, $112, $113, $114, $115, $116, $117, $118, VersionRange($119, $120)), ($121, $122, $123, $124, $125, $126, $127, $128, $129, $130, $131, $132, $133, $134, $135, $136, $137, $138, $139, $140, $141, $142, $143, $144, $145, $146, $147, $148, VersionRange($149, $150)), ($151, $152, $153, $154, $155, $156, $157, $158, $159, $160, $161, $162, $163, $164, $165, $166, $167, $168, $169, $170, $171, $172, $173, $174, $175, $176, $177, $178, VersionRange($179, $180)), ($181, $182, $183, $184, $185, $186, $187, $188, $189, $190, $191, $192, $193, $194, $195, $196, $197, $198, $199, $200, $201, $202, $203, $204, $205, $206, $207, $208, VersionRange($209, $210)), ($211, $212, $213, $214, $215, $216, $217, $218, $219, $220, $221, $222, $223, $224, $225, $226, $227, $228, $229, $230, $231, $232, $233, $234, $235, $236, $237, $238, VersionRange($239, $240)), ($241, $242, $243, $244, $245, $246, $247, $248, $249, $250, $251, $252, $253, $254, $255, $256, $257, $258, $259, $260, $261, $262, $263, $264, $265, $266, $267, $268, VersionRange($269, $270)), ($271, $272, $273, $274, $275, $276, $277, $278, $279, $280, $281, $282, $283, $284, $285, $286, $287, $288, $289, $290, $291, $292, $293, $294, $295, $296, $297, $298, VersionRange($299, $300)), ($301, $302, $303, $304, $305, $306, $307, $308, $309, $310, $311, $312, $313, $314, $315, $316, $317, $318, $319, $320, $321, $322, $323, $324, $325, $326, $327, $328, VersionRange($329, $330)), ($331, $332, $333, $334, $335, $336, $337, $338, $339, $340, $341, $342, $343, $344, $345, $346, $347, $348, $349, $350, $351, $352, $353, $354, $355, $356, $357, $358, VersionRange($359, $360)), ($361, $362, $363, $364, $365, $366, $367, $368, $369, $370, $371, $372, $373, $374, $375, $376, $377, $378, $379, $380, $381, $382, $383, $384, $385, $386, $387, $388, VersionRange($389, $390)), ($391, $392, $393, $394, $395, $396, $397, $398, $399, $400, $401, $402, $403, $404, $405, $406, $407, $408, $409, $410, $411, $412, $413, $414, $415, $416, $417, $418, VersionRange($419, $420)), ($421, $422, $423, $424, $425, $426, $427, $428, $429, $430, $431, $432, $433, $434, $435, $436, $437, $438, $439, $440, $441, $442, $443, $444, $445, $446, $447, $448, VersionRange($449, $450)), ($451, $452, $453, $454, $455, $456, $457, $458, $459, $460, $461, $462, $463, $464, $465, $466, $467, $468, $469, $470, $471, $472, $473, $474, $475, $476, $477, $478, VersionRange($479, $480)), ($481, $482, $483, $484, $485, $486, $487, $488, $489, $490, $491, $492, $493, $494, $495, $496, $497, $498, $499, $500, $501, $502, $503, $504, $505, $506, $507, $508, VersionRange($509, $510)), ($511, $512, $513, $514, $515, $516, $517, $518, $519, $520, $521, $522, $523, $524, $525, $526, $527, $528, $529, $530, $531, $532, $533, $534, $535, $536, $537, $538, VersionRange($539, $540)), ($541, $542, $543, $544, $545, $546, $547, $548, $549, $550, $551, $552, $553, $554, $555, $556, $557, $558, $559, $560, $561, $562, $563, $564, $565, $566, $567, $568, VersionRange($569, $570)), ($571, $572, $573, $574, $575, $576, $577, $578, $579, $580, $581, $582, $583, $584, $585, $586, $587, $588, $589, $590, $591, $592, $593, $594, $595, $596, $597, $598, VersionRange($599, $600)), ($601, $602, $603, $604, $605, $606, $607, $608, $609, $610, $611, $612, $613, $614, $615, $616, $617, $618, $619, $620, $621, $622, $623, $624, $625, $626, $627, $628, VersionRange($629, $630)), ($631, $632, $633, $634, $635, $636, $637, $638, $639, $640, $641, $642, $643, $644, $645, $646, $647, $648, $649, $650, $651, $652, $653, $654, $655, $656, $657, $658, VersionRange($659, $660)), ($661, $662, $663, $664, $665, $666, $667, $668, $669, $670, $671, $672, $673, $674, $675, $676, $677, $678, $679, $680, $681, $682, $683, $684, $685, $686, $687, $688, VersionRange($689, $690)), ($691, $692, $693, $694, $695, $696, $697, $698, $699, $700, $701, $702, $703, $704, $705, $706, $707, $708, $709, $710, $711, $712, $713, $714, $715, $716, $717, $718, VersionRange($719, $720)), ($721, $722, $723, $724, $725, $726, $727, $728, $729, $730, $731, $732, $733, $734, $735, $736, $737, $738, $739, $740, $741, $742, $743, $744, $745, $746, $747, $748, VersionRange($749, $750)), ($751, $752, $753, $754, $755, $756, $757, $758, $759, $760, $761, $762, $763, $764, $765, $766, $767, $768, $769, $770, $771, $772, $773, $774, $775, $776, $777, $778, VersionRange($779, $780)), ($781, $782, $783, $784, $785, $786, $787, $788, $789, $790, $791, $792, $793, $794, $795, $796, $797, $798, $799, $800, $801, $802, $803, $804, $805, $806, $807, $808, VersionRange($809, $810)), ($811, $812, $813, $814, $815, $816, $817, $818, $819, $820, $821, $822, $823, $824, $825, $826, $827, $828, $829, $830, $831, $832, $833, $834, $835, $836, $837, $838, VersionRange($839, $840)), ($841, $842, $843, $844, $845, $846, $847, $848, $849, $850, $851, $852, $853, $854, $855, $856, $857, $858, $859, $860, $861, $862, $863, $864, $865, $866, $867, $868, VersionRange($869, $870)), ($871, $872, $873, $874, $875, $876, $877, $878, $879, $880, $881, $882, $883, $884, $885, $886, $887, $888, $889, $890, $891, $892, $893, $894, $895, $896, $897, $898, VersionRange($899, $900)), ($901, $902, $903, $904, $905, $906, $907, $908, $909, $910, $911, $912, $913, $914, $915, $916, $917, $918, $919, $920, $921, $922, $923, $924, $925, $926, $927, $928, VersionRange($929, $930)), ($931, $932, $933, $934, $935, $936, $937, $938, $939, $940, $941, $942, $943, $944, $945, $946, $947, $948, $949, $950, $951, $952, $953, $954, $955, $956, $957, $958, VersionRange($959, $960)), ($961, $962, $963, $964, $965, $966, $967, $968, $969, $970, $971, $972, $973, $974, $975, $976, $977, $978, $979, $980, $981, $982, $983, $984, $985, $986, $987, $988, VersionRange($989, $990)), ($991, $992, $993, $994, $995, $996, $997, $998, $999, $1000, $1001, $1002, $1003, $1004, $1005, $1006, $1007, $1008, $1009, $1010, $1011, $1012, $1013, $1014, $1015, $1016, $1017, $1018, VersionRange($1019, $1020)), ($1021, $1022, $1023, $1024, $1025, $1026, $1027, $1028, $1029, $1030, $1031, $1032, $1033, $1034, $1035, $1036, $1037, $1038, $1039, $1040, $1041, $1042, $1043, $1044, $1045, $1046, $1047, $1048, VersionRange($1049, $1050)), ($1051, $1052, $1053, $1054, $1055, $1056, $1057, $1058, $1059, $1060, $1061, $1062, $1063, $1064, $1065, $1066, $1067, $1068, $1069, $1070, $1071, $1072, $1073, $1074, $1075, $1076, $1077, $1078, VersionRange($1079, $1080)), ($1081, $1082, $1083, $1084, $1085, $1086, $1087, $1088, $1089, $1090, $1091, $1092, $1093, $1094, $1095, $1096, $1097, $1098, $1099, $1100, $1101, $1102, $1103, $1104, $1105, $1106, $1107, $1108, VersionRange($1109, $1110)), ($1111, $1112, $1113, $1114, $1115, $1116, $1117, $1118, $1119, $1120, $1121, $1122, $1123, $1124, $1125, $1126, $1127, $1128, $1129, $1130, $1131, $1132, $1133, $1134, $1135, $1136, $1137, $1138, VersionRange($1139, $1140)), ($1141, $1142, $1143, $1144, $1145, $1146, $1147, $1148, $1149, $1150, $1151, $1152, $1153, $1154, $1155, $1156, $1157, $1158, $1159, $1160, $1161, $1162, $1163, $1164, $1165, $1166, $1167, $1168, VersionRange($1169, $1170)), ($1171, $1172, $1173, $1174, $1175, $1176, $1177, $1178, $1179, $1180, $1181, $1182, $1183, $1184, $1185, $1186, $1187, $1188, $1189, $1190, $1191, $1192, $1193, $1194, $1195, $1196, $1197, $1198, VersionRange($1199, $1200)), ($1201, $1202, $1203, $1204, $1205, $1206, $1207, $1208, $1209, $1210, $1211, $1212, $1213, $1214, $1215, $1216, $1217, $1218, $1219, $1220, $1221, $1222, $1223, $1224, $1225, $1226, $1227, $1228, VersionRange($1229, $1230)), ($1231, $1232, $1233, $1234, $1235, $1236, $1237, $1238, $1239, $1240, $1241, $1242, $1243, $1244, $1245, $1246, $1247, $1248, $1249, $1250, $1251, $1252, $1253, $1254, $1255, $1256, $1257, $1258, VersionRange($1259, $1260)), ($1261, $1262, $1263, $1264, $1265, $1266, $1267, $1268, $1269, $1270, $1271, $1272, $1273, $1274, $1275, $1276, $1277, $1278, $1279, $1280, $1281, $1282, $1283, $1284, $1285, $1286, $1287, $1288, VersionRange($1289, $1290)), ($1291, $1292, $1293, $1294, $1295, $1296, $1297, $1298, $1299, $1300, $1301, $1302, $1303, $1304, $1305, $1306, $1307, $1308, $1309, $1310, $1311, $1312, $1313, $1314, $1315, $1316, $1317, $1318, VersionRange($1319, $1320)), ($1321, $1322, $1323, $1324, $1325, $1326, $1327, $1328, $1329, $1330, $1331, $1332, $1333, $1334, $1335, $1336, $1337, $1338, $1339, $1340, $1341, $1342, $1343, $1344, $1345, $1346, $1347, $1348, VersionRange($1349, $1350)), ($1351, $1352, $1353, $1354, $1355, $1356, $1357, $1358, $1359, $1360, $1361, $1362, $1363, $1364, $1365, $1366, $1367, $1368, $1369, $1370, $1371, $1372, $1373, $1374, $1375, $1376, $1377, $1378, VersionRange($1379, $1380)), ($1381, $1382, $1383, $1384, $1385, $1386, $1387, $1388, $1389, $1390, $1391, $1392, $1393, $1394, $1395, $1396, $1397, $1398, $1399, $1400, $1401, $1402, $1403, $1404, $1405, $1406, $1407, $1408, VersionRange($1409, $1410)), ($1411, $1412, $1413, $1414, $1415, $1416, $1417, $1418, $1419, $1420, $1421, $1422, $1423, $1424, $1425, $1426, $1427, $1428, $1429, $1430, $1431, $1432, $1433, $1434, $1435, $1436, $1437, $1438, VersionRange($1439, $1440)), ($1441, $1442, $1443, $1444, $1445, $1446, $1447, $1448, $1449, $1450, $1451, $1452, $1453, $1454, $1455, $1456, $1457, $1458, $1459, $1460, $1461, $1462, $1463, $1464, $1465, $1466, $1467, $1468, VersionRange($1469, $1470)), ($1471, $1472, $1473, $1474, $1475, $1476, $1477, $1478, $1479, $1480, $1481, $1482, $1483, $1484, $1485, $1486, $1487, $1488, $1489, $1490, $1491, $1492, $1493, $1494, $1495, $1496, $1497, $1498, VersionRange($1499, $1500)), ($1501, $1502, $1503, $1504, $1505, $1506, $1507, $1508, $1509, $1510, $1511, $1512, $1513, $1514, $1515, $1516, $1517, $1518, $1519, $1520, $1521, $1522, $1523, $1524, $1525, $1526, $1527, $1528, VersionRange($1529, $1530)), ($1531, $1532, $1533, $1534, $1535, $1536, $1537, $1538, $1539, $1540, $1541, $1542, $1543, $1544, $1545, $1546, $1547, $1548, $1549, $1550, $1551, $1552, $1553, $1554, $1555, $1556, $1557, $1558, VersionRange($1559, $1560)), ($1561, $1562, $1563, $1564, $1565, $1566, $1567, $1568, $1569, $1570, $1571, $1572, $1573, $1574, $1575, $1576, $1577, $1578, $1579, $1580, $1581, $1582, $1583, $1584, $1585, $1586, $1587, $1588, VersionRange($1589, $1590)), ($1591, $1592, $1593, $1594, $1595, $1596, $1597, $1598, $1599, $1600, $1601, $1602, $1603, $1604, $1605, $1606, $1607, $1608, $1609, $1610, $1611, $1612, $1613, $1614, $1615, $1616, $1617, $1618, VersionRange($1619, $1620)), ($1621, $1622, $1623, $1624, $1625, $1626, $1627, $1628, $1629, $1630, $1631, $1632, $1633, $1634, $1635, $1636, $1637, $1638, $1639, $1640, $1641, $1642, $1643, $1644, $1645, $1646, $1647, $1648, VersionRange($1649, $1650)), ($1651, $1652, $1653, $1654, $1655, $1656, $1657, $1658, $1659, $1660, $1661, $1662, $1663, $1664, $1665, $1666, $1667, $1668, $1669, $1670, $1671, $1672, $1673, $1674, $1675, $1676, $1677, $1678, VersionRange($1679, $1680)), ($1681, $1682, $1683, $1684, $1685, $1686, $1687, $1688, $1689, $1690, $1691, $1692, $1693, $1694, $1695, $1696, $1697, $1698, $1699, $1700, $1701, $1702, $1703, $1704, $1705, $1706, $1707, $1708, VersionRange($1709, $1710)), ($1711, $1712, $1713, $1714, $1715, $1716, $1717, $1718, $1719, $1720, $1721, $1722, $1723, $1724, $1725, $1726, $1727, $1728, $1729, $1730, $1731, $1732, $1733, $1734, $1735, $1736, $1737, $1738, VersionRange($1739, $1740)), ($1741, $1742, $1743, $1744, $1745, $1746, $1747, $1748, $1749, $1750, $1751, $1752, $1753, $1754, $1755, $1756, $1757, $1758, $1759, $1760, $1761, $1762, $1763, $1764, $1765, $1766, $1767, $1768, VersionRange($1769, $1770)), ($1771, $1772, $1773, $1774, $1775, $1776, $1777, $1778, $1779, $1780, $1781, $1782, $1783, $1784, $1785, $1786, $1787, $1788, $1789, $1790, $1791, $1792, $1793, $1794, $1795, $1796, $1797, $1798, VersionRange($1799, $1800)), ($1801, $1802, $1803, $1804, $1805, $1806, $1807, $1808, $1809, $1810, $1811, $1812, $1813, $1814, $1815, $1816, $1817, $1818, $1819, $1820, $1821, $1822, $1823, $1824, $1825, $1826, $1827, $1828, VersionRange($1829, $1830)), ($1831, $1832, $1833, $1834, $1835, $1836, $1837, $1838, $1839, $1840, $1841, $1842, $1843, $1844, $1845, $1846, $1847, $1848, $1849, $1850, $1851, $1852, $1853, $1854, $1855, $1856, $1857, $1858, VersionRange($1859, $1860)), ($1861, $1862, $1863, $1864, $1865, $1866, $1867, $1868, $1869, $1870, $1871, $1872, $1873, $1874, $1875, $1876, $1877, $1878, $1879, $1880, $1881, $1882, $1883, $1884, $1885, $1886, $1887, $1888, VersionRange($1889, $1890)), ($1891, $1892, $1893, $1894, $1895, $1896, $1897, $1898, $1899, $1900, $1901, $1902, $1903, $1904, $1905, $1906, $1907, $1908, $1909, $1910, $1911, $1912, $1913, $1914, $1915, $1916, $1917, $1918, VersionRange($1919, $1920)), ($1921, $1922, $1923, $1924, $1925, $1926, $1927, $1928, $1929, $1930, $1931, $1932, $1933, $1934, $1935, $1936, $1937, $1938, $1939, $1940, $1941, $1942, $1943, $1944, $1945, $1946, $1947, $1948, VersionRange($1949, $1950)), ($1951, $1952, $1953, $1954, $1955, $1956, $1957, $1958, $1959, $1960, $1961, $1962, $1963, $1964, $1965, $1966, $1967, $1968, $1969, $1970, $1971, $1972, $1973, $1974, $1975, $1976, $1977, $1978, VersionRange($1979, $1980)), ($1981, $1982, $1983, $1984, $1985, $1986, $1987, $1988, $1989, $1990, $1991, $1992, $1993, $1994, $1995, $1996, $1997, $1998, $1999, $2000, $2001, $2002, $2003, $2004, $2005, $2006, $2007, $2008, VersionRange($2009, $2010)), ($2011, $2012, $2013, $2014, $2015, $2016, $2017, $2018, $2019, $2020, $2021, $2022, $2023, $2024, $2025, $2026, $2027, $2028, $2029, $2030, $2031, $2032, $2033, $2034, $2035, $2036, $2037, $2038, VersionRange($2039, $2040)), ($2041, $2042, $2043, $2044, $2045, $2046, $2047, $2048, $2049, $2050, $2051, $2052, $2053, $2054, $2055, $2056, $2057, $2058, $2059, $2060, $2061, $2062, $2063, $2064, $2065, $2066, $2067, $2068, VersionRange($2069, $2070)), ($2071, $2072, $2073, $2074, $2075, $2076, $2077, $2078, $2079, $2080, $2081, $2082, $2083, $2084, $2085, $2086, $2087, $2088, $2089, $2090, $2091, $2092, $2093, $2094, $2095, $2096, $2097, $2098, VersionRange($2099, $2100)), ($2101, $2102, $2103, $2104, $2105, $2106, $2107, $2108, $2109, $2110, $2111, $2112, $2113, $2114, $2115, $2116, $2117, $2118, $2119, $2120, $2121, $2122, $2123, $2124, $2125, $2126, $2127, $2128, VersionRange($2129, $2130)), ($2131, $2132, $2133, $2134, $2135, $2136, $2137, $2138, $2139, $2140, $2141, $2142, $2143, $2144, $2145, $2146, $2147, $2148, $2149, $2150, $2151, $2152, $2153, $2154, $2155, $2156, $2157, $2158, VersionRange($2159, $2160)), ($2161, $2162, $2163, $2164, $2165, $2166, $2167, $2168, $2169, $2170, $2171, $2172, $2173, $2174, $2175, $2176, $2177, $2178, $2179, $2180, $2181, $2182, $2183, $2184, $2185, $2186, $2187, $2188, VersionRange($2189, $2190)), ($2191, $2192, $2193, $2194, $2195, $2196, $2197, $2198, $2199, $2200, $2201, $2202, $2203, $2204, $2205, $2206, $2207, $2208, $2209, $2210, $2211, $2212, $2213, $2214, $2215, $2216, $2217, $2218, VersionRange($2219, $2220)), ($2221, $2222, $2223, $2224, $2225, $2226, $2227, $2228, $2229, $2230, $2231, $2232, $2233, $2234, $2235, $2236, $2237, $2238, $2239, $2240, $2241, $2242, $2243, $2244, $2245, $2246, $2247, $2248, VersionRange($2249, $2250)), ($2251, $2252, $2253, $2254, $2255, $2256, $2257, $2258, $2259, $2260, $2261, $2262, $2263, $2264, $2265, $2266, $2267, $2268, $2269, $2270, $2271, $2272, $2273, $2274, $2275, $2276, $2277, $2278, VersionRange($2279, $2280)), ($2281, $2282, $2283, $2284, $2285, $2286, $2287, $2288, $2289, $2290, $2291, $2292, $2293, $2294, $2295, $2296, $2297, $2298, $2299, $2300, $2301, $2302, $2303, $2304, $2305, $2306, $2307, $2308, VersionRange($2309, $2310)), ($2311, $2312, $2313, $2314, $2315, $2316, $2317, $2318, $2319, $2320, $2321, $2322, $2323, $2324, $2325, $2326, $2327, $2328, $2329, $2330, $2331, $2332, $2333, $2334, $2335, $2336, $2337, $2338, VersionRange($2339, $2340)), ($2341, $2342, $2343, $2344, $2345, $2346, $2347, $2348, $2349, $2350, $2351, $2352, $2353, $2354, $2355, $2356, $2357, $2358, $2359, $2360, $2361, $2362, $2363, $2364, $2365, $2366, $2367, $2368, VersionRange($2369, $2370)), ($2371, $2372, $2373, $2374, $2375, $2376, $2377, $2378, $2379, $2380, $2381, $2382, $2383, $2384, $2385, $2386, $2387, $2388, $2389, $2390, $2391, $2392, $2393, $2394, $2395, $2396, $2397, $2398, VersionRange($2399, $2400)), ($2401, $2402, $2403, $2404, $2405, $2406, $2407, $2408, $2409, $2410, $2411, $2412, $2413, $2414, $2415, $2416, $2417, $2418, $2419, $2420, $2421, $2422, $2423, $2424, $2425, $2426, $2427, $2428, VersionRange($2429, $2430)), ($2431, $2432, $2433, $2434, $2435, $2436, $2437, $2438, $2439, $2440, $2441, $2442, $2443, $2444, $2445, $2446, $2447, $2448, $2449, $2450, $2451, $2452, $2453, $2454, $2455, $2456, $2457, $2458, VersionRange($2459, $2460)), ($2461, $2462, $2463, $2464, $2465, $2466, $2467, $2468, $2469, $2470, $2471, $2472, $2473, $2474, $2475, $2476, $2477, $2478, $2479, $2480, $2481, $2482, $2483, $2484, $2485, $2486, $2487, $2488, VersionRange($2489, $2490)), ($2491, $2492, $2493, $2494, $2495, $2496, $2497, $2498, $2499, $2500, $2501, $2502, $2503, $2504, $2505, $2506, $2507, $2508, $2509, $2510, $2511, $2512, $2513, $2514, $2515, $2516, $2517, $2518, VersionRange($2519, $2520)), ($2521, $2522, $2523, $2524, $2525, $2526, $2527, $2528, $2529, $2530, $2531, $2532, $2533, $2534, $2535, $2536, $2537, $2538, $2539, $2540, $2541, $2542, $2543, $2544, $2545, $2546, $2547, $2548, VersionRange($2549, $2550)), ($2551, $2552, $2553, $2554, $2555, $2556, $2557, $2558, $2559, $2560, $2561, $2562, $2563, $2564, $2565, $2566, $2567, $2568, $2569, $2570, $2571, $2572, $2573, $2574, $2575, $2576, $2577, $2578, VersionRange($2579, $2580)), ($2581, $2582, $2583, $2584, $2585, $2586, $2587, $2588, $2589, $2590, $2591, $2592, $2593, $2594, $2595, $2596, $2597, $2598, $2599, $2600, $2601, $2602, $2603, $2604, $2605, $2606, $2607, $2608, VersionRange($2609, $2610)), ($2611, $2612, $2613, $2614, $2615, $2616, $2617, $2618, $2619, $2620, $2621, $2622, $2623, $2624, $2625, $2626, $2627, $2628, $2629, $2630, $2631, $2632, $2633, $2634, $2635, $2636, $2637, $2638, VersionRange($2639, $2640)), ($2641, $2642, $2643, $2644, $2645, $2646, $2647, $2648, $2649, $2650, $2651, $2652, $2653, $2654, $2655, $2656, $2657, $2658, $2659, $2660, $2661, $2662, $2663, $2664, $2665, $2666, $2667, $2668, VersionRange($2669, $2670)), ($2671, $2672, $2673, $2674, $2675, $2676, $2677, $2678, $2679, $2680, $2681, $2682, $2683, $2684, $2685, $2686, $2687, $2688, $2689, $2690, $2691, $2692, $2693, $2694, $2695, $2696, $2697, $2698, VersionRange($2699, $2700)), ($2701, $2702, $2703, $2704, $2705, $2706, $2707, $2708, $2709, $2710, $2711, $2712, $2713, $2714, $2715, $2716, $2717, $2718, $2719, $2720, $2721, $2722, $2723, $2724, $2725, $2726, $2727, $2728, VersionRange($2729, $2730)), ($2731, $2732, $2733, $2734, $2735, $2736, $2737, $2738, $2739, $2740, $2741, $2742, $2743, $2744, $2745, $2746, $2747, $2748, $2749, $2750, $2751, $2752, $2753, $2754, $2755, $2756, $2757, $2758, VersionRange($2759, $2760)), ($2761, $2762, $2763, $2764, $2765, $2766, $2767, $2768, $2769, $2770, $2771, $2772, $2773, $2774, $2775, $2776, $2777, $2778, $2779, $2780, $2781, $2782, $2783, $2784, $2785, $2786, $2787, $2788, VersionRange($2789, $2790)), ($2791, $2792, $2793, $2794, $2795, $2796, $2797, $2798, $2799, $2800, $2801, $2802, $2803, $2804, $2805, $2806, $2807, $2808, $2809, $2810, $2811, $2812, $2813, $2814, $2815, $2816, $2817, $2818, VersionRange($2819, $2820)), ($2821, $2822, $2823, $2824, $2825, $2826, $2827, $2828, $2829, $2830, $2831, $2832, $2833, $2834, $2835, $2836, $2837, $2838, $2839, $2840, $2841, $2842, $2843, $2844, $2845, $2846, $2847, $2848, VersionRange($2849, $2850)), ($2851, $2852, $2853, $2854, $2855, $2856, $2857, $2858, $2859, $2860, $2861, $2862, $2863, $2864, $2865, $2866, $2867, $2868, $2869, $2870, $2871, $2872, $2873, $2874, $2875, $2876, $2877, $2878, VersionRange($2879, $2880)), ($2881, $2882, $2883, $2884, $2885, $2886, $2887, $2888, $2889, $2890, $2891, $2892, $2893, $2894, $2895, $2896, $2897, $2898, $2899, $2900, $2901, $2902, $2903, $2904, $2905, $2906, $2907, $2908, VersionRange($2909, $2910)), ($2911, $2912, $2913, $2914, $2915, $2916, $2917, $2918, $2919, $2920, $2921, $2922, $2923, $2924, $2925, $2926, $2927, $2928, $2929, $2930, $2931, $2932, $2933, $2934, $2935, $2936, $2937, $2938, VersionRange($2939, $2940)), ($2941, $2942, $2943, $2944, $2945, $2946, $2947, $2948, $2949, $2950, $2951, $2952, $2953, $2954, $2955, $2956, $2957, $2958, $2959, $2960, $2961, $2962, $2963, $2964, $2965, $2966, $2967, $2968, VersionRange($2969, $2970)), ($2971, $2972, $2973, $2974, $2975, $2976, $2977, $2978, $2979, $2980, $2981, $2982, $2983, $2984, $2985, $2986, $2987, $2988, $2989, $2990, $2991, $2992, $2993, $2994, $2995, $2996, $2997, $2998, VersionRange($2999, $3000)), ($3001, $3002, $3003, $3004, $3005, $3006, $3007, $3008, $3009, $3010, $3011, $3012, $3013, $3014, $3015, $3016, $3017, $3018, $3019, $3020, $3021, $3022, $3023, $3024, $3025, $3026, $3027, $3028, VersionRange($3029, $3030)), ($3031, $3032, $3033, $3034, $3035, $3036, $3037, $3038, $3039, $3040, $3041, $3042, $3043, $3044, $3045, $3046, $3047, $3048, $3049, $3050, $3051, $3052, $3053, $3054, $3055, $3056, $3057, $3058, VersionRange($3059, $3060)), ($3061, $3062, $3063, $3064, $3065, $3066, $3067, $3068, $3069, $3070, $3071, $3072, $3073, $3074, $3075, $3076, $3077, $3078, $3079, $3080, $3081, $3082, $3083, $3084, $3085, $3086, $3087, $3088, VersionRange($3089, $3090)), ($3091, $3092, $3093, $3094, $3095, $3096, $3097, $3098, $3099, $3100, $3101, $3102, $3103, $3104, $3105, $3106, $3107, $3108, $3109, $3110, $3111, $3112, $3113, $3114, $3115, $3116, $3117, $3118, VersionRange($3119, $3120)), ($3121, $3122, $3123, $3124, $3125, $3126, $3127, $3128, $3129, $3130, $3131, $3132, $3133, $3134, $3135, $3136, $3137, $3138, $3139, $3140, $3141, $3142, $3143, $3144, $3145, $3146, $3147, $3148, VersionRange($3149, $3150)), ($3151, $3152, $3153, $3154, $3155, $3156, $3157, $3158, $3159, $3160, $3161, $3162, $3163, $3164, $3165, $3166, $3167, $3168, $3169, $3170, $3171, $3172, $3173, $3174, $3175, $3176, $3177, $3178, VersionRange($3179, $3180)), ($3181, $3182, $3183, $3184, $3185, $3186, $3187, $3188, $3189, $3190, $3191, $3192, $3193, $3194, $3195, $3196, $3197, $3198, $3199, $3200, $3201, $3202, $3203, $3204, $3205, $3206, $3207, $3208, VersionRange($3209, $3210)), ($3211, $3212, $3213, $3214, $3215, $3216, $3217, $3218, $3219, $3220, $3221, $3222, $3223, $3224, $3225, $3226, $3227, $3228, $3229, $3230, $3231, $3232, $3233, $3234, $3235, $3236, $3237, $3238, VersionRange($3239, $3240)), ($3241, $3242, $3243, $3244, $3245, $3246, $3247, $3248, $3249, $3250, $3251, $3252, $3253, $3254, $3255, $3256, $3257, $3258, $3259, $3260, $3261, $3262, $3263, $3264, $3265, $3266, $3267, $3268, VersionRange($3269, $3270)), ($3271, $3272, $3273, $3274, $3275, $3276, $3277, $3278, $3279, $3280, $3281, $3282, $3283, $3284, $3285, $3286, $3287, $3288, $3289, $3290, $3291, $3292, $3293, $3294, $3295, $3296, $3297, $3298, VersionRange($3299, $3300)), ($3301, $3302, $3303, $3304, $3305, $3306, $3307, $3308, $3309, $3310, $3311, $3312, $3313, $3314, $3315, $3316, $3317, $3318, $3319, $3320, $3321, $3322, $3323, $3324, $3325, $3326, $3327, $3328, VersionRange($3329, $3330)), ($3331, $3332, $3333, $3334, $3335, $3336, $3337, $3338, $3339, $3340, $3341, $3342, $3343, $3344, $3345, $3346, $3347, $3348, $3349, $3350, $3351, $3352, $3353, $3354, $3355, $3356, $3357, $3358, VersionRange($3359, $3360)), ($3361, $3362, $3363, $3364, $3365, $3366, $3367, $3368, $3369, $3370, $3371, $3372, $3373, $3374, $3375, $3376, $3377, $3378, $3379, $3380, $3381, $3382, $3383, $3384, $3385, $3386, $3387, $3388, VersionRange($3389, $3390)), ($3391, $3392, $3393, $3394, $3395, $3396, $3397, $3398, $3399, $3400, $3401, $3402, $3403, $3404, $3405, $3406, $3407, $3408, $3409, $3410, $3411, $3412, $3413, $3414, $3415, $3416, $3417, $3418, VersionRange($3419, $3420)), ($3421, $3422, $3423, $3424, $3425, $3426, $3427, $3428, $3429, $3430, $3431, $3432, $3433, $3434, $3435, $3436, $3437, $3438, $3439, $3440, $3441, $3442, $3443, $3444, $3445, $3446, $3447, $3448, VersionRange($3449, $3450)), ($3451, $3452, $3453, $3454, $3455, $3456, $3457, $3458, $3459, $3460, $3461, $3462, $3463, $3464, $3465, $3466, $3467, $3468, $3469, $3470, $3471, $3472, $3473, $3474, $3475, $3476, $3477, $3478, VersionRange($3479, $3480)), ($3481, $3482, $3483, $3484, $3485, $3486, $3487, $3488, $3489, $3490, $3491, $3492, $3493, $3494, $3495, $3496, $3497, $3498, $3499, $3500, $3501, $3502, $3503, $3504, $3505, $3506, $3507, $3508, VersionRange($3509, $3510)), ($3511, $3512, $3513, $3514, $3515, $3516, $3517, $3518, $3519, $3520, $3521, $3522, $3523, $3524, $3525, $3526, $3527, $3528, $3529, $3530, $3531, $3532, $3533, $3534, $3535, $3536, $3537, $3538, VersionRange($3539, $3540)), ($3541, $3542, $3543, $3544, $3545, $3546, $3547, $3548, $3549, $3550, $3551, $3552, $3553, $3554, $3555, $3556, $3557, $3558, $3559, $3560, $3561, $3562, $3563, $3564, $3565, $3566, $3567, $3568, VersionRange($3569, $3570)), ($3571, $3572, $3573, $3574, $3575, $3576, $3577, $3578, $3579, $3580, $3581, $3582, $3583, $3584, $3585, $3586, $3587, $3588, $3589, $3590, $3591, $3592, $3593, $3594, $3595, $3596, $3597, $3598, VersionRange($3599, $3600)), ($3601, $3602, $3603, $3604, $3605, $3606, $3607, $3608, $3609, $3610, $3611, $3612, $3613, $3614, $3615, $3616, $3617, $3618, $3619, $3620, $3621, $3622, $3623, $3624, $3625, $3626, $3627, $3628, VersionRange($3629, $3630)), ($3631, $3632, $3633, $3634, $3635, $3636, $3637, $3638, $3639, $3640, $3641, $3642, $3643, $3644, $3645, $3646, $3647, $3648, $3649, $3650, $3651, $3652, $3653, $3654, $3655, $3656, $3657, $3658, VersionRange($3659, $3660)), ($3661, $3662, $3663, $3664, $3665, $3666, $3667, $3668, $3669, $3670, $3671, $3672, $3673, $3674, $3675, $3676, $3677, $3678, $3679, $3680, $3681, $3682, $3683, $3684, $3685, $3686, $3687, $3688, VersionRange($3689, $3690)), ($3691, $3692, $3693, $3694, $3695, $3696, $3697, $3698, $3699, $3700, $3701, $3702, $3703, $3704, $3705, $3706, $3707, $3708, $3709, $3710, $3711, $3712, $3713, $3714, $3715, $3716, $3717, $3718, VersionRange($3719, $3720)), ($3721, $3722, $3723, $3724, $3725, $3726, $3727, $3728, $3729, $3730, $3731, $3732, $3733, $3734, $3735, $3736, $3737, $3738, $3739, $3740, $3741, $3742, $3743, $3744, $3745, $3746, $3747, $3748, VersionRange($3749, $3750)), ($3751, $3752, $3753, $3754, $3755, $3756, $3757, $3758, $3759, $3760, $3761, $3762, $3763, $3764, $3765, $3766, $3767, $3768, $3769, $3770, $3771, $3772, $3773, $3774, $3775, $3776, $3777, $3778, VersionRange($3779, $3780)), ($3781, $3782, $3783, $3784, $3785, $3786, $3787, $3788, $3789, $3790, $3791, $3792, $3793, $3794, $3795, $3796, $3797, $3798, $3799, $3800, $3801, $3802, $3803, $3804, $3805, $3806, $3807, $3808, VersionRange($3809, $3810)), ($3811, $3812, $3813, $3814, $3815, $3816, $3817, $3818, $3819, $3820, $3821, $3822, $3823, $3824, $3825, $3826, $3827, $3828, $3829, $3830, $3831, $3832, $3833, $3834, $3835, $3836, $3837, $3838, VersionRange($3839, $3840)), ($3841, $3842, $3843, $3844, $3845, $3846, $3847, $3848, $3849, $3850, $3851, $3852, $3853, $3854, $3855, $3856, $3857, $3858, $3859, $3860, $3861, $3862, $3863, $3864, $3865, $3866, $3867, $3868, VersionRange($3869, $3870)), ($3871, $3872, $3873, $3874, $3875, $3876, $3877, $3878, $3879, $3880, $3881, $3882, $3883, $3884, $3885, $3886, $3887, $3888, $3889, $3890, $3891, $3892, $3893, $3894, $3895, $3896, $3897, $3898, VersionRange($3899, $3900)), ($3901, $3902, $3903, $3904, $3905, $3906, $3907, $3908, $3909, $3910, $3911, $3912, $3913, $3914, $3915, $3916, $3917, $3918, $3919, $3920, $3921, $3922, $3923, $3924, $3925, $3926, $3927, $3928, VersionRange($3929, $3930)), ($3931, $3932, $3933, $3934, $3935, $3936, $3937, $3938, $3939, $3940, $3941, $3942, $3943, $3944, $3945, $3946, $3947, $3948, $3949, $3950, $3951, $3952, $3953, $3954, $3955, $3956, $3957, $3958, VersionRange($3959, $3960)), ($3961, $3962, $3963, $3964, $3965, $3966, $3967, $3968, $3969, $3970, $3971, $3972, $3973, $3974, $3975, $3976, $3977, $3978, $3979, $3980, $3981, $3982, $3983, $3984, $3985, $3986, $3987, $3988, VersionRange($3989, $3990)), ($3991, $3992, $3993, $3994, $3995, $3996, $3997, $3998, $3999, $4000, $4001, $4002, $4003, $4004, $4005, $4006, $4007, $4008, $4009, $4010, $4011, $4012, $4013, $4014, $4015, $4016, $4017, $4018, VersionRange($4019, $4020)), ($4021, $4022, $4023, $4024, $4025, $4026, $4027, $4028, $4029, $4030, $4031, $4032, $4033, $4034, $4035, $4036, $4037, $4038, $4039, $4040, $4041, $4042, $4043, $4044, $4045, $4046, $4047, $4048, VersionRange($4049, $4050)), ($4051, $4052, $4053, $4054, $4055, $4056, $4057, $4058, $4059, $4060, $4061, $4062, $4063, $4064, $4065, $4066, $4067, $4068, $4069, $4070, $4071, $4072, $4073, $4074, $4075, $4076, $4077, $4078, VersionRange($4079, $4080)), ($4081, $4082, $4083, $4084, $4085, $4086, $4087, $4088, $4089, $4090, $4091, $4092, $4093, $4094, $4095, $4096, $4097, $4098, $4099, $4100, $4101, $4102, $4103, $4104, $4105, $4106, $4107, $4108, VersionRange($4109, $4110)), ($4111, $4112, $4113, $4114, $4115, $4116, $4117, $4118, $4119, $4120, $4121, $4122, $4123, $4124, $4125, $4126, $4127, $4128, $4129, $4130, $4131, $4132, $4133, $4134, $4135, $4136, $4137, $4138, VersionRange($4139, $4140)), ($4141, $4142, $4143, $4144, $4145, $4146, $4147, $4148, $4149, $4150, $4151, $4152, $4153, $4154, $4155, $4156, $4157, $4158, $4159, $4160, $4161, $4162, $4163, $4164, $4165, $4166, $4167, $4168, VersionRange($4169, $4170)), ($4171, $4172, $4173, $4174, $4175, $4176, $4177, $4178, $4179, $4180, $4181, $4182, $4183, $4184, $4185, $4186, $4187, $4188, $4189, $4190, $4191, $4192, $4193, $4194, $4195, $4196, $4197, $4198, VersionRange($4199, $4200)), ($4201, $4202, $4203, $4204, $4205, $4206, $4207, $4208, $4209, $4210, $4211, $4212, $4213, $4214, $4215, $4216, $4217, $4218, $4219, $4220, $4221, $4222, $4223, $4224, $4225, $4226, $4227, $4228, VersionRange($4229, $4230)), ($4231, $4232, $4233, $4234, $4235, $4236, $4237, $4238, $4239, $4240, $4241, $4242, $4243, $4244, $4245, $4246, $4247, $4248, $4249, $4250, $4251, $4252, $4253, $4254, $4255, $4256, $4257, $4258, VersionRange($4259, $4260)), ($4261, $4262, $4263, $4264, $4265, $4266, $4267, $4268, $4269, $4270, $4271, $4272, $4273, $4274, $4275, $4276, $4277, $4278, $4279, $4280, $4281, $4282, $4283, $4284, $4285, $4286, $4287, $4288, VersionRange($4289, $4290)), ($4291, $4292, $4293, $4294, $4295, $4296, $4297, $4298, $4299, $4300, $4301, $4302, $4303, $4304, $4305, $4306, $4307, $4308, $4309, $4310, $4311, $4312, $4313, $4314, $4315, $4316, $4317, $4318, VersionRange($4319, $4320)), ($4321, $4322, $4323, $4324, $4325, $4326, $4327, $4328, $4329, $4330, $4331, $4332, $4333, $4334, $4335, $4336, $4337, $4338, $4339, $4340, $4341, $4342, $4343, $4344, $4345, $4346, $4347, $4348, VersionRange($4349, $4350)), ($4351, $4352, $4353, $4354, $4355, $4356, $4357, $4358, $4359, $4360, $4361, $4362, $4363, $4364, $4365, $4366, $4367, $4368, $4369, $4370, $4371, $4372, $4373, $4374, $4375, $4376, $4377, $4378, VersionRange($4379, $4380)), ($4381, $4382, $4383, $4384, $4385, $4386, $4387, $4388, $4389, $4390, $4391, $4392, $4393, $4394, $4395, $4396, $4397, $4398, $4399, $4400, $4401, $4402, $4403, $4404, $4405, $4406, $4407, $4408, VersionRange($4409, $4410)), ($4411, $4412, $4413, $4414, $4415, $4416, $4417, $4418, $4419, $4420, $4421, $4422, $4423, $4424, $4425, $4426, $4427, $4428, $4429, $4430, $4431, $4432, $4433, $4434, $4435, $4436, $4437, $4438, VersionRange($4439, $4440)), ($4441, $4442, $4443, $4444, $4445, $4446, $4447, $4448, $4449, $4450, $4451, $4452, $4453, $4454, $4455, $4456, $4457, $4458, $4459, $4460, $4461, $4462, $4463, $4464, $4465, $4466, $4467, $4468, VersionRange($4469, $4470)), ($4471, $4472, $4473, $4474, $4475, $4476, $4477, $4478, $4479, $4480, $4481, $4482, $4483, $4484, $4485, $4486, $4487, $4488, $4489, $4490, $4491, $4492, $4493, $4494, $4495, $4496, $4497, $4498, VersionRange($4499, $4500)), ($4501, $4502, $4503, $4504, $4505, $4506, $4507, $4508, $4509, $4510, $4511, $4512, $4513, $4514, $4515, $4516, $4517, $4518, $4519, $4520, $4521, $4522, $4523, $4524, $4525, $4526, $4527, $4528, VersionRange($4529, $4530)), ($4531, $4532, $4533, $4534, $4535, $4536, $4537, $4538, $4539, $4540, $4541, $4542, $4543, $4544, $4545, $4546, $4547, $4548, $4549, $4550, $4551, $4552, $4553, $4554, $4555, $4556, $4557, $4558, VersionRange($4559, $4560)), ($4561, $4562, $4563, $4564, $4565, $4566, $4567, $4568, $4569, $4570, $4571, $4572, $4573, $4574, $4575, $4576, $4577, $4578, $4579, $4580, $4581, $4582, $4583, $4584, $4585, $4586, $4587, $4588, VersionRange($4589, $4590)), ($4591, $4592, $4593, $4594, $4595, $4596, $4597, $4598, $4599, $4600, $4601, $4602, $4603, $4604, $4605, $4606, $4607, $4608, $4609, $4610, $4611, $4612, $4613, $4614, $4615, $4616, $4617, $4618, VersionRange($4619, $4620)), ($4621, $4622, $4623, $4624, $4625, $4626, $4627, $4628, $4629, $4630, $4631, $4632, $4633, $4634, $4635, $4636, $4637, $4638, $4639, $4640, $4641, $4642, $4643, $4644, $4645, $4646, $4647, $4648, VersionRange($4649, $4650)), ($4651, $4652, $4653, $4654, $4655, $4656, $4657, $4658, $4659, $4660, $4661, $4662, $4663, $4664, $4665, $4666, $4667, $4668, $4669, $4670, $4671, $4672, $4673, $4674, $4675, $4676, $4677, $4678, VersionRange($4679, $4680)), ($4681, $4682, $4683, $4684, $4685, $4686, $4687, $4688, $4689, $4690, $4691, $4692, $4693, $4694, $4695, $4696, $4697, $4698, $4699, $4700, $4701, $4702, $4703, $4704, $4705, $4706, $4707, $4708, VersionRange($4709, $4710)), ($4711, $4712, $4713, $4714, $4715, $4716, $4717, $4718, $4719, $4720, $4721, $4722, $4723, $4724, $4725, $4726, $4727, $4728, $4729, $4730, $4731, $4732, $4733, $4734, $4735, $4736, $4737, $4738, VersionRange($4739, $4740)), ($4741, $4742, $4743, $4744, $4745, $4746, $4747, $4748, $4749, $4750, $4751, $4752, $4753, $4754, $4755, $4756, $4757, $4758, $4759, $4760, $4761, $4762, $4763, $4764, $4765, $4766, $4767, $4768, VersionRange($4769, $4770)), ($4771, $4772, $4773, $4774, $4775, $4776, $4777, $4778, $4779, $4780, $4781, $4782, $4783, $4784, $4785, $4786, $4787, $4788, $4789, $4790, $4791, $4792, $4793, $4794, $4795, $4796, $4797, $4798, VersionRange($4799, $4800)), ($4801, $4802, $4803, $4804, $4805, $4806, $4807, $4808, $4809, $4810, $4811, $4812, $4813, $4814, $4815, $4816, $4817, $4818, $4819, $4820, $4821, $4822, $4823, $4824, $4825, $4826, $4827, $4828, VersionRange($4829, $4830)), ($4831, $4832, $4833, $4834, $4835, $4836, $4837, $4838, $4839, $4840, $4841, $4842, $4843, $4844, $4845, $4846, $4847, $4848, $4849, $4850, $4851, $4852, $4853, $4854, $4855, $4856, $4857, $4858, VersionRange($4859, $4860)), ($4861, $4862, $4863, $4864, $4865, $4866, $4867, $4868, $4869, $4870, $4871, $4872, $4873, $4874, $4875, $4876, $4877, $4878, $4879, $4880, $4881, $4882, $4883, $4884, $4885, $4886, $4887, $4888, VersionRange($4889, $4890)), ($4891, $4892, $4893, $4894, $4895, $4896, $4897, $4898, $4899, $4900, $4901, $4902, $4903, $4904, $4905, $4906, $4907, $4908, $4909, $4910, $4911, $4912, $4913, $4914, $4915, $4916, $4917, $4918, VersionRange($4919, $4920)), ($4921, $4922, $4923, $4924, $4925, $4926, $4927, $4928, $4929, $4930, $4931, $4932, $4933, $4934, $4935, $4936, $4937, $4938, $4939, $4940, $4941, $4942, $4943, $4944, $4945, $4946, $4947, $4948, VersionRange($4949, $4950)), ($4951, $4952, $4953, $4954, $4955, $4956, $4957, $4958, $4959, $4960, $4961, $4962, $4963, $4964, $4965, $4966, $4967, $4968, $4969, $4970, $4971, $4972, $4973, $4974, $4975, $4976, $4977, $4978, VersionRange($4979, $4980)), ($4981, $4982, $4983, $4984, $4985, $4986, $4987, $4988, $4989, $4990, $4991, $4992, $4993, $4994, $4995, $4996, $4997, $4998, $4999, $5000, $5001, $5002, $5003, $5004, $5005, $5006, $5007, $5008, VersionRange($5009, $5010)), ($5011, $5012, $5013, $5014, $5015, $5016, $5017, $5018, $5019, $5020, $5021, $5022, $5023, $5024, $5025, $5026, $5027, $5028, $5029, $5030, $5031, $5032, $5033, $5034, $5035, $5036, $5037, $5038, VersionRange($5039, $5040)), ($5041, $5042, $5043, $5044, $5045, $5046, $5047, $5048, $5049, $5050, $5051, $5052, $5053, $5054, $5055, $5056, $5057, $5058, $5059, $5060, $5061, $5062, $5063, $5064, $5065, $5066, $5067, $5068, VersionRange($5069, $5070)), ($5071, $5072, $5073, $5074, $5075, $5076, $5077, $5078, $5079, $5080, $5081, $5082, $5083, $5084, $5085, $5086, $5087, $5088, $5089, $5090, $5091, $5092, $5093, $5094, $5095, $5096, $5097, $5098, VersionRange($5099, $5100)), ($5101, $5102, $5103, $5104, $5105, $5106, $5107, $5108, $5109, $5110, $5111, $5112, $5113, $5114, $5115, $5116, $5117, $5118, $5119, $5120, $5121, $5122, $5123, $5124, $5125, $5126, $5127, $5128, VersionRange($5129, $5130)), ($5131, $5132, $5133, $5134, $5135, $5136, $5137, $5138, $5139, $5140, $5141, $5142, $5143, $5144, $5145, $5146, $5147, $5148, $5149, $5150, $5151, $5152, $5153, $5154, $5155, $5156, $5157, $5158, VersionRange($5159, $5160)), ($5161, $5162, $5163, $5164, $5165, $5166, $5167, $5168, $5169, $5170, $5171, $5172, $5173, $5174, $5175, $5176, $5177, $5178, $5179, $5180, $5181, $5182, $5183, $5184, $5185, $5186, $5187, $5188, VersionRange($5189, $5190)), ($5191, $5192, $5193, $5194, $5195, $5196, $5197, $5198, $5199, $5200, $5201, $5202, $5203, $5204, $5205, $5206, $5207, $5208, $5209, $5210, $5211, $5212, $5213, $5214, $5215, $5216, $5217, $5218, VersionRange($5219, $5220)), ($5221, $5222, $5223, $5224, $5225, $5226, $5227, $5228, $5229, $5230, $5231, $5232, $5233, $5234, $5235, $5236, $5237, $5238, $5239, $5240, $5241, $5242, $5243, $5244, $5245, $5246, $5247, $5248, VersionRange($5249, $5250)), ($5251, $5252, $5253, $5254, $5255, $5256, $5257, $5258, $5259, $5260, $5261, $5262, $5263, $5264, $5265, $5266, $5267, $5268, $5269, $5270, $5271, $5272, $5273, $5274, $5275, $5276, $5277, $5278, VersionRange($5279, $5280)), ($5281, $5282, $5283, $5284, $5285, $5286, $5287, $5288, $5289, $5290, $5291, $5292, $5293, $5294, $5295, $5296, $5297, $5298, $5299, $5300, $5301, $5302, $5303, $5304, $5305, $5306, $5307, $5308, VersionRange($5309, $5310)), ($5311, $5312, $5313, $5314, $5315, $5316, $5317, $5318, $5319, $5320, $5321, $5322, $5323, $5324, $5325, $5326, $5327, $5328, $5329, $5330, $5331, $5332, $5333, $5334, $5335, $5336, $5337, $5338, VersionRange($5339, $5340)), ($5341, $5342, $5343, $5344, $5345, $5346, $5347, $5348, $5349, $5350, $5351, $5352, $5353, $5354, $5355, $5356, $5357, $5358, $5359, $5360, $5361, $5362, $5363, $5364, $5365, $5366, $5367, $5368, VersionRange($5369, $5370)), ($5371, $5372, $5373, $5374, $5375, $5376, $5377, $5378, $5379, $5380, $5381, $5382, $5383, $5384, $5385, $5386, $5387, $5388, $5389, $5390, $5391, $5392, $5393, $5394, $5395, $5396, $5397, $5398, VersionRange($5399, $5400)), ($5401, $5402, $5403, $5404, $5405, $5406, $5407, $5408, $5409, $5410, $5411, $5412, $5413, $5414, $5415, $5416, $5417, $5418, $5419, $5420, $5421, $5422, $5423, $5424, $5425, $5426, $5427, $5428, VersionRange($5429, $5430)), ($5431, $5432, $5433, $5434, $5435, $5436, $5437, $5438, $5439, $5440, $5441, $5442, $5443, $5444, $5445, $5446, $5447, $5448, $5449, $5450, $5451, $5452, $5453, $5454, $5455, $5456, $5457, $5458, VersionRange($5459, $5460)), ($5461, $5462, $5463, $5464, $5465, $5466, $5467, $5468, $5469, $5470, $5471, $5472, $5473, $5474, $5475, $5476, $5477, $5478, $5479, $5480, $5481, $5482, $5483, $5484, $5485, $5486, $5487, $5488, VersionRange($5489, $5490)), ($5491, $5492, $5493, $5494, $5495, $5496, $5497, $5498, $5499, $5500, $5501, $5502, $5503, $5504, $5505, $5506, $5507, $5508, $5509, $5510, $5511, $5512, $5513, $5514, $5515, $5516, $5517, $5518, VersionRange($5519, $5520)), ($5521, $5522, $5523, $5524, $5525, $5526, $5527, $5528, $5529, $5530, $5531, $5532, $5533, $5534, $5535, $5536, $5537, $5538, $5539, $5540, $5541, $5542, $5543, $5544, $5545, $5546, $5547, $5548, VersionRange($5549, $5550)), ($5551, $5552, $5553, $5554, $5555, $5556, $5557, $5558, $5559, $5560, $5561, $5562, $5563, $5564, $5565, $5566, $5567, $5568, $5569, $5570, $5571, $5572, $5573, $5574, $5575, $5576, $5577, $5578, VersionRange($5579, $5580)), ($5581, $5582, $5583, $5584, $5585, $5586, $5587, $5588, $5589, $5590, $5591, $5592, $5593, $5594, $5595, $5596, $5597, $5598, $5599, $5600, $5601, $5602, $5603, $5604, $5605, $5606, $5607, $5608, VersionRange($5609, $5610)), ($5611, $5612, $5613, $5614, $5615, $5616, $5617, $5618, $5619, $5620, $5621, $5622, $5623, $5624, $5625, $5626, $5627, $5628, $5629, $5630, $5631, $5632, $5633, $5634, $5635, $5636, $5637, $5638, VersionRange($5639, $5640)), ($5641, $5642, $5643, $5644, $5645, $5646, $5647, $5648, $5649, $5650, $5651, $5652, $5653, $5654, $5655, $5656, $5657, $5658, $5659, $5660, $5661, $5662, $5663, $5664, $5665, $5666, $5667, $5668, VersionRange($5669, $5670)), ($5671, $5672, $5673, $5674, $5675, $5676, $5677, $5678, $5679, $5680, $5681, $5682, $5683, $5684, $5685, $5686, $5687, $5688, $5689, $5690, $5691, $5692, $5693, $5694, $5695, $5696, $5697, $5698, VersionRange($5699, $5700)), ($5701, $5702, $5703, $5704, $5705, $5706, $5707, $5708, $5709, $5710, $5711, $5712, $5713, $5714, $5715, $5716, $5717, $5718, $5719, $5720, $5721, $5722, $5723, $5724, $5725, $5726, $5727, $5728, VersionRange($5729, $5730)), ($5731, $5732, $5733, $5734, $5735, $5736, $5737, $5738, $5739, $5740, $5741, $5742, $5743, $5744, $5745, $5746, $5747, $5748, $5749, $5750, $5751, $5752, $5753, $5754, $5755, $5756, $5757, $5758, VersionRange($5759, $5760)), ($5761, $5762, $5763, $5764, $5765, $5766, $5767, $5768, $5769, $5770, $5771, $5772, $5773, $5774, $5775, $5776, $5777, $5778, $5779, $5780, $5781, $5782, $5783, $5784, $5785, $5786, $5787, $5788, VersionRange($5789, $5790)), ($5791, $5792, $5793, $5794, $5795, $5796, $5797, $5798, $5799, $5800, $5801, $5802, $5803, $5804, $5805, $5806, $5807, $5808, $5809, $5810, $5811, $5812, $5813, $5814, $5815, $5816, $5817, $5818, VersionRange($5819, $5820)), ($5821, $5822, $5823, $5824, $5825, $5826, $5827, $5828, $5829, $5830, $5831, $5832, $5833, $5834, $5835, $5836, $5837, $5838, $5839, $5840, $5841, $5842, $5843, $5844, $5845, $5846, $5847, $5848, VersionRange($5849, $5850)), ($5851, $5852, $5853, $5854, $5855, $5856, $5857, $5858, $5859, $5860, $5861, $5862, $5863, $5864, $5865, $5866, $5867, $5868, $5869, $5870, $5871, $5872, $5873, $5874, $5875, $5876, $5877, $5878, VersionRange($5879, $5880)), ($5881, $5882, $5883, $5884, $5885, $5886, $5887, $5888, $5889, $5890, $5891, $5892, $5893, $5894, $5895, $5896, $5897, $5898, $5899, $5900, $5901, $5902, $5903, $5904, $5905, $5906, $5907, $5908, VersionRange($5909, $5910)), ($5911, $5912, $5913, $5914, $5915, $5916, $5917, $5918, $5919, $5920, $5921, $5922, $5923, $5924, $5925, $5926, $5927, $5928, $5929, $5930, $5931, $5932, $5933, $5934, $5935, $5936, $5937, $5938, VersionRange($5939, $5940)), ($5941, $5942, $5943, $5944, $5945, $5946, $5947, $5948, $5949, $5950, $5951, $5952, $5953, $5954, $5955, $5956, $5957, $5958, $5959, $5960, $5961, $5962, $5963, $5964, $5965, $5966, $5967, $5968, VersionRange($5969, $5970)), ($5971, $5972, $5973, $5974, $5975, $5976, $5977, $5978, $5979, $5980, $5981, $5982, $5983, $5984, $5985, $5986, $5987, $5988, $5989, $5990, $5991, $5992, $5993, $5994, $5995, $5996, $5997, $5998, VersionRange($5999, $6000)), ($6001, $6002, $6003, $6004, $6005, $6006, $6007, $6008, $6009, $6010, $6011, $6012, $6013, $6014, $6015, $6016, $6017, $6018, $6019, $6020, $6021, $6022, $6023, $6024, $6025, $6026, $6027, $6028, VersionRange($6029, $6030)), ($6031, $6032, $6033, $6034, $6035, $6036, $6037, $6038, $6039, $6040, $6041, $6042, $6043, $6044, $6045, $6046, $6047, $6048, $6049, $6050, $6051, $6052, $6053, $6054, $6055, $6056, $6057, $6058, VersionRange($6059, $6060)), ($6061, $6062, $6063, $6064, $6065, $6066, $6067, $6068, $6069, $6070, $6071, $6072, $6073, $6074, $6075, $6076, $6077, $6078, $6079, $6080, $6081, $6082, $6083, $6084, $6085, $6086, $6087, $6088, VersionRange($6089, $6090)), ($6091, $6092, $6093, $6094, $6095, $6096, $6097, $6098, $6099, $6100, $6101, $6102, $6103, $6104, $6105, $6106, $6107, $6108, $6109, $6110, $6111, $6112, $6113, $6114, $6115, $6116, $6117, $6118, VersionRange($6119, $6120)), ($6121, $6122, $6123, $6124, $6125, $6126, $6127, $6128, $6129, $6130, $6131, $6132, $6133, $6134, $6135, $6136, $6137, $6138, $6139, $6140, $6141, $6142, $6143, $6144, $6145, $6146, $6147, $6148, VersionRange($6149, $6150)), ($6151, $6152, $6153, $6154, $6155, $6156, $6157, $6158, $6159, $6160, $6161, $6162, $6163, $6164, $6165, $6166, $6167, $6168, $6169, $6170, $6171, $6172, $6173, $6174, $6175, $6176, $6177, $6178, VersionRange($6179, $6180)), ($6181, $6182, $6183, $6184, $6185, $6186, $6187, $6188, $6189, $6190, $6191, $6192, $6193, $6194, $6195, $6196, $6197, $6198, $6199, $6200, $6201, $6202, $6203, $6204, $6205, $6206, $6207, $6208, VersionRange($6209, $6210)), ($6211, $6212, $6213, $6214, $6215, $6216, $6217, $6218, $6219, $6220, $6221, $6222, $6223, $6224, $6225, $6226, $6227, $6228, $6229, $6230, $6231, $6232, $6233, $6234, $6235, $6236, $6237, $6238, VersionRange($6239, $6240)), ($6241, $6242, $6243, $6244, $6245, $6246, $6247, $6248, $6249, $6250, $6251, $6252, $6253, $6254, $6255, $6256, $6257, $6258, $6259, $6260, $6261, $6262, $6263, $6264, $6265, $6266, $6267, $6268, VersionRange($6269, $6270)), ($6271, $6272, $6273, $6274, $6275, $6276, $6277, $6278, $6279, $6280, $6281, $6282, $6283, $6284, $6285, $6286, $6287, $6288, $6289, $6290, $6291, $6292, $6293, $6294, $6295, $6296, $6297, $6298, VersionRange($6299, $6300)), ($6301, $6302, $6303, $6304, $6305, $6306, $6307, $6308, $6309, $6310, $6311, $6312, $6313, $6314, $6315, $6316, $6317, $6318, $6319, $6320, $6321, $6322, $6323, $6324, $6325, $6326, $6327, $6328, VersionRange($6329, $6330)), ($6331, $6332, $6333, $6334, $6335, $6336, $6337, $6338, $6339, $6340, $6341, $6342, $6343, $6344, $6345, $6346, $6347, $6348, $6349, $6350, $6351, $6352, $6353, $6354, $6355, $6356, $6357, $6358, VersionRange($6359, $6360)), ($6361, $6362, $6363, $6364, $6365, $6366, $6367, $6368, $6369, $6370, $6371, $6372, $6373, $6374, $6375, $6376, $6377, $6378, $6379, $6380, $6381, $6382, $6383, $6384, $6385, $6386, $6387, $6388, VersionRange($6389, $6390)), ($6391, $6392, $6393, $6394, $6395, $6396, $6397, $6398, $6399, $6400, $6401, $6402, $6403, $6404, $6405, $6406, $6407, $6408, $6409, $6410, $6411, $6412, $6413, $6414, $6415, $6416, $6417, $6418, VersionRange($6419, $6420)), ($6421, $6422, $6423, $6424, $6425, $6426, $6427, $6428, $6429, $6430, $6431, $6432, $6433, $6434, $6435, $6436, $6437, $6438, $6439, $6440, $6441, $6442, $6443, $6444, $6445, $6446, $6447, $6448, VersionRange($6449, $6450)), ($6451, $6452, $6453, $6454, $6455, $6456, $6457, $6458, $6459, $6460, $6461, $6462, $6463, $6464, $6465, $6466, $6467, $6468, $6469, $6470, $6471, $6472, $6473, $6474, $6475, $6476, $6477, $6478, VersionRange($6479, $6480)), ($6481, $6482, $6483, $6484, $6485, $6486, $6487, $6488, $6489, $6490, $6491, $6492, $6493, $6494, $6495, $6496, $6497, $6498, $6499, $6500, $6501, $6502, $6503, $6504, $6505, $6506, $6507, $6508, VersionRange($6509, $6510)), ($6511, $6512, $6513, $6514, $6515, $6516, $6517, $6518, $6519, $6520, $6521, $6522, $6523, $6524, $6525, $6526, $6527, $6528, $6529, $6530, $6531, $6532, $6533, $6534, $6535, $6536, $6537, $6538, VersionRange($6539, $6540)), ($6541, $6542, $6543, $6544, $6545, $6546, $6547, $6548, $6549, $6550, $6551, $6552, $6553, $6554, $6555, $6556, $6557, $6558, $6559, $6560, $6561, $6562, $6563, $6564, $6565, $6566, $6567, $6568, VersionRange($6569, $6570)), ($6571, $6572, $6573, $6574, $6575, $6576, $6577, $6578, $6579, $6580, $6581, $6582, $6583, $6584, $6585, $6586, $6587, $6588, $6589, $6590, $6591, $6592, $6593, $6594, $6595, $6596, $6597, $6598, VersionRange($6599, $6600)), ($6601, $6602, $6603, $6604, $6605, $6606, $6607, $6608, $6609, $6610, $6611, $6612, $6613, $6614, $6615, $6616, $6617, $6618, $6619, $6620, $6621, $6622, $6623, $6624, $6625, $6626, $6627, $6628, VersionRange($6629, $6630)), ($6631, $6632, $6633, $6634, $6635, $6636, $6637, $6638, $6639, $6640, $6641, $6642, $6643, $6644, $6645, $6646, $6647, $6648, $6649, $6650, $6651, $6652, $6653, $6654, $6655, $6656, $6657, $6658, VersionRange($6659, $6660)), ($6661, $6662, $6663, $6664, $6665, $6666, $6667, $6668, $6669, $6670, $6671, $6672, $6673, $6674, $6675, $6676, $6677, $6678, $6679, $6680, $6681, $6682, $6683, $6684, $6685, $6686, $6687, $6688, VersionRange($6689, $6690)), ($6691, $6692, $6693, $6694, $6695, $6696, $6697, $6698, $6699, $6700, $6701, $6702, $6703, $6704, $6705, $6706, $6707, $6708, $6709, $6710, $6711, $6712, $6713, $6714, $6715, $6716, $6717, $6718, VersionRange($6719, $6720)), ($6721, $6722, $6723, $6724, $6725, $6726, $6727, $6728, $6729, $6730, $6731, $6732, $6733, $6734, $6735, $6736, $6737, $6738, $6739, $6740, $6741, $6742, $6743, $6744, $6745, $6746, $6747, $6748, VersionRange($6749, $6750)), ($6751, $6752, $6753, $6754, $6755, $6756, $6757, $6758, $6759, $6760, $6761, $6762, $6763, $6764, $6765, $6766, $6767, $6768, $6769, $6770, $6771, $6772, $6773, $6774, $6775, $6776, $6777, $6778, VersionRange($6779, $6780)), ($6781, $6782, $6783, $6784, $6785, $6786, $6787, $6788, $6789, $6790, $6791, $6792, $6793, $6794, $6795, $6796, $6797, $6798, $6799, $6800, $6801, $6802, $6803, $6804, $6805, $6806, $6807, $6808, VersionRange($6809, $6810)), ($6811, $6812, $6813, $6814, $6815, $6816, $6817, $6818, $6819, $6820, $6821, $6822, $6823, $6824, $6825, $6826, $6827, $6828, $6829, $6830, $6831, $6832, $6833, $6834, $6835, $6836, $6837, $6838, VersionRange($6839, $6840)), ($6841, $6842, $6843, $6844, $6845, $6846, $6847, $6848, $6849, $6850, $6851, $6852, $6853, $6854, $6855, $6856, $6857, $6858, $6859, $6860, $6861, $6862, $6863, $6864, $6865, $6866, $6867, $6868, VersionRange($6869, $6870)), ($6871, $6872, $6873, $6874, $6875, $6876, $6877, $6878, $6879, $6880, $6881, $6882, $6883, $6884, $6885, $6886, $6887, $6888, $6889, $6890, $6891, $6892, $6893, $6894, $6895, $6896, $6897, $6898, VersionRange($6899, $6900)), ($6901, $6902, $6903, $6904, $6905, $6906, $6907, $6908, $6909, $6910, $6911, $6912, $6913, $6914, $6915, $6916, $6917, $6918, $6919, $6920, $6921, $6922, $6923, $6924, $6925, $6926, $6927, $6928, VersionRange($6929, $6930)), ($6931, $6932, $6933, $6934, $6935, $6936, $6937, $6938, $6939, $6940, $6941, $6942, $6943, $6944, $6945, $6946, $6947, $6948, $6949, $6950, $6951, $6952, $6953, $6954, $6955, $6956, $6957, $6958, VersionRange($6959, $6960)), ($6961, $6962, $6963, $6964, $6965, $6966, $6967, $6968, $6969, $6970, $6971, $6972, $6973, $6974, $6975, $6976, $6977, $6978, $6979, $6980, $6981, $6982, $6983, $6984, $6985, $6986, $6987, $6988, VersionRange($6989, $6990)), ($6991, $6992, $6993, $6994, $6995, $6996, $6997, $6998, $6999, $7000, $7001, $7002, $7003, $7004, $7005, $7006, $7007, $7008, $7009, $7010, $7011, $7012, $7013, $7014, $7015, $7016, $7017, $7018, VersionRange($7019, $7020)), ($7021, $7022, $7023, $7024, $7025, $7026, $7027, $7028, $7029, $7030, $7031, $7032, $7033, $7034, $7035, $7036, $7037, $7038, $7039, $7040, $7041, $7042, $7043, $7044, $7045, $7046, $7047, $7048, VersionRange($7049, $7050)), ($7051, $7052, $7053, $7054, $7055, $7056, $7057, $7058, $7059, $7060, $7061, $7062, $7063, $7064, $7065, $7066, $7067, $7068, $7069, $7070, $7071, $7072, $7073, $7074, $7075, $7076, $7077, $7078, VersionRange($7079, $7080)), ($7081, $7082, $7083, $7084, $7085, $7086, $7087, $7088, $7089, $7090, $7091, $7092, $7093, $7094, $7095, $7096, $7097, $7098, $7099, $7100, $7101, $7102, $7103, $7104, $7105, $7106, $7107, $7108, VersionRange($7109, $7110)), ($7111, $7112, $7113, $7114, $7115, $7116, $7117, $7118, $7119, $7120, $7121, $7122, $7123, $7124, $7125, $7126, $7127, $7128, $7129, $7130, $7131, $7132, $7133, $7134, $7135, $7136, $7137, $7138, VersionRange($7139, $7140)), ($7141, $7142, $7143, $7144, $7145, $7146, $7147, $7148, $7149, $7150, $7151, $7152, $7153, $7154, $7155, $7156, $7157, $7158, $7159, $7160, $7161, $7162, $7163, $7164, $7165, $7166, $7167, $7168, VersionRange($7169, $7170)), ($7171, $7172, $7173, $7174, $7175, $7176, $7177, $7178, $7179, $7180, $7181, $7182, $7183, $7184, $7185, $7186, $7187, $7188, $7189, $7190, $7191, $7192, $7193, $7194, $7195, $7196, $7197, $7198, VersionRange($7199, $7200)), ($7201, $7202, $7203, $7204, $7205, $7206, $7207, $7208, $7209, $7210, $7211, $7212, $7213, $7214, $7215, $7216, $7217, $7218, $7219, $7220, $7221, $7222, $7223, $7224, $7225, $7226, $7227, $7228, VersionRange($7229, $7230)), ($7231, $7232, $7233, $7234, $7235, $7236, $7237, $7238, $7239, $7240, $7241, $7242, $7243, $7244, $7245, $7246, $7247, $7248, $7249, $7250, $7251, $7252, $7253, $7254, $7255, $7256, $7257, $7258, VersionRange($7259, $7260)), ($7261, $7262, $7263, $7264, $7265, $7266, $7267, $7268, $7269, $7270, $7271, $7272, $7273, $7274, $7275, $7276, $7277, $7278, $7279, $7280, $7281, $7282, $7283, $7284, $7285, $7286, $7287, $7288, VersionRange($7289, $7290)), ($7291, $7292, $7293, $7294, $7295, $7296, $7297, $7298, $7299, $7300, $7301, $7302, $7303, $7304, $7305, $7306, $7307, $7308, $7309, $7310, $7311, $7312, $7313, $7314, $7315, $7316, $7317, $7318, VersionRange($7319, $7320)), ($7321, $7322, $7323, $7324, $7325, $7326, $7327, $7328, $7329, $7330, $7331, $7332, $7333, $7334, $7335, $7336, $7337, $7338, $7339, $7340, $7341, $7342, $7343, $7344, $7345, $7346, $7347, $7348, VersionRange($7349, $7350)), ($7351, $7352, $7353, $7354, $7355, $7356, $7357, $7358, $7359, $7360, $7361, $7362, $7363, $7364, $7365, $7366, $7367, $7368, $7369, $7370, $7371, $7372, $7373, $7374, $7375, $7376, $7377, $7378, VersionRange($7379, $7380)), ($7381, $7382, $7383, $7384, $7385, $7386, $7387, $7388, $7389, $7390, $7391, $7392, $7393, $7394, $7395, $7396, $7397, $7398, $7399, $7400, $7401, $7402, $7403, $7404, $7405, $7406, $7407, $7408, VersionRange($7409, $7410)), ($7411, $7412, $7413, $7414, $7415, $7416, $7417, $7418, $7419, $7420, $7421, $7422, $7423, $7424, $7425, $7426, $7427, $7428, $7429, $7430, $7431, $7432, $7433, $7434, $7435, $7436, $7437, $7438, VersionRange($7439, $7440)), ($7441, $7442, $7443, $7444, $7445, $7446, $7447, $7448, $7449, $7450, $7451, $7452, $7453, $7454, $7455, $7456, $7457, $7458, $7459, $7460, $7461, $7462, $7463, $7464, $7465, $7466, $7467, $7468, VersionRange($7469, $7470)), ($7471, $7472, $7473, $7474, $7475, $7476, $7477, $7478, $7479, $7480, $7481, $7482, $7483, $7484, $7485, $7486, $7487, $7488, $7489, $7490, $7491, $7492, $7493, $7494, $7495, $7496, $7497, $7498, VersionRange($7499, $7500)), ($7501, $7502, $7503, $7504, $7505, $7506, $7507, $7508, $7509, $7510, $7511, $7512, $7513, $7514, $7515, $7516, $7517, $7518, $7519, $7520, $7521, $7522, $7523, $7524, $7525, $7526, $7527, $7528, VersionRange($7529, $7530)), ($7531, $7532, $7533, $7534, $7535, $7536, $7537, $7538, $7539, $7540, $7541, $7542, $7543, $7544, $7545, $7546, $7547, $7548, $7549, $7550, $7551, $7552, $7553, $7554, $7555, $7556, $7557, $7558, VersionRange($7559, $7560)), ($7561, $7562, $7563, $7564, $7565, $7566, $7567, $7568, $7569, $7570, $7571, $7572, $7573, $7574, $7575, $7576, $7577, $7578, $7579, $7580, $7581, $7582, $7583, $7584, $7585, $7586, $7587, $7588, VersionRange($7589, $7590)), ($7591, $7592, $7593, $7594, $7595, $7596, $7597, $7598, $7599, $7600, $7601, $7602, $7603, $7604, $7605, $7606, $7607, $7608, $7609, $7610, $7611, $7612, $7613, $7614, $7615, $7616, $7617, $7618, VersionRange($7619, $7620)), ($7621, $7622, $7623, $7624, $7625, $7626, $7627, $7628, $7629, $7630, $7631, $7632, $7633, $7634, $7635, $7636, $7637, $7638, $7639, $7640, $7641, $7642, $7643, $7644, $7645, $7646, $7647, $7648, VersionRange($7649, $7650)), ($7651, $7652, $7653, $7654, $7655, $7656, $7657, $7658, $7659, $7660, $7661, $7662, $7663, $7664, $7665, $7666, $7667, $7668, $7669, $7670, $7671, $7672, $7673, $7674, $7675, $7676, $7677, $7678, VersionRange($7679, $7680)), ($7681, $7682, $7683, $7684, $7685, $7686, $7687, $7688, $7689, $7690, $7691, $7692, $7693, $7694, $7695, $7696, $7697, $7698, $7699, $7700, $7701, $7702, $7703, $7704, $7705, $7706, $7707, $7708, VersionRange($7709, $7710)), ($7711, $7712, $7713, $7714, $7715, $7716, $7717, $7718, $7719, $7720, $7721, $7722, $7723, $7724, $7725, $7726, $7727, $7728, $7729, $7730, $7731, $7732, $7733, $7734, $7735, $7736, $7737, $7738, VersionRange($7739, $7740)), ($7741, $7742, $7743, $7744, $7745, $7746, $7747, $7748, $7749, $7750, $7751, $7752, $7753, $7754, $7755, $7756, $7757, $7758, $7759, $7760, $7761, $7762, $7763, $7764, $7765, $7766, $7767, $7768, VersionRange($7769, $7770)), ($7771, $7772, $7773, $7774, $7775, $7776, $7777, $7778, $7779, $7780, $7781, $7782, $7783, $7784, $7785, $7786, $7787, $7788, $7789, $7790, $7791, $7792, $7793, $7794, $7795, $7796, $7797, $7798, VersionRange($7799, $7800)), ($7801, $7802, $7803, $7804, $7805, $7806, $7807, $7808, $7809, $7810, $7811, $7812, $7813, $7814, $7815, $7816, $7817, $7818, $7819, $7820, $7821, $7822, $7823, $7824, $7825, $7826, $7827, $7828, VersionRange($7829, $7830)), ($7831, $7832, $7833, $7834, $7835, $7836, $7837, $7838, $7839, $7840, $7841, $7842, $7843, $7844, $7845, $7846, $7847, $7848, $7849, $7850, $7851, $7852, $7853, $7854, $7855, $7856, $7857, $7858, VersionRange($7859, $7860)), ($7861, $7862, $7863, $7864, $7865, $7866, $7867, $7868, $7869, $7870, $7871, $7872, $7873, $7874, $7875, $7876, $7877, $7878, $7879, $7880, $7881, $7882, $7883, $7884, $7885, $7886, $7887, $7888, VersionRange($7889, $7890)), ($7891, $7892, $7893, $7894, $7895, $7896, $7897, $7898, $7899, $7900, $7901, $7902, $7903, $7904, $7905, $7906, $7907, $7908, $7909, $7910, $7911, $7912, $7913, $7914, $7915, $7916, $7917, $7918, VersionRange($7919, $7920)), ($7921, $7922, $7923, $7924, $7925, $7926, $7927, $7928, $7929, $7930, $7931, $7932, $7933, $7934, $7935, $7936, $7937, $7938, $7939, $7940, $7941, $7942, $7943, $7944, $7945, $7946, $7947, $7948, VersionRange($7949, $7950)), ($7951, $7952, $7953, $7954, $7955, $7956, $7957, $7958, $7959, $7960, $7961, $7962, $7963, $7964, $7965, $7966, $7967, $7968, $7969, $7970, $7971, $7972, $7973, $7974, $7975, $7976, $7977, $7978, VersionRange($7979, $7980)), ($7981, $7982, $7983, $7984, $7985, $7986, $7987, $7988, $7989, $7990, $7991, $7992, $7993, $7994, $7995, $7996, $7997, $7998, $7999, $8000, $8001, $8002, $8003, $8004, $8005, $8006, $8007, $8008, VersionRange($8009, $8010)), ($8011, $8012, $8013, $8014, $8015, $8016, $8017, $8018, $8019, $8020, $8021, $8022, $8023, $8024, $8025, $8026, $8027, $8028, $8029, $8030, $8031, $8032, $8033, $8034, $8035, $8036, $8037, $8038, VersionRange($8039, $8040)), ($8041, $8042, $8043, $8044, $8045, $8046, $8047, $8048, $8049, $8050, $8051, $8052, $8053, $8054, $8055, $8056, $8057, $8058, $8059, $8060, $8061, $8062, $8063, $8064, $8065, $8066, $8067, $8068, VersionRange($8069, $8070)), ($8071, $8072, $8073, $8074, $8075, $8076, $8077, $8078, $8079, $8080, $8081, $8082, $8083, $8084, $8085, $8086, $8087, $8088, $8089, $8090, $8091, $8092, $8093, $8094, $8095, $8096, $8097, $8098, VersionRange($8099, $8100)), ($8101, $8102, $8103, $8104, $8105, $8106, $8107, $8108, $8109, $8110, $8111, $8112, $8113, $8114, $8115, $8116, $8117, $8118, $8119, $8120, $8121, $8122, $8123, $8124, $8125, $8126, $8127, $8128, VersionRange($8129, $8130)), ($8131, $8132, $8133, $8134, $8135, $8136, $8137, $8138, $8139, $8140, $8141, $8142, $8143, $8144, $8145, $8146, $8147, $8148, $8149, $8150, $8151, $8152, $8153, $8154, $8155, $8156, $8157, $8158, VersionRange($8159, $8160)), ($8161, $8162, $8163, $8164, $8165, $8166, $8167, $8168, $8169, $8170, $8171, $8172, $8173, $8174, $8175, $8176, $8177, $8178, $8179, $8180, $8181, $8182, $8183, $8184, $8185, $8186, $8187, $8188, VersionRange($8189, $8190)), ($8191, $8192, $8193, $8194, $8195, $8196, $8197, $8198, $8199, $8200, $8201, $8202, $8203, $8204, $8205, $8206, $8207, $8208, $8209, $8210, $8211, $8212, $8213, $8214, $8215, $8216, $8217, $8218, VersionRange($8219, $8220)), ($8221, $8222, $8223, $8224, $8225, $8226, $8227, $8228, $8229, $8230, $8231, $8232, $8233, $8234, $8235, $8236, $8237, $8238, $8239, $8240, $8241, $8242, $8243, $8244, $8245, $8246, $8247, $8248, VersionRange($8249, $8250)), ($8251, $8252, $8253, $8254, $8255, $8256, $8257, $8258, $8259, $8260, $8261, $8262, $8263, $8264, $8265, $8266, $8267, $8268, $8269, $8270, $8271, $8272, $8273, $8274, $8275, $8276, $8277, $8278, VersionRange($8279, $8280)), ($8281, $8282, $8283, $8284, $8285, $8286, $8287, $8288, $8289, $8290, $8291, $8292, $8293, $8294, $8295, $8296, $8297, $8298, $8299, $8300, $8301, $8302, $8303, $8304, $8305, $8306, $8307, $8308, VersionRange($8309, $8310)), ($8311, $8312, $8313, $8314, $8315, $8316, $8317, $8318, $8319, $8320, $8321, $8322, $8323, $8324, $8325, $8326, $8327, $8328, $8329, $8330, $8331, $8332, $8333, $8334, $8335, $8336, $8337, $8338, VersionRange($8339, $8340)), ($8341, $8342, $8343, $8344, $8345, $8346, $8347, $8348, $8349, $8350, $8351, $8352, $8353, $8354, $8355, $8356, $8357, $8358, $8359, $8360, $8361, $8362, $8363, $8364, $8365, $8366, $8367, $8368, VersionRange($8369, $8370)), ($8371, $8372, $8373, $8374, $8375, $8376, $8377, $8378, $8379, $8380, $8381, $8382, $8383, $8384, $8385, $8386, $8387, $8388, $8389, $8390, $8391, $8392, $8393, $8394, $8395, $8396, $8397, $8398, VersionRange($8399, $8400)), ($8401, $8402, $8403, $8404, $8405, $8406, $8407, $8408, $8409, $8410, $8411, $8412, $8413, $8414, $8415, $8416, $8417, $8418, $8419, $8420, $8421, $8422, $8423, $8424, $8425, $8426, $8427, $8428, VersionRange($8429, $8430)), ($8431, $8432, $8433, $8434, $8435, $8436, $8437, $8438, $8439, $8440, $8441, $8442, $8443, $8444, $8445, $8446, $8447, $8448, $8449, $8450, $8451, $8452, $8453, $8454, $8455, $8456, $8457, $8458, VersionRange($8459, $8460)), ($8461, $8462, $8463, $8464, $8465, $8466, $8467, $8468, $8469, $8470, $8471, $8472, $8473, $8474, $8475, $8476, $8477, $8478, $8479, $8480, $8481, $8482, $8483, $8484, $8485, $8486, $8487, $8488, VersionRange($8489, $8490)), ($8491, $8492, $8493, $8494, $8495, $8496, $8497, $8498, $8499, $8500, $8501, $8502, $8503, $8504, $8505, $8506, $8507, $8508, $8509, $8510, $8511, $8512, $8513, $8514, $8515, $8516, $8517, $8518, VersionRange($8519, $8520)), ($8521, $8522, $8523, $8524, $8525, $8526, $8527, $8528, $8529, $8530, $8531, $8532, $8533, $8534, $8535, $8536, $8537, $8538, $8539, $8540, $8541, $8542, $8543, $8544, $8545, $8546, $8547, $8548, VersionRange($8549, $8550)), ($8551, $8552, $8553, $8554, $8555, $8556, $8557, $8558, $8559, $8560, $8561, $8562, $8563, $8564, $8565, $8566, $8567, $8568, $8569, $8570, $8571, $8572, $8573, $8574, $8575, $8576, $8577, $8578, VersionRange($8579, $8580)), ($8581, $8582, $8583, $8584, $8585, $8586, $8587, $8588, $8589, $8590, $8591, $8592, $8593, $8594, $8595, $8596, $8597, $8598, $8599, $8600, $8601, $8602, $8603, $8604, $8605, $8606, $8607, $8608, VersionRange($8609, $8610)), ($8611, $8612, $8613, $8614, $8615, $8616, $8617, $8618, $8619, $8620, $8621, $8622, $8623, $8624, $8625, $8626, $8627, $8628, $8629, $8630, $8631, $8632, $8633, $8634, $8635, $8636, $8637, $8638, VersionRange($8639, $8640)), ($8641, $8642, $8643, $8644, $8645, $8646, $8647, $8648, $8649, $8650, $8651, $8652, $8653, $8654, $8655, $8656, $8657, $8658, $8659, $8660, $8661, $8662, $8663, $8664, $8665, $8666, $8667, $8668, VersionRange($8669, $8670)), ($8671, $8672, $8673, $8674, $8675, $8676, $8677, $8678, $8679, $8680, $8681, $8682, $8683, $8684, $8685, $8686, $8687, $8688, $8689, $8690, $8691, $8692, $8693, $8694, $8695, $8696, $8697, $8698, VersionRange($8699, $8700)), ($8701, $8702, $8703, $8704, $8705, $8706, $8707, $8708, $8709, $8710, $8711, $8712, $8713, $8714, $8715, $8716, $8717, $8718, $8719, $8720, $8721, $8722, $8723, $8724, $8725, $8726, $8727, $8728, VersionRange($8729, $8730)), ($8731, $8732, $8733, $8734, $8735, $8736, $8737, $8738, $8739, $8740, $8741, $8742, $8743, $8744, $8745, $8746, $8747, $8748, $8749, $8750, $8751, $8752, $8753, $8754, $8755, $8756, $8757, $8758, VersionRange($8759, $8760)), ($8761, $8762, $8763, $8764, $8765, $8766, $8767, $8768, $8769, $8770, $8771, $8772, $8773, $8774, $8775, $8776, $8777, $8778, $8779, $8780, $8781, $8782, $8783, $8784, $8785, $8786, $8787, $8788, VersionRange($8789, $8790)), ($8791, $8792, $8793, $8794, $8795, $8796, $8797, $8798, $8799, $8800, $8801, $8802, $8803, $8804, $8805, $8806, $8807, $8808, $8809, $8810, $8811, $8812, $8813, $8814, $8815, $8816, $8817, $8818, VersionRange($8819, $8820)), ($8821, $8822, $8823, $8824, $8825, $8826, $8827, $8828, $8829, $8830, $8831, $8832, $8833, $8834, $8835, $8836, $8837, $8838, $8839, $8840, $8841, $8842, $8843, $8844, $8845, $8846, $8847, $8848, VersionRange($8849, $8850)), ($8851, $8852, $8853, $8854, $8855, $8856, $8857, $8858, $8859, $8860, $8861, $8862, $8863, $8864, $8865, $8866, $8867, $8868, $8869, $8870, $8871, $8872, $8873, $8874, $8875, $8876, $8877, $8878, VersionRange($8879, $8880)), ($8881, $8882, $8883, $8884, $8885, $8886, $8887, $8888, $8889, $8890, $8891, $8892, $8893, $8894, $8895, $8896, $8897, $8898, $8899, $8900, $8901, $8902, $8903, $8904, $8905, $8906, $8907, $8908, VersionRange($8909, $8910)), ($8911, $8912, $8913, $8914, $8915, $8916, $8917, $8918, $8919, $8920, $8921, $8922, $8923, $8924, $8925, $8926, $8927, $8928, $8929, $8930, $8931, $8932, $8933, $8934, $8935, $8936, $8937, $8938, VersionRange($8939, $8940)), ($8941, $8942, $8943, $8944, $8945, $8946, $8947, $8948, $8949, $8950, $8951, $8952, $8953, $8954, $8955, $8956, $8957, $8958, $8959, $8960, $8961, $8962, $8963, $8964, $8965, $8966, $8967, $8968, VersionRange($8969, $8970)), ($8971, $8972, $8973, $8974, $8975, $8976, $8977, $8978, $8979, $8980, $8981, $8982, $8983, $8984, $8985, $8986, $8987, $8988, $8989, $8990, $8991, $8992, $8993, $8994, $8995, $8996, $8997, $8998, VersionRange($8999, $9000)), ($9001, $9002, $9003, $9004, $9005, $9006, $9007, $9008, $9009, $9010, $9011, $9012, $9013, $9014, $9015, $9016, $9017, $9018, $9019, $9020, $9021, $9022, $9023, $9024, $9025, $9026, $9027, $9028, VersionRange($9029, $9030)), ($9031, $9032, $9033, $9034, $9035, $9036, $9037, $9038, $9039, $9040, $9041, $9042, $9043, $9044, $9045, $9046, $9047, $9048, $9049, $9050, $9051, $9052, $9053, $9054, $9055, $9056, $9057, $9058, VersionRange($9059, $9060)), ($9061, $9062, $9063, $9064, $9065, $9066, $9067, $9068, $9069, $9070, $9071, $9072, $9073, $9074, $9075, $9076, $9077, $9078, $9079, $9080, $9081, $9082, $9083, $9084, $9085, $9086, $9087, $9088, VersionRange($9089, $9090)), ($9091, $9092, $9093, $9094, $9095, $9096, $9097, $9098, $9099, $9100, $9101, $9102, $9103, $9104, $9105, $9106, $9107, $9108, $9109, $9110, $9111, $9112, $9113, $9114, $9115, $9116, $9117, $9118, VersionRange($9119, $9120)), ($9121, $9122, $9123, $9124, $9125, $9126, $9127, $9128, $9129, $9130, $9131, $9132, $9133, $9134, $9135, $9136, $9137, $9138, $9139, $9140, $9141, $9142, $9143, $9144, $9145, $9146, $9147, $9148, VersionRange($9149, $9150)), ($9151, $9152, $9153, $9154, $9155, $9156, $9157, $9158, $9159, $9160, $9161, $9162, $9163, $9164, $9165, $9166, $9167, $9168, $9169, $9170, $9171, $9172, $9173, $9174, $9175, $9176, $9177, $9178, VersionRange($9179, $9180)), ($9181, $9182, $9183, $9184, $9185, $9186, $9187, $9188, $9189, $9190, $9191, $9192, $9193, $9194, $9195, $9196, $9197, $9198, $9199, $9200, $9201, $9202, $9203, $9204, $9205, $9206, $9207, $9208, VersionRange($9209, $9210)), ($9211, $9212, $9213, $9214, $9215, $9216, $9217, $9218, $9219, $9220, $9221, $9222, $9223, $9224, $9225, $9226, $9227, $9228, $9229, $9230, $9231, $9232, $9233, $9234, $9235, $9236, $9237, $9238, VersionRange($9239, $9240)), ($9241, $9242, $9243, $9244, $9245, $9246, $9247, $9248, $9249, $9250, $9251, $9252, $9253, $9254, $9255, $9256, $9257, $9258, $9259, $9260, $9261, $9262, $9263, $9264, $9265, $9266, $9267, $9268, VersionRange($9269, $9270)), ($9271, $9272, $9273, $9274, $9275, $9276, $9277, $9278, $9279, $9280, $9281, $9282, $9283, $9284, $9285, $9286, $9287, $9288, $9289, $9290, $9291, $9292, $9293, $9294, $9295, $9296, $9297, $9298, VersionRange($9299, $9300)), ($9301, $9302, $9303, $9304, $9305, $9306, $9307, $9308, $9309, $9310, $9311, $9312, $9313, $9314, $9315, $9316, $9317, $9318, $9319, $9320, $9321, $9322, $9323, $9324, $9325, $9326, $9327, $9328, VersionRange($9329, $9330)), ($9331, $9332, $9333, $9334, $9335, $9336, $9337, $9338, $9339, $9340, $9341, $9342, $9343, $9344, $9345, $9346, $9347, $9348, $9349, $9350, $9351, $9352, $9353, $9354, $9355, $9356, $9357, $9358, VersionRange($9359, $9360)), ($9361, $9362, $9363, $9364, $9365, $9366, $9367, $9368, $9369, $9370, $9371, $9372, $9373, $9374, $9375, $9376, $9377, $9378, $9379, $9380, $9381, $9382, $9383, $9384, $9385, $9386, $9387, $9388, VersionRange($9389, $9390)), ($9391, $9392, $9393, $9394, $9395, $9396, $9397, $9398, $9399, $9400, $9401, $9402, $9403, $9404, $9405, $9406, $9407, $9408, $9409, $9410, $9411, $9412, $9413, $9414, $9415, $9416, $9417, $9418, VersionRange($9419, $9420)), ($9421, $9422, $9423, $9424, $9425, $9426, $9427, $9428, $9429, $9430, $9431, $9432, $9433, $9434, $9435, $9436, $9437, $9438, $9439, $9440, $9441, $9442, $9443, $9444, $9445, $9446, $9447, $9448, VersionRange($9449, $9450)), ($9451, $9452, $9453, $9454, $9455, $9456, $9457, $9458, $9459, $9460, $9461, $9462, $9463, $9464, $9465, $9466, $9467, $9468, $9469, $9470, $9471, $9472, $9473, $9474, $9475, $9476, $9477, $9478, VersionRange($9479, $9480)), ($9481, $9482, $9483, $9484, $9485, $9486, $9487, $9488, $9489, $9490, $9491, $9492, $9493, $9494, $9495, $9496, $9497, $9498, $9499, $9500, $9501, $9502, $9503, $9504, $9505, $9506, $9507, $9508, VersionRange($9509, $9510)), ($9511, $9512, $9513, $9514, $9515, $9516, $9517, $9518, $9519, $9520, $9521, $9522, $9523, $9524, $9525, $9526, $9527, $9528, $9529, $9530, $9531, $9532, $9533, $9534, $9535, $9536, $9537, $9538, VersionRange($9539, $9540)), ($9541, $9542, $9543, $9544, $9545, $9546, $9547, $9548, $9549, $9550, $9551, $9552, $9553, $9554, $9555, $9556, $9557, $9558, $9559, $9560, $9561, $9562, $9563, $9564, $9565, $9566, $9567, $9568, VersionRange($9569, $9570)), ($9571, $9572, $9573, $9574, $9575, $9576, $9577, $9578, $9579, $9580, $9581, $9582, $9583, $9584, $9585, $9586, $9587, $9588, $9589, $9590, $9591, $9592, $9593, $9594, $9595, $9596, $9597, $9598, VersionRange($9599, $9600)), ($9601, $9602, $9603, $9604, $9605, $9606, $9607, $9608, $9609, $9610, $9611, $9612, $9613, $9614, $9615, $9616, $9617, $9618, $9619, $9620, $9621, $9622, $9623, $9624, $9625, $9626, $9627, $9628, VersionRange($9629, $9630)), ($9631, $9632, $9633, $9634, $9635, $9636, $9637, $9638, $9639, $9640, $9641, $9642, $9643, $9644, $9645, $9646, $9647, $9648, $9649, $9650, $9651, $9652, $9653, $9654, $9655, $9656, $9657, $9658, VersionRange($9659, $9660)), ($9661, $9662, $9663, $9664, $9665, $9666, $9667, $9668, $9669, $9670, $9671, $9672, $9673, $9674, $9675, $9676, $9677, $9678, $9679, $9680, $9681, $9682, $9683, $9684, $9685, $9686, $9687, $9688, VersionRange($9689, $9690)), ($9691, $9692, $9693, $9694, $9695, $9696, $9697, $9698, $9699, $9700, $9701, $9702, $9703, $9704, $9705, $9706, $9707, $9708, $9709, $9710, $9711, $9712, $9713, $9714, $9715, $9716, $9717, $9718, VersionRange($9719, $9720)), ($9721, $9722, $9723, $9724, $9725, $9726, $9727, $9728, $9729, $9730, $9731, $9732, $9733, $9734, $9735, $9736, $9737, $9738, $9739, $9740, $9741, $9742, $9743, $9744, $9745, $9746, $9747, $9748, VersionRange($9749, $9750)), ($9751, $9752, $9753, $9754, $9755, $9756, $9757, $9758, $9759, $9760, $9761, $9762, $9763, $9764, $9765, $9766, $9767, $9768, $9769, $9770, $9771, $9772, $9773, $9774, $9775, $9776, $9777, $9778, VersionRange($9779, $9780)), ($9781, $9782, $9783, $9784, $9785, $9786, $9787, $9788, $9789, $9790, $9791, $9792, $9793, $9794, $9795, $9796, $9797, $9798, $9799, $9800, $9801, $9802, $9803, $9804, $9805, $9806, $9807, $9808, VersionRange($9809, $9810)), ($9811, $9812, $9813, $9814, $9815, $9816, $9817, $9818, $9819, $9820, $9821, $9822, $9823, $9824, $9825, $9826, $9827, $9828, $9829, $9830, $9831, $9832, $9833, $9834, $9835, $9836, $9837, $9838, VersionRange($9839, $9840)), ($9841, $9842, $9843, $9844, $9845, $9846, $9847, $9848, $9849, $9850, $9851, $9852, $9853, $9854, $9855, $9856, $9857, $9858, $9859, $9860, $9861, $9862, $9863, $9864, $9865, $9866, $9867, $9868, VersionRange($9869, $9870)), ($9871, $9872, $9873, $9874, $9875, $9876, $9877, $9878, $9879, $9880, $9881, $9882, $9883, $9884, $9885, $9886, $9887, $9888, $9889, $9890, $9891, $9892, $9893, $9894, $9895, $9896, $9897, $9898, VersionRange($9899, $9900)), ($9901, $9902, $9903, $9904, $9905, $9906, $9907, $9908, $9909, $9910, $9911, $9912, $9913, $9914, $9915, $9916, $9917, $9918, $9919, $9920, $9921, $9922, $9923, $9924, $9925, $9926, $9927, $9928, VersionRange($9929, $9930)), ($9931, $9932, $9933, $9934, $9935, $9936, $9937, $9938, $9939, $9940, $9941, $9942, $9943, $9944, $9945, $9946, $9947, $9948, $9949, $9950, $9951, $9952, $9953, $9954, $9955, $9956, $9957, $9958, VersionRange($9959, $9960)), ($9961, $9962, $9963, $9964, $9965, $9966, $9967, $9968, $9969, $9970, $9971, $9972, $9973, $9974, $9975, $9976, $9977, $9978, $9979, $9980, $9981, $9982, $9983, $9984, $9985, $9986, $9987, $9988, VersionRange($9989, $9990)), ($9991, $9992, $9993, $9994, $9995, $9996, $9997, $9998, $9999, $10000, $10001, $10002, $10003, $10004, $10005, $10006, $10007, $10008, $10009, $10010, $10011, $10012, $10013, $10014, $10015, $10016, $10017, $10018, VersionRange($10019, $10020)), ($10021, $10022, $10023, $10024, $10025, $10026, $10027, $10028, $10029, $10030, $10031, $10032, $10033, $10034, $10035, $10036, $10037, $10038, $10039, $10040, $10041, $10042, $10043, $10044, $10045, $10046, $10047, $10048, VersionRange($10049, $10050)), ($10051, $10052, $10053, $10054, $10055, $10056, $10057, $10058, $10059, $10060, $10061, $10062, $10063, $10064, $10065, $10066, $10067, $10068, $10069, $10070, $10071, $10072, $10073, $10074, $10075, $10076, $10077, $10078, VersionRange($10079, $10080)), ($10081, $10082, $10083, $10084, $10085, $10086, $10087, $10088, $10089, $10090, $10091, $10092, $10093, $10094, $10095, $10096, $10097, $10098, $10099, $10100, $10101, $10102, $10103, $10104, $10105, $10106, $10107, $10108, VersionRange($10109, $10110)), ($10111, $10112, $10113, $10114, $10115, $10116, $10117, $10118, $10119, $10120, $10121, $10122, $10123, $10124, $10125, $10126, $10127, $10128, $10129, $10130, $10131, $10132, $10133, $10134, $10135, $10136, $10137, $10138, VersionRange($10139, $10140)), ($10141, $10142, $10143, $10144, $10145, $10146, $10147, $10148, $10149, $10150, $10151, $10152, $10153, $10154, $10155, $10156, $10157, $10158, $10159, $10160, $10161, $10162, $10163, $10164, $10165, $10166, $10167, $10168, VersionRange($10169, $10170)), ($10171, $10172, $10173, $10174, $10175, $10176, $10177, $10178, $10179, $10180, $10181, $10182, $10183, $10184, $10185, $10186, $10187, $10188, $10189, $10190, $10191, $10192, $10193, $10194, $10195, $10196, $10197, $10198, VersionRange($10199, $10200)), ($10201, $10202, $10203, $10204, $10205, $10206, $10207, $10208, $10209, $10210, $10211, $10212, $10213, $10214, $10215, $10216, $10217, $10218, $10219, $10220, $10221, $10222, $10223, $10224, $10225, $10226, $10227, $10228, VersionRange($10229, $10230)), ($10231, $10232, $10233, $10234, $10235, $10236, $10237, $10238, $10239, $10240, $10241, $10242, $10243, $10244, $10245, $10246, $10247, $10248, $10249, $10250, $10251, $10252, $10253, $10254, $10255, $10256, $10257, $10258, VersionRange($10259, $10260)), ($10261, $10262, $10263, $10264, $10265, $10266, $10267, $10268, $10269, $10270, $10271, $10272, $10273, $10274, $10275, $10276, $10277, $10278, $10279, $10280, $10281, $10282, $10283, $10284, $10285, $10286, $10287, $10288, VersionRange($10289, $10290)), ($10291, $10292, $10293, $10294, $10295, $10296, $10297, $10298, $10299, $10300, $10301, $10302, $10303, $10304, $10305, $10306, $10307, $10308, $10309, $10310, $10311, $10312, $10313, $10314, $10315, $10316, $10317, $10318, VersionRange($10319, $10320)), ($10321, $10322, $10323, $10324, $10325, $10326, $10327, $10328, $10329, $10330, $10331, $10332, $10333, $10334, $10335, $10336, $10337, $10338, $10339, $10340, $10341, $10342, $10343, $10344, $10345, $10346, $10347, $10348, VersionRange($10349, $10350)), ($10351, $10352, $10353, $10354, $10355, $10356, $10357, $10358, $10359, $10360, $10361, $10362, $10363, $10364, $10365, $10366, $10367, $10368, $10369, $10370, $10371, $10372, $10373, $10374, $10375, $10376, $10377, $10378, VersionRange($10379, $10380)), ($10381, $10382, $10383, $10384, $10385, $10386, $10387, $10388, $10389, $10390, $10391, $10392, $10393, $10394, $10395, $10396, $10397, $10398, $10399, $10400, $10401, $10402, $10403, $10404, $10405, $10406, $10407, $10408, VersionRange($10409, $10410)), ($10411, $10412, $10413, $10414, $10415, $10416, $10417, $10418, $10419, $10420, $10421, $10422, $10423, $10424, $10425, $10426, $10427, $10428, $10429, $10430, $10431, $10432, $10433, $10434, $10435, $10436, $10437, $10438, VersionRange($10439, $10440)), ($10441, $10442, $10443, $10444, $10445, $10446, $10447, $10448, $10449, $10450, $10451, $10452, $10453, $10454, $10455, $10456, $10457, $10458, $10459, $10460, $10461, $10462, $10463, $10464, $10465, $10466, $10467, $10468, VersionRange($10469, $10470)), ($10471, $10472, $10473, $10474, $10475, $10476, $10477, $10478, $10479, $10480, $10481, $10482, $10483, $10484, $10485, $10486, $10487, $10488, $10489, $10490, $10491, $10492, $10493, $10494, $10495, $10496, $10497, $10498, VersionRange($10499, $10500)), ($10501, $10502, $10503, $10504, $10505, $10506, $10507, $10508, $10509, $10510, $10511, $10512, $10513, $10514, $10515, $10516, $10517, $10518, $10519, $10520, $10521, $10522, $10523, $10524, $10525, $10526, $10527, $10528, VersionRange($10529, $10530)), ($10531, $10532, $10533, $10534, $10535, $10536, $10537, $10538, $10539, $10540, $10541, $10542, $10543, $10544, $10545, $10546, $10547, $10548, $10549, $10550, $10551, $10552, $10553, $10554, $10555, $10556, $10557, $10558, VersionRange($10559, $10560)), ($10561, $10562, $10563, $10564, $10565, $10566, $10567, $10568, $10569, $10570, $10571, $10572, $10573, $10574, $10575, $10576, $10577, $10578, $10579, $10580, $10581, $10582, $10583, $10584, $10585, $10586, $10587, $10588, VersionRange($10589, $10590)), ($10591, $10592, $10593, $10594, $10595, $10596, $10597, $10598, $10599, $10600, $10601, $10602, $10603, $10604, $10605, $10606, $10607, $10608, $10609, $10610, $10611, $10612, $10613, $10614, $10615, $10616, $10617, $10618, VersionRange($10619, $10620)), ($10621, $10622, $10623, $10624, $10625, $10626, $10627, $10628, $10629, $10630, $10631, $10632, $10633, $10634, $10635, $10636, $10637, $10638, $10639, $10640, $10641, $10642, $10643, $10644, $10645, $10646, $10647, $10648, VersionRange($10649, $10650)), ($10651, $10652, $10653, $10654, $10655, $10656, $10657, $10658, $10659, $10660, $10661, $10662, $10663, $10664, $10665, $10666, $10667, $10668, $10669, $10670, $10671, $10672, $10673, $10674, $10675, $10676, $10677, $10678, VersionRange($10679, $10680)), ($10681, $10682, $10683, $10684, $10685, $10686, $10687, $10688, $10689, $10690, $10691, $10692, $10693, $10694, $10695, $10696, $10697, $10698, $10699, $10700, $10701, $10702, $10703, $10704, $10705, $10706, $10707, $10708, VersionRange($10709, $10710)), ($10711, $10712, $10713, $10714, $10715, $10716, $10717, $10718, $10719, $10720, $10721, $10722, $10723, $10724, $10725, $10726, $10727, $10728, $10729, $10730, $10731, $10732, $10733, $10734, $10735, $10736, $10737, $10738, VersionRange($10739, $10740)), ($10741, $10742, $10743, $10744, $10745, $10746, $10747, $10748, $10749, $10750, $10751, $10752, $10753, $10754, $10755, $10756, $10757, $10758, $10759, $10760, $10761, $10762, $10763, $10764, $10765, $10766, $10767, $10768, VersionRange($10769, $10770)), ($10771, $10772, $10773, $10774, $10775, $10776, $10777, $10778, $10779, $10780, $10781, $10782, $10783, $10784, $10785, $10786, $10787, $10788, $10789, $10790, $10791, $10792, $10793, $10794, $10795, $10796, $10797, $10798, VersionRange($10799, $10800)), ($10801, $10802, $10803, $10804, $10805, $10806, $10807, $10808, $10809, $10810, $10811, $10812, $10813, $10814, $10815, $10816, $10817, $10818, $10819, $10820, $10821, $10822, $10823, $10824, $10825, $10826, $10827, $10828, VersionRange($10829, $10830)), ($10831, $10832, $10833, $10834, $10835, $10836, $10837, $10838, $10839, $10840, $10841, $10842, $10843, $10844, $10845, $10846, $10847, $10848, $10849, $10850, $10851, $10852, $10853, $10854, $10855, $10856, $10857, $10858, VersionRange($10859, $10860)), ($10861, $10862, $10863, $10864, $10865, $10866, $10867, $10868, $10869, $10870, $10871, $10872, $10873, $10874, $10875, $10876, $10877, $10878, $10879, $10880, $10881, $10882, $10883, $10884, $10885, $10886, $10887, $10888, VersionRange($10889, $10890)), ($10891, $10892, $10893, $10894, $10895, $10896, $10897, $10898, $10899, $10900, $10901, $10902, $10903, $10904, $10905, $10906, $10907, $10908, $10909, $10910, $10911, $10912, $10913, $10914, $10915, $10916, $10917, $10918, VersionRange($10919, $10920)), ($10921, $10922, $10923, $10924, $10925, $10926, $10927, $10928, $10929, $10930, $10931, $10932, $10933, $10934, $10935, $10936, $10937, $10938, $10939, $10940, $10941, $10942, $10943, $10944, $10945, $10946, $10947, $10948, VersionRange($10949, $10950)), ($10951, $10952, $10953, $10954, $10955, $10956, $10957, $10958, $10959, $10960, $10961, $10962, $10963, $10964, $10965, $10966, $10967, $10968, $10969, $10970, $10971, $10972, $10973, $10974, $10975, $10976, $10977, $10978, VersionRange($10979, $10980)), ($10981, $10982, $10983, $10984, $10985, $10986, $10987, $10988, $10989, $10990, $10991, $10992, $10993, $10994, $10995, $10996, $10997, $10998, $10999, $11000, $11001, $11002, $11003, $11004, $11005, $11006, $11007, $11008, VersionRange($11009, $11010)), ($11011, $11012, $11013, $11014, $11015, $11016, $11017, $11018, $11019, $11020, $11021, $11022, $11023, $11024, $11025, $11026, $11027, $11028, $11029, $11030, $11031, $11032, $11033, $11034, $11035, $11036, $11037, $11038, VersionRange($11039, $11040)), ($11041, $11042, $11043, $11044, $11045, $11046, $11047, $11048, $11049, $11050, $11051, $11052, $11053, $11054, $11055, $11056, $11057, $11058, $11059, $11060, $11061, $11062, $11063, $11064, $11065, $11066, $11067, $11068, VersionRange($11069, $11070)), ($11071, $11072, $11073, $11074, $11075, $11076, $11077, $11078, $11079, $11080, $11081, $11082, $11083, $11084, $11085, $11086, $11087, $11088, $11089, $11090, $11091, $11092, $11093, $11094, $11095, $11096, $11097, $11098, VersionRange($11099, $11100)), ($11101, $11102, $11103, $11104, $11105, $11106, $11107, $11108, $11109, $11110, $11111, $11112, $11113, $11114, $11115, $11116, $11117, $11118, $11119, $11120, $11121, $11122, $11123, $11124, $11125, $11126, $11127, $11128, VersionRange($11129, $11130)), ($11131, $11132, $11133, $11134, $11135, $11136, $11137, $11138, $11139, $11140, $11141, $11142, $11143, $11144, $11145, $11146, $11147, $11148, $11149, $11150, $11151, $11152, $11153, $11154, $11155, $11156, $11157, $11158, VersionRange($11159, $11160)), ($11161, $11162, $11163, $11164, $11165, $11166, $11167, $11168, $11169, $11170, $11171, $11172, $11173, $11174, $11175, $11176, $11177, $11178, $11179, $11180, $11181, $11182, $11183, $11184, $11185, $11186, $11187, $11188, VersionRange($11189, $11190)), ($11191, $11192, $11193, $11194, $11195, $11196, $11197, $11198, $11199, $11200, $11201, $11202, $11203, $11204, $11205, $11206, $11207, $11208, $11209, $11210, $11211, $11212, $11213, $11214, $11215, $11216, $11217, $11218, VersionRange($11219, $11220)), ($11221, $11222, $11223, $11224, $11225, $11226, $11227, $11228, $11229, $11230, $11231, $11232, $11233, $11234, $11235, $11236, $11237, $11238, $11239, $11240, $11241, $11242, $11243, $11244, $11245, $11246, $11247, $11248, VersionRange($11249, $11250)), ($11251, $11252, $11253, $11254, $11255, $11256, $11257, $11258, $11259, $11260, $11261, $11262, $11263, $11264, $11265, $11266, $11267, $11268, $11269, $11270, $11271, $11272, $11273, $11274, $11275, $11276, $11277, $11278, VersionRange($11279, $11280)), ($11281, $11282, $11283, $11284, $11285, $11286, $11287, $11288, $11289, $11290, $11291, $11292, $11293, $11294, $11295, $11296, $11297, $11298, $11299, $11300, $11301, $11302, $11303, $11304, $11305, $11306, $11307, $11308, VersionRange($11309, $11310)), ($11311, $11312, $11313, $11314, $11315, $11316, $11317, $11318, $11319, $11320, $11321, $11322, $11323, $11324, $11325, $11326, $11327, $11328, $11329, $11330, $11331, $11332, $11333, $11334, $11335, $11336, $11337, $11338, VersionRange($11339, $11340)), ($11341, $11342, $11343, $11344, $11345, $11346, $11347, $11348, $11349, $11350, $11351, $11352, $11353, $11354, $11355, $11356, $11357, $11358, $11359, $11360, $11361, $11362, $11363, $11364, $11365, $11366, $11367, $11368, VersionRange($11369, $11370)), ($11371, $11372, $11373, $11374, $11375, $11376, $11377, $11378, $11379, $11380, $11381, $11382, $11383, $11384, $11385, $11386, $11387, $11388, $11389, $11390, $11391, $11392, $11393, $11394, $11395, $11396, $11397, $11398, VersionRange($11399, $11400)), ($11401, $11402, $11403, $11404, $11405, $11406, $11407, $11408, $11409, $11410, $11411, $11412, $11413, $11414, $11415, $11416, $11417, $11418, $11419, $11420, $11421, $11422, $11423, $11424, $11425, $11426, $11427, $11428, VersionRange($11429, $11430)), ($11431, $11432, $11433, $11434, $11435, $11436, $11437, $11438, $11439, $11440, $11441, $11442, $11443, $11444, $11445, $11446, $11447, $11448, $11449, $11450, $11451, $11452, $11453, $11454, $11455, $11456, $11457, $11458, VersionRange($11459, $11460)), ($11461, $11462, $11463, $11464, $11465, $11466, $11467, $11468, $11469, $11470, $11471, $11472, $11473, $11474, $11475, $11476, $11477, $11478, $11479, $11480, $11481, $11482, $11483, $11484, $11485, $11486, $11487, $11488, VersionRange($11489, $11490)), ($11491, $11492, $11493, $11494, $11495, $11496, $11497, $11498, $11499, $11500, $11501, $11502, $11503, $11504, $11505, $11506, $11507, $11508, $11509, $11510, $11511, $11512, $11513, $11514, $11515, $11516, $11517, $11518, VersionRange($11519, $11520)), ($11521, $11522, $11523, $11524, $11525, $11526, $11527, $11528, $11529, $11530, $11531, $11532, $11533, $11534, $11535, $11536, $11537, $11538, $11539, $11540, $11541, $11542, $11543, $11544, $11545, $11546, $11547, $11548, VersionRange($11549, $11550)), ($11551, $11552, $11553, $11554, $11555, $11556, $11557, $11558, $11559, $11560, $11561, $11562, $11563, $11564, $11565, $11566, $11567, $11568, $11569, $11570, $11571, $11572, $11573, $11574, $11575, $11576, $11577, $11578, VersionRange($11579, $11580)), ($11581, $11582, $11583, $11584, $11585, $11586, $11587, $11588, $11589, $11590, $11591, $11592, $11593, $11594, $11595, $11596, $11597, $11598, $11599, $11600, $11601, $11602, $11603, $11604, $11605, $11606, $11607, $11608, VersionRange($11609, $11610)), ($11611, $11612, $11613, $11614, $11615, $11616, $11617, $11618, $11619, $11620, $11621, $11622, $11623, $11624, $11625, $11626, $11627, $11628, $11629, $11630, $11631, $11632, $11633, $11634, $11635, $11636, $11637, $11638, VersionRange($11639, $11640)), ($11641, $11642, $11643, $11644, $11645, $11646, $11647, $11648, $11649, $11650, $11651, $11652, $11653, $11654, $11655, $11656, $11657, $11658, $11659, $11660, $11661, $11662, $11663, $11664, $11665, $11666, $11667, $11668, VersionRange($11669, $11670)), ($11671, $11672, $11673, $11674, $11675, $11676, $11677, $11678, $11679, $11680, $11681, $11682, $11683, $11684, $11685, $11686, $11687, $11688, $11689, $11690, $11691, $11692, $11693, $11694, $11695, $11696, $11697, $11698, VersionRange($11699, $11700)), ($11701, $11702, $11703, $11704, $11705, $11706, $11707, $11708, $11709, $11710, $11711, $11712, $11713, $11714, $11715, $11716, $11717, $11718, $11719, $11720, $11721, $11722, $11723, $11724, $11725, $11726, $11727, $11728, VersionRange($11729, $11730)), ($11731, $11732, $11733, $11734, $11735, $11736, $11737, $11738, $11739, $11740, $11741, $11742, $11743, $11744, $11745, $11746, $11747, $11748, $11749, $11750, $11751, $11752, $11753, $11754, $11755, $11756, $11757, $11758, VersionRange($11759, $11760)), ($11761, $11762, $11763, $11764, $11765, $11766, $11767, $11768, $11769, $11770, $11771, $11772, $11773, $11774, $11775, $11776, $11777, $11778, $11779, $11780, $11781, $11782, $11783, $11784, $11785, $11786, $11787, $11788, VersionRange($11789, $11790)), ($11791, $11792, $11793, $11794, $11795, $11796, $11797, $11798, $11799, $11800, $11801, $11802, $11803, $11804, $11805, $11806, $11807, $11808, $11809, $11810, $11811, $11812, $11813, $11814, $11815, $11816, $11817, $11818, VersionRange($11819, $11820)), ($11821, $11822, $11823, $11824, $11825, $11826, $11827, $11828, $11829, $11830, $11831, $11832, $11833, $11834, $11835, $11836, $11837, $11838, $11839, $11840, $11841, $11842, $11843, $11844, $11845, $11846, $11847, $11848, VersionRange($11849, $11850)), ($11851, $11852, $11853, $11854, $11855, $11856, $11857, $11858, $11859, $11860, $11861, $11862, $11863, $11864, $11865, $11866, $11867, $11868, $11869, $11870, $11871, $11872, $11873, $11874, $11875, $11876, $11877, $11878, VersionRange($11879, $11880)), ($11881, $11882, $11883, $11884, $11885, $11886, $11887, $11888, $11889, $11890, $11891, $11892, $11893, $11894, $11895, $11896, $11897, $11898, $11899, $11900, $11901, $11902, $11903, $11904, $11905, $11906, $11907, $11908, VersionRange($11909, $11910)), ($11911, $11912, $11913, $11914, $11915, $11916, $11917, $11918, $11919, $11920, $11921, $11922, $11923, $11924, $11925, $11926, $11927, $11928, $11929, $11930, $11931, $11932, $11933, $11934, $11935, $11936, $11937, $11938, VersionRange($11939, $11940)), ($11941, $11942, $11943, $11944, $11945, $11946, $11947, $11948, $11949, $11950, $11951, $11952, $11953, $11954, $11955, $11956, $11957, $11958, $11959, $11960, $11961, $11962, $11963, $11964, $11965, $11966, $11967, $11968, VersionRange($11969, $11970)), ($11971, $11972, $11973, $11974, $11975, $11976, $11977, $11978, $11979, $11980, $11981, $11982, $11983, $11984, $11985, $11986, $11987, $11988, $11989, $11990, $11991, $11992, $11993, $11994, $11995, $11996, $11997, $11998, VersionRange($11999, $12000)), ($12001, $12002, $12003, $12004, $12005, $12006, $12007, $12008, $12009, $12010, $12011, $12012, $12013, $12014, $12015, $12016, $12017, $12018, $12019, $12020, $12021, $12022, $12023, $12024, $12025, $12026, $12027, $12028, VersionRange($12029, $12030)), ($12031, $12032, $12033, $12034, $12035, $12036, $12037, $12038, $12039, $12040, $12041, $12042, $12043, $12044, $12045, $12046, $12047, $12048, $12049, $12050, $12051, $12052, $12053, $12054, $12055, $12056, $12057, $12058, VersionRange($12059, $12060)), ($12061, $12062, $12063, $12064, $12065, $12066, $12067, $12068, $12069, $12070, $12071, $12072, $12073, $12074, $12075, $12076, $12077, $12078, $12079, $12080, $12081, $12082, $12083, $12084, $12085, $12086, $12087, $12088, VersionRange($12089, $12090)), ($12091, $12092, $12093, $12094, $12095, $12096, $12097, $12098, $12099, $12100, $12101, $12102, $12103, $12104, $12105, $12106, $12107, $12108, $12109, $12110, $12111, $12112, $12113, $12114, $12115, $12116, $12117, $12118, VersionRange($12119, $12120)), ($12121, $12122, $12123, $12124, $12125, $12126, $12127, $12128, $12129, $12130, $12131, $12132, $12133, $12134, $12135, $12136, $12137, $12138, $12139, $12140, $12141, $12142, $12143, $12144, $12145, $12146, $12147, $12148, VersionRange($12149, $12150)), ($12151, $12152, $12153, $12154, $12155, $12156, $12157, $12158, $12159, $12160, $12161, $12162, $12163, $12164, $12165, $12166, $12167, $12168, $12169, $12170, $12171, $12172, $12173, $12174, $12175, $12176, $12177, $12178, VersionRange($12179, $12180)), ($12181, $12182, $12183, $12184, $12185, $12186, $12187, $12188, $12189, $12190, $12191, $12192, $12193, $12194, $12195, $12196, $12197, $12198, $12199, $12200, $12201, $12202, $12203, $12204, $12205, $12206, $12207, $12208, VersionRange($12209, $12210)), ($12211, $12212, $12213, $12214, $12215, $12216, $12217, $12218, $12219, $12220, $12221, $12222, $12223, $12224, $12225, $12226, $12227, $12228, $12229, $12230, $12231, $12232, $12233, $12234, $12235, $12236, $12237, $12238, VersionRange($12239, $12240)), ($12241, $12242, $12243, $12244, $12245, $12246, $12247, $12248, $12249, $12250, $12251, $12252, $12253, $12254, $12255, $12256, $12257, $12258, $12259, $12260, $12261, $12262, $12263, $12264, $12265, $12266, $12267, $12268, VersionRange($12269, $12270)), ($12271, $12272, $12273, $12274, $12275, $12276, $12277, $12278, $12279, $12280, $12281, $12282, $12283, $12284, $12285, $12286, $12287, $12288, $12289, $12290, $12291, $12292, $12293, $12294, $12295, $12296, $12297, $12298, VersionRange($12299, $12300)), ($12301, $12302, $12303, $12304, $12305, $12306, $12307, $12308, $12309, $12310, $12311, $12312, $12313, $12314, $12315, $12316, $12317, $12318, $12319, $12320, $12321, $12322, $12323, $12324, $12325, $12326, $12327, $12328, VersionRange($12329, $12330)), ($12331, $12332, $12333, $12334, $12335, $12336, $12337, $12338, $12339, $12340, $12341, $12342, $12343, $12344, $12345, $12346, $12347, $12348, $12349, $12350, $12351, $12352, $12353, $12354, $12355, $12356, $12357, $12358, VersionRange($12359, $12360)), ($12361, $12362, $12363, $12364, $12365, $12366, $12367, $12368, $12369, $12370, $12371, $12372, $12373, $12374, $12375, $12376, $12377, $12378, $12379, $12380, $12381, $12382, $12383, $12384, $12385, $12386, $12387, $12388, VersionRange($12389, $12390)), ($12391, $12392, $12393, $12394, $12395, $12396, $12397, $12398, $12399, $12400, $12401, $12402, $12403, $12404, $12405, $12406, $12407, $12408, $12409, $12410, $12411, $12412, $12413, $12414, $12415, $12416, $12417, $12418, VersionRange($12419, $12420)), ($12421, $12422, $12423, $12424, $12425, $12426, $12427, $12428, $12429, $12430, $12431, $12432, $12433, $12434, $12435, $12436, $12437, $12438, $12439, $12440, $12441, $12442, $12443, $12444, $12445, $12446, $12447, $12448, VersionRange($12449, $12450)), ($12451, $12452, $12453, $12454, $12455, $12456, $12457, $12458, $12459, $12460, $12461, $12462, $12463, $12464, $12465, $12466, $12467, $12468, $12469, $12470, $12471, $12472, $12473, $12474, $12475, $12476, $12477, $12478, VersionRange($12479, $12480)), ($12481, $12482, $12483, $12484, $12485, $12486, $12487, $12488, $12489, $12490, $12491, $12492, $12493, $12494, $12495, $12496, $12497, $12498, $12499, $12500, $12501, $12502, $12503, $12504, $12505, $12506, $12507, $12508, VersionRange($12509, $12510)), ($12511, $12512, $12513, $12514, $12515, $12516, $12517, $12518, $12519, $12520, $12521, $12522, $12523, $12524, $12525, $12526, $12527, $12528, $12529, $12530, $12531, $12532, $12533, $12534, $12535, $12536, $12537, $12538, VersionRange($12539, $12540)), ($12541, $12542, $12543, $12544, $12545, $12546, $12547, $12548, $12549, $12550, $12551, $12552, $12553, $12554, $12555, $12556, $12557, $12558, $12559, $12560, $12561, $12562, $12563, $12564, $12565, $12566, $12567, $12568, VersionRange($12569, $12570)), ($12571, $12572, $12573, $12574, $12575, $12576, $12577, $12578, $12579, $12580, $12581, $12582, $12583, $12584, $12585, $12586, $12587, $12588, $12589, $12590, $12591, $12592, $12593, $12594, $12595, $12596, $12597, $12598, VersionRange($12599, $12600)), ($12601, $12602, $12603, $12604, $12605, $12606, $12607, $12608, $12609, $12610, $12611, $12612, $12613, $12614, $12615, $12616, $12617, $12618, $12619, $12620, $12621, $12622, $12623, $12624, $12625, $12626, $12627, $12628, VersionRange($12629, $12630)), ($12631, $12632, $12633, $12634, $12635, $12636, $12637, $12638, $12639, $12640, $12641, $12642, $12643, $12644, $12645, $12646, $12647, $12648, $12649, $12650, $12651, $12652, $12653, $12654, $12655, $12656, $12657, $12658, VersionRange($12659, $12660)), ($12661, $12662, $12663, $12664, $12665, $12666, $12667, $12668, $12669, $12670, $12671, $12672, $12673, $12674, $12675, $12676, $12677, $12678, $12679, $12680, $12681, $12682, $12683, $12684, $12685, $12686, $12687, $12688, VersionRange($12689, $12690)), ($12691, $12692, $12693, $12694, $12695, $12696, $12697, $12698, $12699, $12700, $12701, $12702, $12703, $12704, $12705, $12706, $12707, $12708, $12709, $12710, $12711, $12712, $12713, $12714, $12715, $12716, $12717, $12718, VersionRange($12719, $12720)), ($12721, $12722, $12723, $12724, $12725, $12726, $12727, $12728, $12729, $12730, $12731, $12732, $12733, $12734, $12735, $12736, $12737, $12738, $12739, $12740, $12741, $12742, $12743, $12744, $12745, $12746, $12747, $12748, VersionRange($12749, $12750)), ($12751, $12752, $12753, $12754, $12755, $12756, $12757, $12758, $12759, $12760, $12761, $12762, $12763, $12764, $12765, $12766, $12767, $12768, $12769, $12770, $12771, $12772, $12773, $12774, $12775, $12776, $12777, $12778, VersionRange($12779, $12780)), ($12781, $12782, $12783, $12784, $12785, $12786, $12787, $12788, $12789, $12790, $12791, $12792, $12793, $12794, $12795, $12796, $12797, $12798, $12799, $12800, $12801, $12802, $12803, $12804, $12805, $12806, $12807, $12808, VersionRange($12809, $12810)), ($12811, $12812, $12813, $12814, $12815, $12816, $12817, $12818, $12819, $12820, $12821, $12822, $12823, $12824, $12825, $12826, $12827, $12828, $12829, $12830, $12831, $12832, $12833, $12834, $12835, $12836, $12837, $12838, VersionRange($12839, $12840)), ($12841, $12842, $12843, $12844, $12845, $12846, $12847, $12848, $12849, $12850, $12851, $12852, $12853, $12854, $12855, $12856, $12857, $12858, $12859, $12860, $12861, $12862, $12863, $12864, $12865, $12866, $12867, $12868, VersionRange($12869, $12870)), ($12871, $12872, $12873, $12874, $12875, $12876, $12877, $12878, $12879, $12880, $12881, $12882, $12883, $12884, $12885, $12886, $12887, $12888, $12889, $12890, $12891, $12892, $12893, $12894, $12895, $12896, $12897, $12898, VersionRange($12899, $12900)), ($12901, $12902, $12903, $12904, $12905, $12906, $12907, $12908, $12909, $12910, $12911, $12912, $12913, $12914, $12915, $12916, $12917, $12918, $12919, $12920, $12921, $12922, $12923, $12924, $12925, $12926, $12927, $12928, VersionRange($12929, $12930)), ($12931, $12932, $12933, $12934, $12935, $12936, $12937, $12938, $12939, $12940, $12941, $12942, $12943, $12944, $12945, $12946, $12947, $12948, $12949, $12950, $12951, $12952, $12953, $12954, $12955, $12956, $12957, $12958, VersionRange($12959, $12960)), ($12961, $12962, $12963, $12964, $12965, $12966, $12967, $12968, $12969, $12970[...][ Date: 2023-07-04 18:39:47 ]
6 4s785ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30)), ($31, $32, $33, $34, $35, $36, $37, $38, $39, $40, $41, $42, $43, $44, $45, $46, $47, $48, $49, $50, $51, $52, $53, $54, $55, $56, $57, $58, VersionRange($59, $60)), ($61, $62, $63, $64, $65, $66, $67, $68, $69, $70, $71, $72, $73, $74, $75, $76, $77, $78, $79, $80, $81, $82, $83, $84, $85, $86, $87, $88, VersionRange($89, $90)), ($91, $92, $93, $94, $95, $96, $97, $98, $99, $100, $101, $102, $103, $104, $105, $106, $107, $108, $109, $110, $111, $112, $113, $114, $115, $116, $117, $118, VersionRange($119, $120)), ($121, $122, $123, $124, $125, $126, $127, $128, $129, $130, $131, $132, $133, $134, $135, $136, $137, $138, $139, $140, $141, $142, $143, $144, $145, $146, $147, $148, VersionRange($149, $150)), ($151, $152, $153, $154, $155, $156, $157, $158, $159, $160, $161, $162, $163, $164, $165, $166, $167, $168, $169, $170, $171, $172, $173, $174, $175, $176, $177, $178, VersionRange($179, $180)), ($181, $182, $183, $184, $185, $186, $187, $188, $189, $190, $191, $192, $193, $194, $195, $196, $197, $198, $199, $200, $201, $202, $203, $204, $205, $206, $207, $208, VersionRange($209, $210)), ($211, $212, $213, $214, $215, $216, $217, $218, $219, $220, $221, $222, $223, $224, $225, $226, $227, $228, $229, $230, $231, $232, $233, $234, $235, $236, $237, $238, VersionRange($239, $240)), ($241, $242, $243, $244, $245, $246, $247, $248, $249, $250, $251, $252, $253, $254, $255, $256, $257, $258, $259, $260, $261, $262, $263, $264, $265, $266, $267, $268, VersionRange($269, $270)), ($271, $272, $273, $274, $275, $276, $277, $278, $279, $280, $281, $282, $283, $284, $285, $286, $287, $288, $289, $290, $291, $292, $293, $294, $295, $296, $297, $298, VersionRange($299, $300)), ($301, $302, $303, $304, $305, $306, $307, $308, $309, $310, $311, $312, $313, $314, $315, $316, $317, $318, $319, $320, $321, $322, $323, $324, $325, $326, $327, $328, VersionRange($329, $330)), ($331, $332, $333, $334, $335, $336, $337, $338, $339, $340, $341, $342, $343, $344, $345, $346, $347, $348, $349, $350, $351, $352, $353, $354, $355, $356, $357, $358, VersionRange($359, $360)), ($361, $362, $363, $364, $365, $366, $367, $368, $369, $370, $371, $372, $373, $374, $375, $376, $377, $378, $379, $380, $381, $382, $383, $384, $385, $386, $387, $388, VersionRange($389, $390)), ($391, $392, $393, $394, $395, $396, $397, $398, $399, $400, $401, $402, $403, $404, $405, $406, $407, $408, $409, $410, $411, $412, $413, $414, $415, $416, $417, $418, VersionRange($419, $420)), ($421, $422, $423, $424, $425, $426, $427, $428, $429, $430, $431, $432, $433, $434, $435, $436, $437, $438, $439, $440, $441, $442, $443, $444, $445, $446, $447, $448, VersionRange($449, $450)), ($451, $452, $453, $454, $455, $456, $457, $458, $459, $460, $461, $462, $463, $464, $465, $466, $467, $468, $469, $470, $471, $472, $473, $474, $475, $476, $477, $478, VersionRange($479, $480)), ($481, $482, $483, $484, $485, $486, $487, $488, $489, $490, $491, $492, $493, $494, $495, $496, $497, $498, $499, $500, $501, $502, $503, $504, $505, $506, $507, $508, VersionRange($509, $510)), ($511, $512, $513, $514, $515, $516, $517, $518, $519, $520, $521, $522, $523, $524, $525, $526, $527, $528, $529, $530, $531, $532, $533, $534, $535, $536, $537, $538, VersionRange($539, $540)), ($541, $542, $543, $544, $545, $546, $547, $548, $549, $550, $551, $552, $553, $554, $555, $556, $557, $558, $559, $560, $561, $562, $563, $564, $565, $566, $567, $568, VersionRange($569, $570)), ($571, $572, $573, $574, $575, $576, $577, $578, $579, $580, $581, $582, $583, $584, $585, $586, $587, $588, $589, $590, $591, $592, $593, $594, $595, $596, $597, $598, VersionRange($599, $600)), ($601, $602, $603, $604, $605, $606, $607, $608, $609, $610, $611, $612, $613, $614, $615, $616, $617, $618, $619, $620, $621, $622, $623, $624, $625, $626, $627, $628, VersionRange($629, $630)), ($631, $632, $633, $634, $635, $636, $637, $638, $639, $640, $641, $642, $643, $644, $645, $646, $647, $648, $649, $650, $651, $652, $653, $654, $655, $656, $657, $658, VersionRange($659, $660)), ($661, $662, $663, $664, $665, $666, $667, $668, $669, $670, $671, $672, $673, $674, $675, $676, $677, $678, $679, $680, $681, $682, $683, $684, $685, $686, $687, $688, VersionRange($689, $690)), ($691, $692, $693, $694, $695, $696, $697, $698, $699, $700, $701, $702, $703, $704, $705, $706, $707, $708, $709, $710, $711, $712, $713, $714, $715, $716, $717, $718, VersionRange($719, $720)), ($721, $722, $723, $724, $725, $726, $727, $728, $729, $730, $731, $732, $733, $734, $735, $736, $737, $738, $739, $740, $741, $742, $743, $744, $745, $746, $747, $748, VersionRange($749, $750)), ($751, $752, $753, $754, $755, $756, $757, $758, $759, $760, $761, $762, $763, $764, $765, $766, $767, $768, $769, $770, $771, $772, $773, $774, $775, $776, $777, $778, VersionRange($779, $780)), ($781, $782, $783, $784, $785, $786, $787, $788, $789, $790, $791, $792, $793, $794, $795, $796, $797, $798, $799, $800, $801, $802, $803, $804, $805, $806, $807, $808, VersionRange($809, $810)), ($811, $812, $813, $814, $815, $816, $817, $818, $819, $820, $821, $822, $823, $824, $825, $826, $827, $828, $829, $830, $831, $832, $833, $834, $835, $836, $837, $838, VersionRange($839, $840)), ($841, $842, $843, $844, $845, $846, $847, $848, $849, $850, $851, $852, $853, $854, $855, $856, $857, $858, $859, $860, $861, $862, $863, $864, $865, $866, $867, $868, VersionRange($869, $870)), ($871, $872, $873, $874, $875, $876, $877, $878, $879, $880, $881, $882, $883, $884, $885, $886, $887, $888, $889, $890, $891, $892, $893, $894, $895, $896, $897, $898, VersionRange($899, $900)), ($901, $902, $903, $904, $905, $906, $907, $908, $909, $910, $911, $912, $913, $914, $915, $916, $917, $918, $919, $920, $921, $922, $923, $924, $925, $926, $927, $928, VersionRange($929, $930)), ($931, $932, $933, $934, $935, $936, $937, $938, $939, $940, $941, $942, $943, $944, $945, $946, $947, $948, $949, $950, $951, $952, $953, $954, $955, $956, $957, $958, VersionRange($959, $960)), ($961, $962, $963, $964, $965, $966, $967, $968, $969, $970, $971, $972, $973, $974, $975, $976, $977, $978, $979, $980, $981, $982, $983, $984, $985, $986, $987, $988, VersionRange($989, $990)), ($991, $992, $993, $994, $995, $996, $997, $998, $999, $1000, $1001, $1002, $1003, $1004, $1005, $1006, $1007, $1008, $1009, $1010, $1011, $1012, $1013, $1014, $1015, $1016, $1017, $1018, VersionRange($1019, $1020)), ($1021, $1022, $1023, $1024, $1025, $1026, $1027, $1028, $1029, $1030, $1031, $1032, $1033, $1034, $1035, $1036, $1037, $1038, $1039, $1040, $1041, $1042, $1043, $1044, $1045, $1046, $1047, $1048, VersionRange($1049, $1050)), ($1051, $1052, $1053, $1054, $1055, $1056, $1057, $1058, $1059, $1060, $1061, $1062, $1063, $1064, $1065, $1066, $1067, $1068, $1069, $1070, $1071, $1072, $1073, $1074, $1075, $1076, $1077, $1078, VersionRange($1079, $1080)), ($1081, $1082, $1083, $1084, $1085, $1086, $1087, $1088, $1089, $1090, $1091, $1092, $1093, $1094, $1095, $1096, $1097, $1098, $1099, $1100, $1101, $1102, $1103, $1104, $1105, $1106, $1107, $1108, VersionRange($1109, $1110)), ($1111, $1112, $1113, $1114, $1115, $1116, $1117, $1118, $1119, $1120, $1121, $1122, $1123, $1124, $1125, $1126, $1127, $1128, $1129, $1130, $1131, $1132, $1133, $1134, $1135, $1136, $1137, $1138, VersionRange($1139, $1140)), ($1141, $1142, $1143, $1144, $1145, $1146, $1147, $1148, $1149, $1150, $1151, $1152, $1153, $1154, $1155, $1156, $1157, $1158, $1159, $1160, $1161, $1162, $1163, $1164, $1165, $1166, $1167, $1168, VersionRange($1169, $1170)), ($1171, $1172, $1173, $1174, $1175, $1176, $1177, $1178, $1179, $1180, $1181, $1182, $1183, $1184, $1185, $1186, $1187, $1188, $1189, $1190, $1191, $1192, $1193, $1194, $1195, $1196, $1197, $1198, VersionRange($1199, $1200)), ($1201, $1202, $1203, $1204, $1205, $1206, $1207, $1208, $1209, $1210, $1211, $1212, $1213, $1214, $1215, $1216, $1217, $1218, $1219, $1220, $1221, $1222, $1223, $1224, $1225, $1226, $1227, $1228, VersionRange($1229, $1230)), ($1231, $1232, $1233, $1234, $1235, $1236, $1237, $1238, $1239, $1240, $1241, $1242, $1243, $1244, $1245, $1246, $1247, $1248, $1249, $1250, $1251, $1252, $1253, $1254, $1255, $1256, $1257, $1258, VersionRange($1259, $1260)), ($1261, $1262, $1263, $1264, $1265, $1266, $1267, $1268, $1269, $1270, $1271, $1272, $1273, $1274, $1275, $1276, $1277, $1278, $1279, $1280, $1281, $1282, $1283, $1284, $1285, $1286, $1287, $1288, VersionRange($1289, $1290)), ($1291, $1292, $1293, $1294, $1295, $1296, $1297, $1298, $1299, $1300, $1301, $1302, $1303, $1304, $1305, $1306, $1307, $1308, $1309, $1310, $1311, $1312, $1313, $1314, $1315, $1316, $1317, $1318, VersionRange($1319, $1320)), ($1321, $1322, $1323, $1324, $1325, $1326, $1327, $1328, $1329, $1330, $1331, $1332, $1333, $1334, $1335, $1336, $1337, $1338, $1339, $1340, $1341, $1342, $1343, $1344, $1345, $1346, $1347, $1348, VersionRange($1349, $1350)), ($1351, $1352, $1353, $1354, $1355, $1356, $1357, $1358, $1359, $1360, $1361, $1362, $1363, $1364, $1365, $1366, $1367, $1368, $1369, $1370, $1371, $1372, $1373, $1374, $1375, $1376, $1377, $1378, VersionRange($1379, $1380)), ($1381, $1382, $1383, $1384, $1385, $1386, $1387, $1388, $1389, $1390, $1391, $1392, $1393, $1394, $1395, $1396, $1397, $1398, $1399, $1400, $1401, $1402, $1403, $1404, $1405, $1406, $1407, $1408, VersionRange($1409, $1410)), ($1411, $1412, $1413, $1414, $1415, $1416, $1417, $1418, $1419, $1420, $1421, $1422, $1423, $1424, $1425, $1426, $1427, $1428, $1429, $1430, $1431, $1432, $1433, $1434, $1435, $1436, $1437, $1438, VersionRange($1439, $1440)), ($1441, $1442, $1443, $1444, $1445, $1446, $1447, $1448, $1449, $1450, $1451, $1452, $1453, $1454, $1455, $1456, $1457, $1458, $1459, $1460, $1461, $1462, $1463, $1464, $1465, $1466, $1467, $1468, VersionRange($1469, $1470)), ($1471, $1472, $1473, $1474, $1475, $1476, $1477, $1478, $1479, $1480, $1481, $1482, $1483, $1484, $1485, $1486, $1487, $1488, $1489, $1490, $1491, $1492, $1493, $1494, $1495, $1496, $1497, $1498, VersionRange($1499, $1500)), ($1501, $1502, $1503, $1504, $1505, $1506, $1507, $1508, $1509, $1510, $1511, $1512, $1513, $1514, $1515, $1516, $1517, $1518, $1519, $1520, $1521, $1522, $1523, $1524, $1525, $1526, $1527, $1528, VersionRange($1529, $1530)), ($1531, $1532, $1533, $1534, $1535, $1536, $1537, $1538, $1539, $1540, $1541, $1542, $1543, $1544, $1545, $1546, $1547, $1548, $1549, $1550, $1551, $1552, $1553, $1554, $1555, $1556, $1557, $1558, VersionRange($1559, $1560)), ($1561, $1562, $1563, $1564, $1565, $1566, $1567, $1568, $1569, $1570, $1571, $1572, $1573, $1574, $1575, $1576, $1577, $1578, $1579, $1580, $1581, $1582, $1583, $1584, $1585, $1586, $1587, $1588, VersionRange($1589, $1590)), ($1591, $1592, $1593, $1594, $1595, $1596, $1597, $1598, $1599, $1600, $1601, $1602, $1603, $1604, $1605, $1606, $1607, $1608, $1609, $1610, $1611, $1612, $1613, $1614, $1615, $1616, $1617, $1618, VersionRange($1619, $1620)), ($1621, $1622, $1623, $1624, $1625, $1626, $1627, $1628, $1629, $1630, $1631, $1632, $1633, $1634, $1635, $1636, $1637, $1638, $1639, $1640, $1641, $1642, $1643, $1644, $1645, $1646, $1647, $1648, VersionRange($1649, $1650)), ($1651, $1652, $1653, $1654, $1655, $1656, $1657, $1658, $1659, $1660, $1661, $1662, $1663, $1664, $1665, $1666, $1667, $1668, $1669, $1670, $1671, $1672, $1673, $1674, $1675, $1676, $1677, $1678, VersionRange($1679, $1680)), ($1681, $1682, $1683, $1684, $1685, $1686, $1687, $1688, $1689, $1690, $1691, $1692, $1693, $1694, $1695, $1696, $1697, $1698, $1699, $1700, $1701, $1702, $1703, $1704, $1705, $1706, $1707, $1708, VersionRange($1709, $1710)), ($1711, $1712, $1713, $1714, $1715, $1716, $1717, $1718, $1719, $1720, $1721, $1722, $1723, $1724, $1725, $1726, $1727, $1728, $1729, $1730, $1731, $1732, $1733, $1734, $1735, $1736, $1737, $1738, VersionRange($1739, $1740)), ($1741, $1742, $1743, $1744, $1745, $1746, $1747, $1748, $1749, $1750, $1751, $1752, $1753, $1754, $1755, $1756, $1757, $1758, $1759, $1760, $1761, $1762, $1763, $1764, $1765, $1766, $1767, $1768, VersionRange($1769, $1770)), ($1771, $1772, $1773, $1774, $1775, $1776, $1777, $1778, $1779, $1780, $1781, $1782, $1783, $1784, $1785, $1786, $1787, $1788, $1789, $1790, $1791, $1792, $1793, $1794, $1795, $1796, $1797, $1798, VersionRange($1799, $1800)), ($1801, $1802, $1803, $1804, $1805, $1806, $1807, $1808, $1809, $1810, $1811, $1812, $1813, $1814, $1815, $1816, $1817, $1818, $1819, $1820, $1821, $1822, $1823, $1824, $1825, $1826, $1827, $1828, VersionRange($1829, $1830)), ($1831, $1832, $1833, $1834, $1835, $1836, $1837, $1838, $1839, $1840, $1841, $1842, $1843, $1844, $1845, $1846, $1847, $1848, $1849, $1850, $1851, $1852, $1853, $1854, $1855, $1856, $1857, $1858, VersionRange($1859, $1860)), ($1861, $1862, $1863, $1864, $1865, $1866, $1867, $1868, $1869, $1870, $1871, $1872, $1873, $1874, $1875, $1876, $1877, $1878, $1879, $1880, $1881, $1882, $1883, $1884, $1885, $1886, $1887, $1888, VersionRange($1889, $1890)), ($1891, $1892, $1893, $1894, $1895, $1896, $1897, $1898, $1899, $1900, $1901, $1902, $1903, $1904, $1905, $1906, $1907, $1908, $1909, $1910, $1911, $1912, $1913, $1914, $1915, $1916, $1917, $1918, VersionRange($1919, $1920)), ($1921, $1922, $1923, $1924, $1925, $1926, $1927, $1928, $1929, $1930, $1931, $1932, $1933, $1934, $1935, $1936, $1937, $1938, $1939, $1940, $1941, $1942, $1943, $1944, $1945, $1946, $1947, $1948, VersionRange($1949, $1950)), ($1951, $1952, $1953, $1954, $1955, $1956, $1957, $1958, $1959, $1960, $1961, $1962, $1963, $1964, $1965, $1966, $1967, $1968, $1969, $1970, $1971, $1972, $1973, $1974, $1975, $1976, $1977, $1978, VersionRange($1979, $1980)), ($1981, $1982, $1983, $1984, $1985, $1986, $1987, $1988, $1989, $1990, $1991, $1992, $1993, $1994, $1995, $1996, $1997, $1998, $1999, $2000, $2001, $2002, $2003, $2004, $2005, $2006, $2007, $2008, VersionRange($2009, $2010)), ($2011, $2012, $2013, $2014, $2015, $2016, $2017, $2018, $2019, $2020, $2021, $2022, $2023, $2024, $2025, $2026, $2027, $2028, $2029, $2030, $2031, $2032, $2033, $2034, $2035, $2036, $2037, $2038, VersionRange($2039, $2040)), ($2041, $2042, $2043, $2044, $2045, $2046, $2047, $2048, $2049, $2050, $2051, $2052, $2053, $2054, $2055, $2056, $2057, $2058, $2059, $2060, $2061, $2062, $2063, $2064, $2065, $2066, $2067, $2068, VersionRange($2069, $2070)), ($2071, $2072, $2073, $2074, $2075, $2076, $2077, $2078, $2079, $2080, $2081, $2082, $2083, $2084, $2085, $2086, $2087, $2088, $2089, $2090, $2091, $2092, $2093, $2094, $2095, $2096, $2097, $2098, VersionRange($2099, $2100)), ($2101, $2102, $2103, $2104, $2105, $2106, $2107, $2108, $2109, $2110, $2111, $2112, $2113, $2114, $2115, $2116, $2117, $2118, $2119, $2120, $2121, $2122, $2123, $2124, $2125, $2126, $2127, $2128, VersionRange($2129, $2130)), ($2131, $2132, $2133, $2134, $2135, $2136, $2137, $2138, $2139, $2140, $2141, $2142, $2143, $2144, $2145, $2146, $2147, $2148, $2149, $2150, $2151, $2152, $2153, $2154, $2155, $2156, $2157, $2158, VersionRange($2159, $2160)), ($2161, $2162, $2163, $2164, $2165, $2166, $2167, $2168, $2169, $2170, $2171, $2172, $2173, $2174, $2175, $2176, $2177, $2178, $2179, $2180, $2181, $2182, $2183, $2184, $2185, $2186, $2187, $2188, VersionRange($2189, $2190)), ($2191, $2192, $2193, $2194, $2195, $2196, $2197, $2198, $2199, $2200, $2201, $2202, $2203, $2204, $2205, $2206, $2207, $2208, $2209, $2210, $2211, $2212, $2213, $2214, $2215, $2216, $2217, $2218, VersionRange($2219, $2220)), ($2221, $2222, $2223, $2224, $2225, $2226, $2227, $2228, $2229, $2230, $2231, $2232, $2233, $2234, $2235, $2236, $2237, $2238, $2239, $2240, $2241, $2242, $2243, $2244, $2245, $2246, $2247, $2248, VersionRange($2249, $2250)), ($2251, $2252, $2253, $2254, $2255, $2256, $2257, $2258, $2259, $2260, $2261, $2262, $2263, $2264, $2265, $2266, $2267, $2268, $2269, $2270, $2271, $2272, $2273, $2274, $2275, $2276, $2277, $2278, VersionRange($2279, $2280)), ($2281, $2282, $2283, $2284, $2285, $2286, $2287, $2288, $2289, $2290, $2291, $2292, $2293, $2294, $2295, $2296, $2297, $2298, $2299, $2300, $2301, $2302, $2303, $2304, $2305, $2306, $2307, $2308, VersionRange($2309, $2310)), ($2311, $2312, $2313, $2314, $2315, $2316, $2317, $2318, $2319, $2320, $2321, $2322, $2323, $2324, $2325, $2326, $2327, $2328, $2329, $2330, $2331, $2332, $2333, $2334, $2335, $2336, $2337, $2338, VersionRange($2339, $2340)), ($2341, $2342, $2343, $2344, $2345, $2346, $2347, $2348, $2349, $2350, $2351, $2352, $2353, $2354, $2355, $2356, $2357, $2358, $2359, $2360, $2361, $2362, $2363, $2364, $2365, $2366, $2367, $2368, VersionRange($2369, $2370)), ($2371, $2372, $2373, $2374, $2375, $2376, $2377, $2378, $2379, $2380, $2381, $2382, $2383, $2384, $2385, $2386, $2387, $2388, $2389, $2390, $2391, $2392, $2393, $2394, $2395, $2396, $2397, $2398, VersionRange($2399, $2400)), ($2401, $2402, $2403, $2404, $2405, $2406, $2407, $2408, $2409, $2410, $2411, $2412, $2413, $2414, $2415, $2416, $2417, $2418, $2419, $2420, $2421, $2422, $2423, $2424, $2425, $2426, $2427, $2428, VersionRange($2429, $2430)), ($2431, $2432, $2433, $2434, $2435, $2436, $2437, $2438, $2439, $2440, $2441, $2442, $2443, $2444, $2445, $2446, $2447, $2448, $2449, $2450, $2451, $2452, $2453, $2454, $2455, $2456, $2457, $2458, VersionRange($2459, $2460)), ($2461, $2462, $2463, $2464, $2465, $2466, $2467, $2468, $2469, $2470, $2471, $2472, $2473, $2474, $2475, $2476, $2477, $2478, $2479, $2480, $2481, $2482, $2483, $2484, $2485, $2486, $2487, $2488, VersionRange($2489, $2490)), ($2491, $2492, $2493, $2494, $2495, $2496, $2497, $2498, $2499, $2500, $2501, $2502, $2503, $2504, $2505, $2506, $2507, $2508, $2509, $2510, $2511, $2512, $2513, $2514, $2515, $2516, $2517, $2518, VersionRange($2519, $2520)), ($2521, $2522, $2523, $2524, $2525, $2526, $2527, $2528, $2529, $2530, $2531, $2532, $2533, $2534, $2535, $2536, $2537, $2538, $2539, $2540, $2541, $2542, $2543, $2544, $2545, $2546, $2547, $2548, VersionRange($2549, $2550)), ($2551, $2552, $2553, $2554, $2555, $2556, $2557, $2558, $2559, $2560, $2561, $2562, $2563, $2564, $2565, $2566, $2567, $2568, $2569, $2570, $2571, $2572, $2573, $2574, $2575, $2576, $2577, $2578, VersionRange($2579, $2580)), ($2581, $2582, $2583, $2584, $2585, $2586, $2587, $2588, $2589, $2590, $2591, $2592, $2593, $2594, $2595, $2596, $2597, $2598, $2599, $2600, $2601, $2602, $2603, $2604, $2605, $2606, $2607, $2608, VersionRange($2609, $2610)), ($2611, $2612, $2613, $2614, $2615, $2616, $2617, $2618, $2619, $2620, $2621, $2622, $2623, $2624, $2625, $2626, $2627, $2628, $2629, $2630, $2631, $2632, $2633, $2634, $2635, $2636, $2637, $2638, VersionRange($2639, $2640)), ($2641, $2642, $2643, $2644, $2645, $2646, $2647, $2648, $2649, $2650, $2651, $2652, $2653, $2654, $2655, $2656, $2657, $2658, $2659, $2660, $2661, $2662, $2663, $2664, $2665, $2666, $2667, $2668, VersionRange($2669, $2670)), ($2671, $2672, $2673, $2674, $2675, $2676, $2677, $2678, $2679, $2680, $2681, $2682, $2683, $2684, $2685, $2686, $2687, $2688, $2689, $2690, $2691, $2692, $2693, $2694, $2695, $2696, $2697, $2698, VersionRange($2699, $2700)), ($2701, $2702, $2703, $2704, $2705, $2706, $2707, $2708, $2709, $2710, $2711, $2712, $2713, $2714, $2715, $2716, $2717, $2718, $2719, $2720, $2721, $2722, $2723, $2724, $2725, $2726, $2727, $2728, VersionRange($2729, $2730)), ($2731, $2732, $2733, $2734, $2735, $2736, $2737, $2738, $2739, $2740, $2741, $2742, $2743, $2744, $2745, $2746, $2747, $2748, $2749, $2750, $2751, $2752, $2753, $2754, $2755, $2756, $2757, $2758, VersionRange($2759, $2760)), ($2761, $2762, $2763, $2764, $2765, $2766, $2767, $2768, $2769, $2770, $2771, $2772, $2773, $2774, $2775, $2776, $2777, $2778, $2779, $2780, $2781, $2782, $2783, $2784, $2785, $2786, $2787, $2788, VersionRange($2789, $2790)), ($2791, $2792, $2793, $2794, $2795, $2796, $2797, $2798, $2799, $2800, $2801, $2802, $2803, $2804, $2805, $2806, $2807, $2808, $2809, $2810, $2811, $2812, $2813, $2814, $2815, $2816, $2817, $2818, VersionRange($2819, $2820)), ($2821, $2822, $2823, $2824, $2825, $2826, $2827, $2828, $2829, $2830, $2831, $2832, $2833, $2834, $2835, $2836, $2837, $2838, $2839, $2840, $2841, $2842, $2843, $2844, $2845, $2846, $2847, $2848, VersionRange($2849, $2850)), ($2851, $2852, $2853, $2854, $2855, $2856, $2857, $2858, $2859, $2860, $2861, $2862, $2863, $2864, $2865, $2866, $2867, $2868, $2869, $2870, $2871, $2872, $2873, $2874, $2875, $2876, $2877, $2878, VersionRange($2879, $2880)), ($2881, $2882, $2883, $2884, $2885, $2886, $2887, $2888, $2889, $2890, $2891, $2892, $2893, $2894, $2895, $2896, $2897, $2898, $2899, $2900, $2901, $2902, $2903, $2904, $2905, $2906, $2907, $2908, VersionRange($2909, $2910)), ($2911, $2912, $2913, $2914, $2915, $2916, $2917, $2918, $2919, $2920, $2921, $2922, $2923, $2924, $2925, $2926, $2927, $2928, $2929, $2930, $2931, $2932, $2933, $2934, $2935, $2936, $2937, $2938, VersionRange($2939, $2940)), ($2941, $2942, $2943, $2944, $2945, $2946, $2947, $2948, $2949, $2950, $2951, $2952, $2953, $2954, $2955, $2956, $2957, $2958, $2959, $2960, $2961, $2962, $2963, $2964, $2965, $2966, $2967, $2968, VersionRange($2969, $2970)), ($2971, $2972, $2973, $2974, $2975, $2976, $2977, $2978, $2979, $2980, $2981, $2982, $2983, $2984, $2985, $2986, $2987, $2988, $2989, $2990, $2991, $2992, $2993, $2994, $2995, $2996, $2997, $2998, VersionRange($2999, $3000)), ($3001, $3002, $3003, $3004, $3005, $3006, $3007, $3008, $3009, $3010, $3011, $3012, $3013, $3014, $3015, $3016, $3017, $3018, $3019, $3020, $3021, $3022, $3023, $3024, $3025, $3026, $3027, $3028, VersionRange($3029, $3030)), ($3031, $3032, $3033, $3034, $3035, $3036, $3037, $3038, $3039, $3040, $3041, $3042, $3043, $3044, $3045, $3046, $3047, $3048, $3049, $3050, $3051, $3052, $3053, $3054, $3055, $3056, $3057, $3058, VersionRange($3059, $3060)), ($3061, $3062, $3063, $3064, $3065, $3066, $3067, $3068, $3069, $3070, $3071, $3072, $3073, $3074, $3075, $3076, $3077, $3078, $3079, $3080, $3081, $3082, $3083, $3084, $3085, $3086, $3087, $3088, VersionRange($3089, $3090)), ($3091, $3092, $3093, $3094, $3095, $3096, $3097, $3098, $3099, $3100, $3101, $3102, $3103, $3104, $3105, $3106, $3107, $3108, $3109, $3110, $3111, $3112, $3113, $3114, $3115, $3116, $3117, $3118, VersionRange($3119, $3120)), ($3121, $3122, $3123, $3124, $3125, $3126, $3127, $3128, $3129, $3130, $3131, $3132, $3133, $3134, $3135, $3136, $3137, $3138, $3139, $3140, $3141, $3142, $3143, $3144, $3145, $3146, $3147, $3148, VersionRange($3149, $3150)), ($3151, $3152, $3153, $3154, $3155, $3156, $3157, $3158, $3159, $3160, $3161, $3162, $3163, $3164, $3165, $3166, $3167, $3168, $3169, $3170, $3171, $3172, $3173, $3174, $3175, $3176, $3177, $3178, VersionRange($3179, $3180)), ($3181, $3182, $3183, $3184, $3185, $3186, $3187, $3188, $3189, $3190, $3191, $3192, $3193, $3194, $3195, $3196, $3197, $3198, $3199, $3200, $3201, $3202, $3203, $3204, $3205, $3206, $3207, $3208, VersionRange($3209, $3210)), ($3211, $3212, $3213, $3214, $3215, $3216, $3217, $3218, $3219, $3220, $3221, $3222, $3223, $3224, $3225, $3226, $3227, $3228, $3229, $3230, $3231, $3232, $3233, $3234, $3235, $3236, $3237, $3238, VersionRange($3239, $3240)), ($3241, $3242, $3243, $3244, $3245, $3246, $3247, $3248, $3249, $3250, $3251, $3252, $3253, $3254, $3255, $3256, $3257, $3258, $3259, $3260, $3261, $3262, $3263, $3264, $3265, $3266, $3267, $3268, VersionRange($3269, $3270)), ($3271, $3272, $3273, $3274, $3275, $3276, $3277, $3278, $3279, $3280, $3281, $3282, $3283, $3284, $3285, $3286, $3287, $3288, $3289, $3290, $3291, $3292, $3293, $3294, $3295, $3296, $3297, $3298, VersionRange($3299, $3300)), ($3301, $3302, $3303, $3304, $3305, $3306, $3307, $3308, $3309, $3310, $3311, $3312, $3313, $3314, $3315, $3316, $3317, $3318, $3319, $3320, $3321, $3322, $3323, $3324, $3325, $3326, $3327, $3328, VersionRange($3329, $3330)), ($3331, $3332, $3333, $3334, $3335, $3336, $3337, $3338, $3339, $3340, $3341, $3342, $3343, $3344, $3345, $3346, $3347, $3348, $3349, $3350, $3351, $3352, $3353, $3354, $3355, $3356, $3357, $3358, VersionRange($3359, $3360)), ($3361, $3362, $3363, $3364, $3365, $3366, $3367, $3368, $3369, $3370, $3371, $3372, $3373, $3374, $3375, $3376, $3377, $3378, $3379, $3380, $3381, $3382, $3383, $3384, $3385, $3386, $3387, $3388, VersionRange($3389, $3390)), ($3391, $3392, $3393, $3394, $3395, $3396, $3397, $3398, $3399, $3400, $3401, $3402, $3403, $3404, $3405, $3406, $3407, $3408, $3409, $3410, $3411, $3412, $3413, $3414, $3415, $3416, $3417, $3418, VersionRange($3419, $3420)), ($3421, $3422, $3423, $3424, $3425, $3426, $3427, $3428, $3429, $3430, $3431, $3432, $3433, $3434, $3435, $3436, $3437, $3438, $3439, $3440, $3441, $3442, $3443, $3444, $3445, $3446, $3447, $3448, VersionRange($3449, $3450)), ($3451, $3452, $3453, $3454, $3455, $3456, $3457, $3458, $3459, $3460, $3461, $3462, $3463, $3464, $3465, $3466, $3467, $3468, $3469, $3470, $3471, $3472, $3473, $3474, $3475, $3476, $3477, $3478, VersionRange($3479, $3480)), ($3481, $3482, $3483, $3484, $3485, $3486, $3487, $3488, $3489, $3490, $3491, $3492, $3493, $3494, $3495, $3496, $3497, $3498, $3499, $3500, $3501, $3502, $3503, $3504, $3505, $3506, $3507, $3508, VersionRange($3509, $3510)), ($3511, $3512, $3513, $3514, $3515, $3516, $3517, $3518, $3519, $3520, $3521, $3522, $3523, $3524, $3525, $3526, $3527, $3528, $3529, $3530, $3531, $3532, $3533, $3534, $3535, $3536, $3537, $3538, VersionRange($3539, $3540)), ($3541, $3542, $3543, $3544, $3545, $3546, $3547, $3548, $3549, $3550, $3551, $3552, $3553, $3554, $3555, $3556, $3557, $3558, $3559, $3560, $3561, $3562, $3563, $3564, $3565, $3566, $3567, $3568, VersionRange($3569, $3570)), ($3571, $3572, $3573, $3574, $3575, $3576, $3577, $3578, $3579, $3580, $3581, $3582, $3583, $3584, $3585, $3586, $3587, $3588, $3589, $3590, $3591, $3592, $3593, $3594, $3595, $3596, $3597, $3598, VersionRange($3599, $3600)), ($3601, $3602, $3603, $3604, $3605, $3606, $3607, $3608, $3609, $3610, $3611, $3612, $3613, $3614, $3615, $3616, $3617, $3618, $3619, $3620, $3621, $3622, $3623, $3624, $3625, $3626, $3627, $3628, VersionRange($3629, $3630)), ($3631, $3632, $3633, $3634, $3635, $3636, $3637, $3638, $3639, $3640, $3641, $3642, $3643, $3644, $3645, $3646, $3647, $3648, $3649, $3650, $3651, $3652, $3653, $3654, $3655, $3656, $3657, $3658, VersionRange($3659, $3660)), ($3661, $3662, $3663, $3664, $3665, $3666, $3667, $3668, $3669, $3670, $3671, $3672, $3673, $3674, $3675, $3676, $3677, $3678, $3679, $3680, $3681, $3682, $3683, $3684, $3685, $3686, $3687, $3688, VersionRange($3689, $3690)), ($3691, $3692, $3693, $3694, $3695, $3696, $3697, $3698, $3699, $3700, $3701, $3702, $3703, $3704, $3705, $3706, $3707, $3708, $3709, $3710, $3711, $3712, $3713, $3714, $3715, $3716, $3717, $3718, VersionRange($3719, $3720)), ($3721, $3722, $3723, $3724, $3725, $3726, $3727, $3728, $3729, $3730, $3731, $3732, $3733, $3734, $3735, $3736, $3737, $3738, $3739, $3740, $3741, $3742, $3743, $3744, $3745, $3746, $3747, $3748, VersionRange($3749, $3750)), ($3751, $3752, $3753, $3754, $3755, $3756, $3757, $3758, $3759, $3760, $3761, $3762, $3763, $3764, $3765, $3766, $3767, $3768, $3769, $3770, $3771, $3772, $3773, $3774, $3775, $3776, $3777, $3778, VersionRange($3779, $3780)), ($3781, $3782, $3783, $3784, $3785, $3786, $3787, $3788, $3789, $3790, $3791, $3792, $3793, $3794, $3795, $3796, $3797, $3798, $3799, $3800, $3801, $3802, $3803, $3804, $3805, $3806, $3807, $3808, VersionRange($3809, $3810)), ($3811, $3812, $3813, $3814, $3815, $3816, $3817, $3818, $3819, $3820, $3821, $3822, $3823, $3824, $3825, $3826, $3827, $3828, $3829, $3830, $3831, $3832, $3833, $3834, $3835, $3836, $3837, $3838, VersionRange($3839, $3840)), ($3841, $3842, $3843, $3844, $3845, $3846, $3847, $3848, $3849, $3850, $3851, $3852, $3853, $3854, $3855, $3856, $3857, $3858, $3859, $3860, $3861, $3862, $3863, $3864, $3865, $3866, $3867, $3868, VersionRange($3869, $3870)), ($3871, $3872, $3873, $3874, $3875, $3876, $3877, $3878, $3879, $3880, $3881, $3882, $3883, $3884, $3885, $3886, $3887, $3888, $3889, $3890, $3891, $3892, $3893, $3894, $3895, $3896, $3897, $3898, VersionRange($3899, $3900)), ($3901, $3902, $3903, $3904, $3905, $3906, $3907, $3908, $3909, $3910, $3911, $3912, $3913, $3914, $3915, $3916, $3917, $3918, $3919, $3920, $3921, $3922, $3923, $3924, $3925, $3926, $3927, $3928, VersionRange($3929, $3930)), ($3931, $3932, $3933, $3934, $3935, $3936, $3937, $3938, $3939, $3940, $3941, $3942, $3943, $3944, $3945, $3946, $3947, $3948, $3949, $3950, $3951, $3952, $3953, $3954, $3955, $3956, $3957, $3958, VersionRange($3959, $3960)), ($3961, $3962, $3963, $3964, $3965, $3966, $3967, $3968, $3969, $3970, $3971, $3972, $3973, $3974, $3975, $3976, $3977, $3978, $3979, $3980, $3981, $3982, $3983, $3984, $3985, $3986, $3987, $3988, VersionRange($3989, $3990)), ($3991, $3992, $3993, $3994, $3995, $3996, $3997, $3998, $3999, $4000, $4001, $4002, $4003, $4004, $4005, $4006, $4007, $4008, $4009, $4010, $4011, $4012, $4013, $4014, $4015, $4016, $4017, $4018, VersionRange($4019, $4020)), ($4021, $4022, $4023, $4024, $4025, $4026, $4027, $4028, $4029, $4030, $4031, $4032, $4033, $4034, $4035, $4036, $4037, $4038, $4039, $4040, $4041, $4042, $4043, $4044, $4045, $4046, $4047, $4048, VersionRange($4049, $4050)), ($4051, $4052, $4053, $4054, $4055, $4056, $4057, $4058, $4059, $4060, $4061, $4062, $4063, $4064, $4065, $4066, $4067, $4068, $4069, $4070, $4071, $4072, $4073, $4074, $4075, $4076, $4077, $4078, VersionRange($4079, $4080)), ($4081, $4082, $4083, $4084, $4085, $4086, $4087, $4088, $4089, $4090, $4091, $4092, $4093, $4094, $4095, $4096, $4097, $4098, $4099, $4100, $4101, $4102, $4103, $4104, $4105, $4106, $4107, $4108, VersionRange($4109, $4110)), ($4111, $4112, $4113, $4114, $4115, $4116, $4117, $4118, $4119, $4120, $4121, $4122, $4123, $4124, $4125, $4126, $4127, $4128, $4129, $4130, $4131, $4132, $4133, $4134, $4135, $4136, $4137, $4138, VersionRange($4139, $4140)), ($4141, $4142, $4143, $4144, $4145, $4146, $4147, $4148, $4149, $4150, $4151, $4152, $4153, $4154, $4155, $4156, $4157, $4158, $4159, $4160, $4161, $4162, $4163, $4164, $4165, $4166, $4167, $4168, VersionRange($4169, $4170)), ($4171, $4172, $4173, $4174, $4175, $4176, $4177, $4178, $4179, $4180, $4181, $4182, $4183, $4184, $4185, $4186, $4187, $4188, $4189, $4190, $4191, $4192, $4193, $4194, $4195, $4196, $4197, $4198, VersionRange($4199, $4200)), ($4201, $4202, $4203, $4204, $4205, $4206, $4207, $4208, $4209, $4210, $4211, $4212, $4213, $4214, $4215, $4216, $4217, $4218, $4219, $4220, $4221, $4222, $4223, $4224, $4225, $4226, $4227, $4228, VersionRange($4229, $4230)), ($4231, $4232, $4233, $4234, $4235, $4236, $4237, $4238, $4239, $4240, $4241, $4242, $4243, $4244, $4245, $4246, $4247, $4248, $4249, $4250, $4251, $4252, $4253, $4254, $4255, $4256, $4257, $4258, VersionRange($4259, $4260)), ($4261, $4262, $4263, $4264, $4265, $4266, $4267, $4268, $4269, $4270, $4271, $4272, $4273, $4274, $4275, $4276, $4277, $4278, $4279, $4280, $4281, $4282, $4283, $4284, $4285, $4286, $4287, $4288, VersionRange($4289, $4290)), ($4291, $4292, $4293, $4294, $4295, $4296, $4297, $4298, $4299, $4300, $4301, $4302, $4303, $4304, $4305, $4306, $4307, $4308, $4309, $4310, $4311, $4312, $4313, $4314, $4315, $4316, $4317, $4318, VersionRange($4319, $4320)), ($4321, $4322, $4323, $4324, $4325, $4326, $4327, $4328, $4329, $4330, $4331, $4332, $4333, $4334, $4335, $4336, $4337, $4338, $4339, $4340, $4341, $4342, $4343, $4344, $4345, $4346, $4347, $4348, VersionRange($4349, $4350)), ($4351, $4352, $4353, $4354, $4355, $4356, $4357, $4358, $4359, $4360, $4361, $4362, $4363, $4364, $4365, $4366, $4367, $4368, $4369, $4370, $4371, $4372, $4373, $4374, $4375, $4376, $4377, $4378, VersionRange($4379, $4380)), ($4381, $4382, $4383, $4384, $4385, $4386, $4387, $4388, $4389, $4390, $4391, $4392, $4393, $4394, $4395, $4396, $4397, $4398, $4399, $4400, $4401, $4402, $4403, $4404, $4405, $4406, $4407, $4408, VersionRange($4409, $4410)), ($4411, $4412, $4413, $4414, $4415, $4416, $4417, $4418, $4419, $4420, $4421, $4422, $4423, $4424, $4425, $4426, $4427, $4428, $4429, $4430, $4431, $4432, $4433, $4434, $4435, $4436, $4437, $4438, VersionRange($4439, $4440)), ($4441, $4442, $4443, $4444, $4445, $4446, $4447, $4448, $4449, $4450, $4451, $4452, $4453, $4454, $4455, $4456, $4457, $4458, $4459, $4460, $4461, $4462, $4463, $4464, $4465, $4466, $4467, $4468, VersionRange($4469, $4470)), ($4471, $4472, $4473, $4474, $4475, $4476, $4477, $4478, $4479, $4480, $4481, $4482, $4483, $4484, $4485, $4486, $4487, $4488, $4489, $4490, $4491, $4492, $4493, $4494, $4495, $4496, $4497, $4498, VersionRange($4499, $4500)), ($4501, $4502, $4503, $4504, $4505, $4506, $4507, $4508, $4509, $4510, $4511, $4512, $4513, $4514, $4515, $4516, $4517, $4518, $4519, $4520, $4521, $4522, $4523, $4524, $4525, $4526, $4527, $4528, VersionRange($4529, $4530)), ($4531, $4532, $4533, $4534, $4535, $4536, $4537, $4538, $4539, $4540, $4541, $4542, $4543, $4544, $4545, $4546, $4547, $4548, $4549, $4550, $4551, $4552, $4553, $4554, $4555, $4556, $4557, $4558, VersionRange($4559, $4560)), ($4561, $4562, $4563, $4564, $4565, $4566, $4567, $4568, $4569, $4570, $4571, $4572, $4573, $4574, $4575, $4576, $4577, $4578, $4579, $4580, $4581, $4582, $4583, $4584, $4585, $4586, $4587, $4588, VersionRange($4589, $4590)), ($4591, $4592, $4593, $4594, $4595, $4596, $4597, $4598, $4599, $4600, $4601, $4602, $4603, $4604, $4605, $4606, $4607, $4608, $4609, $4610, $4611, $4612, $4613, $4614, $4615, $4616, $4617, $4618, VersionRange($4619, $4620)), ($4621, $4622, $4623, $4624, $4625, $4626, $4627, $4628, $4629, $4630, $4631, $4632, $4633, $4634, $4635, $4636, $4637, $4638, $4639, $4640, $4641, $4642, $4643, $4644, $4645, $4646, $4647, $4648, VersionRange($4649, $4650)), ($4651, $4652, $4653, $4654, $4655, $4656, $4657, $4658, $4659, $4660, $4661, $4662, $4663, $4664, $4665, $4666, $4667, $4668, $4669, $4670, $4671, $4672, $4673, $4674, $4675, $4676, $4677, $4678, VersionRange($4679, $4680)), ($4681, $4682, $4683, $4684, $4685, $4686, $4687, $4688, $4689, $4690, $4691, $4692, $4693, $4694, $4695, $4696, $4697, $4698, $4699, $4700, $4701, $4702, $4703, $4704, $4705, $4706, $4707, $4708, VersionRange($4709, $4710)), ($4711, $4712, $4713, $4714, $4715, $4716, $4717, $4718, $4719, $4720, $4721, $4722, $4723, $4724, $4725, $4726, $4727, $4728, $4729, $4730, $4731, $4732, $4733, $4734, $4735, $4736, $4737, $4738, VersionRange($4739, $4740)), ($4741, $4742, $4743, $4744, $4745, $4746, $4747, $4748, $4749, $4750, $4751, $4752, $4753, $4754, $4755, $4756, $4757, $4758, $4759, $4760, $4761, $4762, $4763, $4764, $4765, $4766, $4767, $4768, VersionRange($4769, $4770)), ($4771, $4772, $4773, $4774, $4775, $4776, $4777, $4778, $4779, $4780, $4781, $4782, $4783, $4784, $4785, $4786, $4787, $4788, $4789, $4790, $4791, $4792, $4793, $4794, $4795, $4796, $4797, $4798, VersionRange($4799, $4800)), ($4801, $4802, $4803, $4804, $4805, $4806, $4807, $4808, $4809, $4810, $4811, $4812, $4813, $4814, $4815, $4816, $4817, $4818, $4819, $4820, $4821, $4822, $4823, $4824, $4825, $4826, $4827, $4828, VersionRange($4829, $4830)), ($4831, $4832, $4833, $4834, $4835, $4836, $4837, $4838, $4839, $4840, $4841, $4842, $4843, $4844, $4845, $4846, $4847, $4848, $4849, $4850, $4851, $4852, $4853, $4854, $4855, $4856, $4857, $4858, VersionRange($4859, $4860)), ($4861, $4862, $4863, $4864, $4865, $4866, $4867, $4868, $4869, $4870, $4871, $4872, $4873, $4874, $4875, $4876, $4877, $4878, $4879, $4880, $4881, $4882, $4883, $4884, $4885, $4886, $4887, $4888, VersionRange($4889, $4890)), ($4891, $4892, $4893, $4894, $4895, $4896, $4897, $4898, $4899, $4900, $4901, $4902, $4903, $4904, $4905, $4906, $4907, $4908, $4909, $4910, $4911, $4912, $4913, $4914, $4915, $4916, $4917, $4918, VersionRange($4919, $4920)), ($4921, $4922, $4923, $4924, $4925, $4926, $4927, $4928, $4929, $4930, $4931, $4932, $4933, $4934, $4935, $4936, $4937, $4938, $4939, $4940, $4941, $4942, $4943, $4944, $4945, $4946, $4947, $4948, VersionRange($4949, $4950)), ($4951, $4952, $4953, $4954, $4955, $4956, $4957, $4958, $4959, $4960, $4961, $4962, $4963, $4964, $4965, $4966, $4967, $4968, $4969, $4970, $4971, $4972, $4973, $4974, $4975, $4976, $4977, $4978, VersionRange($4979, $4980)), ($4981, $4982, $4983, $4984, $4985, $4986, $4987, $4988, $4989, $4990, $4991, $4992, $4993, $4994, $4995, $4996, $4997, $4998, $4999, $5000, $5001, $5002, $5003, $5004, $5005, $5006, $5007, $5008, VersionRange($5009, $5010)), ($5011, $5012, $5013, $5014, $5015, $5016, $5017, $5018, $5019, $5020, $5021, $5022, $5023, $5024, $5025, $5026, $5027, $5028, $5029, $5030, $5031, $5032, $5033, $5034, $5035, $5036, $5037, $5038, VersionRange($5039, $5040)), ($5041, $5042, $5043, $5044, $5045, $5046, $5047, $5048, $5049, $5050, $5051, $5052, $5053, $5054, $5055, $5056, $5057, $5058, $5059, $5060, $5061, $5062, $5063, $5064, $5065, $5066, $5067, $5068, VersionRange($5069, $5070)), ($5071, $5072, $5073, $5074, $5075, $5076, $5077, $5078, $5079, $5080, $5081, $5082, $5083, $5084, $5085, $5086, $5087, $5088, $5089, $5090, $5091, $5092, $5093, $5094, $5095, $5096, $5097, $5098, VersionRange($5099, $5100)), ($5101, $5102, $5103, $5104, $5105, $5106, $5107, $5108, $5109, $5110, $5111, $5112, $5113, $5114, $5115, $5116, $5117, $5118, $5119, $5120, $5121, $5122, $5123, $5124, $5125, $5126, $5127, $5128, VersionRange($5129, $5130)), ($5131, $5132, $5133, $5134, $5135, $5136, $5137, $5138, $5139, $5140, $5141, $5142, $5143, $5144, $5145, $5146, $5147, $5148, $5149, $5150, $5151, $5152, $5153, $5154, $5155, $5156, $5157, $5158, VersionRange($5159, $5160)), ($5161, $5162, $5163, $5164, $5165, $5166, $5167, $5168, $5169, $5170, $5171, $5172, $5173, $5174, $5175, $5176, $5177, $5178, $5179, $5180, $5181, $5182, $5183, $5184, $5185, $5186, $5187, $5188, VersionRange($5189, $5190)), ($5191, $5192, $5193, $5194, $5195, $5196, $5197, $5198, $5199, $5200, $5201, $5202, $5203, $5204, $5205, $5206, $5207, $5208, $5209, $5210, $5211, $5212, $5213, $5214, $5215, $5216, $5217, $5218, VersionRange($5219, $5220)), ($5221, $5222, $5223, $5224, $5225, $5226, $5227, $5228, $5229, $5230, $5231, $5232, $5233, $5234, $5235, $5236, $5237, $5238, $5239, $5240, $5241, $5242, $5243, $5244, $5245, $5246, $5247, $5248, VersionRange($5249, $5250)), ($5251, $5252, $5253, $5254, $5255, $5256, $5257, $5258, $5259, $5260, $5261, $5262, $5263, $5264, $5265, $5266, $5267, $5268, $5269, $5270, $5271, $5272, $5273, $5274, $5275, $5276, $5277, $5278, VersionRange($5279, $5280)), ($5281, $5282, $5283, $5284, $5285, $5286, $5287, $5288, $5289, $5290, $5291, $5292, $5293, $5294, $5295, $5296, $5297, $5298, $5299, $5300, $5301, $5302, $5303, $5304, $5305, $5306, $5307, $5308, VersionRange($5309, $5310)), ($5311, $5312, $5313, $5314, $5315, $5316, $5317, $5318, $5319, $5320, $5321, $5322, $5323, $5324, $5325, $5326, $5327, $5328, $5329, $5330, $5331, $5332, $5333, $5334, $5335, $5336, $5337, $5338, VersionRange($5339, $5340)), ($5341, $5342, $5343, $5344, $5345, $5346, $5347, $5348, $5349, $5350, $5351, $5352, $5353, $5354, $5355, $5356, $5357, $5358, $5359, $5360, $5361, $5362, $5363, $5364, $5365, $5366, $5367, $5368, VersionRange($5369, $5370)), ($5371, $5372, $5373, $5374, $5375, $5376, $5377, $5378, $5379, $5380, $5381, $5382, $5383, $5384, $5385, $5386, $5387, $5388, $5389, $5390, $5391, $5392, $5393, $5394, $5395, $5396, $5397, $5398, VersionRange($5399, $5400)), ($5401, $5402, $5403, $5404, $5405, $5406, $5407, $5408, $5409, $5410, $5411, $5412, $5413, $5414, $5415, $5416, $5417, $5418, $5419, $5420, $5421, $5422, $5423, $5424, $5425, $5426, $5427, $5428, VersionRange($5429, $5430)), ($5431, $5432, $5433, $5434, $5435, $5436, $5437, $5438, $5439, $5440, $5441, $5442, $5443, $5444, $5445, $5446, $5447, $5448, $5449, $5450, $5451, $5452, $5453, $5454, $5455, $5456, $5457, $5458, VersionRange($5459, $5460)), ($5461, $5462, $5463, $5464, $5465, $5466, $5467, $5468, $5469, $5470, $5471, $5472, $5473, $5474, $5475, $5476, $5477, $5478, $5479, $5480, $5481, $5482, $5483, $5484, $5485, $5486, $5487, $5488, VersionRange($5489, $5490)), ($5491, $5492, $5493, $5494, $5495, $5496, $5497, $5498, $5499, $5500, $5501, $5502, $5503, $5504, $5505, $5506, $5507, $5508, $5509, $5510, $5511, $5512, $5513, $5514, $5515, $5516, $5517, $5518, VersionRange($5519, $5520)), ($5521, $5522, $5523, $5524, $5525, $5526, $5527, $5528, $5529, $5530, $5531, $5532, $5533, $5534, $5535, $5536, $5537, $5538, $5539, $5540, $5541, $5542, $5543, $5544, $5545, $5546, $5547, $5548, VersionRange($5549, $5550)), ($5551, $5552, $5553, $5554, $5555, $5556, $5557, $5558, $5559, $5560, $5561, $5562, $5563, $5564, $5565, $5566, $5567, $5568, $5569, $5570, $5571, $5572, $5573, $5574, $5575, $5576, $5577, $5578, VersionRange($5579, $5580)), ($5581, $5582, $5583, $5584, $5585, $5586, $5587, $5588, $5589, $5590, $5591, $5592, $5593, $5594, $5595, $5596, $5597, $5598, $5599, $5600, $5601, $5602, $5603, $5604, $5605, $5606, $5607, $5608, VersionRange($5609, $5610)), ($5611, $5612, $5613, $5614, $5615, $5616, $5617, $5618, $5619, $5620, $5621, $5622, $5623, $5624, $5625, $5626, $5627, $5628, $5629, $5630, $5631, $5632, $5633, $5634, $5635, $5636, $5637, $5638, VersionRange($5639, $5640)), ($5641, $5642, $5643, $5644, $5645, $5646, $5647, $5648, $5649, $5650, $5651, $5652, $5653, $5654, $5655, $5656, $5657, $5658, $5659, $5660, $5661, $5662, $5663, $5664, $5665, $5666, $5667, $5668, VersionRange($5669, $5670)), ($5671, $5672, $5673, $5674, $5675, $5676, $5677, $5678, $5679, $5680, $5681, $5682, $5683, $5684, $5685, $5686, $5687, $5688, $5689, $5690, $5691, $5692, $5693, $5694, $5695, $5696, $5697, $5698, VersionRange($5699, $5700)), ($5701, $5702, $5703, $5704, $5705, $5706, $5707, $5708, $5709, $5710, $5711, $5712, $5713, $5714, $5715, $5716, $5717, $5718, $5719, $5720, $5721, $5722, $5723, $5724, $5725, $5726, $5727, $5728, VersionRange($5729, $5730)), ($5731, $5732, $5733, $5734, $5735, $5736, $5737, $5738, $5739, $5740, $5741, $5742, $5743, $5744, $5745, $5746, $5747, $5748, $5749, $5750, $5751, $5752, $5753, $5754, $5755, $5756, $5757, $5758, VersionRange($5759, $5760)), ($5761, $5762, $5763, $5764, $5765, $5766, $5767, $5768, $5769, $5770, $5771, $5772, $5773, $5774, $5775, $5776, $5777, $5778, $5779, $5780, $5781, $5782, $5783, $5784, $5785, $5786, $5787, $5788, VersionRange($5789, $5790)), ($5791, $5792, $5793, $5794, $5795, $5796, $5797, $5798, $5799, $5800, $5801, $5802, $5803, $5804, $5805, $5806, $5807, $5808, $5809, $5810, $5811, $5812, $5813, $5814, $5815, $5816, $5817, $5818, VersionRange($5819, $5820)), ($5821, $5822, $5823, $5824, $5825, $5826, $5827, $5828, $5829, $5830, $5831, $5832, $5833, $5834, $5835, $5836, $5837, $5838, $5839, $5840, $5841, $5842, $5843, $5844, $5845, $5846, $5847, $5848, VersionRange($5849, $5850)), ($5851, $5852, $5853, $5854, $5855, $5856, $5857, $5858, $5859, $5860, $5861, $5862, $5863, $5864, $5865, $5866, $5867, $5868, $5869, $5870, $5871, $5872, $5873, $5874, $5875, $5876, $5877, $5878, VersionRange($5879, $5880)), ($5881, $5882, $5883, $5884, $5885, $5886, $5887, $5888, $5889, $5890, $5891, $5892, $5893, $5894, $5895, $5896, $5897, $5898, $5899, $5900, $5901, $5902, $5903, $5904, $5905, $5906, $5907, $5908, VersionRange($5909, $5910)), ($5911, $5912, $5913, $5914, $5915, $5916, $5917, $5918, $5919, $5920, $5921, $5922, $5923, $5924, $5925, $5926, $5927, $5928, $5929, $5930, $5931, $5932, $5933, $5934, $5935, $5936, $5937, $5938, VersionRange($5939, $5940)), ($5941, $5942, $5943, $5944, $5945, $5946, $5947, $5948, $5949, $5950, $5951, $5952, $5953, $5954, $5955, $5956, $5957, $5958, $5959, $5960, $5961, $5962, $5963, $5964, $5965, $5966, $5967, $5968, VersionRange($5969, $5970)), ($5971, $5972, $5973, $5974, $5975, $5976, $5977, $5978, $5979, $5980, $5981, $5982, $5983, $5984, $5985, $5986, $5987, $5988, $5989, $5990, $5991, $5992, $5993, $5994, $5995, $5996, $5997, $5998, VersionRange($5999, $6000)), ($6001, $6002, $6003, $6004, $6005, $6006, $6007, $6008, $6009, $6010, $6011, $6012, $6013, $6014, $6015, $6016, $6017, $6018, $6019, $6020, $6021, $6022, $6023, $6024, $6025, $6026, $6027, $6028, VersionRange($6029, $6030)), ($6031, $6032, $6033, $6034, $6035, $6036, $6037, $6038, $6039, $6040, $6041, $6042, $6043, $6044, $6045, $6046, $6047, $6048, $6049, $6050, $6051, $6052, $6053, $6054, $6055, $6056, $6057, $6058, VersionRange($6059, $6060)), ($6061, $6062, $6063, $6064, $6065, $6066, $6067, $6068, $6069, $6070, $6071, $6072, $6073, $6074, $6075, $6076, $6077, $6078, $6079, $6080, $6081, $6082, $6083, $6084, $6085, $6086, $6087, $6088, VersionRange($6089, $6090)), ($6091, $6092, $6093, $6094, $6095, $6096, $6097, $6098, $6099, $6100, $6101, $6102, $6103, $6104, $6105, $6106, $6107, $6108, $6109, $6110, $6111, $6112, $6113, $6114, $6115, $6116, $6117, $6118, VersionRange($6119, $6120)), ($6121, $6122, $6123, $6124, $6125, $6126, $6127, $6128, $6129, $6130, $6131, $6132, $6133, $6134, $6135, $6136, $6137, $6138, $6139, $6140, $6141, $6142, $6143, $6144, $6145, $6146, $6147, $6148, VersionRange($6149, $6150)), ($6151, $6152, $6153, $6154, $6155, $6156, $6157, $6158, $6159, $6160, $6161, $6162, $6163, $6164, $6165, $6166, $6167, $6168, $6169, $6170, $6171, $6172, $6173, $6174, $6175, $6176, $6177, $6178, VersionRange($6179, $6180)), ($6181, $6182, $6183, $6184, $6185, $6186, $6187, $6188, $6189, $6190, $6191, $6192, $6193, $6194, $6195, $6196, $6197, $6198, $6199, $6200, $6201, $6202, $6203, $6204, $6205, $6206, $6207, $6208, VersionRange($6209, $6210)), ($6211, $6212, $6213, $6214, $6215, $6216, $6217, $6218, $6219, $6220, $6221, $6222, $6223, $6224, $6225, $6226, $6227, $6228, $6229, $6230, $6231, $6232, $6233, $6234, $6235, $6236, $6237, $6238, VersionRange($6239, $6240)), ($6241, $6242, $6243, $6244, $6245, $6246, $6247, $6248, $6249, $6250, $6251, $6252, $6253, $6254, $6255, $6256, $6257, $6258, $6259, $6260, $6261, $6262, $6263, $6264, $6265, $6266, $6267, $6268, VersionRange($6269, $6270)), ($6271, $6272, $6273, $6274, $6275, $6276, $6277, $6278, $6279, $6280, $6281, $6282, $6283, $6284, $6285, $6286, $6287, $6288, $6289, $6290, $6291, $6292, $6293, $6294, $6295, $6296, $6297, $6298, VersionRange($6299, $6300)), ($6301, $6302, $6303, $6304, $6305, $6306, $6307, $6308, $6309, $6310, $6311, $6312, $6313, $6314, $6315, $6316, $6317, $6318, $6319, $6320, $6321, $6322, $6323, $6324, $6325, $6326, $6327, $6328, VersionRange($6329, $6330)), ($6331, $6332, $6333, $6334, $6335, $6336, $6337, $6338, $6339, $6340, $6341, $6342, $6343, $6344, $6345, $6346, $6347, $6348, $6349, $6350, $6351, $6352, $6353, $6354, $6355, $6356, $6357, $6358, VersionRange($6359, $6360)), ($6361, $6362, $6363, $6364, $6365, $6366, $6367, $6368, $6369, $6370, $6371, $6372, $6373, $6374, $6375, $6376, $6377, $6378, $6379, $6380, $6381, $6382, $6383, $6384, $6385, $6386, $6387, $6388, VersionRange($6389, $6390)), ($6391, $6392, $6393, $6394, $6395, $6396, $6397, $6398, $6399, $6400, $6401, $6402, $6403, $6404, $6405, $6406, $6407, $6408, $6409, $6410, $6411, $6412, $6413, $6414, $6415, $6416, $6417, $6418, VersionRange($6419, $6420)), ($6421, $6422, $6423, $6424, $6425, $6426, $6427, $6428, $6429, $6430, $6431, $6432, $6433, $6434, $6435, $6436, $6437, $6438, $6439, $6440, $6441, $6442, $6443, $6444, $6445, $6446, $6447, $6448, VersionRange($6449, $6450)), ($6451, $6452, $6453, $6454, $6455, $6456, $6457, $6458, $6459, $6460, $6461, $6462, $6463, $6464, $6465, $6466, $6467, $6468, $6469, $6470, $6471, $6472, $6473, $6474, $6475, $6476, $6477, $6478, VersionRange($6479, $6480)), ($6481, $6482, $6483, $6484, $6485, $6486, $6487, $6488, $6489, $6490, $6491, $6492, $6493, $6494, $6495, $6496, $6497, $6498, $6499, $6500, $6501, $6502, $6503, $6504, $6505, $6506, $6507, $6508, VersionRange($6509, $6510)), ($6511, $6512, $6513, $6514, $6515, $6516, $6517, $6518, $6519, $6520, $6521, $6522, $6523, $6524, $6525, $6526, $6527, $6528, $6529, $6530, $6531, $6532, $6533, $6534, $6535, $6536, $6537, $6538, VersionRange($6539, $6540)), ($6541, $6542, $6543, $6544, $6545, $6546, $6547, $6548, $6549, $6550, $6551, $6552, $6553, $6554, $6555, $6556, $6557, $6558, $6559, $6560, $6561, $6562, $6563, $6564, $6565, $6566, $6567, $6568, VersionRange($6569, $6570)), ($6571, $6572, $6573, $6574, $6575, $6576, $6577, $6578, $6579, $6580, $6581, $6582, $6583, $6584, $6585, $6586, $6587, $6588, $6589, $6590, $6591, $6592, $6593, $6594, $6595, $6596, $6597, $6598, VersionRange($6599, $6600)), ($6601, $6602, $6603, $6604, $6605, $6606, $6607, $6608, $6609, $6610, $6611, $6612, $6613, $6614, $6615, $6616, $6617, $6618, $6619, $6620, $6621, $6622, $6623, $6624, $6625, $6626, $6627, $6628, VersionRange($6629, $6630)), ($6631, $6632, $6633, $6634, $6635, $6636, $6637, $6638, $6639, $6640, $6641, $6642, $6643, $6644, $6645, $6646, $6647, $6648, $6649, $6650, $6651, $6652, $6653, $6654, $6655, $6656, $6657, $6658, VersionRange($6659, $6660)), ($6661, $6662, $6663, $6664, $6665, $6666, $6667, $6668, $6669, $6670, $6671, $6672, $6673, $6674, $6675, $6676, $6677, $6678, $6679, $6680, $6681, $6682, $6683, $6684, $6685, $6686, $6687, $6688, VersionRange($6689, $6690)), ($6691, $6692, $6693, $6694, $6695, $6696, $6697, $6698, $6699, $6700, $6701, $6702, $6703, $6704, $6705, $6706, $6707, $6708, $6709, $6710, $6711, $6712, $6713, $6714, $6715, $6716, $6717, $6718, VersionRange($6719, $6720)), ($6721, $6722, $6723, $6724, $6725, $6726, $6727, $6728, $6729, $6730, $6731, $6732, $6733, $6734, $6735, $6736, $6737, $6738, $6739, $6740, $6741, $6742, $6743, $6744, $6745, $6746, $6747, $6748, VersionRange($6749, $6750)), ($6751, $6752, $6753, $6754, $6755, $6756, $6757, $6758, $6759, $6760, $6761, $6762, $6763, $6764, $6765, $6766, $6767, $6768, $6769, $6770, $6771, $6772, $6773, $6774, $6775, $6776, $6777, $6778, VersionRange($6779, $6780)), ($6781, $6782, $6783, $6784, $6785, $6786, $6787, $6788, $6789, $6790, $6791, $6792, $6793, $6794, $6795, $6796, $6797, $6798, $6799, $6800, $6801, $6802, $6803, $6804, $6805, $6806, $6807, $6808, VersionRange($6809, $6810)), ($6811, $6812, $6813, $6814, $6815, $6816, $6817, $6818, $6819, $6820, $6821, $6822, $6823, $6824, $6825, $6826, $6827, $6828, $6829, $6830, $6831, $6832, $6833, $6834, $6835, $6836, $6837, $6838, VersionRange($6839, $6840)), ($6841, $6842, $6843, $6844, $6845, $6846, $6847, $6848, $6849, $6850, $6851, $6852, $6853, $6854, $6855, $6856, $6857, $6858, $6859, $6860, $6861, $6862, $6863, $6864, $6865, $6866, $6867, $6868, VersionRange($6869, $6870)), ($6871, $6872, $6873, $6874, $6875, $6876, $6877, $6878, $6879, $6880, $6881, $6882, $6883, $6884, $6885, $6886, $6887, $6888, $6889, $6890, $6891, $6892, $6893, $6894, $6895, $6896, $6897, $6898, VersionRange($6899, $6900)), ($6901, $6902, $6903, $6904, $6905, $6906, $6907, $6908, $6909, $6910, $6911, $6912, $6913, $6914, $6915, $6916, $6917, $6918, $6919, $6920, $6921, $6922, $6923, $6924, $6925, $6926, $6927, $6928, VersionRange($6929, $6930)), ($6931, $6932, $6933, $6934, $6935, $6936, $6937, $6938, $6939, $6940, $6941, $6942, $6943, $6944, $6945, $6946, $6947, $6948, $6949, $6950, $6951, $6952, $6953, $6954, $6955, $6956, $6957, $6958, VersionRange($6959, $6960)), ($6961, $6962, $6963, $6964, $6965, $6966, $6967, $6968, $6969, $6970, $6971, $6972, $6973, $6974, $6975, $6976, $6977, $6978, $6979, $6980, $6981, $6982, $6983, $6984, $6985, $6986, $6987, $6988, VersionRange($6989, $6990)), ($6991, $6992, $6993, $6994, $6995, $6996, $6997, $6998, $6999, $7000, $7001, $7002, $7003, $7004, $7005, $7006, $7007, $7008, $7009, $7010, $7011, $7012, $7013, $7014, $7015, $7016, $7017, $7018, VersionRange($7019, $7020)), ($7021, $7022, $7023, $7024, $7025, $7026, $7027, $7028, $7029, $7030, $7031, $7032, $7033, $7034, $7035, $7036, $7037, $7038, $7039, $7040, $7041, $7042, $7043, $7044, $7045, $7046, $7047, $7048, VersionRange($7049, $7050)), ($7051, $7052, $7053, $7054, $7055, $7056, $7057, $7058, $7059, $7060, $7061, $7062, $7063, $7064, $7065, $7066, $7067, $7068, $7069, $7070, $7071, $7072, $7073, $7074, $7075, $7076, $7077, $7078, VersionRange($7079, $7080)), ($7081, $7082, $7083, $7084, $7085, $7086, $7087, $7088, $7089, $7090, $7091, $7092, $7093, $7094, $7095, $7096, $7097, $7098, $7099, $7100, $7101, $7102, $7103, $7104, $7105, $7106, $7107, $7108, VersionRange($7109, $7110)), ($7111, $7112, $7113, $7114, $7115, $7116, $7117, $7118, $7119, $7120, $7121, $7122, $7123, $7124, $7125, $7126, $7127, $7128, $7129, $7130, $7131, $7132, $7133, $7134, $7135, $7136, $7137, $7138, VersionRange($7139, $7140)), ($7141, $7142, $7143, $7144, $7145, $7146, $7147, $7148, $7149, $7150, $7151, $7152, $7153, $7154, $7155, $7156, $7157, $7158, $7159, $7160, $7161, $7162, $7163, $7164, $7165, $7166, $7167, $7168, VersionRange($7169, $7170)), ($7171, $7172, $7173, $7174, $7175, $7176, $7177, $7178, $7179, $7180, $7181, $7182, $7183, $7184, $7185, $7186, $7187, $7188, $7189, $7190, $7191, $7192, $7193, $7194, $7195, $7196, $7197, $7198, VersionRange($7199, $7200)), ($7201, $7202, $7203, $7204, $7205, $7206, $7207, $7208, $7209, $7210, $7211, $7212, $7213, $7214, $7215, $7216, $7217, $7218, $7219, $7220, $7221, $7222, $7223, $7224, $7225, $7226, $7227, $7228, VersionRange($7229, $7230)), ($7231, $7232, $7233, $7234, $7235, $7236, $7237, $7238, $7239, $7240, $7241, $7242, $7243, $7244, $7245, $7246, $7247, $7248, $7249, $7250, $7251, $7252, $7253, $7254, $7255, $7256, $7257, $7258, VersionRange($7259, $7260)), ($7261, $7262, $7263, $7264, $7265, $7266, $7267, $7268, $7269, $7270, $7271, $7272, $7273, $7274, $7275, $7276, $7277, $7278, $7279, $7280, $7281, $7282, $7283, $7284, $7285, $7286, $7287, $7288, VersionRange($7289, $7290)), ($7291, $7292, $7293, $7294, $7295, $7296, $7297, $7298, $7299, $7300, $7301, $7302, $7303, $7304, $7305, $7306, $7307, $7308, $7309, $7310, $7311, $7312, $7313, $7314, $7315, $7316, $7317, $7318, VersionRange($7319, $7320)), ($7321, $7322, $7323, $7324, $7325, $7326, $7327, $7328, $7329, $7330, $7331, $7332, $7333, $7334, $7335, $7336, $7337, $7338, $7339, $7340, $7341, $7342, $7343, $7344, $7345, $7346, $7347, $7348, VersionRange($7349, $7350)), ($7351, $7352, $7353, $7354, $7355, $7356, $7357, $7358, $7359, $7360, $7361, $7362, $7363, $7364, $7365, $7366, $7367, $7368, $7369, $7370, $7371, $7372, $7373, $7374, $7375, $7376, $7377, $7378, VersionRange($7379, $7380)), ($7381, $7382, $7383, $7384, $7385, $7386, $7387, $7388, $7389, $7390, $7391, $7392, $7393, $7394, $7395, $7396, $7397, $7398, $7399, $7400, $7401, $7402, $7403, $7404, $7405, $7406, $7407, $7408, VersionRange($7409, $7410)), ($7411, $7412, $7413, $7414, $7415, $7416, $7417, $7418, $7419, $7420, $7421, $7422, $7423, $7424, $7425, $7426, $7427, $7428, $7429, $7430, $7431, $7432, $7433, $7434, $7435, $7436, $7437, $7438, VersionRange($7439, $7440)), ($7441, $7442, $7443, $7444, $7445, $7446, $7447, $7448, $7449, $7450, $7451, $7452, $7453, $7454, $7455, $7456, $7457, $7458, $7459, $7460, $7461, $7462, $7463, $7464, $7465, $7466, $7467, $7468, VersionRange($7469, $7470)), ($7471, $7472, $7473, $7474, $7475, $7476, $7477, $7478, $7479, $7480, $7481, $7482, $7483, $7484, $7485, $7486, $7487, $7488, $7489, $7490, $7491, $7492, $7493, $7494, $7495, $7496, $7497, $7498, VersionRange($7499, $7500)), ($7501, $7502, $7503, $7504, $7505, $7506, $7507, $7508, $7509, $7510, $7511, $7512, $7513, $7514, $7515, $7516, $7517, $7518, $7519, $7520, $7521, $7522, $7523, $7524, $7525, $7526, $7527, $7528, VersionRange($7529, $7530)), ($7531, $7532, $7533, $7534, $7535, $7536, $7537, $7538, $7539, $7540, $7541, $7542, $7543, $7544, $7545, $7546, $7547, $7548, $7549, $7550, $7551, $7552, $7553, $7554, $7555, $7556, $7557, $7558, VersionRange($7559, $7560)), ($7561, $7562, $7563, $7564, $7565, $7566, $7567, $7568, $7569, $7570, $7571, $7572, $7573, $7574, $7575, $7576, $7577, $7578, $7579, $7580, $7581, $7582, $7583, $7584, $7585, $7586, $7587, $7588, VersionRange($7589, $7590)), ($7591, $7592, $7593, $7594, $7595, $7596, $7597, $7598, $7599, $7600, $7601, $7602, $7603, $7604, $7605, $7606, $7607, $7608, $7609, $7610, $7611, $7612, $7613, $7614, $7615, $7616, $7617, $7618, VersionRange($7619, $7620)), ($7621, $7622, $7623, $7624, $7625, $7626, $7627, $7628, $7629, $7630, $7631, $7632, $7633, $7634, $7635, $7636, $7637, $7638, $7639, $7640, $7641, $7642, $7643, $7644, $7645, $7646, $7647, $7648, VersionRange($7649, $7650)), ($7651, $7652, $7653, $7654, $7655, $7656, $7657, $7658, $7659, $7660, $7661, $7662, $7663, $7664, $7665, $7666, $7667, $7668, $7669, $7670, $7671, $7672, $7673, $7674, $7675, $7676, $7677, $7678, VersionRange($7679, $7680)), ($7681, $7682, $7683, $7684, $7685, $7686, $7687, $7688, $7689, $7690, $7691, $7692, $7693, $7694, $7695, $7696, $7697, $7698, $7699, $7700, $7701, $7702, $7703, $7704, $7705, $7706, $7707, $7708, VersionRange($7709, $7710)), ($7711, $7712, $7713, $7714, $7715, $7716, $7717, $7718, $7719, $7720, $7721, $7722, $7723, $7724, $7725, $7726, $7727, $7728, $7729, $7730, $7731, $7732, $7733, $7734, $7735, $7736, $7737, $7738, VersionRange($7739, $7740)), ($7741, $7742, $7743, $7744, $7745, $7746, $7747, $7748, $7749, $7750, $7751, $7752, $7753, $7754, $7755, $7756, $7757, $7758, $7759, $7760, $7761, $7762, $7763, $7764, $7765, $7766, $7767, $7768, VersionRange($7769, $7770)), ($7771, $7772, $7773, $7774, $7775, $7776, $7777, $7778, $7779, $7780, $7781, $7782, $7783, $7784, $7785, $7786, $7787, $7788, $7789, $7790, $7791, $7792, $7793, $7794, $7795, $7796, $7797, $7798, VersionRange($7799, $7800)), ($7801, $7802, $7803, $7804, $7805, $7806, $7807, $7808, $7809, $7810, $7811, $7812, $7813, $7814, $7815, $7816, $7817, $7818, $7819, $7820, $7821, $7822, $7823, $7824, $7825, $7826, $7827, $7828, VersionRange($7829, $7830)), ($7831, $7832, $7833, $7834, $7835, $7836, $7837, $7838, $7839, $7840, $7841, $7842, $7843, $7844, $7845, $7846, $7847, $7848, $7849, $7850, $7851, $7852, $7853, $7854, $7855, $7856, $7857, $7858, VersionRange($7859, $7860)), ($7861, $7862, $7863, $7864, $7865, $7866, $7867, $7868, $7869, $7870, $7871, $7872, $7873, $7874, $7875, $7876, $7877, $7878, $7879, $7880, $7881, $7882, $7883, $7884, $7885, $7886, $7887, $7888, VersionRange($7889, $7890)), ($7891, $7892, $7893, $7894, $7895, $7896, $7897, $7898, $7899, $7900, $7901, $7902, $7903, $7904, $7905, $7906, $7907, $7908, $7909, $7910, $7911, $7912, $7913, $7914, $7915, $7916, $7917, $7918, VersionRange($7919, $7920)), ($7921, $7922, $7923, $7924, $7925, $7926, $7927, $7928, $7929, $7930, $7931, $7932, $7933, $7934, $7935, $7936, $7937, $7938, $7939, $7940, $7941, $7942, $7943, $7944, $7945, $7946, $7947, $7948, VersionRange($7949, $7950)), ($7951, $7952, $7953, $7954, $7955, $7956, $7957, $7958, $7959, $7960, $7961, $7962, $7963, $7964, $7965, $7966, $7967, $7968, $7969, $7970, $7971, $7972, $7973, $7974, $7975, $7976, $7977, $7978, VersionRange($7979, $7980)), ($7981, $7982, $7983, $7984, $7985, $7986, $7987, $7988, $7989, $7990, $7991, $7992, $7993, $7994, $7995, $7996, $7997, $7998, $7999, $8000, $8001, $8002, $8003, $8004, $8005, $8006, $8007, $8008, VersionRange($8009, $8010)), ($8011, $8012, $8013, $8014, $8015, $8016, $8017, $8018, $8019, $8020, $8021, $8022, $8023, $8024, $8025, $8026, $8027, $8028, $8029, $8030, $8031, $8032, $8033, $8034, $8035, $8036, $8037, $8038, VersionRange($8039, $8040)), ($8041, $8042, $8043, $8044, $8045, $8046, $8047, $8048, $8049, $8050, $8051, $8052, $8053, $8054, $8055, $8056, $8057, $8058, $8059, $8060, $8061, $8062, $8063, $8064, $8065, $8066, $8067, $8068, VersionRange($8069, $8070)), ($8071, $8072, $8073, $8074, $8075, $8076, $8077, $8078, $8079, $8080, $8081, $8082, $8083, $8084, $8085, $8086, $8087, $8088, $8089, $8090, $8091, $8092, $8093, $8094, $8095, $8096, $8097, $8098, VersionRange($8099, $8100)), ($8101, $8102, $8103, $8104, $8105, $8106, $8107, $8108, $8109, $8110, $8111, $8112, $8113, $8114, $8115, $8116, $8117, $8118, $8119, $8120, $8121, $8122, $8123, $8124, $8125, $8126, $8127, $8128, VersionRange($8129, $8130)), ($8131, $8132, $8133, $8134, $8135, $8136, $8137, $8138, $8139, $8140, $8141, $8142, $8143, $8144, $8145, $8146, $8147, $8148, $8149, $8150, $8151, $8152, $8153, $8154, $8155, $8156, $8157, $8158, VersionRange($8159, $8160)), ($8161, $8162, $8163, $8164, $8165, $8166, $8167, $8168, $8169, $8170, $8171, $8172, $8173, $8174, $8175, $8176, $8177, $8178, $8179, $8180, $8181, $8182, $8183, $8184, $8185, $8186, $8187, $8188, VersionRange($8189, $8190)), ($8191, $8192, $8193, $8194, $8195, $8196, $8197, $8198, $8199, $8200, $8201, $8202, $8203, $8204, $8205, $8206, $8207, $8208, $8209, $8210, $8211, $8212, $8213, $8214, $8215, $8216, $8217, $8218, VersionRange($8219, $8220)), ($8221, $8222, $8223, $8224, $8225, $8226, $8227, $8228, $8229, $8230, $8231, $8232, $8233, $8234, $8235, $8236, $8237, $8238, $8239, $8240, $8241, $8242, $8243, $8244, $8245, $8246, $8247, $8248, VersionRange($8249, $8250)), ($8251, $8252, $8253, $8254, $8255, $8256, $8257, $8258, $8259, $8260, $8261, $8262, $8263, $8264, $8265, $8266, $8267, $8268, $8269, $8270, $8271, $8272, $8273, $8274, $8275, $8276, $8277, $8278, VersionRange($8279, $8280)), ($8281, $8282, $8283, $8284, $8285, $8286, $8287, $8288, $8289, $8290, $8291, $8292, $8293, $8294, $8295, $8296, $8297, $8298, $8299, $8300, $8301, $8302, $8303, $8304, $8305, $8306, $8307, $8308, VersionRange($8309, $8310)), ($8311, $8312, $8313, $8314, $8315, $8316, $8317, $8318, $8319, $8320, $8321, $8322, $8323, $8324, $8325, $8326, $8327, $8328, $8329, $8330, $8331, $8332, $8333, $8334, $8335, $8336, $8337, $8338, VersionRange($8339, $8340)), ($8341, $8342, $8343, $8344, $8345, $8346, $8347, $8348, $8349, $8350, $8351, $8352, $8353, $8354, $8355, $8356, $8357, $8358, $8359, $8360, $8361, $8362, $8363, $8364, $8365, $8366, $8367, $8368, VersionRange($8369, $8370)), ($8371, $8372, $8373, $8374, $8375, $8376, $8377, $8378, $8379, $8380, $8381, $8382, $8383, $8384, $8385, $8386, $8387, $8388, $8389, $8390, $8391, $8392, $8393, $8394, $8395, $8396, $8397, $8398, VersionRange($8399, $8400)), ($8401, $8402, $8403, $8404, $8405, $8406, $8407, $8408, $8409, $8410, $8411, $8412, $8413, $8414, $8415, $8416, $8417, $8418, $8419, $8420, $8421, $8422, $8423, $8424, $8425, $8426, $8427, $8428, VersionRange($8429, $8430)), ($8431, $8432, $8433, $8434, $8435, $8436, $8437, $8438, $8439, $8440, $8441, $8442, $8443, $8444, $8445, $8446, $8447, $8448, $8449, $8450, $8451, $8452, $8453, $8454, $8455, $8456, $8457, $8458, VersionRange($8459, $8460)), ($8461, $8462, $8463, $8464, $8465, $8466, $8467, $8468, $8469, $8470, $8471, $8472, $8473, $8474, $8475, $8476, $8477, $8478, $8479, $8480, $8481, $8482, $8483, $8484, $8485, $8486, $8487, $8488, VersionRange($8489, $8490)), ($8491, $8492, $8493, $8494, $8495, $8496, $8497, $8498, $8499, $8500, $8501, $8502, $8503, $8504, $8505, $8506, $8507, $8508, $8509, $8510, $8511, $8512, $8513, $8514, $8515, $8516, $8517, $8518, VersionRange($8519, $8520)), ($8521, $8522, $8523, $8524, $8525, $8526, $8527, $8528, $8529, $8530, $8531, $8532, $8533, $8534, $8535, $8536, $8537, $8538, $8539, $8540, $8541, $8542, $8543, $8544, $8545, $8546, $8547, $8548, VersionRange($8549, $8550)), ($8551, $8552, $8553, $8554, $8555, $8556, $8557, $8558, $8559, $8560, $8561, $8562, $8563, $8564, $8565, $8566, $8567, $8568, $8569, $8570, $8571, $8572, $8573, $8574, $8575, $8576, $8577, $8578, VersionRange($8579, $8580)), ($8581, $8582, $8583, $8584, $8585, $8586, $8587, $8588, $8589, $8590, $8591, $8592, $8593, $8594, $8595, $8596, $8597, $8598, $8599, $8600, $8601, $8602, $8603, $8604, $8605, $8606, $8607, $8608, VersionRange($8609, $8610)), ($8611, $8612, $8613, $8614, $8615, $8616, $8617, $8618, $8619, $8620, $8621, $8622, $8623, $8624, $8625, $8626, $8627, $8628, $8629, $8630, $8631, $8632, $8633, $8634, $8635, $8636, $8637, $8638, VersionRange($8639, $8640)), ($8641, $8642, $8643, $8644, $8645, $8646, $8647, $8648, $8649, $8650, $8651, $8652, $8653, $8654, $8655, $8656, $8657, $8658, $8659, $8660, $8661, $8662, $8663, $8664, $8665, $8666, $8667, $8668, VersionRange($8669, $8670)), ($8671, $8672, $8673, $8674, $8675, $8676, $8677, $8678, $8679, $8680, $8681, $8682, $8683, $8684, $8685, $8686, $8687, $8688, $8689, $8690, $8691, $8692, $8693, $8694, $8695, $8696, $8697, $8698, VersionRange($8699, $8700)), ($8701, $8702, $8703, $8704, $8705, $8706, $8707, $8708, $8709, $8710, $8711, $8712, $8713, $8714, $8715, $8716, $8717, $8718, $8719, $8720, $8721, $8722, $8723, $8724, $8725, $8726, $8727, $8728, VersionRange($8729, $8730)), ($8731, $8732, $8733, $8734, $8735, $8736, $8737, $8738, $8739, $8740, $8741, $8742, $8743, $8744, $8745, $8746, $8747, $8748, $8749, $8750, $8751, $8752, $8753, $8754, $8755, $8756, $8757, $8758, VersionRange($8759, $8760)), ($8761, $8762, $8763, $8764, $8765, $8766, $8767, $8768, $8769, $8770, $8771, $8772, $8773, $8774, $8775, $8776, $8777, $8778, $8779, $8780, $8781, $8782, $8783, $8784, $8785, $8786, $8787, $8788, VersionRange($8789, $8790)), ($8791, $8792, $8793, $8794, $8795, $8796, $8797, $8798, $8799, $8800, $8801, $8802, $8803, $8804, $8805, $8806, $8807, $8808, $8809, $8810, $8811, $8812, $8813, $8814, $8815, $8816, $8817, $8818, VersionRange($8819, $8820)), ($8821, $8822, $8823, $8824, $8825, $8826, $8827, $8828, $8829, $8830, $8831, $8832, $8833, $8834, $8835, $8836, $8837, $8838, $8839, $8840, $8841, $8842, $8843, $8844, $8845, $8846, $8847, $8848, VersionRange($8849, $8850)), ($8851, $8852, $8853, $8854, $8855, $8856, $8857, $8858, $8859, $8860, $8861, $8862, $8863, $8864, $8865, $8866, $8867, $8868, $8869, $8870, $8871, $8872, $8873, $8874, $8875, $8876, $8877, $8878, VersionRange($8879, $8880)), ($8881, $8882, $8883, $8884, $8885, $8886, $8887, $8888, $8889, $8890, $8891, $8892, $8893, $8894, $8895, $8896, $8897, $8898, $8899, $8900, $8901, $8902, $8903, $8904, $8905, $8906, $8907, $8908, VersionRange($8909, $8910)), ($8911, $8912, $8913, $8914, $8915, $8916, $8917, $8918, $8919, $8920, $8921, $8922, $8923, $8924, $8925, $8926, $8927, $8928, $8929, $8930, $8931, $8932, $8933, $8934, $8935, $8936, $8937, $8938, VersionRange($8939, $8940)), ($8941, $8942, $8943, $8944, $8945, $8946, $8947, $8948, $8949, $8950, $8951, $8952, $8953, $8954, $8955, $8956, $8957, $8958, $8959, $8960, $8961, $8962, $8963, $8964, $8965, $8966, $8967, $8968, VersionRange($8969, $8970)), ($8971, $8972, $8973, $8974, $8975, $8976, $8977, $8978, $8979, $8980, $8981, $8982, $8983, $8984, $8985, $8986, $8987, $8988, $8989, $8990, $8991, $8992, $8993, $8994, $8995, $8996, $8997, $8998, VersionRange($8999, $9000)), ($9001, $9002, $9003, $9004, $9005, $9006, $9007, $9008, $9009, $9010, $9011, $9012, $9013, $9014, $9015, $9016, $9017, $9018, $9019, $9020, $9021, $9022, $9023, $9024, $9025, $9026, $9027, $9028, VersionRange($9029, $9030)), ($9031, $9032, $9033, $9034, $9035, $9036, $9037, $9038, $9039, $9040, $9041, $9042, $9043, $9044, $9045, $9046, $9047, $9048, $9049, $9050, $9051, $9052, $9053, $9054, $9055, $9056, $9057, $9058, VersionRange($9059, $9060)), ($9061, $9062, $9063, $9064, $9065, $9066, $9067, $9068, $9069, $9070, $9071, $9072, $9073, $9074, $9075, $9076, $9077, $9078, $9079, $9080, $9081, $9082, $9083, $9084, $9085, $9086, $9087, $9088, VersionRange($9089, $9090)), ($9091, $9092, $9093, $9094, $9095, $9096, $9097, $9098, $9099, $9100, $9101, $9102, $9103, $9104, $9105, $9106, $9107, $9108, $9109, $9110, $9111, $9112, $9113, $9114, $9115, $9116, $9117, $9118, VersionRange($9119, $9120)), ($9121, $9122, $9123, $9124, $9125, $9126, $9127, $9128, $9129, $9130, $9131, $9132, $9133, $9134, $9135, $9136, $9137, $9138, $9139, $9140, $9141, $9142, $9143, $9144, $9145, $9146, $9147, $9148, VersionRange($9149, $9150)), ($9151, $9152, $9153, $9154, $9155, $9156, $9157, $9158, $9159, $9160, $9161, $9162, $9163, $9164, $9165, $9166, $9167, $9168, $9169, $9170, $9171, $9172, $9173, $9174, $9175, $9176, $9177, $9178, VersionRange($9179, $9180)), ($9181, $9182, $9183, $9184, $9185, $9186, $9187, $9188, $9189, $9190, $9191, $9192, $9193, $9194, $9195, $9196, $9197, $9198, $9199, $9200, $9201, $9202, $9203, $9204, $9205, $9206, $9207, $9208, VersionRange($9209, $9210)), ($9211, $9212, $9213, $9214, $9215, $9216, $9217, $9218, $9219, $9220, $9221, $9222, $9223, $9224, $9225, $9226, $9227, $9228, $9229, $9230, $9231, $9232, $9233, $9234, $9235, $9236, $9237, $9238, VersionRange($9239, $9240)), ($9241, $9242, $9243, $9244, $9245, $9246, $9247, $9248, $9249, $9250, $9251, $9252, $9253, $9254, $9255, $9256, $9257, $9258, $9259, $9260, $9261, $9262, $9263, $9264, $9265, $9266, $9267, $9268, VersionRange($9269, $9270)), ($9271, $9272, $9273, $9274, $9275, $9276, $9277, $9278, $9279, $9280, $9281, $9282, $9283, $9284, $9285, $9286, $9287, $9288, $9289, $9290, $9291, $9292, $9293, $9294, $9295, $9296, $9297, $9298, VersionRange($9299, $9300)), ($9301, $9302, $9303, $9304, $9305, $9306, $9307, $9308, $9309, $9310, $9311, $9312, $9313, $9314, $9315, $9316, $9317, $9318, $9319, $9320, $9321, $9322, $9323, $9324, $9325, $9326, $9327, $9328, VersionRange($9329, $9330)), ($9331, $9332, $9333, $9334, $9335, $9336, $9337, $9338, $9339, $9340, $9341, $9342, $9343, $9344, $9345, $9346, $9347, $9348, $9349, $9350, $9351, $9352, $9353, $9354, $9355, $9356, $9357, $9358, VersionRange($9359, $9360)), ($9361, $9362, $9363, $9364, $9365, $9366, $9367, $9368, $9369, $9370, $9371, $9372, $9373, $9374, $9375, $9376, $9377, $9378, $9379, $9380, $9381, $9382, $9383, $9384, $9385, $9386, $9387, $9388, VersionRange($9389, $9390)), ($9391, $9392, $9393, $9394, $9395, $9396, $9397, $9398, $9399, $9400, $9401, $9402, $9403, $9404, $9405, $9406, $9407, $9408, $9409, $9410, $9411, $9412, $9413, $9414, $9415, $9416, $9417, $9418, VersionRange($9419, $9420)), ($9421, $9422, $9423, $9424, $9425, $9426, $9427, $9428, $9429, $9430, $9431, $9432, $9433, $9434, $9435, $9436, $9437, $9438, $9439, $9440, $9441, $9442, $9443, $9444, $9445, $9446, $9447, $9448, VersionRange($9449, $9450)), ($9451, $9452, $9453, $9454, $9455, $9456, $9457, $9458, $9459, $9460, $9461, $9462, $9463, $9464, $9465, $9466, $9467, $9468, $9469, $9470, $9471, $9472, $9473, $9474, $9475, $9476, $9477, $9478, VersionRange($9479, $9480)), ($9481, $9482, $9483, $9484, $9485, $9486, $9487, $9488, $9489, $9490, $9491, $9492, $9493, $9494, $9495, $9496, $9497, $9498, $9499, $9500, $9501, $9502, $9503, $9504, $9505, $9506, $9507, $9508, VersionRange($9509, $9510)), ($9511, $9512, $9513, $9514, $9515, $9516, $9517, $9518, $9519, $9520, $9521, $9522, $9523, $9524, $9525, $9526, $9527, $9528, $9529, $9530, $9531, $9532, $9533, $9534, $9535, $9536, $9537, $9538, VersionRange($9539, $9540)), ($9541, $9542, $9543, $9544, $9545, $9546, $9547, $9548, $9549, $9550, $9551, $9552, $9553, $9554, $9555, $9556, $9557, $9558, $9559, $9560, $9561, $9562, $9563, $9564, $9565, $9566, $9567, $9568, VersionRange($9569, $9570)), ($9571, $9572, $9573, $9574, $9575, $9576, $9577, $9578, $9579, $9580, $9581, $9582, $9583, $9584, $9585, $9586, $9587, $9588, $9589, $9590, $9591, $9592, $9593, $9594, $9595, $9596, $9597, $9598, VersionRange($9599, $9600)), ($9601, $9602, $9603, $9604, $9605, $9606, $9607, $9608, $9609, $9610, $9611, $9612, $9613, $9614, $9615, $9616, $9617, $9618, $9619, $9620, $9621, $9622, $9623, $9624, $9625, $9626, $9627, $9628, VersionRange($9629, $9630)), ($9631, $9632, $9633, $9634, $9635, $9636, $9637, $9638, $9639, $9640, $9641, $9642, $9643, $9644, $9645, $9646, $9647, $9648, $9649, $9650, $9651, $9652, $9653, $9654, $9655, $9656, $9657, $9658, VersionRange($9659, $9660)), ($9661, $9662, $9663, $9664, $9665, $9666, $9667, $9668, $9669, $9670, $9671, $9672, $9673, $9674, $9675, $9676, $9677, $9678, $9679, $9680, $9681, $9682, $9683, $9684, $9685, $9686, $9687, $9688, VersionRange($9689, $9690)), ($9691, $9692, $9693, $9694, $9695, $9696, $9697, $9698, $9699, $9700, $9701, $9702, $9703, $9704, $9705, $9706, $9707, $9708, $9709, $9710, $9711, $9712, $9713, $9714, $9715, $9716, $9717, $9718, VersionRange($9719, $9720)), ($9721, $9722, $9723, $9724, $9725, $9726, $9727, $9728, $9729, $9730, $9731, $9732, $9733, $9734, $9735, $9736, $9737, $9738, $9739, $9740, $9741, $9742, $9743, $9744, $9745, $9746, $9747, $9748, VersionRange($9749, $9750)), ($9751, $9752, $9753, $9754, $9755, $9756, $9757, $9758, $9759, $9760, $9761, $9762, $9763, $9764, $9765, $9766, $9767, $9768, $9769, $9770, $9771, $9772, $9773, $9774, $9775, $9776, $9777, $9778, VersionRange($9779, $9780)), ($9781, $9782, $9783, $9784, $9785, $9786, $9787, $9788, $9789, $9790, $9791, $9792, $9793, $9794, $9795, $9796, $9797, $9798, $9799, $9800, $9801, $9802, $9803, $9804, $9805, $9806, $9807, $9808, VersionRange($9809, $9810)), ($9811, $9812, $9813, $9814, $9815, $9816, $9817, $9818, $9819, $9820, $9821, $9822, $9823, $9824, $9825, $9826, $9827, $9828, $9829, $9830, $9831, $9832, $9833, $9834, $9835, $9836, $9837, $9838, VersionRange($9839, $9840)), ($9841, $9842, $9843, $9844, $9845, $9846, $9847, $9848, $9849, $9850, $9851, $9852, $9853, $9854, $9855, $9856, $9857, $9858, $9859, $9860, $9861, $9862, $9863, $9864, $9865, $9866, $9867, $9868, VersionRange($9869, $9870)), ($9871, $9872, $9873, $9874, $9875, $9876, $9877, $9878, $9879, $9880, $9881, $9882, $9883, $9884, $9885, $9886, $9887, $9888, $9889, $9890, $9891, $9892, $9893, $9894, $9895, $9896, $9897, $9898, VersionRange($9899, $9900)), ($9901, $9902, $9903, $9904, $9905, $9906, $9907, $9908, $9909, $9910, $9911, $9912, $9913, $9914, $9915, $9916, $9917, $9918, $9919, $9920, $9921, $9922, $9923, $9924, $9925, $9926, $9927, $9928, VersionRange($9929, $9930)), ($9931, $9932, $9933, $9934, $9935, $9936, $9937, $9938, $9939, $9940, $9941, $9942, $9943, $9944, $9945, $9946, $9947, $9948, $9949, $9950, $9951, $9952, $9953, $9954, $9955, $9956, $9957, $9958, VersionRange($9959, $9960)), ($9961, $9962, $9963, $9964, $9965, $9966, $9967, $9968, $9969, $9970, $9971, $9972, $9973, $9974, $9975, $9976, $9977, $9978, $9979, $9980, $9981, $9982, $9983, $9984, $9985, $9986, $9987, $9988, VersionRange($9989, $9990)), ($9991, $9992, $9993, $9994, $9995, $9996, $9997, $9998, $9999, $10000, $10001, $10002, $10003, $10004, $10005, $10006, $10007, $10008, $10009, $10010, $10011, $10012, $10013, $10014, $10015, $10016, $10017, $10018, VersionRange($10019, $10020)), ($10021, $10022, $10023, $10024, $10025, $10026, $10027, $10028, $10029, $10030, $10031, $10032, $10033, $10034, $10035, $10036, $10037, $10038, $10039, $10040, $10041, $10042, $10043, $10044, $10045, $10046, $10047, $10048, VersionRange($10049, $10050)), ($10051, $10052, $10053, $10054, $10055, $10056, $10057, $10058, $10059, $10060, $10061, $10062, $10063, $10064, $10065, $10066, $10067, $10068, $10069, $10070, $10071, $10072, $10073, $10074, $10075, $10076, $10077, $10078, VersionRange($10079, $10080)), ($10081, $10082, $10083, $10084, $10085, $10086, $10087, $10088, $10089, $10090, $10091, $10092, $10093, $10094, $10095, $10096, $10097, $10098, $10099, $10100, $10101, $10102, $10103, $10104, $10105, $10106, $10107, $10108, VersionRange($10109, $10110)), ($10111, $10112, $10113, $10114, $10115, $10116, $10117, $10118, $10119, $10120, $10121, $10122, $10123, $10124, $10125, $10126, $10127, $10128, $10129, $10130, $10131, $10132, $10133, $10134, $10135, $10136, $10137, $10138, VersionRange($10139, $10140)), ($10141, $10142, $10143, $10144, $10145, $10146, $10147, $10148, $10149, $10150, $10151, $10152, $10153, $10154, $10155, $10156, $10157, $10158, $10159, $10160, $10161, $10162, $10163, $10164, $10165, $10166, $10167, $10168, VersionRange($10169, $10170)), ($10171, $10172, $10173, $10174, $10175, $10176, $10177, $10178, $10179, $10180, $10181, $10182, $10183, $10184, $10185, $10186, $10187, $10188, $10189, $10190, $10191, $10192, $10193, $10194, $10195, $10196, $10197, $10198, VersionRange($10199, $10200)), ($10201, $10202, $10203, $10204, $10205, $10206, $10207, $10208, $10209, $10210, $10211, $10212, $10213, $10214, $10215, $10216, $10217, $10218, $10219, $10220, $10221, $10222, $10223, $10224, $10225, $10226, $10227, $10228, VersionRange($10229, $10230)), ($10231, $10232, $10233, $10234, $10235, $10236, $10237, $10238, $10239, $10240, $10241, $10242, $10243, $10244, $10245, $10246, $10247, $10248, $10249, $10250, $10251, $10252, $10253, $10254, $10255, $10256, $10257, $10258, VersionRange($10259, $10260)), ($10261, $10262, $10263, $10264, $10265, $10266, $10267, $10268, $10269, $10270, $10271, $10272, $10273, $10274, $10275, $10276, $10277, $10278, $10279, $10280, $10281, $10282, $10283, $10284, $10285, $10286, $10287, $10288, VersionRange($10289, $10290)), ($10291, $10292, $10293, $10294, $10295, $10296, $10297, $10298, $10299, $10300, $10301, $10302, $10303, $10304, $10305, $10306, $10307, $10308, $10309, $10310, $10311, $10312, $10313, $10314, $10315, $10316, $10317, $10318, VersionRange($10319, $10320)), ($10321, $10322, $10323, $10324, $10325, $10326, $10327, $10328, $10329, $10330, $10331, $10332, $10333, $10334, $10335, $10336, $10337, $10338, $10339, $10340, $10341, $10342, $10343, $10344, $10345, $10346, $10347, $10348, VersionRange($10349, $10350)), ($10351, $10352, $10353, $10354, $10355, $10356, $10357, $10358, $10359, $10360, $10361, $10362, $10363, $10364, $10365, $10366, $10367, $10368, $10369, $10370, $10371, $10372, $10373, $10374, $10375, $10376, $10377, $10378, VersionRange($10379, $10380)), ($10381, $10382, $10383, $10384, $10385, $10386, $10387, $10388, $10389, $10390, $10391, $10392, $10393, $10394, $10395, $10396, $10397, $10398, $10399, $10400, $10401, $10402, $10403, $10404, $10405, $10406, $10407, $10408, VersionRange($10409, $10410)), ($10411, $10412, $10413, $10414, $10415, $10416, $10417, $10418, $10419, $10420, $10421, $10422, $10423, $10424, $10425, $10426, $10427, $10428, $10429, $10430, $10431, $10432, $10433, $10434, $10435, $10436, $10437, $10438, VersionRange($10439, $10440)), ($10441, $10442, $10443, $10444, $10445, $10446, $10447, $10448, $10449, $10450, $10451, $10452, $10453, $10454, $10455, $10456, $10457, $10458, $10459, $10460, $10461, $10462, $10463, $10464, $10465, $10466, $10467, $10468, VersionRange($10469, $10470)), ($10471, $10472, $10473, $10474, $10475, $10476, $10477, $10478, $10479, $10480, $10481, $10482, $10483, $10484, $10485, $10486, $10487, $10488, $10489, $10490, $10491, $10492, $10493, $10494, $10495, $10496, $10497, $10498, VersionRange($10499, $10500)), ($10501, $10502, $10503, $10504, $10505, $10506, $10507, $10508, $10509, $10510, $10511, $10512, $10513, $10514, $10515, $10516, $10517, $10518, $10519, $10520, $10521, $10522, $10523, $10524, $10525, $10526, $10527, $10528, VersionRange($10529, $10530)), ($10531, $10532, $10533, $10534, $10535, $10536, $10537, $10538, $10539, $10540, $10541, $10542, $10543, $10544, $10545, $10546, $10547, $10548, $10549, $10550, $10551, $10552, $10553, $10554, $10555, $10556, $10557, $10558, VersionRange($10559, $10560)), ($10561, $10562, $10563, $10564, $10565, $10566, $10567, $10568, $10569, $10570, $10571, $10572, $10573, $10574, $10575, $10576, $10577, $10578, $10579, $10580, $10581, $10582, $10583, $10584, $10585, $10586, $10587, $10588, VersionRange($10589, $10590)), ($10591, $10592, $10593, $10594, $10595, $10596, $10597, $10598, $10599, $10600, $10601, $10602, $10603, $10604, $10605, $10606, $10607, $10608, $10609, $10610, $10611, $10612, $10613, $10614, $10615, $10616, $10617, $10618, VersionRange($10619, $10620)), ($10621, $10622, $10623, $10624, $10625, $10626, $10627, $10628, $10629, $10630, $10631, $10632, $10633, $10634, $10635, $10636, $10637, $10638, $10639, $10640, $10641, $10642, $10643, $10644, $10645, $10646, $10647, $10648, VersionRange($10649, $10650)), ($10651, $10652, $10653, $10654, $10655, $10656, $10657, $10658, $10659, $10660, $10661, $10662, $10663, $10664, $10665, $10666, $10667, $10668, $10669, $10670, $10671, $10672, $10673, $10674, $10675, $10676, $10677, $10678, VersionRange($10679, $10680)), ($10681, $10682, $10683, $10684, $10685, $10686, $10687, $10688, $10689, $10690, $10691, $10692, $10693, $10694, $10695, $10696, $10697, $10698, $10699, $10700, $10701, $10702, $10703, $10704, $10705, $10706, $10707, $10708, VersionRange($10709, $10710)), ($10711, $10712, $10713, $10714, $10715, $10716, $10717, $10718, $10719, $10720, $10721, $10722, $10723, $10724, $10725, $10726, $10727, $10728, $10729, $10730, $10731, $10732, $10733, $10734, $10735, $10736, $10737, $10738, VersionRange($10739, $10740)), ($10741, $10742, $10743, $10744, $10745, $10746, $10747, $10748, $10749, $10750, $10751, $10752, $10753, $10754, $10755, $10756, $10757, $10758, $10759, $10760, $10761, $10762, $10763, $10764, $10765, $10766, $10767, $10768, VersionRange($10769, $10770)), ($10771, $10772, $10773, $10774, $10775, $10776, $10777, $10778, $10779, $10780, $10781, $10782, $10783, $10784, $10785, $10786, $10787, $10788, $10789, $10790, $10791, $10792, $10793, $10794, $10795, $10796, $10797, $10798, VersionRange($10799, $10800)), ($10801, $10802, $10803, $10804, $10805, $10806, $10807, $10808, $10809, $10810, $10811, $10812, $10813, $10814, $10815, $10816, $10817, $10818, $10819, $10820, $10821, $10822, $10823, $10824, $10825, $10826, $10827, $10828, VersionRange($10829, $10830)), ($10831, $10832, $10833, $10834, $10835, $10836, $10837, $10838, $10839, $10840, $10841, $10842, $10843, $10844, $10845, $10846, $10847, $10848, $10849, $10850, $10851, $10852, $10853, $10854, $10855, $10856, $10857, $10858, VersionRange($10859, $10860)), ($10861, $10862, $10863, $10864, $10865, $10866, $10867, $10868, $10869, $10870, $10871, $10872, $10873, $10874, $10875, $10876, $10877, $10878, $10879, $10880, $10881, $10882, $10883, $10884, $10885, $10886, $10887, $10888, VersionRange($10889, $10890)), ($10891, $10892, $10893, $10894, $10895, $10896, $10897, $10898, $10899, $10900, $10901, $10902, $10903, $10904, $10905, $10906, $10907, $10908, $10909, $10910, $10911, $10912, $10913, $10914, $10915, $10916, $10917, $10918, VersionRange($10919, $10920)), ($10921, $10922, $10923, $10924, $10925, $10926, $10927, $10928, $10929, $10930, $10931, $10932, $10933, $10934, $10935, $10936, $10937, $10938, $10939, $10940, $10941, $10942, $10943, $10944, $10945, $10946, $10947, $10948, VersionRange($10949, $10950)), ($10951, $10952, $10953, $10954, $10955, $10956, $10957, $10958, $10959, $10960, $10961, $10962, $10963, $10964, $10965, $10966, $10967, $10968, $10969, $10970, $10971, $10972, $10973, $10974, $10975, $10976, $10977, $10978, VersionRange($10979, $10980)), ($10981, $10982, $10983, $10984, $10985, $10986, $10987, $10988, $10989, $10990, $10991, $10992, $10993, $10994, $10995, $10996, $10997, $10998, $10999, $11000, $11001, $11002, $11003, $11004, $11005, $11006, $11007, $11008, VersionRange($11009, $11010)), ($11011, $11012, $11013, $11014, $11015, $11016, $11017, $11018, $11019, $11020, $11021, $11022, $11023, $11024, $11025, $11026, $11027, $11028, $11029, $11030, $11031, $11032, $11033, $11034, $11035, $11036, $11037, $11038, VersionRange($11039, $11040)), ($11041, $11042, $11043, $11044, $11045, $11046, $11047, $11048, $11049, $11050, $11051, $11052, $11053, $11054, $11055, $11056, $11057, $11058, $11059, $11060, $11061, $11062, $11063, $11064, $11065, $11066, $11067, $11068, VersionRange($11069, $11070)), ($11071, $11072, $11073, $11074, $11075, $11076, $11077, $11078, $11079, $11080, $11081, $11082, $11083, $11084, $11085, $11086, $11087, $11088, $11089, $11090, $11091, $11092, $11093, $11094, $11095, $11096, $11097, $11098, VersionRange($11099, $11100)), ($11101, $11102, $11103, $11104, $11105, $11106, $11107, $11108, $11109, $11110, $11111, $11112, $11113, $11114, $11115, $11116, $11117, $11118, $11119, $11120, $11121, $11122, $11123, $11124, $11125, $11126, $11127, $11128, VersionRange($11129, $11130)), ($11131, $11132, $11133, $11134, $11135, $11136, $11137, $11138, $11139, $11140, $11141, $11142, $11143, $11144, $11145, $11146, $11147, $11148, $11149, $11150, $11151, $11152, $11153, $11154, $11155, $11156, $11157, $11158, VersionRange($11159, $11160)), ($11161, $11162, $11163, $11164, $11165, $11166, $11167, $11168, $11169, $11170, $11171, $11172, $11173, $11174, $11175, $11176, $11177, $11178, $11179, $11180, $11181, $11182, $11183, $11184, $11185, $11186, $11187, $11188, VersionRange($11189, $11190)), ($11191, $11192, $11193, $11194, $11195, $11196, $11197, $11198, $11199, $11200, $11201, $11202, $11203, $11204, $11205, $11206, $11207, $11208, $11209, $11210, $11211, $11212, $11213, $11214, $11215, $11216, $11217, $11218, VersionRange($11219, $11220)), ($11221, $11222, $11223, $11224, $11225, $11226, $11227, $11228, $11229, $11230, $11231, $11232, $11233, $11234, $11235, $11236, $11237, $11238, $11239, $11240, $11241, $11242, $11243, $11244, $11245, $11246, $11247, $11248, VersionRange($11249, $11250)), ($11251, $11252, $11253, $11254, $11255, $11256, $11257, $11258, $11259, $11260, $11261, $11262, $11263, $11264, $11265, $11266, $11267, $11268, $11269, $11270, $11271, $11272, $11273, $11274, $11275, $11276, $11277, $11278, VersionRange($11279, $11280)), ($11281, $11282, $11283, $11284, $11285, $11286, $11287, $11288, $11289, $11290, $11291, $11292, $11293, $11294, $11295, $11296, $11297, $11298, $11299, $11300, $11301, $11302, $11303, $11304, $11305, $11306, $11307, $11308, VersionRange($11309, $11310)), ($11311, $11312, $11313, $11314, $11315, $11316, $11317, $11318, $11319, $11320, $11321, $11322, $11323, $11324, $11325, $11326, $11327, $11328, $11329, $11330, $11331, $11332, $11333, $11334, $11335, $11336, $11337, $11338, VersionRange($11339, $11340)), ($11341, $11342, $11343, $11344, $11345, $11346, $11347, $11348, $11349, $11350, $11351, $11352, $11353, $11354, $11355, $11356, $11357, $11358, $11359, $11360, $11361, $11362, $11363, $11364, $11365, $11366, $11367, $11368, VersionRange($11369, $11370)), ($11371, $11372, $11373, $11374, $11375, $11376, $11377, $11378, $11379, $11380, $11381, $11382, $11383, $11384, $11385, $11386, $11387, $11388, $11389, $11390, $11391, $11392, $11393, $11394, $11395, $11396, $11397, $11398, VersionRange($11399, $11400)), ($11401, $11402, $11403, $11404, $11405, $11406, $11407, $11408, $11409, $11410, $11411, $11412, $11413, $11414, $11415, $11416, $11417, $11418, $11419, $11420, $11421, $11422, $11423, $11424, $11425, $11426, $11427, $11428, VersionRange($11429, $11430)), ($11431, $11432, $11433, $11434, $11435, $11436, $11437, $11438, $11439, $11440, $11441, $11442, $11443, $11444, $11445, $11446, $11447, $11448, $11449, $11450, $11451, $11452, $11453, $11454, $11455, $11456, $11457, $11458, VersionRange($11459, $11460)), ($11461, $11462, $11463, $11464, $11465, $11466, $11467, $11468, $11469, $11470, $11471, $11472, $11473, $11474, $11475, $11476, $11477, $11478, $11479, $11480, $11481, $11482, $11483, $11484, $11485, $11486, $11487, $11488, VersionRange($11489, $11490)), ($11491, $11492, $11493, $11494, $11495, $11496, $11497, $11498, $11499, $11500, $11501, $11502, $11503, $11504, $11505, $11506, $11507, $11508, $11509, $11510, $11511, $11512, $11513, $11514, $11515, $11516, $11517, $11518, VersionRange($11519, $11520)), ($11521, $11522, $11523, $11524, $11525, $11526, $11527, $11528, $11529, $11530, $11531, $11532, $11533, $11534, $11535, $11536, $11537, $11538, $11539, $11540, $11541, $11542, $11543, $11544, $11545, $11546, $11547, $11548, VersionRange($11549, $11550)), ($11551, $11552, $11553, $11554, $11555, $11556, $11557, $11558, $11559, $11560, $11561, $11562, $11563, $11564, $11565, $11566, $11567, $11568, $11569, $11570, $11571, $11572, $11573, $11574, $11575, $11576, $11577, $11578, VersionRange($11579, $11580)), ($11581, $11582, $11583, $11584, $11585, $11586, $11587, $11588, $11589, $11590, $11591, $11592, $11593, $11594, $11595, $11596, $11597, $11598, $11599, $11600, $11601, $11602, $11603, $11604, $11605, $11606, $11607, $11608, VersionRange($11609, $11610)), ($11611, $11612, $11613, $11614, $11615, $11616, $11617, $11618, $11619, $11620, $11621, $11622, $11623, $11624, $11625, $11626, $11627, $11628, $11629, $11630, $11631, $11632, $11633, $11634, $11635, $11636, $11637, $11638, VersionRange($11639, $11640)), ($11641, $11642, $11643, $11644, $11645, $11646, $11647, $11648, $11649, $11650, $11651, $11652, $11653, $11654, $11655, $11656, $11657, $11658, $11659, $11660, $11661, $11662, $11663, $11664, $11665, $11666, $11667, $11668, VersionRange($11669, $11670)), ($11671, $11672, $11673, $11674, $11675, $11676, $11677, $11678, $11679, $11680, $11681, $11682, $11683, $11684, $11685, $11686, $11687, $11688, $11689, $11690, $11691, $11692, $11693, $11694, $11695, $11696, $11697, $11698, VersionRange($11699, $11700)), ($11701, $11702, $11703, $11704, $11705, $11706, $11707, $11708, $11709, $11710, $11711, $11712, $11713, $11714, $11715, $11716, $11717, $11718, $11719, $11720, $11721, $11722, $11723, $11724, $11725, $11726, $11727, $11728, VersionRange($11729, $11730)), ($11731, $11732, $11733, $11734, $11735, $11736, $11737, $11738, $11739, $11740, $11741, $11742, $11743, $11744, $11745, $11746, $11747, $11748, $11749, $11750, $11751, $11752, $11753, $11754, $11755, $11756, $11757, $11758, VersionRange($11759, $11760)), ($11761, $11762, $11763, $11764, $11765, $11766, $11767, $11768, $11769, $11770, $11771, $11772, $11773, $11774, $11775, $11776, $11777, $11778, $11779, $11780, $11781, $11782, $11783, $11784, $11785, $11786, $11787, $11788, VersionRange($11789, $11790)), ($11791, $11792, $11793, $11794, $11795, $11796, $11797, $11798, $11799, $11800, $11801, $11802, $11803, $11804, $11805, $11806, $11807, $11808, $11809, $11810, $11811, $11812, $11813, $11814, $11815, $11816, $11817, $11818, VersionRange($11819, $11820)), ($11821, $11822, $11823, $11824, $11825, $11826, $11827, $11828, $11829, $11830, $11831, $11832, $11833, $11834, $11835, $11836, $11837, $11838, $11839, $11840, $11841, $11842, $11843, $11844, $11845, $11846, $11847, $11848, VersionRange($11849, $11850)), ($11851, $11852, $11853, $11854, $11855, $11856, $11857, $11858, $11859, $11860, $11861, $11862, $11863, $11864, $11865, $11866, $11867, $11868, $11869, $11870, $11871, $11872, $11873, $11874, $11875, $11876, $11877, $11878, VersionRange($11879, $11880)), ($11881, $11882, $11883, $11884, $11885, $11886, $11887, $11888, $11889, $11890, $11891, $11892, $11893, $11894, $11895, $11896, $11897, $11898, $11899, $11900, $11901, $11902, $11903, $11904, $11905, $11906, $11907, $11908, VersionRange($11909, $11910)), ($11911, $11912, $11913, $11914, $11915, $11916, $11917, $11918, $11919, $11920, $11921, $11922, $11923, $11924, $11925, $11926, $11927, $11928, $11929, $11930, $11931, $11932, $11933, $11934, $11935, $11936, $11937, $11938, VersionRange($11939, $11940)), ($11941, $11942, $11943, $11944, $11945, $11946, $11947, $11948, $11949, $11950, $11951, $11952, $11953, $11954, $11955, $11956, $11957, $11958, $11959, $11960, $11961, $11962, $11963, $11964, $11965, $11966, $11967, $11968, VersionRange($11969, $11970)), ($11971, $11972, $11973, $11974, $11975, $11976, $11977, $11978, $11979, $11980, $11981, $11982, $11983, $11984, $11985, $11986, $11987, $11988, $11989, $11990, $11991, $11992, $11993, $11994, $11995, $11996, $11997, $11998, VersionRange($11999, $12000)), ($12001, $12002, $12003, $12004, $12005, $12006, $12007, $12008, $12009, $12010, $12011, $12012, $12013, $12014, $12015, $12016, $12017, $12018, $12019, $12020, $12021, $12022, $12023, $12024, $12025, $12026, $12027, $12028, VersionRange($12029, $12030)), ($12031, $12032, $12033, $12034, $12035, $12036, $12037, $12038, $12039, $12040, $12041, $12042, $12043, $12044, $12045, $12046, $12047, $12048, $12049, $12050, $12051, $12052, $12053, $12054, $12055, $12056, $12057, $12058, VersionRange($12059, $12060)), ($12061, $12062, $12063, $12064, $12065, $12066, $12067, $12068, $12069, $12070, $12071, $12072, $12073, $12074, $12075, $12076, $12077, $12078, $12079, $12080, $12081, $12082, $12083, $12084, $12085, $12086, $12087, $12088, VersionRange($12089, $12090)), ($12091, $12092, $12093, $12094, $12095, $12096, $12097, $12098, $12099, $12100, $12101, $12102, $12103, $12104, $12105, $12106, $12107, $12108, $12109, $12110, $12111, $12112, $12113, $12114, $12115, $12116, $12117, $12118, VersionRange($12119, $12120)), ($12121, $12122, $12123, $12124, $12125, $12126, $12127, $12128, $12129, $12130, $12131, $12132, $12133, $12134, $12135, $12136, $12137, $12138, $12139, $12140, $12141, $12142, $12143, $12144, $12145, $12146, $12147, $12148, VersionRange($12149, $12150)), ($12151, $12152, $12153, $12154, $12155, $12156, $12157, $12158, $12159, $12160, $12161, $12162, $12163, $12164, $12165, $12166, $12167, $12168, $12169, $12170, $12171, $12172, $12173, $12174, $12175, $12176, $12177, $12178, VersionRange($12179, $12180)), ($12181, $12182, $12183, $12184, $12185, $12186, $12187, $12188, $12189, $12190, $12191, $12192, $12193, $12194, $12195, $12196, $12197, $12198, $12199, $12200, $12201, $12202, $12203, $12204, $12205, $12206, $12207, $12208, VersionRange($12209, $12210)), ($12211, $12212, $12213, $12214, $12215, $12216, $12217, $12218, $12219, $12220, $12221, $12222, $12223, $12224, $12225, $12226, $12227, $12228, $12229, $12230, $12231, $12232, $12233, $12234, $12235, $12236, $12237, $12238, VersionRange($12239, $12240)), ($12241, $12242, $12243, $12244, $12245, $12246, $12247, $12248, $12249, $12250, $12251, $12252, $12253, $12254, $12255, $12256, $12257, $12258, $12259, $12260, $12261, $12262, $12263, $12264, $12265, $12266, $12267, $12268, VersionRange($12269, $12270)), ($12271, $12272, $12273, $12274, $12275, $12276, $12277, $12278, $12279, $12280, $12281, $12282, $12283, $12284, $12285, $12286, $12287, $12288, $12289, $12290, $12291, $12292, $12293, $12294, $12295, $12296, $12297, $12298, VersionRange($12299, $12300)), ($12301, $12302, $12303, $12304, $12305, $12306, $12307, $12308, $12309, $12310, $12311, $12312, $12313, $12314, $12315, $12316, $12317, $12318, $12319, $12320, $12321, $12322, $12323, $12324, $12325, $12326, $12327, $12328, VersionRange($12329, $12330)), ($12331, $12332, $12333, $12334, $12335, $12336, $12337, $12338, $12339, $12340, $12341, $12342, $12343, $12344, $12345, $12346, $12347, $12348, $12349, $12350, $12351, $12352, $12353, $12354, $12355, $12356, $12357, $12358, VersionRange($12359, $12360)), ($12361, $12362, $12363, $12364, $12365, $12366, $12367, $12368, $12369, $12370, $12371, $12372, $12373, $12374, $12375, $12376, $12377, $12378, $12379, $12380, $12381, $12382, $12383, $12384, $12385, $12386, $12387, $12388, VersionRange($12389, $12390)), ($12391, $12392, $12393, $12394, $12395, $12396, $12397, $12398, $12399, $12400, $12401, $12402, $12403, $12404, $12405, $12406, $12407, $12408, $12409, $12410, $12411, $12412, $12413, $12414, $12415, $12416, $12417, $12418, VersionRange($12419, $12420)), ($12421, $12422, $12423, $12424, $12425, $12426, $12427, $12428, $12429, $12430, $12431, $12432, $12433, $12434, $12435, $12436, $12437, $12438, $12439, $12440, $12441, $12442, $12443, $12444, $12445, $12446, $12447, $12448, VersionRange($12449, $12450)), ($12451, $12452, $12453, $12454, $12455, $12456, $12457, $12458, $12459, $12460, $12461, $12462, $12463, $12464, $12465, $12466, $12467, $12468, $12469, $12470, $12471, $12472, $12473, $12474, $12475, $12476, $12477, $12478, VersionRange($12479, $12480)), ($12481, $12482, $12483, $12484, $12485, $12486, $12487, $12488, $12489, $12490, $12491, $12492, $12493, $12494, $12495, $12496, $12497, $12498, $12499, $12500, $12501, $12502, $12503, $12504, $12505, $12506, $12507, $12508, VersionRange($12509, $12510)), ($12511, $12512, $12513, $12514, $12515, $12516, $12517, $12518, $12519, $12520, $12521, $12522, $12523, $12524, $12525, $12526, $12527, $12528, $12529, $12530, $12531, $12532, $12533, $12534, $12535, $12536, $12537, $12538, VersionRange($12539, $12540)), ($12541, $12542, $12543, $12544, $12545, $12546, $12547, $12548, $12549, $12550, $12551, $12552, $12553, $12554, $12555, $12556, $12557, $12558, $12559, $12560, $12561, $12562, $12563, $12564, $12565, $12566, $12567, $12568, VersionRange($12569, $12570)), ($12571, $12572, $12573, $12574, $12575, $12576, $12577, $12578, $12579, $12580, $12581, $12582, $12583, $12584, $12585, $12586, $12587, $12588, $12589, $12590, $12591, $12592, $12593, $12594, $12595, $12596, $12597, $12598, VersionRange($12599, $12600)), ($12601, $12602, $12603, $12604, $12605, $12606, $12607, $12608, $12609, $12610, $12611, $12612, $12613, $12614, $12615, $12616, $12617, $12618, $12619, $12620, $12621, $12622, $12623, $12624, $12625, $12626, $12627, $12628, VersionRange($12629, $12630)), ($12631, $12632, $12633, $12634, $12635, $12636, $12637, $12638, $12639, $12640, $12641, $12642, $12643, $12644, $12645, $12646, $12647, $12648, $12649, $12650, $12651, $12652, $12653, $12654, $12655, $12656, $12657, $12658, VersionRange($12659, $12660)), ($12661, $12662, $12663, $12664, $12665, $12666, $12667, $12668, $12669, $12670, $12671, $12672, $12673, $12674, $12675, $12676, $12677, $12678, $12679, $12680, $12681, $12682, $12683, $12684, $12685, $12686, $12687, $12688, VersionRange($12689, $12690)), ($12691, $12692, $12693, $12694, $12695, $12696, $12697, $12698, $12699, $12700, $12701, $12702, $12703, $12704, $12705, $12706, $12707, $12708, $12709, $12710, $12711, $12712, $12713, $12714, $12715, $12716, $12717, $12718, VersionRange($12719, $12720)), ($12721, $12722, $12723, $12724, $12725, $12726, $12727, $12728, $12729, $12730, $12731, $12732, $12733, $12734, $12735, $12736, $12737, $12738, $12739, $12740, $12741, $12742, $12743, $12744, $12745, $12746, $12747, $12748, VersionRange($12749, $12750)), ($12751, $12752, $12753, $12754, $12755, $12756, $12757, $12758, $12759, $12760, $12761, $12762, $12763, $12764, $12765, $12766, $12767, $12768, $12769, $12770, $12771, $12772, $12773, $12774, $12775, $12776, $12777, $12778, VersionRange($12779, $12780)), ($12781, $12782, $12783, $12784, $12785, $12786, $12787, $12788, $12789, $12790, $12791, $12792, $12793, $12794, $12795, $12796, $12797, $12798, $12799, $12800, $12801, $12802, $12803, $12804, $12805, $12806, $12807, $12808, VersionRange($12809, $12810)), ($12811, $12812, $12813, $12814, $12815, $12816, $12817, $12818, $12819, $12820, $12821, $12822, $12823, $12824, $12825, $12826, $12827, $12828, $12829, $12830, $12831, $12832, $12833, $12834, $12835, $12836, $12837, $12838, VersionRange($12839, $12840)), ($12841, $12842, $12843, $12844, $12845, $12846, $12847, $12848, $12849, $12850, $12851, $12852, $12853, $12854, $12855, $12856, $12857, $12858, $12859, $12860, $12861, $12862, $12863, $12864, $12865, $12866, $12867, $12868, VersionRange($12869, $12870)), ($12871, $12872, $12873, $12874, $12875, $12876, $12877, $12878, $12879, $12880, $12881, $12882, $12883, $12884, $12885, $12886, $12887, $12888, $12889, $12890, $12891, $12892, $12893, $12894, $12895, $12896, $12897, $12898, VersionRange($12899, $12900)), ($12901, $12902, $12903, $12904, $12905, $12906, $12907, $12908, $12909, $12910, $12911, $12912, $12913, $12914, $12915, $12916, $12917, $12918, $12919, $12920, $12921, $12922, $12923, $12924, $12925, $12926, $12927, $12928, VersionRange($12929, $12930)), ($12931, $12932, $12933, $12934, $12935, $12936, $12937, $12938, $12939, $12940, $12941, $12942, $12943, $12944, $12945, $12946, $12947, $12948, $12949, $12950, $12951, $12952, $12953, $12954, $12955, $12956, $12957, $12958, VersionRange($12959, $12960)), ($12961, $12962, $12963, $12964, $12965, $12966, $12967, $12968, $12969, $12970[...][ Date: 2023-07-04 18:41:10 ]
7 4s745ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30)), ($31, $32, $33, $34, $35, $36, $37, $38, $39, $40, $41, $42, $43, $44, $45, $46, $47, $48, $49, $50, $51, $52, $53, $54, $55, $56, $57, $58, VersionRange($59, $60)), ($61, $62, $63, $64, $65, $66, $67, $68, $69, $70, $71, $72, $73, $74, $75, $76, $77, $78, $79, $80, $81, $82, $83, $84, $85, $86, $87, $88, VersionRange($89, $90)), ($91, $92, $93, $94, $95, $96, $97, $98, $99, $100, $101, $102, $103, $104, $105, $106, $107, $108, $109, $110, $111, $112, $113, $114, $115, $116, $117, $118, VersionRange($119, $120)), ($121, $122, $123, $124, $125, $126, $127, $128, $129, $130, $131, $132, $133, $134, $135, $136, $137, $138, $139, $140, $141, $142, $143, $144, $145, $146, $147, $148, VersionRange($149, $150)), ($151, $152, $153, $154, $155, $156, $157, $158, $159, $160, $161, $162, $163, $164, $165, $166, $167, $168, $169, $170, $171, $172, $173, $174, $175, $176, $177, $178, VersionRange($179, $180)), ($181, $182, $183, $184, $185, $186, $187, $188, $189, $190, $191, $192, $193, $194, $195, $196, $197, $198, $199, $200, $201, $202, $203, $204, $205, $206, $207, $208, VersionRange($209, $210)), ($211, $212, $213, $214, $215, $216, $217, $218, $219, $220, $221, $222, $223, $224, $225, $226, $227, $228, $229, $230, $231, $232, $233, $234, $235, $236, $237, $238, VersionRange($239, $240)), ($241, $242, $243, $244, $245, $246, $247, $248, $249, $250, $251, $252, $253, $254, $255, $256, $257, $258, $259, $260, $261, $262, $263, $264, $265, $266, $267, $268, VersionRange($269, $270)), ($271, $272, $273, $274, $275, $276, $277, $278, $279, $280, $281, $282, $283, $284, $285, $286, $287, $288, $289, $290, $291, $292, $293, $294, $295, $296, $297, $298, VersionRange($299, $300)), ($301, $302, $303, $304, $305, $306, $307, $308, $309, $310, $311, $312, $313, $314, $315, $316, $317, $318, $319, $320, $321, $322, $323, $324, $325, $326, $327, $328, VersionRange($329, $330)), ($331, $332, $333, $334, $335, $336, $337, $338, $339, $340, $341, $342, $343, $344, $345, $346, $347, $348, $349, $350, $351, $352, $353, $354, $355, $356, $357, $358, VersionRange($359, $360)), ($361, $362, $363, $364, $365, $366, $367, $368, $369, $370, $371, $372, $373, $374, $375, $376, $377, $378, $379, $380, $381, $382, $383, $384, $385, $386, $387, $388, VersionRange($389, $390)), ($391, $392, $393, $394, $395, $396, $397, $398, $399, $400, $401, $402, $403, $404, $405, $406, $407, $408, $409, $410, $411, $412, $413, $414, $415, $416, $417, $418, VersionRange($419, $420)), ($421, $422, $423, $424, $425, $426, $427, $428, $429, $430, $431, $432, $433, $434, $435, $436, $437, $438, $439, $440, $441, $442, $443, $444, $445, $446, $447, $448, VersionRange($449, $450)), ($451, $452, $453, $454, $455, $456, $457, $458, $459, $460, $461, $462, $463, $464, $465, $466, $467, $468, $469, $470, $471, $472, $473, $474, $475, $476, $477, $478, VersionRange($479, $480)), ($481, $482, $483, $484, $485, $486, $487, $488, $489, $490, $491, $492, $493, $494, $495, $496, $497, $498, $499, $500, $501, $502, $503, $504, $505, $506, $507, $508, VersionRange($509, $510)), ($511, $512, $513, $514, $515, $516, $517, $518, $519, $520, $521, $522, $523, $524, $525, $526, $527, $528, $529, $530, $531, $532, $533, $534, $535, $536, $537, $538, VersionRange($539, $540)), ($541, $542, $543, $544, $545, $546, $547, $548, $549, $550, $551, $552, $553, $554, $555, $556, $557, $558, $559, $560, $561, $562, $563, $564, $565, $566, $567, $568, VersionRange($569, $570)), ($571, $572, $573, $574, $575, $576, $577, $578, $579, $580, $581, $582, $583, $584, $585, $586, $587, $588, $589, $590, $591, $592, $593, $594, $595, $596, $597, $598, VersionRange($599, $600)), ($601, $602, $603, $604, $605, $606, $607, $608, $609, $610, $611, $612, $613, $614, $615, $616, $617, $618, $619, $620, $621, $622, $623, $624, $625, $626, $627, $628, VersionRange($629, $630)), ($631, $632, $633, $634, $635, $636, $637, $638, $639, $640, $641, $642, $643, $644, $645, $646, $647, $648, $649, $650, $651, $652, $653, $654, $655, $656, $657, $658, VersionRange($659, $660)), ($661, $662, $663, $664, $665, $666, $667, $668, $669, $670, $671, $672, $673, $674, $675, $676, $677, $678, $679, $680, $681, $682, $683, $684, $685, $686, $687, $688, VersionRange($689, $690)), ($691, $692, $693, $694, $695, $696, $697, $698, $699, $700, $701, $702, $703, $704, $705, $706, $707, $708, $709, $710, $711, $712, $713, $714, $715, $716, $717, $718, VersionRange($719, $720)), ($721, $722, $723, $724, $725, $726, $727, $728, $729, $730, $731, $732, $733, $734, $735, $736, $737, $738, $739, $740, $741, $742, $743, $744, $745, $746, $747, $748, VersionRange($749, $750)), ($751, $752, $753, $754, $755, $756, $757, $758, $759, $760, $761, $762, $763, $764, $765, $766, $767, $768, $769, $770, $771, $772, $773, $774, $775, $776, $777, $778, VersionRange($779, $780)), ($781, $782, $783, $784, $785, $786, $787, $788, $789, $790, $791, $792, $793, $794, $795, $796, $797, $798, $799, $800, $801, $802, $803, $804, $805, $806, $807, $808, VersionRange($809, $810)), ($811, $812, $813, $814, $815, $816, $817, $818, $819, $820, $821, $822, $823, $824, $825, $826, $827, $828, $829, $830, $831, $832, $833, $834, $835, $836, $837, $838, VersionRange($839, $840)), ($841, $842, $843, $844, $845, $846, $847, $848, $849, $850, $851, $852, $853, $854, $855, $856, $857, $858, $859, $860, $861, $862, $863, $864, $865, $866, $867, $868, VersionRange($869, $870)), ($871, $872, $873, $874, $875, $876, $877, $878, $879, $880, $881, $882, $883, $884, $885, $886, $887, $888, $889, $890, $891, $892, $893, $894, $895, $896, $897, $898, VersionRange($899, $900)), ($901, $902, $903, $904, $905, $906, $907, $908, $909, $910, $911, $912, $913, $914, $915, $916, $917, $918, $919, $920, $921, $922, $923, $924, $925, $926, $927, $928, VersionRange($929, $930)), ($931, $932, $933, $934, $935, $936, $937, $938, $939, $940, $941, $942, $943, $944, $945, $946, $947, $948, $949, $950, $951, $952, $953, $954, $955, $956, $957, $958, VersionRange($959, $960)), ($961, $962, $963, $964, $965, $966, $967, $968, $969, $970, $971, $972, $973, $974, $975, $976, $977, $978, $979, $980, $981, $982, $983, $984, $985, $986, $987, $988, VersionRange($989, $990)), ($991, $992, $993, $994, $995, $996, $997, $998, $999, $1000, $1001, $1002, $1003, $1004, $1005, $1006, $1007, $1008, $1009, $1010, $1011, $1012, $1013, $1014, $1015, $1016, $1017, $1018, VersionRange($1019, $1020)), ($1021, $1022, $1023, $1024, $1025, $1026, $1027, $1028, $1029, $1030, $1031, $1032, $1033, $1034, $1035, $1036, $1037, $1038, $1039, $1040, $1041, $1042, $1043, $1044, $1045, $1046, $1047, $1048, VersionRange($1049, $1050)), ($1051, $1052, $1053, $1054, $1055, $1056, $1057, $1058, $1059, $1060, $1061, $1062, $1063, $1064, $1065, $1066, $1067, $1068, $1069, $1070, $1071, $1072, $1073, $1074, $1075, $1076, $1077, $1078, VersionRange($1079, $1080)), ($1081, $1082, $1083, $1084, $1085, $1086, $1087, $1088, $1089, $1090, $1091, $1092, $1093, $1094, $1095, $1096, $1097, $1098, $1099, $1100, $1101, $1102, $1103, $1104, $1105, $1106, $1107, $1108, VersionRange($1109, $1110)), ($1111, $1112, $1113, $1114, $1115, $1116, $1117, $1118, $1119, $1120, $1121, $1122, $1123, $1124, $1125, $1126, $1127, $1128, $1129, $1130, $1131, $1132, $1133, $1134, $1135, $1136, $1137, $1138, VersionRange($1139, $1140)), ($1141, $1142, $1143, $1144, $1145, $1146, $1147, $1148, $1149, $1150, $1151, $1152, $1153, $1154, $1155, $1156, $1157, $1158, $1159, $1160, $1161, $1162, $1163, $1164, $1165, $1166, $1167, $1168, VersionRange($1169, $1170)), ($1171, $1172, $1173, $1174, $1175, $1176, $1177, $1178, $1179, $1180, $1181, $1182, $1183, $1184, $1185, $1186, $1187, $1188, $1189, $1190, $1191, $1192, $1193, $1194, $1195, $1196, $1197, $1198, VersionRange($1199, $1200)), ($1201, $1202, $1203, $1204, $1205, $1206, $1207, $1208, $1209, $1210, $1211, $1212, $1213, $1214, $1215, $1216, $1217, $1218, $1219, $1220, $1221, $1222, $1223, $1224, $1225, $1226, $1227, $1228, VersionRange($1229, $1230)), ($1231, $1232, $1233, $1234, $1235, $1236, $1237, $1238, $1239, $1240, $1241, $1242, $1243, $1244, $1245, $1246, $1247, $1248, $1249, $1250, $1251, $1252, $1253, $1254, $1255, $1256, $1257, $1258, VersionRange($1259, $1260)), ($1261, $1262, $1263, $1264, $1265, $1266, $1267, $1268, $1269, $1270, $1271, $1272, $1273, $1274, $1275, $1276, $1277, $1278, $1279, $1280, $1281, $1282, $1283, $1284, $1285, $1286, $1287, $1288, VersionRange($1289, $1290)), ($1291, $1292, $1293, $1294, $1295, $1296, $1297, $1298, $1299, $1300, $1301, $1302, $1303, $1304, $1305, $1306, $1307, $1308, $1309, $1310, $1311, $1312, $1313, $1314, $1315, $1316, $1317, $1318, VersionRange($1319, $1320)), ($1321, $1322, $1323, $1324, $1325, $1326, $1327, $1328, $1329, $1330, $1331, $1332, $1333, $1334, $1335, $1336, $1337, $1338, $1339, $1340, $1341, $1342, $1343, $1344, $1345, $1346, $1347, $1348, VersionRange($1349, $1350)), ($1351, $1352, $1353, $1354, $1355, $1356, $1357, $1358, $1359, $1360, $1361, $1362, $1363, $1364, $1365, $1366, $1367, $1368, $1369, $1370, $1371, $1372, $1373, $1374, $1375, $1376, $1377, $1378, VersionRange($1379, $1380)), ($1381, $1382, $1383, $1384, $1385, $1386, $1387, $1388, $1389, $1390, $1391, $1392, $1393, $1394, $1395, $1396, $1397, $1398, $1399, $1400, $1401, $1402, $1403, $1404, $1405, $1406, $1407, $1408, VersionRange($1409, $1410)), ($1411, $1412, $1413, $1414, $1415, $1416, $1417, $1418, $1419, $1420, $1421, $1422, $1423, $1424, $1425, $1426, $1427, $1428, $1429, $1430, $1431, $1432, $1433, $1434, $1435, $1436, $1437, $1438, VersionRange($1439, $1440)), ($1441, $1442, $1443, $1444, $1445, $1446, $1447, $1448, $1449, $1450, $1451, $1452, $1453, $1454, $1455, $1456, $1457, $1458, $1459, $1460, $1461, $1462, $1463, $1464, $1465, $1466, $1467, $1468, VersionRange($1469, $1470)), ($1471, $1472, $1473, $1474, $1475, $1476, $1477, $1478, $1479, $1480, $1481, $1482, $1483, $1484, $1485, $1486, $1487, $1488, $1489, $1490, $1491, $1492, $1493, $1494, $1495, $1496, $1497, $1498, VersionRange($1499, $1500)), ($1501, $1502, $1503, $1504, $1505, $1506, $1507, $1508, $1509, $1510, $1511, $1512, $1513, $1514, $1515, $1516, $1517, $1518, $1519, $1520, $1521, $1522, $1523, $1524, $1525, $1526, $1527, $1528, VersionRange($1529, $1530)), ($1531, $1532, $1533, $1534, $1535, $1536, $1537, $1538, $1539, $1540, $1541, $1542, $1543, $1544, $1545, $1546, $1547, $1548, $1549, $1550, $1551, $1552, $1553, $1554, $1555, $1556, $1557, $1558, VersionRange($1559, $1560)), ($1561, $1562, $1563, $1564, $1565, $1566, $1567, $1568, $1569, $1570, $1571, $1572, $1573, $1574, $1575, $1576, $1577, $1578, $1579, $1580, $1581, $1582, $1583, $1584, $1585, $1586, $1587, $1588, VersionRange($1589, $1590)), ($1591, $1592, $1593, $1594, $1595, $1596, $1597, $1598, $1599, $1600, $1601, $1602, $1603, $1604, $1605, $1606, $1607, $1608, $1609, $1610, $1611, $1612, $1613, $1614, $1615, $1616, $1617, $1618, VersionRange($1619, $1620)), ($1621, $1622, $1623, $1624, $1625, $1626, $1627, $1628, $1629, $1630, $1631, $1632, $1633, $1634, $1635, $1636, $1637, $1638, $1639, $1640, $1641, $1642, $1643, $1644, $1645, $1646, $1647, $1648, VersionRange($1649, $1650)), ($1651, $1652, $1653, $1654, $1655, $1656, $1657, $1658, $1659, $1660, $1661, $1662, $1663, $1664, $1665, $1666, $1667, $1668, $1669, $1670, $1671, $1672, $1673, $1674, $1675, $1676, $1677, $1678, VersionRange($1679, $1680)), ($1681, $1682, $1683, $1684, $1685, $1686, $1687, $1688, $1689, $1690, $1691, $1692, $1693, $1694, $1695, $1696, $1697, $1698, $1699, $1700, $1701, $1702, $1703, $1704, $1705, $1706, $1707, $1708, VersionRange($1709, $1710)), ($1711, $1712, $1713, $1714, $1715, $1716, $1717, $1718, $1719, $1720, $1721, $1722, $1723, $1724, $1725, $1726, $1727, $1728, $1729, $1730, $1731, $1732, $1733, $1734, $1735, $1736, $1737, $1738, VersionRange($1739, $1740)), ($1741, $1742, $1743, $1744, $1745, $1746, $1747, $1748, $1749, $1750, $1751, $1752, $1753, $1754, $1755, $1756, $1757, $1758, $1759, $1760, $1761, $1762, $1763, $1764, $1765, $1766, $1767, $1768, VersionRange($1769, $1770)), ($1771, $1772, $1773, $1774, $1775, $1776, $1777, $1778, $1779, $1780, $1781, $1782, $1783, $1784, $1785, $1786, $1787, $1788, $1789, $1790, $1791, $1792, $1793, $1794, $1795, $1796, $1797, $1798, VersionRange($1799, $1800)), ($1801, $1802, $1803, $1804, $1805, $1806, $1807, $1808, $1809, $1810, $1811, $1812, $1813, $1814, $1815, $1816, $1817, $1818, $1819, $1820, $1821, $1822, $1823, $1824, $1825, $1826, $1827, $1828, VersionRange($1829, $1830)), ($1831, $1832, $1833, $1834, $1835, $1836, $1837, $1838, $1839, $1840, $1841, $1842, $1843, $1844, $1845, $1846, $1847, $1848, $1849, $1850, $1851, $1852, $1853, $1854, $1855, $1856, $1857, $1858, VersionRange($1859, $1860)), ($1861, $1862, $1863, $1864, $1865, $1866, $1867, $1868, $1869, $1870, $1871, $1872, $1873, $1874, $1875, $1876, $1877, $1878, $1879, $1880, $1881, $1882, $1883, $1884, $1885, $1886, $1887, $1888, VersionRange($1889, $1890)), ($1891, $1892, $1893, $1894, $1895, $1896, $1897, $1898, $1899, $1900, $1901, $1902, $1903, $1904, $1905, $1906, $1907, $1908, $1909, $1910, $1911, $1912, $1913, $1914, $1915, $1916, $1917, $1918, VersionRange($1919, $1920)), ($1921, $1922, $1923, $1924, $1925, $1926, $1927, $1928, $1929, $1930, $1931, $1932, $1933, $1934, $1935, $1936, $1937, $1938, $1939, $1940, $1941, $1942, $1943, $1944, $1945, $1946, $1947, $1948, VersionRange($1949, $1950)), ($1951, $1952, $1953, $1954, $1955, $1956, $1957, $1958, $1959, $1960, $1961, $1962, $1963, $1964, $1965, $1966, $1967, $1968, $1969, $1970, $1971, $1972, $1973, $1974, $1975, $1976, $1977, $1978, VersionRange($1979, $1980)), ($1981, $1982, $1983, $1984, $1985, $1986, $1987, $1988, $1989, $1990, $1991, $1992, $1993, $1994, $1995, $1996, $1997, $1998, $1999, $2000, $2001, $2002, $2003, $2004, $2005, $2006, $2007, $2008, VersionRange($2009, $2010)), ($2011, $2012, $2013, $2014, $2015, $2016, $2017, $2018, $2019, $2020, $2021, $2022, $2023, $2024, $2025, $2026, $2027, $2028, $2029, $2030, $2031, $2032, $2033, $2034, $2035, $2036, $2037, $2038, VersionRange($2039, $2040)), ($2041, $2042, $2043, $2044, $2045, $2046, $2047, $2048, $2049, $2050, $2051, $2052, $2053, $2054, $2055, $2056, $2057, $2058, $2059, $2060, $2061, $2062, $2063, $2064, $2065, $2066, $2067, $2068, VersionRange($2069, $2070)), ($2071, $2072, $2073, $2074, $2075, $2076, $2077, $2078, $2079, $2080, $2081, $2082, $2083, $2084, $2085, $2086, $2087, $2088, $2089, $2090, $2091, $2092, $2093, $2094, $2095, $2096, $2097, $2098, VersionRange($2099, $2100)), ($2101, $2102, $2103, $2104, $2105, $2106, $2107, $2108, $2109, $2110, $2111, $2112, $2113, $2114, $2115, $2116, $2117, $2118, $2119, $2120, $2121, $2122, $2123, $2124, $2125, $2126, $2127, $2128, VersionRange($2129, $2130)), ($2131, $2132, $2133, $2134, $2135, $2136, $2137, $2138, $2139, $2140, $2141, $2142, $2143, $2144, $2145, $2146, $2147, $2148, $2149, $2150, $2151, $2152, $2153, $2154, $2155, $2156, $2157, $2158, VersionRange($2159, $2160)), ($2161, $2162, $2163, $2164, $2165, $2166, $2167, $2168, $2169, $2170, $2171, $2172, $2173, $2174, $2175, $2176, $2177, $2178, $2179, $2180, $2181, $2182, $2183, $2184, $2185, $2186, $2187, $2188, VersionRange($2189, $2190)), ($2191, $2192, $2193, $2194, $2195, $2196, $2197, $2198, $2199, $2200, $2201, $2202, $2203, $2204, $2205, $2206, $2207, $2208, $2209, $2210, $2211, $2212, $2213, $2214, $2215, $2216, $2217, $2218, VersionRange($2219, $2220)), ($2221, $2222, $2223, $2224, $2225, $2226, $2227, $2228, $2229, $2230, $2231, $2232, $2233, $2234, $2235, $2236, $2237, $2238, $2239, $2240, $2241, $2242, $2243, $2244, $2245, $2246, $2247, $2248, VersionRange($2249, $2250)), ($2251, $2252, $2253, $2254, $2255, $2256, $2257, $2258, $2259, $2260, $2261, $2262, $2263, $2264, $2265, $2266, $2267, $2268, $2269, $2270, $2271, $2272, $2273, $2274, $2275, $2276, $2277, $2278, VersionRange($2279, $2280)), ($2281, $2282, $2283, $2284, $2285, $2286, $2287, $2288, $2289, $2290, $2291, $2292, $2293, $2294, $2295, $2296, $2297, $2298, $2299, $2300, $2301, $2302, $2303, $2304, $2305, $2306, $2307, $2308, VersionRange($2309, $2310)), ($2311, $2312, $2313, $2314, $2315, $2316, $2317, $2318, $2319, $2320, $2321, $2322, $2323, $2324, $2325, $2326, $2327, $2328, $2329, $2330, $2331, $2332, $2333, $2334, $2335, $2336, $2337, $2338, VersionRange($2339, $2340)), ($2341, $2342, $2343, $2344, $2345, $2346, $2347, $2348, $2349, $2350, $2351, $2352, $2353, $2354, $2355, $2356, $2357, $2358, $2359, $2360, $2361, $2362, $2363, $2364, $2365, $2366, $2367, $2368, VersionRange($2369, $2370)), ($2371, $2372, $2373, $2374, $2375, $2376, $2377, $2378, $2379, $2380, $2381, $2382, $2383, $2384, $2385, $2386, $2387, $2388, $2389, $2390, $2391, $2392, $2393, $2394, $2395, $2396, $2397, $2398, VersionRange($2399, $2400)), ($2401, $2402, $2403, $2404, $2405, $2406, $2407, $2408, $2409, $2410, $2411, $2412, $2413, $2414, $2415, $2416, $2417, $2418, $2419, $2420, $2421, $2422, $2423, $2424, $2425, $2426, $2427, $2428, VersionRange($2429, $2430)), ($2431, $2432, $2433, $2434, $2435, $2436, $2437, $2438, $2439, $2440, $2441, $2442, $2443, $2444, $2445, $2446, $2447, $2448, $2449, $2450, $2451, $2452, $2453, $2454, $2455, $2456, $2457, $2458, VersionRange($2459, $2460)), ($2461, $2462, $2463, $2464, $2465, $2466, $2467, $2468, $2469, $2470, $2471, $2472, $2473, $2474, $2475, $2476, $2477, $2478, $2479, $2480, $2481, $2482, $2483, $2484, $2485, $2486, $2487, $2488, VersionRange($2489, $2490)), ($2491, $2492, $2493, $2494, $2495, $2496, $2497, $2498, $2499, $2500, $2501, $2502, $2503, $2504, $2505, $2506, $2507, $2508, $2509, $2510, $2511, $2512, $2513, $2514, $2515, $2516, $2517, $2518, VersionRange($2519, $2520)), ($2521, $2522, $2523, $2524, $2525, $2526, $2527, $2528, $2529, $2530, $2531, $2532, $2533, $2534, $2535, $2536, $2537, $2538, $2539, $2540, $2541, $2542, $2543, $2544, $2545, $2546, $2547, $2548, VersionRange($2549, $2550)), ($2551, $2552, $2553, $2554, $2555, $2556, $2557, $2558, $2559, $2560, $2561, $2562, $2563, $2564, $2565, $2566, $2567, $2568, $2569, $2570, $2571, $2572, $2573, $2574, $2575, $2576, $2577, $2578, VersionRange($2579, $2580)), ($2581, $2582, $2583, $2584, $2585, $2586, $2587, $2588, $2589, $2590, $2591, $2592, $2593, $2594, $2595, $2596, $2597, $2598, $2599, $2600, $2601, $2602, $2603, $2604, $2605, $2606, $2607, $2608, VersionRange($2609, $2610)), ($2611, $2612, $2613, $2614, $2615, $2616, $2617, $2618, $2619, $2620, $2621, $2622, $2623, $2624, $2625, $2626, $2627, $2628, $2629, $2630, $2631, $2632, $2633, $2634, $2635, $2636, $2637, $2638, VersionRange($2639, $2640)), ($2641, $2642, $2643, $2644, $2645, $2646, $2647, $2648, $2649, $2650, $2651, $2652, $2653, $2654, $2655, $2656, $2657, $2658, $2659, $2660, $2661, $2662, $2663, $2664, $2665, $2666, $2667, $2668, VersionRange($2669, $2670)), ($2671, $2672, $2673, $2674, $2675, $2676, $2677, $2678, $2679, $2680, $2681, $2682, $2683, $2684, $2685, $2686, $2687, $2688, $2689, $2690, $2691, $2692, $2693, $2694, $2695, $2696, $2697, $2698, VersionRange($2699, $2700)), ($2701, $2702, $2703, $2704, $2705, $2706, $2707, $2708, $2709, $2710, $2711, $2712, $2713, $2714, $2715, $2716, $2717, $2718, $2719, $2720, $2721, $2722, $2723, $2724, $2725, $2726, $2727, $2728, VersionRange($2729, $2730)), ($2731, $2732, $2733, $2734, $2735, $2736, $2737, $2738, $2739, $2740, $2741, $2742, $2743, $2744, $2745, $2746, $2747, $2748, $2749, $2750, $2751, $2752, $2753, $2754, $2755, $2756, $2757, $2758, VersionRange($2759, $2760)), ($2761, $2762, $2763, $2764, $2765, $2766, $2767, $2768, $2769, $2770, $2771, $2772, $2773, $2774, $2775, $2776, $2777, $2778, $2779, $2780, $2781, $2782, $2783, $2784, $2785, $2786, $2787, $2788, VersionRange($2789, $2790)), ($2791, $2792, $2793, $2794, $2795, $2796, $2797, $2798, $2799, $2800, $2801, $2802, $2803, $2804, $2805, $2806, $2807, $2808, $2809, $2810, $2811, $2812, $2813, $2814, $2815, $2816, $2817, $2818, VersionRange($2819, $2820)), ($2821, $2822, $2823, $2824, $2825, $2826, $2827, $2828, $2829, $2830, $2831, $2832, $2833, $2834, $2835, $2836, $2837, $2838, $2839, $2840, $2841, $2842, $2843, $2844, $2845, $2846, $2847, $2848, VersionRange($2849, $2850)), ($2851, $2852, $2853, $2854, $2855, $2856, $2857, $2858, $2859, $2860, $2861, $2862, $2863, $2864, $2865, $2866, $2867, $2868, $2869, $2870, $2871, $2872, $2873, $2874, $2875, $2876, $2877, $2878, VersionRange($2879, $2880)), ($2881, $2882, $2883, $2884, $2885, $2886, $2887, $2888, $2889, $2890, $2891, $2892, $2893, $2894, $2895, $2896, $2897, $2898, $2899, $2900, $2901, $2902, $2903, $2904, $2905, $2906, $2907, $2908, VersionRange($2909, $2910)), ($2911, $2912, $2913, $2914, $2915, $2916, $2917, $2918, $2919, $2920, $2921, $2922, $2923, $2924, $2925, $2926, $2927, $2928, $2929, $2930, $2931, $2932, $2933, $2934, $2935, $2936, $2937, $2938, VersionRange($2939, $2940)), ($2941, $2942, $2943, $2944, $2945, $2946, $2947, $2948, $2949, $2950, $2951, $2952, $2953, $2954, $2955, $2956, $2957, $2958, $2959, $2960, $2961, $2962, $2963, $2964, $2965, $2966, $2967, $2968, VersionRange($2969, $2970)), ($2971, $2972, $2973, $2974, $2975, $2976, $2977, $2978, $2979, $2980, $2981, $2982, $2983, $2984, $2985, $2986, $2987, $2988, $2989, $2990, $2991, $2992, $2993, $2994, $2995, $2996, $2997, $2998, VersionRange($2999, $3000)), ($3001, $3002, $3003, $3004, $3005, $3006, $3007, $3008, $3009, $3010, $3011, $3012, $3013, $3014, $3015, $3016, $3017, $3018, $3019, $3020, $3021, $3022, $3023, $3024, $3025, $3026, $3027, $3028, VersionRange($3029, $3030)), ($3031, $3032, $3033, $3034, $3035, $3036, $3037, $3038, $3039, $3040, $3041, $3042, $3043, $3044, $3045, $3046, $3047, $3048, $3049, $3050, $3051, $3052, $3053, $3054, $3055, $3056, $3057, $3058, VersionRange($3059, $3060)), ($3061, $3062, $3063, $3064, $3065, $3066, $3067, $3068, $3069, $3070, $3071, $3072, $3073, $3074, $3075, $3076, $3077, $3078, $3079, $3080, $3081, $3082, $3083, $3084, $3085, $3086, $3087, $3088, VersionRange($3089, $3090)), ($3091, $3092, $3093, $3094, $3095, $3096, $3097, $3098, $3099, $3100, $3101, $3102, $3103, $3104, $3105, $3106, $3107, $3108, $3109, $3110, $3111, $3112, $3113, $3114, $3115, $3116, $3117, $3118, VersionRange($3119, $3120)), ($3121, $3122, $3123, $3124, $3125, $3126, $3127, $3128, $3129, $3130, $3131, $3132, $3133, $3134, $3135, $3136, $3137, $3138, $3139, $3140, $3141, $3142, $3143, $3144, $3145, $3146, $3147, $3148, VersionRange($3149, $3150)), ($3151, $3152, $3153, $3154, $3155, $3156, $3157, $3158, $3159, $3160, $3161, $3162, $3163, $3164, $3165, $3166, $3167, $3168, $3169, $3170, $3171, $3172, $3173, $3174, $3175, $3176, $3177, $3178, VersionRange($3179, $3180)), ($3181, $3182, $3183, $3184, $3185, $3186, $3187, $3188, $3189, $3190, $3191, $3192, $3193, $3194, $3195, $3196, $3197, $3198, $3199, $3200, $3201, $3202, $3203, $3204, $3205, $3206, $3207, $3208, VersionRange($3209, $3210)), ($3211, $3212, $3213, $3214, $3215, $3216, $3217, $3218, $3219, $3220, $3221, $3222, $3223, $3224, $3225, $3226, $3227, $3228, $3229, $3230, $3231, $3232, $3233, $3234, $3235, $3236, $3237, $3238, VersionRange($3239, $3240)), ($3241, $3242, $3243, $3244, $3245, $3246, $3247, $3248, $3249, $3250, $3251, $3252, $3253, $3254, $3255, $3256, $3257, $3258, $3259, $3260, $3261, $3262, $3263, $3264, $3265, $3266, $3267, $3268, VersionRange($3269, $3270)), ($3271, $3272, $3273, $3274, $3275, $3276, $3277, $3278, $3279, $3280, $3281, $3282, $3283, $3284, $3285, $3286, $3287, $3288, $3289, $3290, $3291, $3292, $3293, $3294, $3295, $3296, $3297, $3298, VersionRange($3299, $3300)), ($3301, $3302, $3303, $3304, $3305, $3306, $3307, $3308, $3309, $3310, $3311, $3312, $3313, $3314, $3315, $3316, $3317, $3318, $3319, $3320, $3321, $3322, $3323, $3324, $3325, $3326, $3327, $3328, VersionRange($3329, $3330)), ($3331, $3332, $3333, $3334, $3335, $3336, $3337, $3338, $3339, $3340, $3341, $3342, $3343, $3344, $3345, $3346, $3347, $3348, $3349, $3350, $3351, $3352, $3353, $3354, $3355, $3356, $3357, $3358, VersionRange($3359, $3360)), ($3361, $3362, $3363, $3364, $3365, $3366, $3367, $3368, $3369, $3370, $3371, $3372, $3373, $3374, $3375, $3376, $3377, $3378, $3379, $3380, $3381, $3382, $3383, $3384, $3385, $3386, $3387, $3388, VersionRange($3389, $3390)), ($3391, $3392, $3393, $3394, $3395, $3396, $3397, $3398, $3399, $3400, $3401, $3402, $3403, $3404, $3405, $3406, $3407, $3408, $3409, $3410, $3411, $3412, $3413, $3414, $3415, $3416, $3417, $3418, VersionRange($3419, $3420)), ($3421, $3422, $3423, $3424, $3425, $3426, $3427, $3428, $3429, $3430, $3431, $3432, $3433, $3434, $3435, $3436, $3437, $3438, $3439, $3440, $3441, $3442, $3443, $3444, $3445, $3446, $3447, $3448, VersionRange($3449, $3450)), ($3451, $3452, $3453, $3454, $3455, $3456, $3457, $3458, $3459, $3460, $3461, $3462, $3463, $3464, $3465, $3466, $3467, $3468, $3469, $3470, $3471, $3472, $3473, $3474, $3475, $3476, $3477, $3478, VersionRange($3479, $3480)), ($3481, $3482, $3483, $3484, $3485, $3486, $3487, $3488, $3489, $3490, $3491, $3492, $3493, $3494, $3495, $3496, $3497, $3498, $3499, $3500, $3501, $3502, $3503, $3504, $3505, $3506, $3507, $3508, VersionRange($3509, $3510)), ($3511, $3512, $3513, $3514, $3515, $3516, $3517, $3518, $3519, $3520, $3521, $3522, $3523, $3524, $3525, $3526, $3527, $3528, $3529, $3530, $3531, $3532, $3533, $3534, $3535, $3536, $3537, $3538, VersionRange($3539, $3540)), ($3541, $3542, $3543, $3544, $3545, $3546, $3547, $3548, $3549, $3550, $3551, $3552, $3553, $3554, $3555, $3556, $3557, $3558, $3559, $3560, $3561, $3562, $3563, $3564, $3565, $3566, $3567, $3568, VersionRange($3569, $3570)), ($3571, $3572, $3573, $3574, $3575, $3576, $3577, $3578, $3579, $3580, $3581, $3582, $3583, $3584, $3585, $3586, $3587, $3588, $3589, $3590, $3591, $3592, $3593, $3594, $3595, $3596, $3597, $3598, VersionRange($3599, $3600)), ($3601, $3602, $3603, $3604, $3605, $3606, $3607, $3608, $3609, $3610, $3611, $3612, $3613, $3614, $3615, $3616, $3617, $3618, $3619, $3620, $3621, $3622, $3623, $3624, $3625, $3626, $3627, $3628, VersionRange($3629, $3630)), ($3631, $3632, $3633, $3634, $3635, $3636, $3637, $3638, $3639, $3640, $3641, $3642, $3643, $3644, $3645, $3646, $3647, $3648, $3649, $3650, $3651, $3652, $3653, $3654, $3655, $3656, $3657, $3658, VersionRange($3659, $3660)), ($3661, $3662, $3663, $3664, $3665, $3666, $3667, $3668, $3669, $3670, $3671, $3672, $3673, $3674, $3675, $3676, $3677, $3678, $3679, $3680, $3681, $3682, $3683, $3684, $3685, $3686, $3687, $3688, VersionRange($3689, $3690)), ($3691, $3692, $3693, $3694, $3695, $3696, $3697, $3698, $3699, $3700, $3701, $3702, $3703, $3704, $3705, $3706, $3707, $3708, $3709, $3710, $3711, $3712, $3713, $3714, $3715, $3716, $3717, $3718, VersionRange($3719, $3720)), ($3721, $3722, $3723, $3724, $3725, $3726, $3727, $3728, $3729, $3730, $3731, $3732, $3733, $3734, $3735, $3736, $3737, $3738, $3739, $3740, $3741, $3742, $3743, $3744, $3745, $3746, $3747, $3748, VersionRange($3749, $3750)), ($3751, $3752, $3753, $3754, $3755, $3756, $3757, $3758, $3759, $3760, $3761, $3762, $3763, $3764, $3765, $3766, $3767, $3768, $3769, $3770, $3771, $3772, $3773, $3774, $3775, $3776, $3777, $3778, VersionRange($3779, $3780)), ($3781, $3782, $3783, $3784, $3785, $3786, $3787, $3788, $3789, $3790, $3791, $3792, $3793, $3794, $3795, $3796, $3797, $3798, $3799, $3800, $3801, $3802, $3803, $3804, $3805, $3806, $3807, $3808, VersionRange($3809, $3810)), ($3811, $3812, $3813, $3814, $3815, $3816, $3817, $3818, $3819, $3820, $3821, $3822, $3823, $3824, $3825, $3826, $3827, $3828, $3829, $3830, $3831, $3832, $3833, $3834, $3835, $3836, $3837, $3838, VersionRange($3839, $3840)), ($3841, $3842, $3843, $3844, $3845, $3846, $3847, $3848, $3849, $3850, $3851, $3852, $3853, $3854, $3855, $3856, $3857, $3858, $3859, $3860, $3861, $3862, $3863, $3864, $3865, $3866, $3867, $3868, VersionRange($3869, $3870)), ($3871, $3872, $3873, $3874, $3875, $3876, $3877, $3878, $3879, $3880, $3881, $3882, $3883, $3884, $3885, $3886, $3887, $3888, $3889, $3890, $3891, $3892, $3893, $3894, $3895, $3896, $3897, $3898, VersionRange($3899, $3900)), ($3901, $3902, $3903, $3904, $3905, $3906, $3907, $3908, $3909, $3910, $3911, $3912, $3913, $3914, $3915, $3916, $3917, $3918, $3919, $3920, $3921, $3922, $3923, $3924, $3925, $3926, $3927, $3928, VersionRange($3929, $3930)), ($3931, $3932, $3933, $3934, $3935, $3936, $3937, $3938, $3939, $3940, $3941, $3942, $3943, $3944, $3945, $3946, $3947, $3948, $3949, $3950, $3951, $3952, $3953, $3954, $3955, $3956, $3957, $3958, VersionRange($3959, $3960)), ($3961, $3962, $3963, $3964, $3965, $3966, $3967, $3968, $3969, $3970, $3971, $3972, $3973, $3974, $3975, $3976, $3977, $3978, $3979, $3980, $3981, $3982, $3983, $3984, $3985, $3986, $3987, $3988, VersionRange($3989, $3990)), ($3991, $3992, $3993, $3994, $3995, $3996, $3997, $3998, $3999, $4000, $4001, $4002, $4003, $4004, $4005, $4006, $4007, $4008, $4009, $4010, $4011, $4012, $4013, $4014, $4015, $4016, $4017, $4018, VersionRange($4019, $4020)), ($4021, $4022, $4023, $4024, $4025, $4026, $4027, $4028, $4029, $4030, $4031, $4032, $4033, $4034, $4035, $4036, $4037, $4038, $4039, $4040, $4041, $4042, $4043, $4044, $4045, $4046, $4047, $4048, VersionRange($4049, $4050)), ($4051, $4052, $4053, $4054, $4055, $4056, $4057, $4058, $4059, $4060, $4061, $4062, $4063, $4064, $4065, $4066, $4067, $4068, $4069, $4070, $4071, $4072, $4073, $4074, $4075, $4076, $4077, $4078, VersionRange($4079, $4080)), ($4081, $4082, $4083, $4084, $4085, $4086, $4087, $4088, $4089, $4090, $4091, $4092, $4093, $4094, $4095, $4096, $4097, $4098, $4099, $4100, $4101, $4102, $4103, $4104, $4105, $4106, $4107, $4108, VersionRange($4109, $4110)), ($4111, $4112, $4113, $4114, $4115, $4116, $4117, $4118, $4119, $4120, $4121, $4122, $4123, $4124, $4125, $4126, $4127, $4128, $4129, $4130, $4131, $4132, $4133, $4134, $4135, $4136, $4137, $4138, VersionRange($4139, $4140)), ($4141, $4142, $4143, $4144, $4145, $4146, $4147, $4148, $4149, $4150, $4151, $4152, $4153, $4154, $4155, $4156, $4157, $4158, $4159, $4160, $4161, $4162, $4163, $4164, $4165, $4166, $4167, $4168, VersionRange($4169, $4170)), ($4171, $4172, $4173, $4174, $4175, $4176, $4177, $4178, $4179, $4180, $4181, $4182, $4183, $4184, $4185, $4186, $4187, $4188, $4189, $4190, $4191, $4192, $4193, $4194, $4195, $4196, $4197, $4198, VersionRange($4199, $4200)), ($4201, $4202, $4203, $4204, $4205, $4206, $4207, $4208, $4209, $4210, $4211, $4212, $4213, $4214, $4215, $4216, $4217, $4218, $4219, $4220, $4221, $4222, $4223, $4224, $4225, $4226, $4227, $4228, VersionRange($4229, $4230)), ($4231, $4232, $4233, $4234, $4235, $4236, $4237, $4238, $4239, $4240, $4241, $4242, $4243, $4244, $4245, $4246, $4247, $4248, $4249, $4250, $4251, $4252, $4253, $4254, $4255, $4256, $4257, $4258, VersionRange($4259, $4260)), ($4261, $4262, $4263, $4264, $4265, $4266, $4267, $4268, $4269, $4270, $4271, $4272, $4273, $4274, $4275, $4276, $4277, $4278, $4279, $4280, $4281, $4282, $4283, $4284, $4285, $4286, $4287, $4288, VersionRange($4289, $4290)), ($4291, $4292, $4293, $4294, $4295, $4296, $4297, $4298, $4299, $4300, $4301, $4302, $4303, $4304, $4305, $4306, $4307, $4308, $4309, $4310, $4311, $4312, $4313, $4314, $4315, $4316, $4317, $4318, VersionRange($4319, $4320)), ($4321, $4322, $4323, $4324, $4325, $4326, $4327, $4328, $4329, $4330, $4331, $4332, $4333, $4334, $4335, $4336, $4337, $4338, $4339, $4340, $4341, $4342, $4343, $4344, $4345, $4346, $4347, $4348, VersionRange($4349, $4350)), ($4351, $4352, $4353, $4354, $4355, $4356, $4357, $4358, $4359, $4360, $4361, $4362, $4363, $4364, $4365, $4366, $4367, $4368, $4369, $4370, $4371, $4372, $4373, $4374, $4375, $4376, $4377, $4378, VersionRange($4379, $4380)), ($4381, $4382, $4383, $4384, $4385, $4386, $4387, $4388, $4389, $4390, $4391, $4392, $4393, $4394, $4395, $4396, $4397, $4398, $4399, $4400, $4401, $4402, $4403, $4404, $4405, $4406, $4407, $4408, VersionRange($4409, $4410)), ($4411, $4412, $4413, $4414, $4415, $4416, $4417, $4418, $4419, $4420, $4421, $4422, $4423, $4424, $4425, $4426, $4427, $4428, $4429, $4430, $4431, $4432, $4433, $4434, $4435, $4436, $4437, $4438, VersionRange($4439, $4440)), ($4441, $4442, $4443, $4444, $4445, $4446, $4447, $4448, $4449, $4450, $4451, $4452, $4453, $4454, $4455, $4456, $4457, $4458, $4459, $4460, $4461, $4462, $4463, $4464, $4465, $4466, $4467, $4468, VersionRange($4469, $4470)), ($4471, $4472, $4473, $4474, $4475, $4476, $4477, $4478, $4479, $4480, $4481, $4482, $4483, $4484, $4485, $4486, $4487, $4488, $4489, $4490, $4491, $4492, $4493, $4494, $4495, $4496, $4497, $4498, VersionRange($4499, $4500)), ($4501, $4502, $4503, $4504, $4505, $4506, $4507, $4508, $4509, $4510, $4511, $4512, $4513, $4514, $4515, $4516, $4517, $4518, $4519, $4520, $4521, $4522, $4523, $4524, $4525, $4526, $4527, $4528, VersionRange($4529, $4530)), ($4531, $4532, $4533, $4534, $4535, $4536, $4537, $4538, $4539, $4540, $4541, $4542, $4543, $4544, $4545, $4546, $4547, $4548, $4549, $4550, $4551, $4552, $4553, $4554, $4555, $4556, $4557, $4558, VersionRange($4559, $4560)), ($4561, $4562, $4563, $4564, $4565, $4566, $4567, $4568, $4569, $4570, $4571, $4572, $4573, $4574, $4575, $4576, $4577, $4578, $4579, $4580, $4581, $4582, $4583, $4584, $4585, $4586, $4587, $4588, VersionRange($4589, $4590)), ($4591, $4592, $4593, $4594, $4595, $4596, $4597, $4598, $4599, $4600, $4601, $4602, $4603, $4604, $4605, $4606, $4607, $4608, $4609, $4610, $4611, $4612, $4613, $4614, $4615, $4616, $4617, $4618, VersionRange($4619, $4620)), ($4621, $4622, $4623, $4624, $4625, $4626, $4627, $4628, $4629, $4630, $4631, $4632, $4633, $4634, $4635, $4636, $4637, $4638, $4639, $4640, $4641, $4642, $4643, $4644, $4645, $4646, $4647, $4648, VersionRange($4649, $4650)), ($4651, $4652, $4653, $4654, $4655, $4656, $4657, $4658, $4659, $4660, $4661, $4662, $4663, $4664, $4665, $4666, $4667, $4668, $4669, $4670, $4671, $4672, $4673, $4674, $4675, $4676, $4677, $4678, VersionRange($4679, $4680)), ($4681, $4682, $4683, $4684, $4685, $4686, $4687, $4688, $4689, $4690, $4691, $4692, $4693, $4694, $4695, $4696, $4697, $4698, $4699, $4700, $4701, $4702, $4703, $4704, $4705, $4706, $4707, $4708, VersionRange($4709, $4710)), ($4711, $4712, $4713, $4714, $4715, $4716, $4717, $4718, $4719, $4720, $4721, $4722, $4723, $4724, $4725, $4726, $4727, $4728, $4729, $4730, $4731, $4732, $4733, $4734, $4735, $4736, $4737, $4738, VersionRange($4739, $4740)), ($4741, $4742, $4743, $4744, $4745, $4746, $4747, $4748, $4749, $4750, $4751, $4752, $4753, $4754, $4755, $4756, $4757, $4758, $4759, $4760, $4761, $4762, $4763, $4764, $4765, $4766, $4767, $4768, VersionRange($4769, $4770)), ($4771, $4772, $4773, $4774, $4775, $4776, $4777, $4778, $4779, $4780, $4781, $4782, $4783, $4784, $4785, $4786, $4787, $4788, $4789, $4790, $4791, $4792, $4793, $4794, $4795, $4796, $4797, $4798, VersionRange($4799, $4800)), ($4801, $4802, $4803, $4804, $4805, $4806, $4807, $4808, $4809, $4810, $4811, $4812, $4813, $4814, $4815, $4816, $4817, $4818, $4819, $4820, $4821, $4822, $4823, $4824, $4825, $4826, $4827, $4828, VersionRange($4829, $4830)), ($4831, $4832, $4833, $4834, $4835, $4836, $4837, $4838, $4839, $4840, $4841, $4842, $4843, $4844, $4845, $4846, $4847, $4848, $4849, $4850, $4851, $4852, $4853, $4854, $4855, $4856, $4857, $4858, VersionRange($4859, $4860)), ($4861, $4862, $4863, $4864, $4865, $4866, $4867, $4868, $4869, $4870, $4871, $4872, $4873, $4874, $4875, $4876, $4877, $4878, $4879, $4880, $4881, $4882, $4883, $4884, $4885, $4886, $4887, $4888, VersionRange($4889, $4890)), ($4891, $4892, $4893, $4894, $4895, $4896, $4897, $4898, $4899, $4900, $4901, $4902, $4903, $4904, $4905, $4906, $4907, $4908, $4909, $4910, $4911, $4912, $4913, $4914, $4915, $4916, $4917, $4918, VersionRange($4919, $4920)), ($4921, $4922, $4923, $4924, $4925, $4926, $4927, $4928, $4929, $4930, $4931, $4932, $4933, $4934, $4935, $4936, $4937, $4938, $4939, $4940, $4941, $4942, $4943, $4944, $4945, $4946, $4947, $4948, VersionRange($4949, $4950)), ($4951, $4952, $4953, $4954, $4955, $4956, $4957, $4958, $4959, $4960, $4961, $4962, $4963, $4964, $4965, $4966, $4967, $4968, $4969, $4970, $4971, $4972, $4973, $4974, $4975, $4976, $4977, $4978, VersionRange($4979, $4980)), ($4981, $4982, $4983, $4984, $4985, $4986, $4987, $4988, $4989, $4990, $4991, $4992, $4993, $4994, $4995, $4996, $4997, $4998, $4999, $5000, $5001, $5002, $5003, $5004, $5005, $5006, $5007, $5008, VersionRange($5009, $5010)), ($5011, $5012, $5013, $5014, $5015, $5016, $5017, $5018, $5019, $5020, $5021, $5022, $5023, $5024, $5025, $5026, $5027, $5028, $5029, $5030, $5031, $5032, $5033, $5034, $5035, $5036, $5037, $5038, VersionRange($5039, $5040)), ($5041, $5042, $5043, $5044, $5045, $5046, $5047, $5048, $5049, $5050, $5051, $5052, $5053, $5054, $5055, $5056, $5057, $5058, $5059, $5060, $5061, $5062, $5063, $5064, $5065, $5066, $5067, $5068, VersionRange($5069, $5070)), ($5071, $5072, $5073, $5074, $5075, $5076, $5077, $5078, $5079, $5080, $5081, $5082, $5083, $5084, $5085, $5086, $5087, $5088, $5089, $5090, $5091, $5092, $5093, $5094, $5095, $5096, $5097, $5098, VersionRange($5099, $5100)), ($5101, $5102, $5103, $5104, $5105, $5106, $5107, $5108, $5109, $5110, $5111, $5112, $5113, $5114, $5115, $5116, $5117, $5118, $5119, $5120, $5121, $5122, $5123, $5124, $5125, $5126, $5127, $5128, VersionRange($5129, $5130)), ($5131, $5132, $5133, $5134, $5135, $5136, $5137, $5138, $5139, $5140, $5141, $5142, $5143, $5144, $5145, $5146, $5147, $5148, $5149, $5150, $5151, $5152, $5153, $5154, $5155, $5156, $5157, $5158, VersionRange($5159, $5160)), ($5161, $5162, $5163, $5164, $5165, $5166, $5167, $5168, $5169, $5170, $5171, $5172, $5173, $5174, $5175, $5176, $5177, $5178, $5179, $5180, $5181, $5182, $5183, $5184, $5185, $5186, $5187, $5188, VersionRange($5189, $5190)), ($5191, $5192, $5193, $5194, $5195, $5196, $5197, $5198, $5199, $5200, $5201, $5202, $5203, $5204, $5205, $5206, $5207, $5208, $5209, $5210, $5211, $5212, $5213, $5214, $5215, $5216, $5217, $5218, VersionRange($5219, $5220)), ($5221, $5222, $5223, $5224, $5225, $5226, $5227, $5228, $5229, $5230, $5231, $5232, $5233, $5234, $5235, $5236, $5237, $5238, $5239, $5240, $5241, $5242, $5243, $5244, $5245, $5246, $5247, $5248, VersionRange($5249, $5250)), ($5251, $5252, $5253, $5254, $5255, $5256, $5257, $5258, $5259, $5260, $5261, $5262, $5263, $5264, $5265, $5266, $5267, $5268, $5269, $5270, $5271, $5272, $5273, $5274, $5275, $5276, $5277, $5278, VersionRange($5279, $5280)), ($5281, $5282, $5283, $5284, $5285, $5286, $5287, $5288, $5289, $5290, $5291, $5292, $5293, $5294, $5295, $5296, $5297, $5298, $5299, $5300, $5301, $5302, $5303, $5304, $5305, $5306, $5307, $5308, VersionRange($5309, $5310)), ($5311, $5312, $5313, $5314, $5315, $5316, $5317, $5318, $5319, $5320, $5321, $5322, $5323, $5324, $5325, $5326, $5327, $5328, $5329, $5330, $5331, $5332, $5333, $5334, $5335, $5336, $5337, $5338, VersionRange($5339, $5340)), ($5341, $5342, $5343, $5344, $5345, $5346, $5347, $5348, $5349, $5350, $5351, $5352, $5353, $5354, $5355, $5356, $5357, $5358, $5359, $5360, $5361, $5362, $5363, $5364, $5365, $5366, $5367, $5368, VersionRange($5369, $5370)), ($5371, $5372, $5373, $5374, $5375, $5376, $5377, $5378, $5379, $5380, $5381, $5382, $5383, $5384, $5385, $5386, $5387, $5388, $5389, $5390, $5391, $5392, $5393, $5394, $5395, $5396, $5397, $5398, VersionRange($5399, $5400)), ($5401, $5402, $5403, $5404, $5405, $5406, $5407, $5408, $5409, $5410, $5411, $5412, $5413, $5414, $5415, $5416, $5417, $5418, $5419, $5420, $5421, $5422, $5423, $5424, $5425, $5426, $5427, $5428, VersionRange($5429, $5430)), ($5431, $5432, $5433, $5434, $5435, $5436, $5437, $5438, $5439, $5440, $5441, $5442, $5443, $5444, $5445, $5446, $5447, $5448, $5449, $5450, $5451, $5452, $5453, $5454, $5455, $5456, $5457, $5458, VersionRange($5459, $5460)), ($5461, $5462, $5463, $5464, $5465, $5466, $5467, $5468, $5469, $5470, $5471, $5472, $5473, $5474, $5475, $5476, $5477, $5478, $5479, $5480, $5481, $5482, $5483, $5484, $5485, $5486, $5487, $5488, VersionRange($5489, $5490)), ($5491, $5492, $5493, $5494, $5495, $5496, $5497, $5498, $5499, $5500, $5501, $5502, $5503, $5504, $5505, $5506, $5507, $5508, $5509, $5510, $5511, $5512, $5513, $5514, $5515, $5516, $5517, $5518, VersionRange($5519, $5520)), ($5521, $5522, $5523, $5524, $5525, $5526, $5527, $5528, $5529, $5530, $5531, $5532, $5533, $5534, $5535, $5536, $5537, $5538, $5539, $5540, $5541, $5542, $5543, $5544, $5545, $5546, $5547, $5548, VersionRange($5549, $5550)), ($5551, $5552, $5553, $5554, $5555, $5556, $5557, $5558, $5559, $5560, $5561, $5562, $5563, $5564, $5565, $5566, $5567, $5568, $5569, $5570, $5571, $5572, $5573, $5574, $5575, $5576, $5577, $5578, VersionRange($5579, $5580)), ($5581, $5582, $5583, $5584, $5585, $5586, $5587, $5588, $5589, $5590, $5591, $5592, $5593, $5594, $5595, $5596, $5597, $5598, $5599, $5600, $5601, $5602, $5603, $5604, $5605, $5606, $5607, $5608, VersionRange($5609, $5610)), ($5611, $5612, $5613, $5614, $5615, $5616, $5617, $5618, $5619, $5620, $5621, $5622, $5623, $5624, $5625, $5626, $5627, $5628, $5629, $5630, $5631, $5632, $5633, $5634, $5635, $5636, $5637, $5638, VersionRange($5639, $5640)), ($5641, $5642, $5643, $5644, $5645, $5646, $5647, $5648, $5649, $5650, $5651, $5652, $5653, $5654, $5655, $5656, $5657, $5658, $5659, $5660, $5661, $5662, $5663, $5664, $5665, $5666, $5667, $5668, VersionRange($5669, $5670)), ($5671, $5672, $5673, $5674, $5675, $5676, $5677, $5678, $5679, $5680, $5681, $5682, $5683, $5684, $5685, $5686, $5687, $5688, $5689, $5690, $5691, $5692, $5693, $5694, $5695, $5696, $5697, $5698, VersionRange($5699, $5700)), ($5701, $5702, $5703, $5704, $5705, $5706, $5707, $5708, $5709, $5710, $5711, $5712, $5713, $5714, $5715, $5716, $5717, $5718, $5719, $5720, $5721, $5722, $5723, $5724, $5725, $5726, $5727, $5728, VersionRange($5729, $5730)), ($5731, $5732, $5733, $5734, $5735, $5736, $5737, $5738, $5739, $5740, $5741, $5742, $5743, $5744, $5745, $5746, $5747, $5748, $5749, $5750, $5751, $5752, $5753, $5754, $5755, $5756, $5757, $5758, VersionRange($5759, $5760)), ($5761, $5762, $5763, $5764, $5765, $5766, $5767, $5768, $5769, $5770, $5771, $5772, $5773, $5774, $5775, $5776, $5777, $5778, $5779, $5780, $5781, $5782, $5783, $5784, $5785, $5786, $5787, $5788, VersionRange($5789, $5790)), ($5791, $5792, $5793, $5794, $5795, $5796, $5797, $5798, $5799, $5800, $5801, $5802, $5803, $5804, $5805, $5806, $5807, $5808, $5809, $5810, $5811, $5812, $5813, $5814, $5815, $5816, $5817, $5818, VersionRange($5819, $5820)), ($5821, $5822, $5823, $5824, $5825, $5826, $5827, $5828, $5829, $5830, $5831, $5832, $5833, $5834, $5835, $5836, $5837, $5838, $5839, $5840, $5841, $5842, $5843, $5844, $5845, $5846, $5847, $5848, VersionRange($5849, $5850)), ($5851, $5852, $5853, $5854, $5855, $5856, $5857, $5858, $5859, $5860, $5861, $5862, $5863, $5864, $5865, $5866, $5867, $5868, $5869, $5870, $5871, $5872, $5873, $5874, $5875, $5876, $5877, $5878, VersionRange($5879, $5880)), ($5881, $5882, $5883, $5884, $5885, $5886, $5887, $5888, $5889, $5890, $5891, $5892, $5893, $5894, $5895, $5896, $5897, $5898, $5899, $5900, $5901, $5902, $5903, $5904, $5905, $5906, $5907, $5908, VersionRange($5909, $5910)), ($5911, $5912, $5913, $5914, $5915, $5916, $5917, $5918, $5919, $5920, $5921, $5922, $5923, $5924, $5925, $5926, $5927, $5928, $5929, $5930, $5931, $5932, $5933, $5934, $5935, $5936, $5937, $5938, VersionRange($5939, $5940)), ($5941, $5942, $5943, $5944, $5945, $5946, $5947, $5948, $5949, $5950, $5951, $5952, $5953, $5954, $5955, $5956, $5957, $5958, $5959, $5960, $5961, $5962, $5963, $5964, $5965, $5966, $5967, $5968, VersionRange($5969, $5970)), ($5971, $5972, $5973, $5974, $5975, $5976, $5977, $5978, $5979, $5980, $5981, $5982, $5983, $5984, $5985, $5986, $5987, $5988, $5989, $5990, $5991, $5992, $5993, $5994, $5995, $5996, $5997, $5998, VersionRange($5999, $6000)), ($6001, $6002, $6003, $6004, $6005, $6006, $6007, $6008, $6009, $6010, $6011, $6012, $6013, $6014, $6015, $6016, $6017, $6018, $6019, $6020, $6021, $6022, $6023, $6024, $6025, $6026, $6027, $6028, VersionRange($6029, $6030)), ($6031, $6032, $6033, $6034, $6035, $6036, $6037, $6038, $6039, $6040, $6041, $6042, $6043, $6044, $6045, $6046, $6047, $6048, $6049, $6050, $6051, $6052, $6053, $6054, $6055, $6056, $6057, $6058, VersionRange($6059, $6060)), ($6061, $6062, $6063, $6064, $6065, $6066, $6067, $6068, $6069, $6070, $6071, $6072, $6073, $6074, $6075, $6076, $6077, $6078, $6079, $6080, $6081, $6082, $6083, $6084, $6085, $6086, $6087, $6088, VersionRange($6089, $6090)), ($6091, $6092, $6093, $6094, $6095, $6096, $6097, $6098, $6099, $6100, $6101, $6102, $6103, $6104, $6105, $6106, $6107, $6108, $6109, $6110, $6111, $6112, $6113, $6114, $6115, $6116, $6117, $6118, VersionRange($6119, $6120)), ($6121, $6122, $6123, $6124, $6125, $6126, $6127, $6128, $6129, $6130, $6131, $6132, $6133, $6134, $6135, $6136, $6137, $6138, $6139, $6140, $6141, $6142, $6143, $6144, $6145, $6146, $6147, $6148, VersionRange($6149, $6150)), ($6151, $6152, $6153, $6154, $6155, $6156, $6157, $6158, $6159, $6160, $6161, $6162, $6163, $6164, $6165, $6166, $6167, $6168, $6169, $6170, $6171, $6172, $6173, $6174, $6175, $6176, $6177, $6178, VersionRange($6179, $6180)), ($6181, $6182, $6183, $6184, $6185, $6186, $6187, $6188, $6189, $6190, $6191, $6192, $6193, $6194, $6195, $6196, $6197, $6198, $6199, $6200, $6201, $6202, $6203, $6204, $6205, $6206, $6207, $6208, VersionRange($6209, $6210)), ($6211, $6212, $6213, $6214, $6215, $6216, $6217, $6218, $6219, $6220, $6221, $6222, $6223, $6224, $6225, $6226, $6227, $6228, $6229, $6230, $6231, $6232, $6233, $6234, $6235, $6236, $6237, $6238, VersionRange($6239, $6240)), ($6241, $6242, $6243, $6244, $6245, $6246, $6247, $6248, $6249, $6250, $6251, $6252, $6253, $6254, $6255, $6256, $6257, $6258, $6259, $6260, $6261, $6262, $6263, $6264, $6265, $6266, $6267, $6268, VersionRange($6269, $6270)), ($6271, $6272, $6273, $6274, $6275, $6276, $6277, $6278, $6279, $6280, $6281, $6282, $6283, $6284, $6285, $6286, $6287, $6288, $6289, $6290, $6291, $6292, $6293, $6294, $6295, $6296, $6297, $6298, VersionRange($6299, $6300)), ($6301, $6302, $6303, $6304, $6305, $6306, $6307, $6308, $6309, $6310, $6311, $6312, $6313, $6314, $6315, $6316, $6317, $6318, $6319, $6320, $6321, $6322, $6323, $6324, $6325, $6326, $6327, $6328, VersionRange($6329, $6330)), ($6331, $6332, $6333, $6334, $6335, $6336, $6337, $6338, $6339, $6340, $6341, $6342, $6343, $6344, $6345, $6346, $6347, $6348, $6349, $6350, $6351, $6352, $6353, $6354, $6355, $6356, $6357, $6358, VersionRange($6359, $6360)), ($6361, $6362, $6363, $6364, $6365, $6366, $6367, $6368, $6369, $6370, $6371, $6372, $6373, $6374, $6375, $6376, $6377, $6378, $6379, $6380, $6381, $6382, $6383, $6384, $6385, $6386, $6387, $6388, VersionRange($6389, $6390)), ($6391, $6392, $6393, $6394, $6395, $6396, $6397, $6398, $6399, $6400, $6401, $6402, $6403, $6404, $6405, $6406, $6407, $6408, $6409, $6410, $6411, $6412, $6413, $6414, $6415, $6416, $6417, $6418, VersionRange($6419, $6420)), ($6421, $6422, $6423, $6424, $6425, $6426, $6427, $6428, $6429, $6430, $6431, $6432, $6433, $6434, $6435, $6436, $6437, $6438, $6439, $6440, $6441, $6442, $6443, $6444, $6445, $6446, $6447, $6448, VersionRange($6449, $6450)), ($6451, $6452, $6453, $6454, $6455, $6456, $6457, $6458, $6459, $6460, $6461, $6462, $6463, $6464, $6465, $6466, $6467, $6468, $6469, $6470, $6471, $6472, $6473, $6474, $6475, $6476, $6477, $6478, VersionRange($6479, $6480)), ($6481, $6482, $6483, $6484, $6485, $6486, $6487, $6488, $6489, $6490, $6491, $6492, $6493, $6494, $6495, $6496, $6497, $6498, $6499, $6500, $6501, $6502, $6503, $6504, $6505, $6506, $6507, $6508, VersionRange($6509, $6510)), ($6511, $6512, $6513, $6514, $6515, $6516, $6517, $6518, $6519, $6520, $6521, $6522, $6523, $6524, $6525, $6526, $6527, $6528, $6529, $6530, $6531, $6532, $6533, $6534, $6535, $6536, $6537, $6538, VersionRange($6539, $6540)), ($6541, $6542, $6543, $6544, $6545, $6546, $6547, $6548, $6549, $6550, $6551, $6552, $6553, $6554, $6555, $6556, $6557, $6558, $6559, $6560, $6561, $6562, $6563, $6564, $6565, $6566, $6567, $6568, VersionRange($6569, $6570)), ($6571, $6572, $6573, $6574, $6575, $6576, $6577, $6578, $6579, $6580, $6581, $6582, $6583, $6584, $6585, $6586, $6587, $6588, $6589, $6590, $6591, $6592, $6593, $6594, $6595, $6596, $6597, $6598, VersionRange($6599, $6600)), ($6601, $6602, $6603, $6604, $6605, $6606, $6607, $6608, $6609, $6610, $6611, $6612, $6613, $6614, $6615, $6616, $6617, $6618, $6619, $6620, $6621, $6622, $6623, $6624, $6625, $6626, $6627, $6628, VersionRange($6629, $6630)), ($6631, $6632, $6633, $6634, $6635, $6636, $6637, $6638, $6639, $6640, $6641, $6642, $6643, $6644, $6645, $6646, $6647, $6648, $6649, $6650, $6651, $6652, $6653, $6654, $6655, $6656, $6657, $6658, VersionRange($6659, $6660)), ($6661, $6662, $6663, $6664, $6665, $6666, $6667, $6668, $6669, $6670, $6671, $6672, $6673, $6674, $6675, $6676, $6677, $6678, $6679, $6680, $6681, $6682, $6683, $6684, $6685, $6686, $6687, $6688, VersionRange($6689, $6690)), ($6691, $6692, $6693, $6694, $6695, $6696, $6697, $6698, $6699, $6700, $6701, $6702, $6703, $6704, $6705, $6706, $6707, $6708, $6709, $6710, $6711, $6712, $6713, $6714, $6715, $6716, $6717, $6718, VersionRange($6719, $6720)), ($6721, $6722, $6723, $6724, $6725, $6726, $6727, $6728, $6729, $6730, $6731, $6732, $6733, $6734, $6735, $6736, $6737, $6738, $6739, $6740, $6741, $6742, $6743, $6744, $6745, $6746, $6747, $6748, VersionRange($6749, $6750)), ($6751, $6752, $6753, $6754, $6755, $6756, $6757, $6758, $6759, $6760, $6761, $6762, $6763, $6764, $6765, $6766, $6767, $6768, $6769, $6770, $6771, $6772, $6773, $6774, $6775, $6776, $6777, $6778, VersionRange($6779, $6780)), ($6781, $6782, $6783, $6784, $6785, $6786, $6787, $6788, $6789, $6790, $6791, $6792, $6793, $6794, $6795, $6796, $6797, $6798, $6799, $6800, $6801, $6802, $6803, $6804, $6805, $6806, $6807, $6808, VersionRange($6809, $6810)), ($6811, $6812, $6813, $6814, $6815, $6816, $6817, $6818, $6819, $6820, $6821, $6822, $6823, $6824, $6825, $6826, $6827, $6828, $6829, $6830, $6831, $6832, $6833, $6834, $6835, $6836, $6837, $6838, VersionRange($6839, $6840)), ($6841, $6842, $6843, $6844, $6845, $6846, $6847, $6848, $6849, $6850, $6851, $6852, $6853, $6854, $6855, $6856, $6857, $6858, $6859, $6860, $6861, $6862, $6863, $6864, $6865, $6866, $6867, $6868, VersionRange($6869, $6870)), ($6871, $6872, $6873, $6874, $6875, $6876, $6877, $6878, $6879, $6880, $6881, $6882, $6883, $6884, $6885, $6886, $6887, $6888, $6889, $6890, $6891, $6892, $6893, $6894, $6895, $6896, $6897, $6898, VersionRange($6899, $6900)), ($6901, $6902, $6903, $6904, $6905, $6906, $6907, $6908, $6909, $6910, $6911, $6912, $6913, $6914, $6915, $6916, $6917, $6918, $6919, $6920, $6921, $6922, $6923, $6924, $6925, $6926, $6927, $6928, VersionRange($6929, $6930)), ($6931, $6932, $6933, $6934, $6935, $6936, $6937, $6938, $6939, $6940, $6941, $6942, $6943, $6944, $6945, $6946, $6947, $6948, $6949, $6950, $6951, $6952, $6953, $6954, $6955, $6956, $6957, $6958, VersionRange($6959, $6960)), ($6961, $6962, $6963, $6964, $6965, $6966, $6967, $6968, $6969, $6970, $6971, $6972, $6973, $6974, $6975, $6976, $6977, $6978, $6979, $6980, $6981, $6982, $6983, $6984, $6985, $6986, $6987, $6988, VersionRange($6989, $6990)), ($6991, $6992, $6993, $6994, $6995, $6996, $6997, $6998, $6999, $7000, $7001, $7002, $7003, $7004, $7005, $7006, $7007, $7008, $7009, $7010, $7011, $7012, $7013, $7014, $7015, $7016, $7017, $7018, VersionRange($7019, $7020)), ($7021, $7022, $7023, $7024, $7025, $7026, $7027, $7028, $7029, $7030, $7031, $7032, $7033, $7034, $7035, $7036, $7037, $7038, $7039, $7040, $7041, $7042, $7043, $7044, $7045, $7046, $7047, $7048, VersionRange($7049, $7050)), ($7051, $7052, $7053, $7054, $7055, $7056, $7057, $7058, $7059, $7060, $7061, $7062, $7063, $7064, $7065, $7066, $7067, $7068, $7069, $7070, $7071, $7072, $7073, $7074, $7075, $7076, $7077, $7078, VersionRange($7079, $7080)), ($7081, $7082, $7083, $7084, $7085, $7086, $7087, $7088, $7089, $7090, $7091, $7092, $7093, $7094, $7095, $7096, $7097, $7098, $7099, $7100, $7101, $7102, $7103, $7104, $7105, $7106, $7107, $7108, VersionRange($7109, $7110)), ($7111, $7112, $7113, $7114, $7115, $7116, $7117, $7118, $7119, $7120, $7121, $7122, $7123, $7124, $7125, $7126, $7127, $7128, $7129, $7130, $7131, $7132, $7133, $7134, $7135, $7136, $7137, $7138, VersionRange($7139, $7140)), ($7141, $7142, $7143, $7144, $7145, $7146, $7147, $7148, $7149, $7150, $7151, $7152, $7153, $7154, $7155, $7156, $7157, $7158, $7159, $7160, $7161, $7162, $7163, $7164, $7165, $7166, $7167, $7168, VersionRange($7169, $7170)), ($7171, $7172, $7173, $7174, $7175, $7176, $7177, $7178, $7179, $7180, $7181, $7182, $7183, $7184, $7185, $7186, $7187, $7188, $7189, $7190, $7191, $7192, $7193, $7194, $7195, $7196, $7197, $7198, VersionRange($7199, $7200)), ($7201, $7202, $7203, $7204, $7205, $7206, $7207, $7208, $7209, $7210, $7211, $7212, $7213, $7214, $7215, $7216, $7217, $7218, $7219, $7220, $7221, $7222, $7223, $7224, $7225, $7226, $7227, $7228, VersionRange($7229, $7230)), ($7231, $7232, $7233, $7234, $7235, $7236, $7237, $7238, $7239, $7240, $7241, $7242, $7243, $7244, $7245, $7246, $7247, $7248, $7249, $7250, $7251, $7252, $7253, $7254, $7255, $7256, $7257, $7258, VersionRange($7259, $7260)), ($7261, $7262, $7263, $7264, $7265, $7266, $7267, $7268, $7269, $7270, $7271, $7272, $7273, $7274, $7275, $7276, $7277, $7278, $7279, $7280, $7281, $7282, $7283, $7284, $7285, $7286, $7287, $7288, VersionRange($7289, $7290)), ($7291, $7292, $7293, $7294, $7295, $7296, $7297, $7298, $7299, $7300, $7301, $7302, $7303, $7304, $7305, $7306, $7307, $7308, $7309, $7310, $7311, $7312, $7313, $7314, $7315, $7316, $7317, $7318, VersionRange($7319, $7320)), ($7321, $7322, $7323, $7324, $7325, $7326, $7327, $7328, $7329, $7330, $7331, $7332, $7333, $7334, $7335, $7336, $7337, $7338, $7339, $7340, $7341, $7342, $7343, $7344, $7345, $7346, $7347, $7348, VersionRange($7349, $7350)), ($7351, $7352, $7353, $7354, $7355, $7356, $7357, $7358, $7359, $7360, $7361, $7362, $7363, $7364, $7365, $7366, $7367, $7368, $7369, $7370, $7371, $7372, $7373, $7374, $7375, $7376, $7377, $7378, VersionRange($7379, $7380)), ($7381, $7382, $7383, $7384, $7385, $7386, $7387, $7388, $7389, $7390, $7391, $7392, $7393, $7394, $7395, $7396, $7397, $7398, $7399, $7400, $7401, $7402, $7403, $7404, $7405, $7406, $7407, $7408, VersionRange($7409, $7410)), ($7411, $7412, $7413, $7414, $7415, $7416, $7417, $7418, $7419, $7420, $7421, $7422, $7423, $7424, $7425, $7426, $7427, $7428, $7429, $7430, $7431, $7432, $7433, $7434, $7435, $7436, $7437, $7438, VersionRange($7439, $7440)), ($7441, $7442, $7443, $7444, $7445, $7446, $7447, $7448, $7449, $7450, $7451, $7452, $7453, $7454, $7455, $7456, $7457, $7458, $7459, $7460, $7461, $7462, $7463, $7464, $7465, $7466, $7467, $7468, VersionRange($7469, $7470)), ($7471, $7472, $7473, $7474, $7475, $7476, $7477, $7478, $7479, $7480, $7481, $7482, $7483, $7484, $7485, $7486, $7487, $7488, $7489, $7490, $7491, $7492, $7493, $7494, $7495, $7496, $7497, $7498, VersionRange($7499, $7500)), ($7501, $7502, $7503, $7504, $7505, $7506, $7507, $7508, $7509, $7510, $7511, $7512, $7513, $7514, $7515, $7516, $7517, $7518, $7519, $7520, $7521, $7522, $7523, $7524, $7525, $7526, $7527, $7528, VersionRange($7529, $7530)), ($7531, $7532, $7533, $7534, $7535, $7536, $7537, $7538, $7539, $7540, $7541, $7542, $7543, $7544, $7545, $7546, $7547, $7548, $7549, $7550, $7551, $7552, $7553, $7554, $7555, $7556, $7557, $7558, VersionRange($7559, $7560)), ($7561, $7562, $7563, $7564, $7565, $7566, $7567, $7568, $7569, $7570, $7571, $7572, $7573, $7574, $7575, $7576, $7577, $7578, $7579, $7580, $7581, $7582, $7583, $7584, $7585, $7586, $7587, $7588, VersionRange($7589, $7590)), ($7591, $7592, $7593, $7594, $7595, $7596, $7597, $7598, $7599, $7600, $7601, $7602, $7603, $7604, $7605, $7606, $7607, $7608, $7609, $7610, $7611, $7612, $7613, $7614, $7615, $7616, $7617, $7618, VersionRange($7619, $7620)), ($7621, $7622, $7623, $7624, $7625, $7626, $7627, $7628, $7629, $7630, $7631, $7632, $7633, $7634, $7635, $7636, $7637, $7638, $7639, $7640, $7641, $7642, $7643, $7644, $7645, $7646, $7647, $7648, VersionRange($7649, $7650)), ($7651, $7652, $7653, $7654, $7655, $7656, $7657, $7658, $7659, $7660, $7661, $7662, $7663, $7664, $7665, $7666, $7667, $7668, $7669, $7670, $7671, $7672, $7673, $7674, $7675, $7676, $7677, $7678, VersionRange($7679, $7680)), ($7681, $7682, $7683, $7684, $7685, $7686, $7687, $7688, $7689, $7690, $7691, $7692, $7693, $7694, $7695, $7696, $7697, $7698, $7699, $7700, $7701, $7702, $7703, $7704, $7705, $7706, $7707, $7708, VersionRange($7709, $7710)), ($7711, $7712, $7713, $7714, $7715, $7716, $7717, $7718, $7719, $7720, $7721, $7722, $7723, $7724, $7725, $7726, $7727, $7728, $7729, $7730, $7731, $7732, $7733, $7734, $7735, $7736, $7737, $7738, VersionRange($7739, $7740)), ($7741, $7742, $7743, $7744, $7745, $7746, $7747, $7748, $7749, $7750, $7751, $7752, $7753, $7754, $7755, $7756, $7757, $7758, $7759, $7760, $7761, $7762, $7763, $7764, $7765, $7766, $7767, $7768, VersionRange($7769, $7770)), ($7771, $7772, $7773, $7774, $7775, $7776, $7777, $7778, $7779, $7780, $7781, $7782, $7783, $7784, $7785, $7786, $7787, $7788, $7789, $7790, $7791, $7792, $7793, $7794, $7795, $7796, $7797, $7798, VersionRange($7799, $7800)), ($7801, $7802, $7803, $7804, $7805, $7806, $7807, $7808, $7809, $7810, $7811, $7812, $7813, $7814, $7815, $7816, $7817, $7818, $7819, $7820, $7821, $7822, $7823, $7824, $7825, $7826, $7827, $7828, VersionRange($7829, $7830)), ($7831, $7832, $7833, $7834, $7835, $7836, $7837, $7838, $7839, $7840, $7841, $7842, $7843, $7844, $7845, $7846, $7847, $7848, $7849, $7850, $7851, $7852, $7853, $7854, $7855, $7856, $7857, $7858, VersionRange($7859, $7860)), ($7861, $7862, $7863, $7864, $7865, $7866, $7867, $7868, $7869, $7870, $7871, $7872, $7873, $7874, $7875, $7876, $7877, $7878, $7879, $7880, $7881, $7882, $7883, $7884, $7885, $7886, $7887, $7888, VersionRange($7889, $7890)), ($7891, $7892, $7893, $7894, $7895, $7896, $7897, $7898, $7899, $7900, $7901, $7902, $7903, $7904, $7905, $7906, $7907, $7908, $7909, $7910, $7911, $7912, $7913, $7914, $7915, $7916, $7917, $7918, VersionRange($7919, $7920)), ($7921, $7922, $7923, $7924, $7925, $7926, $7927, $7928, $7929, $7930, $7931, $7932, $7933, $7934, $7935, $7936, $7937, $7938, $7939, $7940, $7941, $7942, $7943, $7944, $7945, $7946, $7947, $7948, VersionRange($7949, $7950)), ($7951, $7952, $7953, $7954, $7955, $7956, $7957, $7958, $7959, $7960, $7961, $7962, $7963, $7964, $7965, $7966, $7967, $7968, $7969, $7970, $7971, $7972, $7973, $7974, $7975, $7976, $7977, $7978, VersionRange($7979, $7980)), ($7981, $7982, $7983, $7984, $7985, $7986, $7987, $7988, $7989, $7990, $7991, $7992, $7993, $7994, $7995, $7996, $7997, $7998, $7999, $8000, $8001, $8002, $8003, $8004, $8005, $8006, $8007, $8008, VersionRange($8009, $8010)), ($8011, $8012, $8013, $8014, $8015, $8016, $8017, $8018, $8019, $8020, $8021, $8022, $8023, $8024, $8025, $8026, $8027, $8028, $8029, $8030, $8031, $8032, $8033, $8034, $8035, $8036, $8037, $8038, VersionRange($8039, $8040)), ($8041, $8042, $8043, $8044, $8045, $8046, $8047, $8048, $8049, $8050, $8051, $8052, $8053, $8054, $8055, $8056, $8057, $8058, $8059, $8060, $8061, $8062, $8063, $8064, $8065, $8066, $8067, $8068, VersionRange($8069, $8070)), ($8071, $8072, $8073, $8074, $8075, $8076, $8077, $8078, $8079, $8080, $8081, $8082, $8083, $8084, $8085, $8086, $8087, $8088, $8089, $8090, $8091, $8092, $8093, $8094, $8095, $8096, $8097, $8098, VersionRange($8099, $8100)), ($8101, $8102, $8103, $8104, $8105, $8106, $8107, $8108, $8109, $8110, $8111, $8112, $8113, $8114, $8115, $8116, $8117, $8118, $8119, $8120, $8121, $8122, $8123, $8124, $8125, $8126, $8127, $8128, VersionRange($8129, $8130)), ($8131, $8132, $8133, $8134, $8135, $8136, $8137, $8138, $8139, $8140, $8141, $8142, $8143, $8144, $8145, $8146, $8147, $8148, $8149, $8150, $8151, $8152, $8153, $8154, $8155, $8156, $8157, $8158, VersionRange($8159, $8160)), ($8161, $8162, $8163, $8164, $8165, $8166, $8167, $8168, $8169, $8170, $8171, $8172, $8173, $8174, $8175, $8176, $8177, $8178, $8179, $8180, $8181, $8182, $8183, $8184, $8185, $8186, $8187, $8188, VersionRange($8189, $8190)), ($8191, $8192, $8193, $8194, $8195, $8196, $8197, $8198, $8199, $8200, $8201, $8202, $8203, $8204, $8205, $8206, $8207, $8208, $8209, $8210, $8211, $8212, $8213, $8214, $8215, $8216, $8217, $8218, VersionRange($8219, $8220)), ($8221, $8222, $8223, $8224, $8225, $8226, $8227, $8228, $8229, $8230, $8231, $8232, $8233, $8234, $8235, $8236, $8237, $8238, $8239, $8240, $8241, $8242, $8243, $8244, $8245, $8246, $8247, $8248, VersionRange($8249, $8250)), ($8251, $8252, $8253, $8254, $8255, $8256, $8257, $8258, $8259, $8260, $8261, $8262, $8263, $8264, $8265, $8266, $8267, $8268, $8269, $8270, $8271, $8272, $8273, $8274, $8275, $8276, $8277, $8278, VersionRange($8279, $8280)), ($8281, $8282, $8283, $8284, $8285, $8286, $8287, $8288, $8289, $8290, $8291, $8292, $8293, $8294, $8295, $8296, $8297, $8298, $8299, $8300, $8301, $8302, $8303, $8304, $8305, $8306, $8307, $8308, VersionRange($8309, $8310)), ($8311, $8312, $8313, $8314, $8315, $8316, $8317, $8318, $8319, $8320, $8321, $8322, $8323, $8324, $8325, $8326, $8327, $8328, $8329, $8330, $8331, $8332, $8333, $8334, $8335, $8336, $8337, $8338, VersionRange($8339, $8340)), ($8341, $8342, $8343, $8344, $8345, $8346, $8347, $8348, $8349, $8350, $8351, $8352, $8353, $8354, $8355, $8356, $8357, $8358, $8359, $8360, $8361, $8362, $8363, $8364, $8365, $8366, $8367, $8368, VersionRange($8369, $8370)), ($8371, $8372, $8373, $8374, $8375, $8376, $8377, $8378, $8379, $8380, $8381, $8382, $8383, $8384, $8385, $8386, $8387, $8388, $8389, $8390, $8391, $8392, $8393, $8394, $8395, $8396, $8397, $8398, VersionRange($8399, $8400)), ($8401, $8402, $8403, $8404, $8405, $8406, $8407, $8408, $8409, $8410, $8411, $8412, $8413, $8414, $8415, $8416, $8417, $8418, $8419, $8420, $8421, $8422, $8423, $8424, $8425, $8426, $8427, $8428, VersionRange($8429, $8430)), ($8431, $8432, $8433, $8434, $8435, $8436, $8437, $8438, $8439, $8440, $8441, $8442, $8443, $8444, $8445, $8446, $8447, $8448, $8449, $8450, $8451, $8452, $8453, $8454, $8455, $8456, $8457, $8458, VersionRange($8459, $8460)), ($8461, $8462, $8463, $8464, $8465, $8466, $8467, $8468, $8469, $8470, $8471, $8472, $8473, $8474, $8475, $8476, $8477, $8478, $8479, $8480, $8481, $8482, $8483, $8484, $8485, $8486, $8487, $8488, VersionRange($8489, $8490)), ($8491, $8492, $8493, $8494, $8495, $8496, $8497, $8498, $8499, $8500, $8501, $8502, $8503, $8504, $8505, $8506, $8507, $8508, $8509, $8510, $8511, $8512, $8513, $8514, $8515, $8516, $8517, $8518, VersionRange($8519, $8520)), ($8521, $8522, $8523, $8524, $8525, $8526, $8527, $8528, $8529, $8530, $8531, $8532, $8533, $8534, $8535, $8536, $8537, $8538, $8539, $8540, $8541, $8542, $8543, $8544, $8545, $8546, $8547, $8548, VersionRange($8549, $8550)), ($8551, $8552, $8553, $8554, $8555, $8556, $8557, $8558, $8559, $8560, $8561, $8562, $8563, $8564, $8565, $8566, $8567, $8568, $8569, $8570, $8571, $8572, $8573, $8574, $8575, $8576, $8577, $8578, VersionRange($8579, $8580)), ($8581, $8582, $8583, $8584, $8585, $8586, $8587, $8588, $8589, $8590, $8591, $8592, $8593, $8594, $8595, $8596, $8597, $8598, $8599, $8600, $8601, $8602, $8603, $8604, $8605, $8606, $8607, $8608, VersionRange($8609, $8610)), ($8611, $8612, $8613, $8614, $8615, $8616, $8617, $8618, $8619, $8620, $8621, $8622, $8623, $8624, $8625, $8626, $8627, $8628, $8629, $8630, $8631, $8632, $8633, $8634, $8635, $8636, $8637, $8638, VersionRange($8639, $8640)), ($8641, $8642, $8643, $8644, $8645, $8646, $8647, $8648, $8649, $8650, $8651, $8652, $8653, $8654, $8655, $8656, $8657, $8658, $8659, $8660, $8661, $8662, $8663, $8664, $8665, $8666, $8667, $8668, VersionRange($8669, $8670)), ($8671, $8672, $8673, $8674, $8675, $8676, $8677, $8678, $8679, $8680, $8681, $8682, $8683, $8684, $8685, $8686, $8687, $8688, $8689, $8690, $8691, $8692, $8693, $8694, $8695, $8696, $8697, $8698, VersionRange($8699, $8700)), ($8701, $8702, $8703, $8704, $8705, $8706, $8707, $8708, $8709, $8710, $8711, $8712, $8713, $8714, $8715, $8716, $8717, $8718, $8719, $8720, $8721, $8722, $8723, $8724, $8725, $8726, $8727, $8728, VersionRange($8729, $8730)), ($8731, $8732, $8733, $8734, $8735, $8736, $8737, $8738, $8739, $8740, $8741, $8742, $8743, $8744, $8745, $8746, $8747, $8748, $8749, $8750, $8751, $8752, $8753, $8754, $8755, $8756, $8757, $8758, VersionRange($8759, $8760)), ($8761, $8762, $8763, $8764, $8765, $8766, $8767, $8768, $8769, $8770, $8771, $8772, $8773, $8774, $8775, $8776, $8777, $8778, $8779, $8780, $8781, $8782, $8783, $8784, $8785, $8786, $8787, $8788, VersionRange($8789, $8790)), ($8791, $8792, $8793, $8794, $8795, $8796, $8797, $8798, $8799, $8800, $8801, $8802, $8803, $8804, $8805, $8806, $8807, $8808, $8809, $8810, $8811, $8812, $8813, $8814, $8815, $8816, $8817, $8818, VersionRange($8819, $8820)), ($8821, $8822, $8823, $8824, $8825, $8826, $8827, $8828, $8829, $8830, $8831, $8832, $8833, $8834, $8835, $8836, $8837, $8838, $8839, $8840, $8841, $8842, $8843, $8844, $8845, $8846, $8847, $8848, VersionRange($8849, $8850)), ($8851, $8852, $8853, $8854, $8855, $8856, $8857, $8858, $8859, $8860, $8861, $8862, $8863, $8864, $8865, $8866, $8867, $8868, $8869, $8870, $8871, $8872, $8873, $8874, $8875, $8876, $8877, $8878, VersionRange($8879, $8880)), ($8881, $8882, $8883, $8884, $8885, $8886, $8887, $8888, $8889, $8890, $8891, $8892, $8893, $8894, $8895, $8896, $8897, $8898, $8899, $8900, $8901, $8902, $8903, $8904, $8905, $8906, $8907, $8908, VersionRange($8909, $8910)), ($8911, $8912, $8913, $8914, $8915, $8916, $8917, $8918, $8919, $8920, $8921, $8922, $8923, $8924, $8925, $8926, $8927, $8928, $8929, $8930, $8931, $8932, $8933, $8934, $8935, $8936, $8937, $8938, VersionRange($8939, $8940)), ($8941, $8942, $8943, $8944, $8945, $8946, $8947, $8948, $8949, $8950, $8951, $8952, $8953, $8954, $8955, $8956, $8957, $8958, $8959, $8960, $8961, $8962, $8963, $8964, $8965, $8966, $8967, $8968, VersionRange($8969, $8970)), ($8971, $8972, $8973, $8974, $8975, $8976, $8977, $8978, $8979, $8980, $8981, $8982, $8983, $8984, $8985, $8986, $8987, $8988, $8989, $8990, $8991, $8992, $8993, $8994, $8995, $8996, $8997, $8998, VersionRange($8999, $9000)), ($9001, $9002, $9003, $9004, $9005, $9006, $9007, $9008, $9009, $9010, $9011, $9012, $9013, $9014, $9015, $9016, $9017, $9018, $9019, $9020, $9021, $9022, $9023, $9024, $9025, $9026, $9027, $9028, VersionRange($9029, $9030)), ($9031, $9032, $9033, $9034, $9035, $9036, $9037, $9038, $9039, $9040, $9041, $9042, $9043, $9044, $9045, $9046, $9047, $9048, $9049, $9050, $9051, $9052, $9053, $9054, $9055, $9056, $9057, $9058, VersionRange($9059, $9060)), ($9061, $9062, $9063, $9064, $9065, $9066, $9067, $9068, $9069, $9070, $9071, $9072, $9073, $9074, $9075, $9076, $9077, $9078, $9079, $9080, $9081, $9082, $9083, $9084, $9085, $9086, $9087, $9088, VersionRange($9089, $9090)), ($9091, $9092, $9093, $9094, $9095, $9096, $9097, $9098, $9099, $9100, $9101, $9102, $9103, $9104, $9105, $9106, $9107, $9108, $9109, $9110, $9111, $9112, $9113, $9114, $9115, $9116, $9117, $9118, VersionRange($9119, $9120)), ($9121, $9122, $9123, $9124, $9125, $9126, $9127, $9128, $9129, $9130, $9131, $9132, $9133, $9134, $9135, $9136, $9137, $9138, $9139, $9140, $9141, $9142, $9143, $9144, $9145, $9146, $9147, $9148, VersionRange($9149, $9150)), ($9151, $9152, $9153, $9154, $9155, $9156, $9157, $9158, $9159, $9160, $9161, $9162, $9163, $9164, $9165, $9166, $9167, $9168, $9169, $9170, $9171, $9172, $9173, $9174, $9175, $9176, $9177, $9178, VersionRange($9179, $9180)), ($9181, $9182, $9183, $9184, $9185, $9186, $9187, $9188, $9189, $9190, $9191, $9192, $9193, $9194, $9195, $9196, $9197, $9198, $9199, $9200, $9201, $9202, $9203, $9204, $9205, $9206, $9207, $9208, VersionRange($9209, $9210)), ($9211, $9212, $9213, $9214, $9215, $9216, $9217, $9218, $9219, $9220, $9221, $9222, $9223, $9224, $9225, $9226, $9227, $9228, $9229, $9230, $9231, $9232, $9233, $9234, $9235, $9236, $9237, $9238, VersionRange($9239, $9240)), ($9241, $9242, $9243, $9244, $9245, $9246, $9247, $9248, $9249, $9250, $9251, $9252, $9253, $9254, $9255, $9256, $9257, $9258, $9259, $9260, $9261, $9262, $9263, $9264, $9265, $9266, $9267, $9268, VersionRange($9269, $9270)), ($9271, $9272, $9273, $9274, $9275, $9276, $9277, $9278, $9279, $9280, $9281, $9282, $9283, $9284, $9285, $9286, $9287, $9288, $9289, $9290, $9291, $9292, $9293, $9294, $9295, $9296, $9297, $9298, VersionRange($9299, $9300)), ($9301, $9302, $9303, $9304, $9305, $9306, $9307, $9308, $9309, $9310, $9311, $9312, $9313, $9314, $9315, $9316, $9317, $9318, $9319, $9320, $9321, $9322, $9323, $9324, $9325, $9326, $9327, $9328, VersionRange($9329, $9330)), ($9331, $9332, $9333, $9334, $9335, $9336, $9337, $9338, $9339, $9340, $9341, $9342, $9343, $9344, $9345, $9346, $9347, $9348, $9349, $9350, $9351, $9352, $9353, $9354, $9355, $9356, $9357, $9358, VersionRange($9359, $9360)), ($9361, $9362, $9363, $9364, $9365, $9366, $9367, $9368, $9369, $9370, $9371, $9372, $9373, $9374, $9375, $9376, $9377, $9378, $9379, $9380, $9381, $9382, $9383, $9384, $9385, $9386, $9387, $9388, VersionRange($9389, $9390)), ($9391, $9392, $9393, $9394, $9395, $9396, $9397, $9398, $9399, $9400, $9401, $9402, $9403, $9404, $9405, $9406, $9407, $9408, $9409, $9410, $9411, $9412, $9413, $9414, $9415, $9416, $9417, $9418, VersionRange($9419, $9420)), ($9421, $9422, $9423, $9424, $9425, $9426, $9427, $9428, $9429, $9430, $9431, $9432, $9433, $9434, $9435, $9436, $9437, $9438, $9439, $9440, $9441, $9442, $9443, $9444, $9445, $9446, $9447, $9448, VersionRange($9449, $9450)), ($9451, $9452, $9453, $9454, $9455, $9456, $9457, $9458, $9459, $9460, $9461, $9462, $9463, $9464, $9465, $9466, $9467, $9468, $9469, $9470, $9471, $9472, $9473, $9474, $9475, $9476, $9477, $9478, VersionRange($9479, $9480)), ($9481, $9482, $9483, $9484, $9485, $9486, $9487, $9488, $9489, $9490, $9491, $9492, $9493, $9494, $9495, $9496, $9497, $9498, $9499, $9500, $9501, $9502, $9503, $9504, $9505, $9506, $9507, $9508, VersionRange($9509, $9510)), ($9511, $9512, $9513, $9514, $9515, $9516, $9517, $9518, $9519, $9520, $9521, $9522, $9523, $9524, $9525, $9526, $9527, $9528, $9529, $9530, $9531, $9532, $9533, $9534, $9535, $9536, $9537, $9538, VersionRange($9539, $9540)), ($9541, $9542, $9543, $9544, $9545, $9546, $9547, $9548, $9549, $9550, $9551, $9552, $9553, $9554, $9555, $9556, $9557, $9558, $9559, $9560, $9561, $9562, $9563, $9564, $9565, $9566, $9567, $9568, VersionRange($9569, $9570)), ($9571, $9572, $9573, $9574, $9575, $9576, $9577, $9578, $9579, $9580, $9581, $9582, $9583, $9584, $9585, $9586, $9587, $9588, $9589, $9590, $9591, $9592, $9593, $9594, $9595, $9596, $9597, $9598, VersionRange($9599, $9600)), ($9601, $9602, $9603, $9604, $9605, $9606, $9607, $9608, $9609, $9610, $9611, $9612, $9613, $9614, $9615, $9616, $9617, $9618, $9619, $9620, $9621, $9622, $9623, $9624, $9625, $9626, $9627, $9628, VersionRange($9629, $9630)), ($9631, $9632, $9633, $9634, $9635, $9636, $9637, $9638, $9639, $9640, $9641, $9642, $9643, $9644, $9645, $9646, $9647, $9648, $9649, $9650, $9651, $9652, $9653, $9654, $9655, $9656, $9657, $9658, VersionRange($9659, $9660)), ($9661, $9662, $9663, $9664, $9665, $9666, $9667, $9668, $9669, $9670, $9671, $9672, $9673, $9674, $9675, $9676, $9677, $9678, $9679, $9680, $9681, $9682, $9683, $9684, $9685, $9686, $9687, $9688, VersionRange($9689, $9690)), ($9691, $9692, $9693, $9694, $9695, $9696, $9697, $9698, $9699, $9700, $9701, $9702, $9703, $9704, $9705, $9706, $9707, $9708, $9709, $9710, $9711, $9712, $9713, $9714, $9715, $9716, $9717, $9718, VersionRange($9719, $9720)), ($9721, $9722, $9723, $9724, $9725, $9726, $9727, $9728, $9729, $9730, $9731, $9732, $9733, $9734, $9735, $9736, $9737, $9738, $9739, $9740, $9741, $9742, $9743, $9744, $9745, $9746, $9747, $9748, VersionRange($9749, $9750)), ($9751, $9752, $9753, $9754, $9755, $9756, $9757, $9758, $9759, $9760, $9761, $9762, $9763, $9764, $9765, $9766, $9767, $9768, $9769, $9770, $9771, $9772, $9773, $9774, $9775, $9776, $9777, $9778, VersionRange($9779, $9780)), ($9781, $9782, $9783, $9784, $9785, $9786, $9787, $9788, $9789, $9790, $9791, $9792, $9793, $9794, $9795, $9796, $9797, $9798, $9799, $9800, $9801, $9802, $9803, $9804, $9805, $9806, $9807, $9808, VersionRange($9809, $9810)), ($9811, $9812, $9813, $9814, $9815, $9816, $9817, $9818, $9819, $9820, $9821, $9822, $9823, $9824, $9825, $9826, $9827, $9828, $9829, $9830, $9831, $9832, $9833, $9834, $9835, $9836, $9837, $9838, VersionRange($9839, $9840)), ($9841, $9842, $9843, $9844, $9845, $9846, $9847, $9848, $9849, $9850, $9851, $9852, $9853, $9854, $9855, $9856, $9857, $9858, $9859, $9860, $9861, $9862, $9863, $9864, $9865, $9866, $9867, $9868, VersionRange($9869, $9870)), ($9871, $9872, $9873, $9874, $9875, $9876, $9877, $9878, $9879, $9880, $9881, $9882, $9883, $9884, $9885, $9886, $9887, $9888, $9889, $9890, $9891, $9892, $9893, $9894, $9895, $9896, $9897, $9898, VersionRange($9899, $9900)), ($9901, $9902, $9903, $9904, $9905, $9906, $9907, $9908, $9909, $9910, $9911, $9912, $9913, $9914, $9915, $9916, $9917, $9918, $9919, $9920, $9921, $9922, $9923, $9924, $9925, $9926, $9927, $9928, VersionRange($9929, $9930)), ($9931, $9932, $9933, $9934, $9935, $9936, $9937, $9938, $9939, $9940, $9941, $9942, $9943, $9944, $9945, $9946, $9947, $9948, $9949, $9950, $9951, $9952, $9953, $9954, $9955, $9956, $9957, $9958, VersionRange($9959, $9960)), ($9961, $9962, $9963, $9964, $9965, $9966, $9967, $9968, $9969, $9970, $9971, $9972, $9973, $9974, $9975, $9976, $9977, $9978, $9979, $9980, $9981, $9982, $9983, $9984, $9985, $9986, $9987, $9988, VersionRange($9989, $9990)), ($9991, $9992, $9993, $9994, $9995, $9996, $9997, $9998, $9999, $10000, $10001, $10002, $10003, $10004, $10005, $10006, $10007, $10008, $10009, $10010, $10011, $10012, $10013, $10014, $10015, $10016, $10017, $10018, VersionRange($10019, $10020)), ($10021, $10022, $10023, $10024, $10025, $10026, $10027, $10028, $10029, $10030, $10031, $10032, $10033, $10034, $10035, $10036, $10037, $10038, $10039, $10040, $10041, $10042, $10043, $10044, $10045, $10046, $10047, $10048, VersionRange($10049, $10050)), ($10051, $10052, $10053, $10054, $10055, $10056, $10057, $10058, $10059, $10060, $10061, $10062, $10063, $10064, $10065, $10066, $10067, $10068, $10069, $10070, $10071, $10072, $10073, $10074, $10075, $10076, $10077, $10078, VersionRange($10079, $10080)), ($10081, $10082, $10083, $10084, $10085, $10086, $10087, $10088, $10089, $10090, $10091, $10092, $10093, $10094, $10095, $10096, $10097, $10098, $10099, $10100, $10101, $10102, $10103, $10104, $10105, $10106, $10107, $10108, VersionRange($10109, $10110)), ($10111, $10112, $10113, $10114, $10115, $10116, $10117, $10118, $10119, $10120, $10121, $10122, $10123, $10124, $10125, $10126, $10127, $10128, $10129, $10130, $10131, $10132, $10133, $10134, $10135, $10136, $10137, $10138, VersionRange($10139, $10140)), ($10141, $10142, $10143, $10144, $10145, $10146, $10147, $10148, $10149, $10150, $10151, $10152, $10153, $10154, $10155, $10156, $10157, $10158, $10159, $10160, $10161, $10162, $10163, $10164, $10165, $10166, $10167, $10168, VersionRange($10169, $10170)), ($10171, $10172, $10173, $10174, $10175, $10176, $10177, $10178, $10179, $10180, $10181, $10182, $10183, $10184, $10185, $10186, $10187, $10188, $10189, $10190, $10191, $10192, $10193, $10194, $10195, $10196, $10197, $10198, VersionRange($10199, $10200)), ($10201, $10202, $10203, $10204, $10205, $10206, $10207, $10208, $10209, $10210, $10211, $10212, $10213, $10214, $10215, $10216, $10217, $10218, $10219, $10220, $10221, $10222, $10223, $10224, $10225, $10226, $10227, $10228, VersionRange($10229, $10230)), ($10231, $10232, $10233, $10234, $10235, $10236, $10237, $10238, $10239, $10240, $10241, $10242, $10243, $10244, $10245, $10246, $10247, $10248, $10249, $10250, $10251, $10252, $10253, $10254, $10255, $10256, $10257, $10258, VersionRange($10259, $10260)), ($10261, $10262, $10263, $10264, $10265, $10266, $10267, $10268, $10269, $10270, $10271, $10272, $10273, $10274, $10275, $10276, $10277, $10278, $10279, $10280, $10281, $10282, $10283, $10284, $10285, $10286, $10287, $10288, VersionRange($10289, $10290)), ($10291, $10292, $10293, $10294, $10295, $10296, $10297, $10298, $10299, $10300, $10301, $10302, $10303, $10304, $10305, $10306, $10307, $10308, $10309, $10310, $10311, $10312, $10313, $10314, $10315, $10316, $10317, $10318, VersionRange($10319, $10320)), ($10321, $10322, $10323, $10324, $10325, $10326, $10327, $10328, $10329, $10330, $10331, $10332, $10333, $10334, $10335, $10336, $10337, $10338, $10339, $10340, $10341, $10342, $10343, $10344, $10345, $10346, $10347, $10348, VersionRange($10349, $10350)), ($10351, $10352, $10353, $10354, $10355, $10356, $10357, $10358, $10359, $10360, $10361, $10362, $10363, $10364, $10365, $10366, $10367, $10368, $10369, $10370, $10371, $10372, $10373, $10374, $10375, $10376, $10377, $10378, VersionRange($10379, $10380)), ($10381, $10382, $10383, $10384, $10385, $10386, $10387, $10388, $10389, $10390, $10391, $10392, $10393, $10394, $10395, $10396, $10397, $10398, $10399, $10400, $10401, $10402, $10403, $10404, $10405, $10406, $10407, $10408, VersionRange($10409, $10410)), ($10411, $10412, $10413, $10414, $10415, $10416, $10417, $10418, $10419, $10420, $10421, $10422, $10423, $10424, $10425, $10426, $10427, $10428, $10429, $10430, $10431, $10432, $10433, $10434, $10435, $10436, $10437, $10438, VersionRange($10439, $10440)), ($10441, $10442, $10443, $10444, $10445, $10446, $10447, $10448, $10449, $10450, $10451, $10452, $10453, $10454, $10455, $10456, $10457, $10458, $10459, $10460, $10461, $10462, $10463, $10464, $10465, $10466, $10467, $10468, VersionRange($10469, $10470)), ($10471, $10472, $10473, $10474, $10475, $10476, $10477, $10478, $10479, $10480, $10481, $10482, $10483, $10484, $10485, $10486, $10487, $10488, $10489, $10490, $10491, $10492, $10493, $10494, $10495, $10496, $10497, $10498, VersionRange($10499, $10500)), ($10501, $10502, $10503, $10504, $10505, $10506, $10507, $10508, $10509, $10510, $10511, $10512, $10513, $10514, $10515, $10516, $10517, $10518, $10519, $10520, $10521, $10522, $10523, $10524, $10525, $10526, $10527, $10528, VersionRange($10529, $10530)), ($10531, $10532, $10533, $10534, $10535, $10536, $10537, $10538, $10539, $10540, $10541, $10542, $10543, $10544, $10545, $10546, $10547, $10548, $10549, $10550, $10551, $10552, $10553, $10554, $10555, $10556, $10557, $10558, VersionRange($10559, $10560)), ($10561, $10562, $10563, $10564, $10565, $10566, $10567, $10568, $10569, $10570, $10571, $10572, $10573, $10574, $10575, $10576, $10577, $10578, $10579, $10580, $10581, $10582, $10583, $10584, $10585, $10586, $10587, $10588, VersionRange($10589, $10590)), ($10591, $10592, $10593, $10594, $10595, $10596, $10597, $10598, $10599, $10600, $10601, $10602, $10603, $10604, $10605, $10606, $10607, $10608, $10609, $10610, $10611, $10612, $10613, $10614, $10615, $10616, $10617, $10618, VersionRange($10619, $10620)), ($10621, $10622, $10623, $10624, $10625, $10626, $10627, $10628, $10629, $10630, $10631, $10632, $10633, $10634, $10635, $10636, $10637, $10638, $10639, $10640, $10641, $10642, $10643, $10644, $10645, $10646, $10647, $10648, VersionRange($10649, $10650)), ($10651, $10652, $10653, $10654, $10655, $10656, $10657, $10658, $10659, $10660, $10661, $10662, $10663, $10664, $10665, $10666, $10667, $10668, $10669, $10670, $10671, $10672, $10673, $10674, $10675, $10676, $10677, $10678, VersionRange($10679, $10680)), ($10681, $10682, $10683, $10684, $10685, $10686, $10687, $10688, $10689, $10690, $10691, $10692, $10693, $10694, $10695, $10696, $10697, $10698, $10699, $10700, $10701, $10702, $10703, $10704, $10705, $10706, $10707, $10708, VersionRange($10709, $10710)), ($10711, $10712, $10713, $10714, $10715, $10716, $10717, $10718, $10719, $10720, $10721, $10722, $10723, $10724, $10725, $10726, $10727, $10728, $10729, $10730, $10731, $10732, $10733, $10734, $10735, $10736, $10737, $10738, VersionRange($10739, $10740)), ($10741, $10742, $10743, $10744, $10745, $10746, $10747, $10748, $10749, $10750, $10751, $10752, $10753, $10754, $10755, $10756, $10757, $10758, $10759, $10760, $10761, $10762, $10763, $10764, $10765, $10766, $10767, $10768, VersionRange($10769, $10770)), ($10771, $10772, $10773, $10774, $10775, $10776, $10777, $10778, $10779, $10780, $10781, $10782, $10783, $10784, $10785, $10786, $10787, $10788, $10789, $10790, $10791, $10792, $10793, $10794, $10795, $10796, $10797, $10798, VersionRange($10799, $10800)), ($10801, $10802, $10803, $10804, $10805, $10806, $10807, $10808, $10809, $10810, $10811, $10812, $10813, $10814, $10815, $10816, $10817, $10818, $10819, $10820, $10821, $10822, $10823, $10824, $10825, $10826, $10827, $10828, VersionRange($10829, $10830)), ($10831, $10832, $10833, $10834, $10835, $10836, $10837, $10838, $10839, $10840, $10841, $10842, $10843, $10844, $10845, $10846, $10847, $10848, $10849, $10850, $10851, $10852, $10853, $10854, $10855, $10856, $10857, $10858, VersionRange($10859, $10860)), ($10861, $10862, $10863, $10864, $10865, $10866, $10867, $10868, $10869, $10870, $10871, $10872, $10873, $10874, $10875, $10876, $10877, $10878, $10879, $10880, $10881, $10882, $10883, $10884, $10885, $10886, $10887, $10888, VersionRange($10889, $10890)), ($10891, $10892, $10893, $10894, $10895, $10896, $10897, $10898, $10899, $10900, $10901, $10902, $10903, $10904, $10905, $10906, $10907, $10908, $10909, $10910, $10911, $10912, $10913, $10914, $10915, $10916, $10917, $10918, VersionRange($10919, $10920)), ($10921, $10922, $10923, $10924, $10925, $10926, $10927, $10928, $10929, $10930, $10931, $10932, $10933, $10934, $10935, $10936, $10937, $10938, $10939, $10940, $10941, $10942, $10943, $10944, $10945, $10946, $10947, $10948, VersionRange($10949, $10950)), ($10951, $10952, $10953, $10954, $10955, $10956, $10957, $10958, $10959, $10960, $10961, $10962, $10963, $10964, $10965, $10966, $10967, $10968, $10969, $10970, $10971, $10972, $10973, $10974, $10975, $10976, $10977, $10978, VersionRange($10979, $10980)), ($10981, $10982, $10983, $10984, $10985, $10986, $10987, $10988, $10989, $10990, $10991, $10992, $10993, $10994, $10995, $10996, $10997, $10998, $10999, $11000, $11001, $11002, $11003, $11004, $11005, $11006, $11007, $11008, VersionRange($11009, $11010)), ($11011, $11012, $11013, $11014, $11015, $11016, $11017, $11018, $11019, $11020, $11021, $11022, $11023, $11024, $11025, $11026, $11027, $11028, $11029, $11030, $11031, $11032, $11033, $11034, $11035, $11036, $11037, $11038, VersionRange($11039, $11040)), ($11041, $11042, $11043, $11044, $11045, $11046, $11047, $11048, $11049, $11050, $11051, $11052, $11053, $11054, $11055, $11056, $11057, $11058, $11059, $11060, $11061, $11062, $11063, $11064, $11065, $11066, $11067, $11068, VersionRange($11069, $11070)), ($11071, $11072, $11073, $11074, $11075, $11076, $11077, $11078, $11079, $11080, $11081, $11082, $11083, $11084, $11085, $11086, $11087, $11088, $11089, $11090, $11091, $11092, $11093, $11094, $11095, $11096, $11097, $11098, VersionRange($11099, $11100)), ($11101, $11102, $11103, $11104, $11105, $11106, $11107, $11108, $11109, $11110, $11111, $11112, $11113, $11114, $11115, $11116, $11117, $11118, $11119, $11120, $11121, $11122, $11123, $11124, $11125, $11126, $11127, $11128, VersionRange($11129, $11130)), ($11131, $11132, $11133, $11134, $11135, $11136, $11137, $11138, $11139, $11140, $11141, $11142, $11143, $11144, $11145, $11146, $11147, $11148, $11149, $11150, $11151, $11152, $11153, $11154, $11155, $11156, $11157, $11158, VersionRange($11159, $11160)), ($11161, $11162, $11163, $11164, $11165, $11166, $11167, $11168, $11169, $11170, $11171, $11172, $11173, $11174, $11175, $11176, $11177, $11178, $11179, $11180, $11181, $11182, $11183, $11184, $11185, $11186, $11187, $11188, VersionRange($11189, $11190)), ($11191, $11192, $11193, $11194, $11195, $11196, $11197, $11198, $11199, $11200, $11201, $11202, $11203, $11204, $11205, $11206, $11207, $11208, $11209, $11210, $11211, $11212, $11213, $11214, $11215, $11216, $11217, $11218, VersionRange($11219, $11220)), ($11221, $11222, $11223, $11224, $11225, $11226, $11227, $11228, $11229, $11230, $11231, $11232, $11233, $11234, $11235, $11236, $11237, $11238, $11239, $11240, $11241, $11242, $11243, $11244, $11245, $11246, $11247, $11248, VersionRange($11249, $11250)), ($11251, $11252, $11253, $11254, $11255, $11256, $11257, $11258, $11259, $11260, $11261, $11262, $11263, $11264, $11265, $11266, $11267, $11268, $11269, $11270, $11271, $11272, $11273, $11274, $11275, $11276, $11277, $11278, VersionRange($11279, $11280)), ($11281, $11282, $11283, $11284, $11285, $11286, $11287, $11288, $11289, $11290, $11291, $11292, $11293, $11294, $11295, $11296, $11297, $11298, $11299, $11300, $11301, $11302, $11303, $11304, $11305, $11306, $11307, $11308, VersionRange($11309, $11310)), ($11311, $11312, $11313, $11314, $11315, $11316, $11317, $11318, $11319, $11320, $11321, $11322, $11323, $11324, $11325, $11326, $11327, $11328, $11329, $11330, $11331, $11332, $11333, $11334, $11335, $11336, $11337, $11338, VersionRange($11339, $11340)), ($11341, $11342, $11343, $11344, $11345, $11346, $11347, $11348, $11349, $11350, $11351, $11352, $11353, $11354, $11355, $11356, $11357, $11358, $11359, $11360, $11361, $11362, $11363, $11364, $11365, $11366, $11367, $11368, VersionRange($11369, $11370)), ($11371, $11372, $11373, $11374, $11375, $11376, $11377, $11378, $11379, $11380, $11381, $11382, $11383, $11384, $11385, $11386, $11387, $11388, $11389, $11390, $11391, $11392, $11393, $11394, $11395, $11396, $11397, $11398, VersionRange($11399, $11400)), ($11401, $11402, $11403, $11404, $11405, $11406, $11407, $11408, $11409, $11410, $11411, $11412, $11413, $11414, $11415, $11416, $11417, $11418, $11419, $11420, $11421, $11422, $11423, $11424, $11425, $11426, $11427, $11428, VersionRange($11429, $11430)), ($11431, $11432, $11433, $11434, $11435, $11436, $11437, $11438, $11439, $11440, $11441, $11442, $11443, $11444, $11445, $11446, $11447, $11448, $11449, $11450, $11451, $11452, $11453, $11454, $11455, $11456, $11457, $11458, VersionRange($11459, $11460)), ($11461, $11462, $11463, $11464, $11465, $11466, $11467, $11468, $11469, $11470, $11471, $11472, $11473, $11474, $11475, $11476, $11477, $11478, $11479, $11480, $11481, $11482, $11483, $11484, $11485, $11486, $11487, $11488, VersionRange($11489, $11490)), ($11491, $11492, $11493, $11494, $11495, $11496, $11497, $11498, $11499, $11500, $11501, $11502, $11503, $11504, $11505, $11506, $11507, $11508, $11509, $11510, $11511, $11512, $11513, $11514, $11515, $11516, $11517, $11518, VersionRange($11519, $11520)), ($11521, $11522, $11523, $11524, $11525, $11526, $11527, $11528, $11529, $11530, $11531, $11532, $11533, $11534, $11535, $11536, $11537, $11538, $11539, $11540, $11541, $11542, $11543, $11544, $11545, $11546, $11547, $11548, VersionRange($11549, $11550)), ($11551, $11552, $11553, $11554, $11555, $11556, $11557, $11558, $11559, $11560, $11561, $11562, $11563, $11564, $11565, $11566, $11567, $11568, $11569, $11570, $11571, $11572, $11573, $11574, $11575, $11576, $11577, $11578, VersionRange($11579, $11580)), ($11581, $11582, $11583, $11584, $11585, $11586, $11587, $11588, $11589, $11590, $11591, $11592, $11593, $11594, $11595, $11596, $11597, $11598, $11599, $11600, $11601, $11602, $11603, $11604, $11605, $11606, $11607, $11608, VersionRange($11609, $11610)), ($11611, $11612, $11613, $11614, $11615, $11616, $11617, $11618, $11619, $11620, $11621, $11622, $11623, $11624, $11625, $11626, $11627, $11628, $11629, $11630, $11631, $11632, $11633, $11634, $11635, $11636, $11637, $11638, VersionRange($11639, $11640)), ($11641, $11642, $11643, $11644, $11645, $11646, $11647, $11648, $11649, $11650, $11651, $11652, $11653, $11654, $11655, $11656, $11657, $11658, $11659, $11660, $11661, $11662, $11663, $11664, $11665, $11666, $11667, $11668, VersionRange($11669, $11670)), ($11671, $11672, $11673, $11674, $11675, $11676, $11677, $11678, $11679, $11680, $11681, $11682, $11683, $11684, $11685, $11686, $11687, $11688, $11689, $11690, $11691, $11692, $11693, $11694, $11695, $11696, $11697, $11698, VersionRange($11699, $11700)), ($11701, $11702, $11703, $11704, $11705, $11706, $11707, $11708, $11709, $11710, $11711, $11712, $11713, $11714, $11715, $11716, $11717, $11718, $11719, $11720, $11721, $11722, $11723, $11724, $11725, $11726, $11727, $11728, VersionRange($11729, $11730)), ($11731, $11732, $11733, $11734, $11735, $11736, $11737, $11738, $11739, $11740, $11741, $11742, $11743, $11744, $11745, $11746, $11747, $11748, $11749, $11750, $11751, $11752, $11753, $11754, $11755, $11756, $11757, $11758, VersionRange($11759, $11760)), ($11761, $11762, $11763, $11764, $11765, $11766, $11767, $11768, $11769, $11770, $11771, $11772, $11773, $11774, $11775, $11776, $11777, $11778, $11779, $11780, $11781, $11782, $11783, $11784, $11785, $11786, $11787, $11788, VersionRange($11789, $11790)), ($11791, $11792, $11793, $11794, $11795, $11796, $11797, $11798, $11799, $11800, $11801, $11802, $11803, $11804, $11805, $11806, $11807, $11808, $11809, $11810, $11811, $11812, $11813, $11814, $11815, $11816, $11817, $11818, VersionRange($11819, $11820)), ($11821, $11822, $11823, $11824, $11825, $11826, $11827, $11828, $11829, $11830, $11831, $11832, $11833, $11834, $11835, $11836, $11837, $11838, $11839, $11840, $11841, $11842, $11843, $11844, $11845, $11846, $11847, $11848, VersionRange($11849, $11850)), ($11851, $11852, $11853, $11854, $11855, $11856, $11857, $11858, $11859, $11860, $11861, $11862, $11863, $11864, $11865, $11866, $11867, $11868, $11869, $11870, $11871, $11872, $11873, $11874, $11875, $11876, $11877, $11878, VersionRange($11879, $11880)), ($11881, $11882, $11883, $11884, $11885, $11886, $11887, $11888, $11889, $11890, $11891, $11892, $11893, $11894, $11895, $11896, $11897, $11898, $11899, $11900, $11901, $11902, $11903, $11904, $11905, $11906, $11907, $11908, VersionRange($11909, $11910)), ($11911, $11912, $11913, $11914, $11915, $11916, $11917, $11918, $11919, $11920, $11921, $11922, $11923, $11924, $11925, $11926, $11927, $11928, $11929, $11930, $11931, $11932, $11933, $11934, $11935, $11936, $11937, $11938, VersionRange($11939, $11940)), ($11941, $11942, $11943, $11944, $11945, $11946, $11947, $11948, $11949, $11950, $11951, $11952, $11953, $11954, $11955, $11956, $11957, $11958, $11959, $11960, $11961, $11962, $11963, $11964, $11965, $11966, $11967, $11968, VersionRange($11969, $11970)), ($11971, $11972, $11973, $11974, $11975, $11976, $11977, $11978, $11979, $11980, $11981, $11982, $11983, $11984, $11985, $11986, $11987, $11988, $11989, $11990, $11991, $11992, $11993, $11994, $11995, $11996, $11997, $11998, VersionRange($11999, $12000)), ($12001, $12002, $12003, $12004, $12005, $12006, $12007, $12008, $12009, $12010, $12011, $12012, $12013, $12014, $12015, $12016, $12017, $12018, $12019, $12020, $12021, $12022, $12023, $12024, $12025, $12026, $12027, $12028, VersionRange($12029, $12030)), ($12031, $12032, $12033, $12034, $12035, $12036, $12037, $12038, $12039, $12040, $12041, $12042, $12043, $12044, $12045, $12046, $12047, $12048, $12049, $12050, $12051, $12052, $12053, $12054, $12055, $12056, $12057, $12058, VersionRange($12059, $12060)), ($12061, $12062, $12063, $12064, $12065, $12066, $12067, $12068, $12069, $12070, $12071, $12072, $12073, $12074, $12075, $12076, $12077, $12078, $12079, $12080, $12081, $12082, $12083, $12084, $12085, $12086, $12087, $12088, VersionRange($12089, $12090)), ($12091, $12092, $12093, $12094, $12095, $12096, $12097, $12098, $12099, $12100, $12101, $12102, $12103, $12104, $12105, $12106, $12107, $12108, $12109, $12110, $12111, $12112, $12113, $12114, $12115, $12116, $12117, $12118, VersionRange($12119, $12120)), ($12121, $12122, $12123, $12124, $12125, $12126, $12127, $12128, $12129, $12130, $12131, $12132, $12133, $12134, $12135, $12136, $12137, $12138, $12139, $12140, $12141, $12142, $12143, $12144, $12145, $12146, $12147, $12148, VersionRange($12149, $12150)), ($12151, $12152, $12153, $12154, $12155, $12156, $12157, $12158, $12159, $12160, $12161, $12162, $12163, $12164, $12165, $12166, $12167, $12168, $12169, $12170, $12171, $12172, $12173, $12174, $12175, $12176, $12177, $12178, VersionRange($12179, $12180)), ($12181, $12182, $12183, $12184, $12185, $12186, $12187, $12188, $12189, $12190, $12191, $12192, $12193, $12194, $12195, $12196, $12197, $12198, $12199, $12200, $12201, $12202, $12203, $12204, $12205, $12206, $12207, $12208, VersionRange($12209, $12210)), ($12211, $12212, $12213, $12214, $12215, $12216, $12217, $12218, $12219, $12220, $12221, $12222, $12223, $12224, $12225, $12226, $12227, $12228, $12229, $12230, $12231, $12232, $12233, $12234, $12235, $12236, $12237, $12238, VersionRange($12239, $12240)), ($12241, $12242, $12243, $12244, $12245, $12246, $12247, $12248, $12249, $12250, $12251, $12252, $12253, $12254, $12255, $12256, $12257, $12258, $12259, $12260, $12261, $12262, $12263, $12264, $12265, $12266, $12267, $12268, VersionRange($12269, $12270)), ($12271, $12272, $12273, $12274, $12275, $12276, $12277, $12278, $12279, $12280, $12281, $12282, $12283, $12284, $12285, $12286, $12287, $12288, $12289, $12290, $12291, $12292, $12293, $12294, $12295, $12296, $12297, $12298, VersionRange($12299, $12300)), ($12301, $12302, $12303, $12304, $12305, $12306, $12307, $12308, $12309, $12310, $12311, $12312, $12313, $12314, $12315, $12316, $12317, $12318, $12319, $12320, $12321, $12322, $12323, $12324, $12325, $12326, $12327, $12328, VersionRange($12329, $12330)), ($12331, $12332, $12333, $12334, $12335, $12336, $12337, $12338, $12339, $12340, $12341, $12342, $12343, $12344, $12345, $12346, $12347, $12348, $12349, $12350, $12351, $12352, $12353, $12354, $12355, $12356, $12357, $12358, VersionRange($12359, $12360)), ($12361, $12362, $12363, $12364, $12365, $12366, $12367, $12368, $12369, $12370, $12371, $12372, $12373, $12374, $12375, $12376, $12377, $12378, $12379, $12380, $12381, $12382, $12383, $12384, $12385, $12386, $12387, $12388, VersionRange($12389, $12390)), ($12391, $12392, $12393, $12394, $12395, $12396, $12397, $12398, $12399, $12400, $12401, $12402, $12403, $12404, $12405, $12406, $12407, $12408, $12409, $12410, $12411, $12412, $12413, $12414, $12415, $12416, $12417, $12418, VersionRange($12419, $12420)), ($12421, $12422, $12423, $12424, $12425, $12426, $12427, $12428, $12429, $12430, $12431, $12432, $12433, $12434, $12435, $12436, $12437, $12438, $12439, $12440, $12441, $12442, $12443, $12444, $12445, $12446, $12447, $12448, VersionRange($12449, $12450)), ($12451, $12452, $12453, $12454, $12455, $12456, $12457, $12458, $12459, $12460, $12461, $12462, $12463, $12464, $12465, $12466, $12467, $12468, $12469, $12470, $12471, $12472, $12473, $12474, $12475, $12476, $12477, $12478, VersionRange($12479, $12480)), ($12481, $12482, $12483, $12484, $12485, $12486, $12487, $12488, $12489, $12490, $12491, $12492, $12493, $12494, $12495, $12496, $12497, $12498, $12499, $12500, $12501, $12502, $12503, $12504, $12505, $12506, $12507, $12508, VersionRange($12509, $12510)), ($12511, $12512, $12513, $12514, $12515, $12516, $12517, $12518, $12519, $12520, $12521, $12522, $12523, $12524, $12525, $12526, $12527, $12528, $12529, $12530, $12531, $12532, $12533, $12534, $12535, $12536, $12537, $12538, VersionRange($12539, $12540)), ($12541, $12542, $12543, $12544, $12545, $12546, $12547, $12548, $12549, $12550, $12551, $12552, $12553, $12554, $12555, $12556, $12557, $12558, $12559, $12560, $12561, $12562, $12563, $12564, $12565, $12566, $12567, $12568, VersionRange($12569, $12570)), ($12571, $12572, $12573, $12574, $12575, $12576, $12577, $12578, $12579, $12580, $12581, $12582, $12583, $12584, $12585, $12586, $12587, $12588, $12589, $12590, $12591, $12592, $12593, $12594, $12595, $12596, $12597, $12598, VersionRange($12599, $12600)), ($12601, $12602, $12603, $12604, $12605, $12606, $12607, $12608, $12609, $12610, $12611, $12612, $12613, $12614, $12615, $12616, $12617, $12618, $12619, $12620, $12621, $12622, $12623, $12624, $12625, $12626, $12627, $12628, VersionRange($12629, $12630)), ($12631, $12632, $12633, $12634, $12635, $12636, $12637, $12638, $12639, $12640, $12641, $12642, $12643, $12644, $12645, $12646, $12647, $12648, $12649, $12650, $12651, $12652, $12653, $12654, $12655, $12656, $12657, $12658, VersionRange($12659, $12660)), ($12661, $12662, $12663, $12664, $12665, $12666, $12667, $12668, $12669, $12670, $12671, $12672, $12673, $12674, $12675, $12676, $12677, $12678, $12679, $12680, $12681, $12682, $12683, $12684, $12685, $12686, $12687, $12688, VersionRange($12689, $12690)), ($12691, $12692, $12693, $12694, $12695, $12696, $12697, $12698, $12699, $12700, $12701, $12702, $12703, $12704, $12705, $12706, $12707, $12708, $12709, $12710, $12711, $12712, $12713, $12714, $12715, $12716, $12717, $12718, VersionRange($12719, $12720)), ($12721, $12722, $12723, $12724, $12725, $12726, $12727, $12728, $12729, $12730, $12731, $12732, $12733, $12734, $12735, $12736, $12737, $12738, $12739, $12740, $12741, $12742, $12743, $12744, $12745, $12746, $12747, $12748, VersionRange($12749, $12750)), ($12751, $12752, $12753, $12754, $12755, $12756, $12757, $12758, $12759, $12760, $12761, $12762, $12763, $12764, $12765, $12766, $12767, $12768, $12769, $12770, $12771, $12772, $12773, $12774, $12775, $12776, $12777, $12778, VersionRange($12779, $12780)), ($12781, $12782, $12783, $12784, $12785, $12786, $12787, $12788, $12789, $12790, $12791, $12792, $12793, $12794, $12795, $12796, $12797, $12798, $12799, $12800, $12801, $12802, $12803, $12804, $12805, $12806, $12807, $12808, VersionRange($12809, $12810)), ($12811, $12812, $12813, $12814, $12815, $12816, $12817, $12818, $12819, $12820, $12821, $12822, $12823, $12824, $12825, $12826, $12827, $12828, $12829, $12830, $12831, $12832, $12833, $12834, $12835, $12836, $12837, $12838, VersionRange($12839, $12840)), ($12841, $12842, $12843, $12844, $12845, $12846, $12847, $12848, $12849, $12850, $12851, $12852, $12853, $12854, $12855, $12856, $12857, $12858, $12859, $12860, $12861, $12862, $12863, $12864, $12865, $12866, $12867, $12868, VersionRange($12869, $12870)), ($12871, $12872, $12873, $12874, $12875, $12876, $12877, $12878, $12879, $12880, $12881, $12882, $12883, $12884, $12885, $12886, $12887, $12888, $12889, $12890, $12891, $12892, $12893, $12894, $12895, $12896, $12897, $12898, VersionRange($12899, $12900)), ($12901, $12902, $12903, $12904, $12905, $12906, $12907, $12908, $12909, $12910, $12911, $12912, $12913, $12914, $12915, $12916, $12917, $12918, $12919, $12920, $12921, $12922, $12923, $12924, $12925, $12926, $12927, $12928, VersionRange($12929, $12930)), ($12931, $12932, $12933, $12934, $12935, $12936, $12937, $12938, $12939, $12940, $12941, $12942, $12943, $12944, $12945, $12946, $12947, $12948, $12949, $12950, $12951, $12952, $12953, $12954, $12955, $12956, $12957, $12958, VersionRange($12959, $12960)), ($12961, $12962, $12963, $12964, $12965, $12966, $12967, $12968, $12969, $12970[...][ Date: 2023-07-04 18:40:19 ]
8 4s497ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30)), ($31, $32, $33, $34, $35, $36, $37, $38, $39, $40, $41, $42, $43, $44, $45, $46, $47, $48, $49, $50, $51, $52, $53, $54, $55, $56, $57, $58, VersionRange($59, $60)), ($61, $62, $63, $64, $65, $66, $67, $68, $69, $70, $71, $72, $73, $74, $75, $76, $77, $78, $79, $80, $81, $82, $83, $84, $85, $86, $87, $88, VersionRange($89, $90)), ($91, $92, $93, $94, $95, $96, $97, $98, $99, $100, $101, $102, $103, $104, $105, $106, $107, $108, $109, $110, $111, $112, $113, $114, $115, $116, $117, $118, VersionRange($119, $120)), ($121, $122, $123, $124, $125, $126, $127, $128, $129, $130, $131, $132, $133, $134, $135, $136, $137, $138, $139, $140, $141, $142, $143, $144, $145, $146, $147, $148, VersionRange($149, $150)), ($151, $152, $153, $154, $155, $156, $157, $158, $159, $160, $161, $162, $163, $164, $165, $166, $167, $168, $169, $170, $171, $172, $173, $174, $175, $176, $177, $178, VersionRange($179, $180)), ($181, $182, $183, $184, $185, $186, $187, $188, $189, $190, $191, $192, $193, $194, $195, $196, $197, $198, $199, $200, $201, $202, $203, $204, $205, $206, $207, $208, VersionRange($209, $210)), ($211, $212, $213, $214, $215, $216, $217, $218, $219, $220, $221, $222, $223, $224, $225, $226, $227, $228, $229, $230, $231, $232, $233, $234, $235, $236, $237, $238, VersionRange($239, $240)), ($241, $242, $243, $244, $245, $246, $247, $248, $249, $250, $251, $252, $253, $254, $255, $256, $257, $258, $259, $260, $261, $262, $263, $264, $265, $266, $267, $268, VersionRange($269, $270)), ($271, $272, $273, $274, $275, $276, $277, $278, $279, $280, $281, $282, $283, $284, $285, $286, $287, $288, $289, $290, $291, $292, $293, $294, $295, $296, $297, $298, VersionRange($299, $300)), ($301, $302, $303, $304, $305, $306, $307, $308, $309, $310, $311, $312, $313, $314, $315, $316, $317, $318, $319, $320, $321, $322, $323, $324, $325, $326, $327, $328, VersionRange($329, $330)), ($331, $332, $333, $334, $335, $336, $337, $338, $339, $340, $341, $342, $343, $344, $345, $346, $347, $348, $349, $350, $351, $352, $353, $354, $355, $356, $357, $358, VersionRange($359, $360)), ($361, $362, $363, $364, $365, $366, $367, $368, $369, $370, $371, $372, $373, $374, $375, $376, $377, $378, $379, $380, $381, $382, $383, $384, $385, $386, $387, $388, VersionRange($389, $390)), ($391, $392, $393, $394, $395, $396, $397, $398, $399, $400, $401, $402, $403, $404, $405, $406, $407, $408, $409, $410, $411, $412, $413, $414, $415, $416, $417, $418, VersionRange($419, $420)), ($421, $422, $423, $424, $425, $426, $427, $428, $429, $430, $431, $432, $433, $434, $435, $436, $437, $438, $439, $440, $441, $442, $443, $444, $445, $446, $447, $448, VersionRange($449, $450)), ($451, $452, $453, $454, $455, $456, $457, $458, $459, $460, $461, $462, $463, $464, $465, $466, $467, $468, $469, $470, $471, $472, $473, $474, $475, $476, $477, $478, VersionRange($479, $480)), ($481, $482, $483, $484, $485, $486, $487, $488, $489, $490, $491, $492, $493, $494, $495, $496, $497, $498, $499, $500, $501, $502, $503, $504, $505, $506, $507, $508, VersionRange($509, $510)), ($511, $512, $513, $514, $515, $516, $517, $518, $519, $520, $521, $522, $523, $524, $525, $526, $527, $528, $529, $530, $531, $532, $533, $534, $535, $536, $537, $538, VersionRange($539, $540)), ($541, $542, $543, $544, $545, $546, $547, $548, $549, $550, $551, $552, $553, $554, $555, $556, $557, $558, $559, $560, $561, $562, $563, $564, $565, $566, $567, $568, VersionRange($569, $570)), ($571, $572, $573, $574, $575, $576, $577, $578, $579, $580, $581, $582, $583, $584, $585, $586, $587, $588, $589, $590, $591, $592, $593, $594, $595, $596, $597, $598, VersionRange($599, $600)), ($601, $602, $603, $604, $605, $606, $607, $608, $609, $610, $611, $612, $613, $614, $615, $616, $617, $618, $619, $620, $621, $622, $623, $624, $625, $626, $627, $628, VersionRange($629, $630)), ($631, $632, $633, $634, $635, $636, $637, $638, $639, $640, $641, $642, $643, $644, $645, $646, $647, $648, $649, $650, $651, $652, $653, $654, $655, $656, $657, $658, VersionRange($659, $660)), ($661, $662, $663, $664, $665, $666, $667, $668, $669, $670, $671, $672, $673, $674, $675, $676, $677, $678, $679, $680, $681, $682, $683, $684, $685, $686, $687, $688, VersionRange($689, $690)), ($691, $692, $693, $694, $695, $696, $697, $698, $699, $700, $701, $702, $703, $704, $705, $706, $707, $708, $709, $710, $711, $712, $713, $714, $715, $716, $717, $718, VersionRange($719, $720)), ($721, $722, $723, $724, $725, $726, $727, $728, $729, $730, $731, $732, $733, $734, $735, $736, $737, $738, $739, $740, $741, $742, $743, $744, $745, $746, $747, $748, VersionRange($749, $750)), ($751, $752, $753, $754, $755, $756, $757, $758, $759, $760, $761, $762, $763, $764, $765, $766, $767, $768, $769, $770, $771, $772, $773, $774, $775, $776, $777, $778, VersionRange($779, $780)), ($781, $782, $783, $784, $785, $786, $787, $788, $789, $790, $791, $792, $793, $794, $795, $796, $797, $798, $799, $800, $801, $802, $803, $804, $805, $806, $807, $808, VersionRange($809, $810)), ($811, $812, $813, $814, $815, $816, $817, $818, $819, $820, $821, $822, $823, $824, $825, $826, $827, $828, $829, $830, $831, $832, $833, $834, $835, $836, $837, $838, VersionRange($839, $840)), ($841, $842, $843, $844, $845, $846, $847, $848, $849, $850, $851, $852, $853, $854, $855, $856, $857, $858, $859, $860, $861, $862, $863, $864, $865, $866, $867, $868, VersionRange($869, $870)), ($871, $872, $873, $874, $875, $876, $877, $878, $879, $880, $881, $882, $883, $884, $885, $886, $887, $888, $889, $890, $891, $892, $893, $894, $895, $896, $897, $898, VersionRange($899, $900)), ($901, $902, $903, $904, $905, $906, $907, $908, $909, $910, $911, $912, $913, $914, $915, $916, $917, $918, $919, $920, $921, $922, $923, $924, $925, $926, $927, $928, VersionRange($929, $930)), ($931, $932, $933, $934, $935, $936, $937, $938, $939, $940, $941, $942, $943, $944, $945, $946, $947, $948, $949, $950, $951, $952, $953, $954, $955, $956, $957, $958, VersionRange($959, $960)), ($961, $962, $963, $964, $965, $966, $967, $968, $969, $970, $971, $972, $973, $974, $975, $976, $977, $978, $979, $980, $981, $982, $983, $984, $985, $986, $987, $988, VersionRange($989, $990)), ($991, $992, $993, $994, $995, $996, $997, $998, $999, $1000, $1001, $1002, $1003, $1004, $1005, $1006, $1007, $1008, $1009, $1010, $1011, $1012, $1013, $1014, $1015, $1016, $1017, $1018, VersionRange($1019, $1020)), ($1021, $1022, $1023, $1024, $1025, $1026, $1027, $1028, $1029, $1030, $1031, $1032, $1033, $1034, $1035, $1036, $1037, $1038, $1039, $1040, $1041, $1042, $1043, $1044, $1045, $1046, $1047, $1048, VersionRange($1049, $1050)), ($1051, $1052, $1053, $1054, $1055, $1056, $1057, $1058, $1059, $1060, $1061, $1062, $1063, $1064, $1065, $1066, $1067, $1068, $1069, $1070, $1071, $1072, $1073, $1074, $1075, $1076, $1077, $1078, VersionRange($1079, $1080)), ($1081, $1082, $1083, $1084, $1085, $1086, $1087, $1088, $1089, $1090, $1091, $1092, $1093, $1094, $1095, $1096, $1097, $1098, $1099, $1100, $1101, $1102, $1103, $1104, $1105, $1106, $1107, $1108, VersionRange($1109, $1110)), ($1111, $1112, $1113, $1114, $1115, $1116, $1117, $1118, $1119, $1120, $1121, $1122, $1123, $1124, $1125, $1126, $1127, $1128, $1129, $1130, $1131, $1132, $1133, $1134, $1135, $1136, $1137, $1138, VersionRange($1139, $1140)), ($1141, $1142, $1143, $1144, $1145, $1146, $1147, $1148, $1149, $1150, $1151, $1152, $1153, $1154, $1155, $1156, $1157, $1158, $1159, $1160, $1161, $1162, $1163, $1164, $1165, $1166, $1167, $1168, VersionRange($1169, $1170)), ($1171, $1172, $1173, $1174, $1175, $1176, $1177, $1178, $1179, $1180, $1181, $1182, $1183, $1184, $1185, $1186, $1187, $1188, $1189, $1190, $1191, $1192, $1193, $1194, $1195, $1196, $1197, $1198, VersionRange($1199, $1200)), ($1201, $1202, $1203, $1204, $1205, $1206, $1207, $1208, $1209, $1210, $1211, $1212, $1213, $1214, $1215, $1216, $1217, $1218, $1219, $1220, $1221, $1222, $1223, $1224, $1225, $1226, $1227, $1228, VersionRange($1229, $1230)), ($1231, $1232, $1233, $1234, $1235, $1236, $1237, $1238, $1239, $1240, $1241, $1242, $1243, $1244, $1245, $1246, $1247, $1248, $1249, $1250, $1251, $1252, $1253, $1254, $1255, $1256, $1257, $1258, VersionRange($1259, $1260)), ($1261, $1262, $1263, $1264, $1265, $1266, $1267, $1268, $1269, $1270, $1271, $1272, $1273, $1274, $1275, $1276, $1277, $1278, $1279, $1280, $1281, $1282, $1283, $1284, $1285, $1286, $1287, $1288, VersionRange($1289, $1290)), ($1291, $1292, $1293, $1294, $1295, $1296, $1297, $1298, $1299, $1300, $1301, $1302, $1303, $1304, $1305, $1306, $1307, $1308, $1309, $1310, $1311, $1312, $1313, $1314, $1315, $1316, $1317, $1318, VersionRange($1319, $1320)), ($1321, $1322, $1323, $1324, $1325, $1326, $1327, $1328, $1329, $1330, $1331, $1332, $1333, $1334, $1335, $1336, $1337, $1338, $1339, $1340, $1341, $1342, $1343, $1344, $1345, $1346, $1347, $1348, VersionRange($1349, $1350)), ($1351, $1352, $1353, $1354, $1355, $1356, $1357, $1358, $1359, $1360, $1361, $1362, $1363, $1364, $1365, $1366, $1367, $1368, $1369, $1370, $1371, $1372, $1373, $1374, $1375, $1376, $1377, $1378, VersionRange($1379, $1380)), ($1381, $1382, $1383, $1384, $1385, $1386, $1387, $1388, $1389, $1390, $1391, $1392, $1393, $1394, $1395, $1396, $1397, $1398, $1399, $1400, $1401, $1402, $1403, $1404, $1405, $1406, $1407, $1408, VersionRange($1409, $1410)), ($1411, $1412, $1413, $1414, $1415, $1416, $1417, $1418, $1419, $1420, $1421, $1422, $1423, $1424, $1425, $1426, $1427, $1428, $1429, $1430, $1431, $1432, $1433, $1434, $1435, $1436, $1437, $1438, VersionRange($1439, $1440)), ($1441, $1442, $1443, $1444, $1445, $1446, $1447, $1448, $1449, $1450, $1451, $1452, $1453, $1454, $1455, $1456, $1457, $1458, $1459, $1460, $1461, $1462, $1463, $1464, $1465, $1466, $1467, $1468, VersionRange($1469, $1470)), ($1471, $1472, $1473, $1474, $1475, $1476, $1477, $1478, $1479, $1480, $1481, $1482, $1483, $1484, $1485, $1486, $1487, $1488, $1489, $1490, $1491, $1492, $1493, $1494, $1495, $1496, $1497, $1498, VersionRange($1499, $1500)), ($1501, $1502, $1503, $1504, $1505, $1506, $1507, $1508, $1509, $1510, $1511, $1512, $1513, $1514, $1515, $1516, $1517, $1518, $1519, $1520, $1521, $1522, $1523, $1524, $1525, $1526, $1527, $1528, VersionRange($1529, $1530)), ($1531, $1532, $1533, $1534, $1535, $1536, $1537, $1538, $1539, $1540, $1541, $1542, $1543, $1544, $1545, $1546, $1547, $1548, $1549, $1550, $1551, $1552, $1553, $1554, $1555, $1556, $1557, $1558, VersionRange($1559, $1560)), ($1561, $1562, $1563, $1564, $1565, $1566, $1567, $1568, $1569, $1570, $1571, $1572, $1573, $1574, $1575, $1576, $1577, $1578, $1579, $1580, $1581, $1582, $1583, $1584, $1585, $1586, $1587, $1588, VersionRange($1589, $1590)), ($1591, $1592, $1593, $1594, $1595, $1596, $1597, $1598, $1599, $1600, $1601, $1602, $1603, $1604, $1605, $1606, $1607, $1608, $1609, $1610, $1611, $1612, $1613, $1614, $1615, $1616, $1617, $1618, VersionRange($1619, $1620)), ($1621, $1622, $1623, $1624, $1625, $1626, $1627, $1628, $1629, $1630, $1631, $1632, $1633, $1634, $1635, $1636, $1637, $1638, $1639, $1640, $1641, $1642, $1643, $1644, $1645, $1646, $1647, $1648, VersionRange($1649, $1650)), ($1651, $1652, $1653, $1654, $1655, $1656, $1657, $1658, $1659, $1660, $1661, $1662, $1663, $1664, $1665, $1666, $1667, $1668, $1669, $1670, $1671, $1672, $1673, $1674, $1675, $1676, $1677, $1678, VersionRange($1679, $1680)), ($1681, $1682, $1683, $1684, $1685, $1686, $1687, $1688, $1689, $1690, $1691, $1692, $1693, $1694, $1695, $1696, $1697, $1698, $1699, $1700, $1701, $1702, $1703, $1704, $1705, $1706, $1707, $1708, VersionRange($1709, $1710)), ($1711, $1712, $1713, $1714, $1715, $1716, $1717, $1718, $1719, $1720, $1721, $1722, $1723, $1724, $1725, $1726, $1727, $1728, $1729, $1730, $1731, $1732, $1733, $1734, $1735, $1736, $1737, $1738, VersionRange($1739, $1740)), ($1741, $1742, $1743, $1744, $1745, $1746, $1747, $1748, $1749, $1750, $1751, $1752, $1753, $1754, $1755, $1756, $1757, $1758, $1759, $1760, $1761, $1762, $1763, $1764, $1765, $1766, $1767, $1768, VersionRange($1769, $1770)), ($1771, $1772, $1773, $1774, $1775, $1776, $1777, $1778, $1779, $1780, $1781, $1782, $1783, $1784, $1785, $1786, $1787, $1788, $1789, $1790, $1791, $1792, $1793, $1794, $1795, $1796, $1797, $1798, VersionRange($1799, $1800)), ($1801, $1802, $1803, $1804, $1805, $1806, $1807, $1808, $1809, $1810, $1811, $1812, $1813, $1814, $1815, $1816, $1817, $1818, $1819, $1820, $1821, $1822, $1823, $1824, $1825, $1826, $1827, $1828, VersionRange($1829, $1830)), ($1831, $1832, $1833, $1834, $1835, $1836, $1837, $1838, $1839, $1840, $1841, $1842, $1843, $1844, $1845, $1846, $1847, $1848, $1849, $1850, $1851, $1852, $1853, $1854, $1855, $1856, $1857, $1858, VersionRange($1859, $1860)), ($1861, $1862, $1863, $1864, $1865, $1866, $1867, $1868, $1869, $1870, $1871, $1872, $1873, $1874, $1875, $1876, $1877, $1878, $1879, $1880, $1881, $1882, $1883, $1884, $1885, $1886, $1887, $1888, VersionRange($1889, $1890)), ($1891, $1892, $1893, $1894, $1895, $1896, $1897, $1898, $1899, $1900, $1901, $1902, $1903, $1904, $1905, $1906, $1907, $1908, $1909, $1910, $1911, $1912, $1913, $1914, $1915, $1916, $1917, $1918, VersionRange($1919, $1920)), ($1921, $1922, $1923, $1924, $1925, $1926, $1927, $1928, $1929, $1930, $1931, $1932, $1933, $1934, $1935, $1936, $1937, $1938, $1939, $1940, $1941, $1942, $1943, $1944, $1945, $1946, $1947, $1948, VersionRange($1949, $1950)), ($1951, $1952, $1953, $1954, $1955, $1956, $1957, $1958, $1959, $1960, $1961, $1962, $1963, $1964, $1965, $1966, $1967, $1968, $1969, $1970, $1971, $1972, $1973, $1974, $1975, $1976, $1977, $1978, VersionRange($1979, $1980)), ($1981, $1982, $1983, $1984, $1985, $1986, $1987, $1988, $1989, $1990, $1991, $1992, $1993, $1994, $1995, $1996, $1997, $1998, $1999, $2000, $2001, $2002, $2003, $2004, $2005, $2006, $2007, $2008, VersionRange($2009, $2010)), ($2011, $2012, $2013, $2014, $2015, $2016, $2017, $2018, $2019, $2020, $2021, $2022, $2023, $2024, $2025, $2026, $2027, $2028, $2029, $2030, $2031, $2032, $2033, $2034, $2035, $2036, $2037, $2038, VersionRange($2039, $2040)), ($2041, $2042, $2043, $2044, $2045, $2046, $2047, $2048, $2049, $2050, $2051, $2052, $2053, $2054, $2055, $2056, $2057, $2058, $2059, $2060, $2061, $2062, $2063, $2064, $2065, $2066, $2067, $2068, VersionRange($2069, $2070)), ($2071, $2072, $2073, $2074, $2075, $2076, $2077, $2078, $2079, $2080, $2081, $2082, $2083, $2084, $2085, $2086, $2087, $2088, $2089, $2090, $2091, $2092, $2093, $2094, $2095, $2096, $2097, $2098, VersionRange($2099, $2100)), ($2101, $2102, $2103, $2104, $2105, $2106, $2107, $2108, $2109, $2110, $2111, $2112, $2113, $2114, $2115, $2116, $2117, $2118, $2119, $2120, $2121, $2122, $2123, $2124, $2125, $2126, $2127, $2128, VersionRange($2129, $2130)), ($2131, $2132, $2133, $2134, $2135, $2136, $2137, $2138, $2139, $2140, $2141, $2142, $2143, $2144, $2145, $2146, $2147, $2148, $2149, $2150, $2151, $2152, $2153, $2154, $2155, $2156, $2157, $2158, VersionRange($2159, $2160)), ($2161, $2162, $2163, $2164, $2165, $2166, $2167, $2168, $2169, $2170, $2171, $2172, $2173, $2174, $2175, $2176, $2177, $2178, $2179, $2180, $2181, $2182, $2183, $2184, $2185, $2186, $2187, $2188, VersionRange($2189, $2190)), ($2191, $2192, $2193, $2194, $2195, $2196, $2197, $2198, $2199, $2200, $2201, $2202, $2203, $2204, $2205, $2206, $2207, $2208, $2209, $2210, $2211, $2212, $2213, $2214, $2215, $2216, $2217, $2218, VersionRange($2219, $2220)), ($2221, $2222, $2223, $2224, $2225, $2226, $2227, $2228, $2229, $2230, $2231, $2232, $2233, $2234, $2235, $2236, $2237, $2238, $2239, $2240, $2241, $2242, $2243, $2244, $2245, $2246, $2247, $2248, VersionRange($2249, $2250)), ($2251, $2252, $2253, $2254, $2255, $2256, $2257, $2258, $2259, $2260, $2261, $2262, $2263, $2264, $2265, $2266, $2267, $2268, $2269, $2270, $2271, $2272, $2273, $2274, $2275, $2276, $2277, $2278, VersionRange($2279, $2280)), ($2281, $2282, $2283, $2284, $2285, $2286, $2287, $2288, $2289, $2290, $2291, $2292, $2293, $2294, $2295, $2296, $2297, $2298, $2299, $2300, $2301, $2302, $2303, $2304, $2305, $2306, $2307, $2308, VersionRange($2309, $2310)), ($2311, $2312, $2313, $2314, $2315, $2316, $2317, $2318, $2319, $2320, $2321, $2322, $2323, $2324, $2325, $2326, $2327, $2328, $2329, $2330, $2331, $2332, $2333, $2334, $2335, $2336, $2337, $2338, VersionRange($2339, $2340)), ($2341, $2342, $2343, $2344, $2345, $2346, $2347, $2348, $2349, $2350, $2351, $2352, $2353, $2354, $2355, $2356, $2357, $2358, $2359, $2360, $2361, $2362, $2363, $2364, $2365, $2366, $2367, $2368, VersionRange($2369, $2370)), ($2371, $2372, $2373, $2374, $2375, $2376, $2377, $2378, $2379, $2380, $2381, $2382, $2383, $2384, $2385, $2386, $2387, $2388, $2389, $2390, $2391, $2392, $2393, $2394, $2395, $2396, $2397, $2398, VersionRange($2399, $2400)), ($2401, $2402, $2403, $2404, $2405, $2406, $2407, $2408, $2409, $2410, $2411, $2412, $2413, $2414, $2415, $2416, $2417, $2418, $2419, $2420, $2421, $2422, $2423, $2424, $2425, $2426, $2427, $2428, VersionRange($2429, $2430)), ($2431, $2432, $2433, $2434, $2435, $2436, $2437, $2438, $2439, $2440, $2441, $2442, $2443, $2444, $2445, $2446, $2447, $2448, $2449, $2450, $2451, $2452, $2453, $2454, $2455, $2456, $2457, $2458, VersionRange($2459, $2460)), ($2461, $2462, $2463, $2464, $2465, $2466, $2467, $2468, $2469, $2470, $2471, $2472, $2473, $2474, $2475, $2476, $2477, $2478, $2479, $2480, $2481, $2482, $2483, $2484, $2485, $2486, $2487, $2488, VersionRange($2489, $2490)), ($2491, $2492, $2493, $2494, $2495, $2496, $2497, $2498, $2499, $2500, $2501, $2502, $2503, $2504, $2505, $2506, $2507, $2508, $2509, $2510, $2511, $2512, $2513, $2514, $2515, $2516, $2517, $2518, VersionRange($2519, $2520)), ($2521, $2522, $2523, $2524, $2525, $2526, $2527, $2528, $2529, $2530, $2531, $2532, $2533, $2534, $2535, $2536, $2537, $2538, $2539, $2540, $2541, $2542, $2543, $2544, $2545, $2546, $2547, $2548, VersionRange($2549, $2550)), ($2551, $2552, $2553, $2554, $2555, $2556, $2557, $2558, $2559, $2560, $2561, $2562, $2563, $2564, $2565, $2566, $2567, $2568, $2569, $2570, $2571, $2572, $2573, $2574, $2575, $2576, $2577, $2578, VersionRange($2579, $2580)), ($2581, $2582, $2583, $2584, $2585, $2586, $2587, $2588, $2589, $2590, $2591, $2592, $2593, $2594, $2595, $2596, $2597, $2598, $2599, $2600, $2601, $2602, $2603, $2604, $2605, $2606, $2607, $2608, VersionRange($2609, $2610)), ($2611, $2612, $2613, $2614, $2615, $2616, $2617, $2618, $2619, $2620, $2621, $2622, $2623, $2624, $2625, $2626, $2627, $2628, $2629, $2630, $2631, $2632, $2633, $2634, $2635, $2636, $2637, $2638, VersionRange($2639, $2640)), ($2641, $2642, $2643, $2644, $2645, $2646, $2647, $2648, $2649, $2650, $2651, $2652, $2653, $2654, $2655, $2656, $2657, $2658, $2659, $2660, $2661, $2662, $2663, $2664, $2665, $2666, $2667, $2668, VersionRange($2669, $2670)), ($2671, $2672, $2673, $2674, $2675, $2676, $2677, $2678, $2679, $2680, $2681, $2682, $2683, $2684, $2685, $2686, $2687, $2688, $2689, $2690, $2691, $2692, $2693, $2694, $2695, $2696, $2697, $2698, VersionRange($2699, $2700)), ($2701, $2702, $2703, $2704, $2705, $2706, $2707, $2708, $2709, $2710, $2711, $2712, $2713, $2714, $2715, $2716, $2717, $2718, $2719, $2720, $2721, $2722, $2723, $2724, $2725, $2726, $2727, $2728, VersionRange($2729, $2730)), ($2731, $2732, $2733, $2734, $2735, $2736, $2737, $2738, $2739, $2740, $2741, $2742, $2743, $2744, $2745, $2746, $2747, $2748, $2749, $2750, $2751, $2752, $2753, $2754, $2755, $2756, $2757, $2758, VersionRange($2759, $2760)), ($2761, $2762, $2763, $2764, $2765, $2766, $2767, $2768, $2769, $2770, $2771, $2772, $2773, $2774, $2775, $2776, $2777, $2778, $2779, $2780, $2781, $2782, $2783, $2784, $2785, $2786, $2787, $2788, VersionRange($2789, $2790)), ($2791, $2792, $2793, $2794, $2795, $2796, $2797, $2798, $2799, $2800, $2801, $2802, $2803, $2804, $2805, $2806, $2807, $2808, $2809, $2810, $2811, $2812, $2813, $2814, $2815, $2816, $2817, $2818, VersionRange($2819, $2820)), ($2821, $2822, $2823, $2824, $2825, $2826, $2827, $2828, $2829, $2830, $2831, $2832, $2833, $2834, $2835, $2836, $2837, $2838, $2839, $2840, $2841, $2842, $2843, $2844, $2845, $2846, $2847, $2848, VersionRange($2849, $2850)), ($2851, $2852, $2853, $2854, $2855, $2856, $2857, $2858, $2859, $2860, $2861, $2862, $2863, $2864, $2865, $2866, $2867, $2868, $2869, $2870, $2871, $2872, $2873, $2874, $2875, $2876, $2877, $2878, VersionRange($2879, $2880)), ($2881, $2882, $2883, $2884, $2885, $2886, $2887, $2888, $2889, $2890, $2891, $2892, $2893, $2894, $2895, $2896, $2897, $2898, $2899, $2900, $2901, $2902, $2903, $2904, $2905, $2906, $2907, $2908, VersionRange($2909, $2910)), ($2911, $2912, $2913, $2914, $2915, $2916, $2917, $2918, $2919, $2920, $2921, $2922, $2923, $2924, $2925, $2926, $2927, $2928, $2929, $2930, $2931, $2932, $2933, $2934, $2935, $2936, $2937, $2938, VersionRange($2939, $2940)), ($2941, $2942, $2943, $2944, $2945, $2946, $2947, $2948, $2949, $2950, $2951, $2952, $2953, $2954, $2955, $2956, $2957, $2958, $2959, $2960, $2961, $2962, $2963, $2964, $2965, $2966, $2967, $2968, VersionRange($2969, $2970)), ($2971, $2972, $2973, $2974, $2975, $2976, $2977, $2978, $2979, $2980, $2981, $2982, $2983, $2984, $2985, $2986, $2987, $2988, $2989, $2990, $2991, $2992, $2993, $2994, $2995, $2996, $2997, $2998, VersionRange($2999, $3000)), ($3001, $3002, $3003, $3004, $3005, $3006, $3007, $3008, $3009, $3010, $3011, $3012, $3013, $3014, $3015, $3016, $3017, $3018, $3019, $3020, $3021, $3022, $3023, $3024, $3025, $3026, $3027, $3028, VersionRange($3029, $3030)), ($3031, $3032, $3033, $3034, $3035, $3036, $3037, $3038, $3039, $3040, $3041, $3042, $3043, $3044, $3045, $3046, $3047, $3048, $3049, $3050, $3051, $3052, $3053, $3054, $3055, $3056, $3057, $3058, VersionRange($3059, $3060)), ($3061, $3062, $3063, $3064, $3065, $3066, $3067, $3068, $3069, $3070, $3071, $3072, $3073, $3074, $3075, $3076, $3077, $3078, $3079, $3080, $3081, $3082, $3083, $3084, $3085, $3086, $3087, $3088, VersionRange($3089, $3090)), ($3091, $3092, $3093, $3094, $3095, $3096, $3097, $3098, $3099, $3100, $3101, $3102, $3103, $3104, $3105, $3106, $3107, $3108, $3109, $3110, $3111, $3112, $3113, $3114, $3115, $3116, $3117, $3118, VersionRange($3119, $3120)), ($3121, $3122, $3123, $3124, $3125, $3126, $3127, $3128, $3129, $3130, $3131, $3132, $3133, $3134, $3135, $3136, $3137, $3138, $3139, $3140, $3141, $3142, $3143, $3144, $3145, $3146, $3147, $3148, VersionRange($3149, $3150)), ($3151, $3152, $3153, $3154, $3155, $3156, $3157, $3158, $3159, $3160, $3161, $3162, $3163, $3164, $3165, $3166, $3167, $3168, $3169, $3170, $3171, $3172, $3173, $3174, $3175, $3176, $3177, $3178, VersionRange($3179, $3180)), ($3181, $3182, $3183, $3184, $3185, $3186, $3187, $3188, $3189, $3190, $3191, $3192, $3193, $3194, $3195, $3196, $3197, $3198, $3199, $3200, $3201, $3202, $3203, $3204, $3205, $3206, $3207, $3208, VersionRange($3209, $3210)), ($3211, $3212, $3213, $3214, $3215, $3216, $3217, $3218, $3219, $3220, $3221, $3222, $3223, $3224, $3225, $3226, $3227, $3228, $3229, $3230, $3231, $3232, $3233, $3234, $3235, $3236, $3237, $3238, VersionRange($3239, $3240)), ($3241, $3242, $3243, $3244, $3245, $3246, $3247, $3248, $3249, $3250, $3251, $3252, $3253, $3254, $3255, $3256, $3257, $3258, $3259, $3260, $3261, $3262, $3263, $3264, $3265, $3266, $3267, $3268, VersionRange($3269, $3270)), ($3271, $3272, $3273, $3274, $3275, $3276, $3277, $3278, $3279, $3280, $3281, $3282, $3283, $3284, $3285, $3286, $3287, $3288, $3289, $3290, $3291, $3292, $3293, $3294, $3295, $3296, $3297, $3298, VersionRange($3299, $3300)), ($3301, $3302, $3303, $3304, $3305, $3306, $3307, $3308, $3309, $3310, $3311, $3312, $3313, $3314, $3315, $3316, $3317, $3318, $3319, $3320, $3321, $3322, $3323, $3324, $3325, $3326, $3327, $3328, VersionRange($3329, $3330)), ($3331, $3332, $3333, $3334, $3335, $3336, $3337, $3338, $3339, $3340, $3341, $3342, $3343, $3344, $3345, $3346, $3347, $3348, $3349, $3350, $3351, $3352, $3353, $3354, $3355, $3356, $3357, $3358, VersionRange($3359, $3360)), ($3361, $3362, $3363, $3364, $3365, $3366, $3367, $3368, $3369, $3370, $3371, $3372, $3373, $3374, $3375, $3376, $3377, $3378, $3379, $3380, $3381, $3382, $3383, $3384, $3385, $3386, $3387, $3388, VersionRange($3389, $3390)), ($3391, $3392, $3393, $3394, $3395, $3396, $3397, $3398, $3399, $3400, $3401, $3402, $3403, $3404, $3405, $3406, $3407, $3408, $3409, $3410, $3411, $3412, $3413, $3414, $3415, $3416, $3417, $3418, VersionRange($3419, $3420)), ($3421, $3422, $3423, $3424, $3425, $3426, $3427, $3428, $3429, $3430, $3431, $3432, $3433, $3434, $3435, $3436, $3437, $3438, $3439, $3440, $3441, $3442, $3443, $3444, $3445, $3446, $3447, $3448, VersionRange($3449, $3450)), ($3451, $3452, $3453, $3454, $3455, $3456, $3457, $3458, $3459, $3460, $3461, $3462, $3463, $3464, $3465, $3466, $3467, $3468, $3469, $3470, $3471, $3472, $3473, $3474, $3475, $3476, $3477, $3478, VersionRange($3479, $3480)), ($3481, $3482, $3483, $3484, $3485, $3486, $3487, $3488, $3489, $3490, $3491, $3492, $3493, $3494, $3495, $3496, $3497, $3498, $3499, $3500, $3501, $3502, $3503, $3504, $3505, $3506, $3507, $3508, VersionRange($3509, $3510)), ($3511, $3512, $3513, $3514, $3515, $3516, $3517, $3518, $3519, $3520, $3521, $3522, $3523, $3524, $3525, $3526, $3527, $3528, $3529, $3530, $3531, $3532, $3533, $3534, $3535, $3536, $3537, $3538, VersionRange($3539, $3540)), ($3541, $3542, $3543, $3544, $3545, $3546, $3547, $3548, $3549, $3550, $3551, $3552, $3553, $3554, $3555, $3556, $3557, $3558, $3559, $3560, $3561, $3562, $3563, $3564, $3565, $3566, $3567, $3568, VersionRange($3569, $3570)), ($3571, $3572, $3573, $3574, $3575, $3576, $3577, $3578, $3579, $3580, $3581, $3582, $3583, $3584, $3585, $3586, $3587, $3588, $3589, $3590, $3591, $3592, $3593, $3594, $3595, $3596, $3597, $3598, VersionRange($3599, $3600)), ($3601, $3602, $3603, $3604, $3605, $3606, $3607, $3608, $3609, $3610, $3611, $3612, $3613, $3614, $3615, $3616, $3617, $3618, $3619, $3620, $3621, $3622, $3623, $3624, $3625, $3626, $3627, $3628, VersionRange($3629, $3630)), ($3631, $3632, $3633, $3634, $3635, $3636, $3637, $3638, $3639, $3640, $3641, $3642, $3643, $3644, $3645, $3646, $3647, $3648, $3649, $3650, $3651, $3652, $3653, $3654, $3655, $3656, $3657, $3658, VersionRange($3659, $3660)), ($3661, $3662, $3663, $3664, $3665, $3666, $3667, $3668, $3669, $3670, $3671, $3672, $3673, $3674, $3675, $3676, $3677, $3678, $3679, $3680, $3681, $3682, $3683, $3684, $3685, $3686, $3687, $3688, VersionRange($3689, $3690)), ($3691, $3692, $3693, $3694, $3695, $3696, $3697, $3698, $3699, $3700, $3701, $3702, $3703, $3704, $3705, $3706, $3707, $3708, $3709, $3710, $3711, $3712, $3713, $3714, $3715, $3716, $3717, $3718, VersionRange($3719, $3720)), ($3721, $3722, $3723, $3724, $3725, $3726, $3727, $3728, $3729, $3730, $3731, $3732, $3733, $3734, $3735, $3736, $3737, $3738, $3739, $3740, $3741, $3742, $3743, $3744, $3745, $3746, $3747, $3748, VersionRange($3749, $3750)), ($3751, $3752, $3753, $3754, $3755, $3756, $3757, $3758, $3759, $3760, $3761, $3762, $3763, $3764, $3765, $3766, $3767, $3768, $3769, $3770, $3771, $3772, $3773, $3774, $3775, $3776, $3777, $3778, VersionRange($3779, $3780)), ($3781, $3782, $3783, $3784, $3785, $3786, $3787, $3788, $3789, $3790, $3791, $3792, $3793, $3794, $3795, $3796, $3797, $3798, $3799, $3800, $3801, $3802, $3803, $3804, $3805, $3806, $3807, $3808, VersionRange($3809, $3810)), ($3811, $3812, $3813, $3814, $3815, $3816, $3817, $3818, $3819, $3820, $3821, $3822, $3823, $3824, $3825, $3826, $3827, $3828, $3829, $3830, $3831, $3832, $3833, $3834, $3835, $3836, $3837, $3838, VersionRange($3839, $3840)), ($3841, $3842, $3843, $3844, $3845, $3846, $3847, $3848, $3849, $3850, $3851, $3852, $3853, $3854, $3855, $3856, $3857, $3858, $3859, $3860, $3861, $3862, $3863, $3864, $3865, $3866, $3867, $3868, VersionRange($3869, $3870)), ($3871, $3872, $3873, $3874, $3875, $3876, $3877, $3878, $3879, $3880, $3881, $3882, $3883, $3884, $3885, $3886, $3887, $3888, $3889, $3890, $3891, $3892, $3893, $3894, $3895, $3896, $3897, $3898, VersionRange($3899, $3900)), ($3901, $3902, $3903, $3904, $3905, $3906, $3907, $3908, $3909, $3910, $3911, $3912, $3913, $3914, $3915, $3916, $3917, $3918, $3919, $3920, $3921, $3922, $3923, $3924, $3925, $3926, $3927, $3928, VersionRange($3929, $3930)), ($3931, $3932, $3933, $3934, $3935, $3936, $3937, $3938, $3939, $3940, $3941, $3942, $3943, $3944, $3945, $3946, $3947, $3948, $3949, $3950, $3951, $3952, $3953, $3954, $3955, $3956, $3957, $3958, VersionRange($3959, $3960)), ($3961, $3962, $3963, $3964, $3965, $3966, $3967, $3968, $3969, $3970, $3971, $3972, $3973, $3974, $3975, $3976, $3977, $3978, $3979, $3980, $3981, $3982, $3983, $3984, $3985, $3986, $3987, $3988, VersionRange($3989, $3990)), ($3991, $3992, $3993, $3994, $3995, $3996, $3997, $3998, $3999, $4000, $4001, $4002, $4003, $4004, $4005, $4006, $4007, $4008, $4009, $4010, $4011, $4012, $4013, $4014, $4015, $4016, $4017, $4018, VersionRange($4019, $4020)), ($4021, $4022, $4023, $4024, $4025, $4026, $4027, $4028, $4029, $4030, $4031, $4032, $4033, $4034, $4035, $4036, $4037, $4038, $4039, $4040, $4041, $4042, $4043, $4044, $4045, $4046, $4047, $4048, VersionRange($4049, $4050)), ($4051, $4052, $4053, $4054, $4055, $4056, $4057, $4058, $4059, $4060, $4061, $4062, $4063, $4064, $4065, $4066, $4067, $4068, $4069, $4070, $4071, $4072, $4073, $4074, $4075, $4076, $4077, $4078, VersionRange($4079, $4080)), ($4081, $4082, $4083, $4084, $4085, $4086, $4087, $4088, $4089, $4090, $4091, $4092, $4093, $4094, $4095, $4096, $4097, $4098, $4099, $4100, $4101, $4102, $4103, $4104, $4105, $4106, $4107, $4108, VersionRange($4109, $4110)), ($4111, $4112, $4113, $4114, $4115, $4116, $4117, $4118, $4119, $4120, $4121, $4122, $4123, $4124, $4125, $4126, $4127, $4128, $4129, $4130, $4131, $4132, $4133, $4134, $4135, $4136, $4137, $4138, VersionRange($4139, $4140)), ($4141, $4142, $4143, $4144, $4145, $4146, $4147, $4148, $4149, $4150, $4151, $4152, $4153, $4154, $4155, $4156, $4157, $4158, $4159, $4160, $4161, $4162, $4163, $4164, $4165, $4166, $4167, $4168, VersionRange($4169, $4170)), ($4171, $4172, $4173, $4174, $4175, $4176, $4177, $4178, $4179, $4180, $4181, $4182, $4183, $4184, $4185, $4186, $4187, $4188, $4189, $4190, $4191, $4192, $4193, $4194, $4195, $4196, $4197, $4198, VersionRange($4199, $4200)), ($4201, $4202, $4203, $4204, $4205, $4206, $4207, $4208, $4209, $4210, $4211, $4212, $4213, $4214, $4215, $4216, $4217, $4218, $4219, $4220, $4221, $4222, $4223, $4224, $4225, $4226, $4227, $4228, VersionRange($4229, $4230)), ($4231, $4232, $4233, $4234, $4235, $4236, $4237, $4238, $4239, $4240, $4241, $4242, $4243, $4244, $4245, $4246, $4247, $4248, $4249, $4250, $4251, $4252, $4253, $4254, $4255, $4256, $4257, $4258, VersionRange($4259, $4260)), ($4261, $4262, $4263, $4264, $4265, $4266, $4267, $4268, $4269, $4270, $4271, $4272, $4273, $4274, $4275, $4276, $4277, $4278, $4279, $4280, $4281, $4282, $4283, $4284, $4285, $4286, $4287, $4288, VersionRange($4289, $4290)), ($4291, $4292, $4293, $4294, $4295, $4296, $4297, $4298, $4299, $4300, $4301, $4302, $4303, $4304, $4305, $4306, $4307, $4308, $4309, $4310, $4311, $4312, $4313, $4314, $4315, $4316, $4317, $4318, VersionRange($4319, $4320)), ($4321, $4322, $4323, $4324, $4325, $4326, $4327, $4328, $4329, $4330, $4331, $4332, $4333, $4334, $4335, $4336, $4337, $4338, $4339, $4340, $4341, $4342, $4343, $4344, $4345, $4346, $4347, $4348, VersionRange($4349, $4350)), ($4351, $4352, $4353, $4354, $4355, $4356, $4357, $4358, $4359, $4360, $4361, $4362, $4363, $4364, $4365, $4366, $4367, $4368, $4369, $4370, $4371, $4372, $4373, $4374, $4375, $4376, $4377, $4378, VersionRange($4379, $4380)), ($4381, $4382, $4383, $4384, $4385, $4386, $4387, $4388, $4389, $4390, $4391, $4392, $4393, $4394, $4395, $4396, $4397, $4398, $4399, $4400, $4401, $4402, $4403, $4404, $4405, $4406, $4407, $4408, VersionRange($4409, $4410)), ($4411, $4412, $4413, $4414, $4415, $4416, $4417, $4418, $4419, $4420, $4421, $4422, $4423, $4424, $4425, $4426, $4427, $4428, $4429, $4430, $4431, $4432, $4433, $4434, $4435, $4436, $4437, $4438, VersionRange($4439, $4440)), ($4441, $4442, $4443, $4444, $4445, $4446, $4447, $4448, $4449, $4450, $4451, $4452, $4453, $4454, $4455, $4456, $4457, $4458, $4459, $4460, $4461, $4462, $4463, $4464, $4465, $4466, $4467, $4468, VersionRange($4469, $4470)), ($4471, $4472, $4473, $4474, $4475, $4476, $4477, $4478, $4479, $4480, $4481, $4482, $4483, $4484, $4485, $4486, $4487, $4488, $4489, $4490, $4491, $4492, $4493, $4494, $4495, $4496, $4497, $4498, VersionRange($4499, $4500)), ($4501, $4502, $4503, $4504, $4505, $4506, $4507, $4508, $4509, $4510, $4511, $4512, $4513, $4514, $4515, $4516, $4517, $4518, $4519, $4520, $4521, $4522, $4523, $4524, $4525, $4526, $4527, $4528, VersionRange($4529, $4530)), ($4531, $4532, $4533, $4534, $4535, $4536, $4537, $4538, $4539, $4540, $4541, $4542, $4543, $4544, $4545, $4546, $4547, $4548, $4549, $4550, $4551, $4552, $4553, $4554, $4555, $4556, $4557, $4558, VersionRange($4559, $4560)), ($4561, $4562, $4563, $4564, $4565, $4566, $4567, $4568, $4569, $4570, $4571, $4572, $4573, $4574, $4575, $4576, $4577, $4578, $4579, $4580, $4581, $4582, $4583, $4584, $4585, $4586, $4587, $4588, VersionRange($4589, $4590)), ($4591, $4592, $4593, $4594, $4595, $4596, $4597, $4598, $4599, $4600, $4601, $4602, $4603, $4604, $4605, $4606, $4607, $4608, $4609, $4610, $4611, $4612, $4613, $4614, $4615, $4616, $4617, $4618, VersionRange($4619, $4620)), ($4621, $4622, $4623, $4624, $4625, $4626, $4627, $4628, $4629, $4630, $4631, $4632, $4633, $4634, $4635, $4636, $4637, $4638, $4639, $4640, $4641, $4642, $4643, $4644, $4645, $4646, $4647, $4648, VersionRange($4649, $4650)), ($4651, $4652, $4653, $4654, $4655, $4656, $4657, $4658, $4659, $4660, $4661, $4662, $4663, $4664, $4665, $4666, $4667, $4668, $4669, $4670, $4671, $4672, $4673, $4674, $4675, $4676, $4677, $4678, VersionRange($4679, $4680)), ($4681, $4682, $4683, $4684, $4685, $4686, $4687, $4688, $4689, $4690, $4691, $4692, $4693, $4694, $4695, $4696, $4697, $4698, $4699, $4700, $4701, $4702, $4703, $4704, $4705, $4706, $4707, $4708, VersionRange($4709, $4710)), ($4711, $4712, $4713, $4714, $4715, $4716, $4717, $4718, $4719, $4720, $4721, $4722, $4723, $4724, $4725, $4726, $4727, $4728, $4729, $4730, $4731, $4732, $4733, $4734, $4735, $4736, $4737, $4738, VersionRange($4739, $4740)), ($4741, $4742, $4743, $4744, $4745, $4746, $4747, $4748, $4749, $4750, $4751, $4752, $4753, $4754, $4755, $4756, $4757, $4758, $4759, $4760, $4761, $4762, $4763, $4764, $4765, $4766, $4767, $4768, VersionRange($4769, $4770)), ($4771, $4772, $4773, $4774, $4775, $4776, $4777, $4778, $4779, $4780, $4781, $4782, $4783, $4784, $4785, $4786, $4787, $4788, $4789, $4790, $4791, $4792, $4793, $4794, $4795, $4796, $4797, $4798, VersionRange($4799, $4800)), ($4801, $4802, $4803, $4804, $4805, $4806, $4807, $4808, $4809, $4810, $4811, $4812, $4813, $4814, $4815, $4816, $4817, $4818, $4819, $4820, $4821, $4822, $4823, $4824, $4825, $4826, $4827, $4828, VersionRange($4829, $4830)), ($4831, $4832, $4833, $4834, $4835, $4836, $4837, $4838, $4839, $4840, $4841, $4842, $4843, $4844, $4845, $4846, $4847, $4848, $4849, $4850, $4851, $4852, $4853, $4854, $4855, $4856, $4857, $4858, VersionRange($4859, $4860)), ($4861, $4862, $4863, $4864, $4865, $4866, $4867, $4868, $4869, $4870, $4871, $4872, $4873, $4874, $4875, $4876, $4877, $4878, $4879, $4880, $4881, $4882, $4883, $4884, $4885, $4886, $4887, $4888, VersionRange($4889, $4890)), ($4891, $4892, $4893, $4894, $4895, $4896, $4897, $4898, $4899, $4900, $4901, $4902, $4903, $4904, $4905, $4906, $4907, $4908, $4909, $4910, $4911, $4912, $4913, $4914, $4915, $4916, $4917, $4918, VersionRange($4919, $4920)), ($4921, $4922, $4923, $4924, $4925, $4926, $4927, $4928, $4929, $4930, $4931, $4932, $4933, $4934, $4935, $4936, $4937, $4938, $4939, $4940, $4941, $4942, $4943, $4944, $4945, $4946, $4947, $4948, VersionRange($4949, $4950)), ($4951, $4952, $4953, $4954, $4955, $4956, $4957, $4958, $4959, $4960, $4961, $4962, $4963, $4964, $4965, $4966, $4967, $4968, $4969, $4970, $4971, $4972, $4973, $4974, $4975, $4976, $4977, $4978, VersionRange($4979, $4980)), ($4981, $4982, $4983, $4984, $4985, $4986, $4987, $4988, $4989, $4990, $4991, $4992, $4993, $4994, $4995, $4996, $4997, $4998, $4999, $5000, $5001, $5002, $5003, $5004, $5005, $5006, $5007, $5008, VersionRange($5009, $5010)), ($5011, $5012, $5013, $5014, $5015, $5016, $5017, $5018, $5019, $5020, $5021, $5022, $5023, $5024, $5025, $5026, $5027, $5028, $5029, $5030, $5031, $5032, $5033, $5034, $5035, $5036, $5037, $5038, VersionRange($5039, $5040)), ($5041, $5042, $5043, $5044, $5045, $5046, $5047, $5048, $5049, $5050, $5051, $5052, $5053, $5054, $5055, $5056, $5057, $5058, $5059, $5060, $5061, $5062, $5063, $5064, $5065, $5066, $5067, $5068, VersionRange($5069, $5070)), ($5071, $5072, $5073, $5074, $5075, $5076, $5077, $5078, $5079, $5080, $5081, $5082, $5083, $5084, $5085, $5086, $5087, $5088, $5089, $5090, $5091, $5092, $5093, $5094, $5095, $5096, $5097, $5098, VersionRange($5099, $5100)), ($5101, $5102, $5103, $5104, $5105, $5106, $5107, $5108, $5109, $5110, $5111, $5112, $5113, $5114, $5115, $5116, $5117, $5118, $5119, $5120, $5121, $5122, $5123, $5124, $5125, $5126, $5127, $5128, VersionRange($5129, $5130)), ($5131, $5132, $5133, $5134, $5135, $5136, $5137, $5138, $5139, $5140, $5141, $5142, $5143, $5144, $5145, $5146, $5147, $5148, $5149, $5150, $5151, $5152, $5153, $5154, $5155, $5156, $5157, $5158, VersionRange($5159, $5160)), ($5161, $5162, $5163, $5164, $5165, $5166, $5167, $5168, $5169, $5170, $5171, $5172, $5173, $5174, $5175, $5176, $5177, $5178, $5179, $5180, $5181, $5182, $5183, $5184, $5185, $5186, $5187, $5188, VersionRange($5189, $5190)), ($5191, $5192, $5193, $5194, $5195, $5196, $5197, $5198, $5199, $5200, $5201, $5202, $5203, $5204, $5205, $5206, $5207, $5208, $5209, $5210, $5211, $5212, $5213, $5214, $5215, $5216, $5217, $5218, VersionRange($5219, $5220)), ($5221, $5222, $5223, $5224, $5225, $5226, $5227, $5228, $5229, $5230, $5231, $5232, $5233, $5234, $5235, $5236, $5237, $5238, $5239, $5240, $5241, $5242, $5243, $5244, $5245, $5246, $5247, $5248, VersionRange($5249, $5250)), ($5251, $5252, $5253, $5254, $5255, $5256, $5257, $5258, $5259, $5260, $5261, $5262, $5263, $5264, $5265, $5266, $5267, $5268, $5269, $5270, $5271, $5272, $5273, $5274, $5275, $5276, $5277, $5278, VersionRange($5279, $5280)), ($5281, $5282, $5283, $5284, $5285, $5286, $5287, $5288, $5289, $5290, $5291, $5292, $5293, $5294, $5295, $5296, $5297, $5298, $5299, $5300, $5301, $5302, $5303, $5304, $5305, $5306, $5307, $5308, VersionRange($5309, $5310)), ($5311, $5312, $5313, $5314, $5315, $5316, $5317, $5318, $5319, $5320, $5321, $5322, $5323, $5324, $5325, $5326, $5327, $5328, $5329, $5330, $5331, $5332, $5333, $5334, $5335, $5336, $5337, $5338, VersionRange($5339, $5340)), ($5341, $5342, $5343, $5344, $5345, $5346, $5347, $5348, $5349, $5350, $5351, $5352, $5353, $5354, $5355, $5356, $5357, $5358, $5359, $5360, $5361, $5362, $5363, $5364, $5365, $5366, $5367, $5368, VersionRange($5369, $5370)), ($5371, $5372, $5373, $5374, $5375, $5376, $5377, $5378, $5379, $5380, $5381, $5382, $5383, $5384, $5385, $5386, $5387, $5388, $5389, $5390, $5391, $5392, $5393, $5394, $5395, $5396, $5397, $5398, VersionRange($5399, $5400)), ($5401, $5402, $5403, $5404, $5405, $5406, $5407, $5408, $5409, $5410, $5411, $5412, $5413, $5414, $5415, $5416, $5417, $5418, $5419, $5420, $5421, $5422, $5423, $5424, $5425, $5426, $5427, $5428, VersionRange($5429, $5430)), ($5431, $5432, $5433, $5434, $5435, $5436, $5437, $5438, $5439, $5440, $5441, $5442, $5443, $5444, $5445, $5446, $5447, $5448, $5449, $5450, $5451, $5452, $5453, $5454, $5455, $5456, $5457, $5458, VersionRange($5459, $5460)), ($5461, $5462, $5463, $5464, $5465, $5466, $5467, $5468, $5469, $5470, $5471, $5472, $5473, $5474, $5475, $5476, $5477, $5478, $5479, $5480, $5481, $5482, $5483, $5484, $5485, $5486, $5487, $5488, VersionRange($5489, $5490)), ($5491, $5492, $5493, $5494, $5495, $5496, $5497, $5498, $5499, $5500, $5501, $5502, $5503, $5504, $5505, $5506, $5507, $5508, $5509, $5510, $5511, $5512, $5513, $5514, $5515, $5516, $5517, $5518, VersionRange($5519, $5520)), ($5521, $5522, $5523, $5524, $5525, $5526, $5527, $5528, $5529, $5530, $5531, $5532, $5533, $5534, $5535, $5536, $5537, $5538, $5539, $5540, $5541, $5542, $5543, $5544, $5545, $5546, $5547, $5548, VersionRange($5549, $5550)), ($5551, $5552, $5553, $5554, $5555, $5556, $5557, $5558, $5559, $5560, $5561, $5562, $5563, $5564, $5565, $5566, $5567, $5568, $5569, $5570, $5571, $5572, $5573, $5574, $5575, $5576, $5577, $5578, VersionRange($5579, $5580)), ($5581, $5582, $5583, $5584, $5585, $5586, $5587, $5588, $5589, $5590, $5591, $5592, $5593, $5594, $5595, $5596, $5597, $5598, $5599, $5600, $5601, $5602, $5603, $5604, $5605, $5606, $5607, $5608, VersionRange($5609, $5610)), ($5611, $5612, $5613, $5614, $5615, $5616, $5617, $5618, $5619, $5620, $5621, $5622, $5623, $5624, $5625, $5626, $5627, $5628, $5629, $5630, $5631, $5632, $5633, $5634, $5635, $5636, $5637, $5638, VersionRange($5639, $5640)), ($5641, $5642, $5643, $5644, $5645, $5646, $5647, $5648, $5649, $5650, $5651, $5652, $5653, $5654, $5655, $5656, $5657, $5658, $5659, $5660, $5661, $5662, $5663, $5664, $5665, $5666, $5667, $5668, VersionRange($5669, $5670)), ($5671, $5672, $5673, $5674, $5675, $5676, $5677, $5678, $5679, $5680, $5681, $5682, $5683, $5684, $5685, $5686, $5687, $5688, $5689, $5690, $5691, $5692, $5693, $5694, $5695, $5696, $5697, $5698, VersionRange($5699, $5700)), ($5701, $5702, $5703, $5704, $5705, $5706, $5707, $5708, $5709, $5710, $5711, $5712, $5713, $5714, $5715, $5716, $5717, $5718, $5719, $5720, $5721, $5722, $5723, $5724, $5725, $5726, $5727, $5728, VersionRange($5729, $5730)), ($5731, $5732, $5733, $5734, $5735, $5736, $5737, $5738, $5739, $5740, $5741, $5742, $5743, $5744, $5745, $5746, $5747, $5748, $5749, $5750, $5751, $5752, $5753, $5754, $5755, $5756, $5757, $5758, VersionRange($5759, $5760)), ($5761, $5762, $5763, $5764, $5765, $5766, $5767, $5768, $5769, $5770, $5771, $5772, $5773, $5774, $5775, $5776, $5777, $5778, $5779, $5780, $5781, $5782, $5783, $5784, $5785, $5786, $5787, $5788, VersionRange($5789, $5790)), ($5791, $5792, $5793, $5794, $5795, $5796, $5797, $5798, $5799, $5800, $5801, $5802, $5803, $5804, $5805, $5806, $5807, $5808, $5809, $5810, $5811, $5812, $5813, $5814, $5815, $5816, $5817, $5818, VersionRange($5819, $5820)), ($5821, $5822, $5823, $5824, $5825, $5826, $5827, $5828, $5829, $5830, $5831, $5832, $5833, $5834, $5835, $5836, $5837, $5838, $5839, $5840, $5841, $5842, $5843, $5844, $5845, $5846, $5847, $5848, VersionRange($5849, $5850)), ($5851, $5852, $5853, $5854, $5855, $5856, $5857, $5858, $5859, $5860, $5861, $5862, $5863, $5864, $5865, $5866, $5867, $5868, $5869, $5870, $5871, $5872, $5873, $5874, $5875, $5876, $5877, $5878, VersionRange($5879, $5880)), ($5881, $5882, $5883, $5884, $5885, $5886, $5887, $5888, $5889, $5890, $5891, $5892, $5893, $5894, $5895, $5896, $5897, $5898, $5899, $5900, $5901, $5902, $5903, $5904, $5905, $5906, $5907, $5908, VersionRange($5909, $5910)), ($5911, $5912, $5913, $5914, $5915, $5916, $5917, $5918, $5919, $5920, $5921, $5922, $5923, $5924, $5925, $5926, $5927, $5928, $5929, $5930, $5931, $5932, $5933, $5934, $5935, $5936, $5937, $5938, VersionRange($5939, $5940)), ($5941, $5942, $5943, $5944, $5945, $5946, $5947, $5948, $5949, $5950, $5951, $5952, $5953, $5954, $5955, $5956, $5957, $5958, $5959, $5960, $5961, $5962, $5963, $5964, $5965, $5966, $5967, $5968, VersionRange($5969, $5970)), ($5971, $5972, $5973, $5974, $5975, $5976, $5977, $5978, $5979, $5980, $5981, $5982, $5983, $5984, $5985, $5986, $5987, $5988, $5989, $5990, $5991, $5992, $5993, $5994, $5995, $5996, $5997, $5998, VersionRange($5999, $6000)), ($6001, $6002, $6003, $6004, $6005, $6006, $6007, $6008, $6009, $6010, $6011, $6012, $6013, $6014, $6015, $6016, $6017, $6018, $6019, $6020, $6021, $6022, $6023, $6024, $6025, $6026, $6027, $6028, VersionRange($6029, $6030)), ($6031, $6032, $6033, $6034, $6035, $6036, $6037, $6038, $6039, $6040, $6041, $6042, $6043, $6044, $6045, $6046, $6047, $6048, $6049, $6050, $6051, $6052, $6053, $6054, $6055, $6056, $6057, $6058, VersionRange($6059, $6060)), ($6061, $6062, $6063, $6064, $6065, $6066, $6067, $6068, $6069, $6070, $6071, $6072, $6073, $6074, $6075, $6076, $6077, $6078, $6079, $6080, $6081, $6082, $6083, $6084, $6085, $6086, $6087, $6088, VersionRange($6089, $6090)), ($6091, $6092, $6093, $6094, $6095, $6096, $6097, $6098, $6099, $6100, $6101, $6102, $6103, $6104, $6105, $6106, $6107, $6108, $6109, $6110, $6111, $6112, $6113, $6114, $6115, $6116, $6117, $6118, VersionRange($6119, $6120)), ($6121, $6122, $6123, $6124, $6125, $6126, $6127, $6128, $6129, $6130, $6131, $6132, $6133, $6134, $6135, $6136, $6137, $6138, $6139, $6140, $6141, $6142, $6143, $6144, $6145, $6146, $6147, $6148, VersionRange($6149, $6150)), ($6151, $6152, $6153, $6154, $6155, $6156, $6157, $6158, $6159, $6160, $6161, $6162, $6163, $6164, $6165, $6166, $6167, $6168, $6169, $6170, $6171, $6172, $6173, $6174, $6175, $6176, $6177, $6178, VersionRange($6179, $6180)), ($6181, $6182, $6183, $6184, $6185, $6186, $6187, $6188, $6189, $6190, $6191, $6192, $6193, $6194, $6195, $6196, $6197, $6198, $6199, $6200, $6201, $6202, $6203, $6204, $6205, $6206, $6207, $6208, VersionRange($6209, $6210)), ($6211, $6212, $6213, $6214, $6215, $6216, $6217, $6218, $6219, $6220, $6221, $6222, $6223, $6224, $6225, $6226, $6227, $6228, $6229, $6230, $6231, $6232, $6233, $6234, $6235, $6236, $6237, $6238, VersionRange($6239, $6240)), ($6241, $6242, $6243, $6244, $6245, $6246, $6247, $6248, $6249, $6250, $6251, $6252, $6253, $6254, $6255, $6256, $6257, $6258, $6259, $6260, $6261, $6262, $6263, $6264, $6265, $6266, $6267, $6268, VersionRange($6269, $6270)), ($6271, $6272, $6273, $6274, $6275, $6276, $6277, $6278, $6279, $6280, $6281, $6282, $6283, $6284, $6285, $6286, $6287, $6288, $6289, $6290, $6291, $6292, $6293, $6294, $6295, $6296, $6297, $6298, VersionRange($6299, $6300)), ($6301, $6302, $6303, $6304, $6305, $6306, $6307, $6308, $6309, $6310, $6311, $6312, $6313, $6314, $6315, $6316, $6317, $6318, $6319, $6320, $6321, $6322, $6323, $6324, $6325, $6326, $6327, $6328, VersionRange($6329, $6330)), ($6331, $6332, $6333, $6334, $6335, $6336, $6337, $6338, $6339, $6340, $6341, $6342, $6343, $6344, $6345, $6346, $6347, $6348, $6349, $6350, $6351, $6352, $6353, $6354, $6355, $6356, $6357, $6358, VersionRange($6359, $6360)), ($6361, $6362, $6363, $6364, $6365, $6366, $6367, $6368, $6369, $6370, $6371, $6372, $6373, $6374, $6375, $6376, $6377, $6378, $6379, $6380, $6381, $6382, $6383, $6384, $6385, $6386, $6387, $6388, VersionRange($6389, $6390)), ($6391, $6392, $6393, $6394, $6395, $6396, $6397, $6398, $6399, $6400, $6401, $6402, $6403, $6404, $6405, $6406, $6407, $6408, $6409, $6410, $6411, $6412, $6413, $6414, $6415, $6416, $6417, $6418, VersionRange($6419, $6420)), ($6421, $6422, $6423, $6424, $6425, $6426, $6427, $6428, $6429, $6430, $6431, $6432, $6433, $6434, $6435, $6436, $6437, $6438, $6439, $6440, $6441, $6442, $6443, $6444, $6445, $6446, $6447, $6448, VersionRange($6449, $6450)), ($6451, $6452, $6453, $6454, $6455, $6456, $6457, $6458, $6459, $6460, $6461, $6462, $6463, $6464, $6465, $6466, $6467, $6468, $6469, $6470, $6471, $6472, $6473, $6474, $6475, $6476, $6477, $6478, VersionRange($6479, $6480)), ($6481, $6482, $6483, $6484, $6485, $6486, $6487, $6488, $6489, $6490, $6491, $6492, $6493, $6494, $6495, $6496, $6497, $6498, $6499, $6500, $6501, $6502, $6503, $6504, $6505, $6506, $6507, $6508, VersionRange($6509, $6510)), ($6511, $6512, $6513, $6514, $6515, $6516, $6517, $6518, $6519, $6520, $6521, $6522, $6523, $6524, $6525, $6526, $6527, $6528, $6529, $6530, $6531, $6532, $6533, $6534, $6535, $6536, $6537, $6538, VersionRange($6539, $6540)), ($6541, $6542, $6543, $6544, $6545, $6546, $6547, $6548, $6549, $6550, $6551, $6552, $6553, $6554, $6555, $6556, $6557, $6558, $6559, $6560, $6561, $6562, $6563, $6564, $6565, $6566, $6567, $6568, VersionRange($6569, $6570)), ($6571, $6572, $6573, $6574, $6575, $6576, $6577, $6578, $6579, $6580, $6581, $6582, $6583, $6584, $6585, $6586, $6587, $6588, $6589, $6590, $6591, $6592, $6593, $6594, $6595, $6596, $6597, $6598, VersionRange($6599, $6600)), ($6601, $6602, $6603, $6604, $6605, $6606, $6607, $6608, $6609, $6610, $6611, $6612, $6613, $6614, $6615, $6616, $6617, $6618, $6619, $6620, $6621, $6622, $6623, $6624, $6625, $6626, $6627, $6628, VersionRange($6629, $6630)), ($6631, $6632, $6633, $6634, $6635, $6636, $6637, $6638, $6639, $6640, $6641, $6642, $6643, $6644, $6645, $6646, $6647, $6648, $6649, $6650, $6651, $6652, $6653, $6654, $6655, $6656, $6657, $6658, VersionRange($6659, $6660)), ($6661, $6662, $6663, $6664, $6665, $6666, $6667, $6668, $6669, $6670, $6671, $6672, $6673, $6674, $6675, $6676, $6677, $6678, $6679, $6680, $6681, $6682, $6683, $6684, $6685, $6686, $6687, $6688, VersionRange($6689, $6690)), ($6691, $6692, $6693, $6694, $6695, $6696, $6697, $6698, $6699, $6700, $6701, $6702, $6703, $6704, $6705, $6706, $6707, $6708, $6709, $6710, $6711, $6712, $6713, $6714, $6715, $6716, $6717, $6718, VersionRange($6719, $6720)), ($6721, $6722, $6723, $6724, $6725, $6726, $6727, $6728, $6729, $6730, $6731, $6732, $6733, $6734, $6735, $6736, $6737, $6738, $6739, $6740, $6741, $6742, $6743, $6744, $6745, $6746, $6747, $6748, VersionRange($6749, $6750)), ($6751, $6752, $6753, $6754, $6755, $6756, $6757, $6758, $6759, $6760, $6761, $6762, $6763, $6764, $6765, $6766, $6767, $6768, $6769, $6770, $6771, $6772, $6773, $6774, $6775, $6776, $6777, $6778, VersionRange($6779, $6780)), ($6781, $6782, $6783, $6784, $6785, $6786, $6787, $6788, $6789, $6790, $6791, $6792, $6793, $6794, $6795, $6796, $6797, $6798, $6799, $6800, $6801, $6802, $6803, $6804, $6805, $6806, $6807, $6808, VersionRange($6809, $6810)), ($6811, $6812, $6813, $6814, $6815, $6816, $6817, $6818, $6819, $6820, $6821, $6822, $6823, $6824, $6825, $6826, $6827, $6828, $6829, $6830, $6831, $6832, $6833, $6834, $6835, $6836, $6837, $6838, VersionRange($6839, $6840)), ($6841, $6842, $6843, $6844, $6845, $6846, $6847, $6848, $6849, $6850, $6851, $6852, $6853, $6854, $6855, $6856, $6857, $6858, $6859, $6860, $6861, $6862, $6863, $6864, $6865, $6866, $6867, $6868, VersionRange($6869, $6870)), ($6871, $6872, $6873, $6874, $6875, $6876, $6877, $6878, $6879, $6880, $6881, $6882, $6883, $6884, $6885, $6886, $6887, $6888, $6889, $6890, $6891, $6892, $6893, $6894, $6895, $6896, $6897, $6898, VersionRange($6899, $6900)), ($6901, $6902, $6903, $6904, $6905, $6906, $6907, $6908, $6909, $6910, $6911, $6912, $6913, $6914, $6915, $6916, $6917, $6918, $6919, $6920, $6921, $6922, $6923, $6924, $6925, $6926, $6927, $6928, VersionRange($6929, $6930)), ($6931, $6932, $6933, $6934, $6935, $6936, $6937, $6938, $6939, $6940, $6941, $6942, $6943, $6944, $6945, $6946, $6947, $6948, $6949, $6950, $6951, $6952, $6953, $6954, $6955, $6956, $6957, $6958, VersionRange($6959, $6960)), ($6961, $6962, $6963, $6964, $6965, $6966, $6967, $6968, $6969, $6970, $6971, $6972, $6973, $6974, $6975, $6976, $6977, $6978, $6979, $6980, $6981, $6982, $6983, $6984, $6985, $6986, $6987, $6988, VersionRange($6989, $6990)), ($6991, $6992, $6993, $6994, $6995, $6996, $6997, $6998, $6999, $7000, $7001, $7002, $7003, $7004, $7005, $7006, $7007, $7008, $7009, $7010, $7011, $7012, $7013, $7014, $7015, $7016, $7017, $7018, VersionRange($7019, $7020)), ($7021, $7022, $7023, $7024, $7025, $7026, $7027, $7028, $7029, $7030, $7031, $7032, $7033, $7034, $7035, $7036, $7037, $7038, $7039, $7040, $7041, $7042, $7043, $7044, $7045, $7046, $7047, $7048, VersionRange($7049, $7050)), ($7051, $7052, $7053, $7054, $7055, $7056, $7057, $7058, $7059, $7060, $7061, $7062, $7063, $7064, $7065, $7066, $7067, $7068, $7069, $7070, $7071, $7072, $7073, $7074, $7075, $7076, $7077, $7078, VersionRange($7079, $7080)), ($7081, $7082, $7083, $7084, $7085, $7086, $7087, $7088, $7089, $7090, $7091, $7092, $7093, $7094, $7095, $7096, $7097, $7098, $7099, $7100, $7101, $7102, $7103, $7104, $7105, $7106, $7107, $7108, VersionRange($7109, $7110)), ($7111, $7112, $7113, $7114, $7115, $7116, $7117, $7118, $7119, $7120, $7121, $7122, $7123, $7124, $7125, $7126, $7127, $7128, $7129, $7130, $7131, $7132, $7133, $7134, $7135, $7136, $7137, $7138, VersionRange($7139, $7140)), ($7141, $7142, $7143, $7144, $7145, $7146, $7147, $7148, $7149, $7150, $7151, $7152, $7153, $7154, $7155, $7156, $7157, $7158, $7159, $7160, $7161, $7162, $7163, $7164, $7165, $7166, $7167, $7168, VersionRange($7169, $7170)), ($7171, $7172, $7173, $7174, $7175, $7176, $7177, $7178, $7179, $7180, $7181, $7182, $7183, $7184, $7185, $7186, $7187, $7188, $7189, $7190, $7191, $7192, $7193, $7194, $7195, $7196, $7197, $7198, VersionRange($7199, $7200)), ($7201, $7202, $7203, $7204, $7205, $7206, $7207, $7208, $7209, $7210, $7211, $7212, $7213, $7214, $7215, $7216, $7217, $7218, $7219, $7220, $7221, $7222, $7223, $7224, $7225, $7226, $7227, $7228, VersionRange($7229, $7230)), ($7231, $7232, $7233, $7234, $7235, $7236, $7237, $7238, $7239, $7240, $7241, $7242, $7243, $7244, $7245, $7246, $7247, $7248, $7249, $7250, $7251, $7252, $7253, $7254, $7255, $7256, $7257, $7258, VersionRange($7259, $7260)), ($7261, $7262, $7263, $7264, $7265, $7266, $7267, $7268, $7269, $7270, $7271, $7272, $7273, $7274, $7275, $7276, $7277, $7278, $7279, $7280, $7281, $7282, $7283, $7284, $7285, $7286, $7287, $7288, VersionRange($7289, $7290)), ($7291, $7292, $7293, $7294, $7295, $7296, $7297, $7298, $7299, $7300, $7301, $7302, $7303, $7304, $7305, $7306, $7307, $7308, $7309, $7310, $7311, $7312, $7313, $7314, $7315, $7316, $7317, $7318, VersionRange($7319, $7320)), ($7321, $7322, $7323, $7324, $7325, $7326, $7327, $7328, $7329, $7330, $7331, $7332, $7333, $7334, $7335, $7336, $7337, $7338, $7339, $7340, $7341, $7342, $7343, $7344, $7345, $7346, $7347, $7348, VersionRange($7349, $7350)), ($7351, $7352, $7353, $7354, $7355, $7356, $7357, $7358, $7359, $7360, $7361, $7362, $7363, $7364, $7365, $7366, $7367, $7368, $7369, $7370, $7371, $7372, $7373, $7374, $7375, $7376, $7377, $7378, VersionRange($7379, $7380)), ($7381, $7382, $7383, $7384, $7385, $7386, $7387, $7388, $7389, $7390, $7391, $7392, $7393, $7394, $7395, $7396, $7397, $7398, $7399, $7400, $7401, $7402, $7403, $7404, $7405, $7406, $7407, $7408, VersionRange($7409, $7410)), ($7411, $7412, $7413, $7414, $7415, $7416, $7417, $7418, $7419, $7420, $7421, $7422, $7423, $7424, $7425, $7426, $7427, $7428, $7429, $7430, $7431, $7432, $7433, $7434, $7435, $7436, $7437, $7438, VersionRange($7439, $7440)), ($7441, $7442, $7443, $7444, $7445, $7446, $7447, $7448, $7449, $7450, $7451, $7452, $7453, $7454, $7455, $7456, $7457, $7458, $7459, $7460, $7461, $7462, $7463, $7464, $7465, $7466, $7467, $7468, VersionRange($7469, $7470)), ($7471, $7472, $7473, $7474, $7475, $7476, $7477, $7478, $7479, $7480, $7481, $7482, $7483, $7484, $7485, $7486, $7487, $7488, $7489, $7490, $7491, $7492, $7493, $7494, $7495, $7496, $7497, $7498, VersionRange($7499, $7500)), ($7501, $7502, $7503, $7504, $7505, $7506, $7507, $7508, $7509, $7510, $7511, $7512, $7513, $7514, $7515, $7516, $7517, $7518, $7519, $7520, $7521, $7522, $7523, $7524, $7525, $7526, $7527, $7528, VersionRange($7529, $7530)), ($7531, $7532, $7533, $7534, $7535, $7536, $7537, $7538, $7539, $7540, $7541, $7542, $7543, $7544, $7545, $7546, $7547, $7548, $7549, $7550, $7551, $7552, $7553, $7554, $7555, $7556, $7557, $7558, VersionRange($7559, $7560)), ($7561, $7562, $7563, $7564, $7565, $7566, $7567, $7568, $7569, $7570, $7571, $7572, $7573, $7574, $7575, $7576, $7577, $7578, $7579, $7580, $7581, $7582, $7583, $7584, $7585, $7586, $7587, $7588, VersionRange($7589, $7590)), ($7591, $7592, $7593, $7594, $7595, $7596, $7597, $7598, $7599, $7600, $7601, $7602, $7603, $7604, $7605, $7606, $7607, $7608, $7609, $7610, $7611, $7612, $7613, $7614, $7615, $7616, $7617, $7618, VersionRange($7619, $7620)), ($7621, $7622, $7623, $7624, $7625, $7626, $7627, $7628, $7629, $7630, $7631, $7632, $7633, $7634, $7635, $7636, $7637, $7638, $7639, $7640, $7641, $7642, $7643, $7644, $7645, $7646, $7647, $7648, VersionRange($7649, $7650)), ($7651, $7652, $7653, $7654, $7655, $7656, $7657, $7658, $7659, $7660, $7661, $7662, $7663, $7664, $7665, $7666, $7667, $7668, $7669, $7670, $7671, $7672, $7673, $7674, $7675, $7676, $7677, $7678, VersionRange($7679, $7680)), ($7681, $7682, $7683, $7684, $7685, $7686, $7687, $7688, $7689, $7690, $7691, $7692, $7693, $7694, $7695, $7696, $7697, $7698, $7699, $7700, $7701, $7702, $7703, $7704, $7705, $7706, $7707, $7708, VersionRange($7709, $7710)), ($7711, $7712, $7713, $7714, $7715, $7716, $7717, $7718, $7719, $7720, $7721, $7722, $7723, $7724, $7725, $7726, $7727, $7728, $7729, $7730, $7731, $7732, $7733, $7734, $7735, $7736, $7737, $7738, VersionRange($7739, $7740)), ($7741, $7742, $7743, $7744, $7745, $7746, $7747, $7748, $7749, $7750, $7751, $7752, $7753, $7754, $7755, $7756, $7757, $7758, $7759, $7760, $7761, $7762, $7763, $7764, $7765, $7766, $7767, $7768, VersionRange($7769, $7770)), ($7771, $7772, $7773, $7774, $7775, $7776, $7777, $7778, $7779, $7780, $7781, $7782, $7783, $7784, $7785, $7786, $7787, $7788, $7789, $7790, $7791, $7792, $7793, $7794, $7795, $7796, $7797, $7798, VersionRange($7799, $7800)), ($7801, $7802, $7803, $7804, $7805, $7806, $7807, $7808, $7809, $7810, $7811, $7812, $7813, $7814, $7815, $7816, $7817, $7818, $7819, $7820, $7821, $7822, $7823, $7824, $7825, $7826, $7827, $7828, VersionRange($7829, $7830)), ($7831, $7832, $7833, $7834, $7835, $7836, $7837, $7838, $7839, $7840, $7841, $7842, $7843, $7844, $7845, $7846, $7847, $7848, $7849, $7850, $7851, $7852, $7853, $7854, $7855, $7856, $7857, $7858, VersionRange($7859, $7860)), ($7861, $7862, $7863, $7864, $7865, $7866, $7867, $7868, $7869, $7870, $7871, $7872, $7873, $7874, $7875, $7876, $7877, $7878, $7879, $7880, $7881, $7882, $7883, $7884, $7885, $7886, $7887, $7888, VersionRange($7889, $7890)), ($7891, $7892, $7893, $7894, $7895, $7896, $7897, $7898, $7899, $7900, $7901, $7902, $7903, $7904, $7905, $7906, $7907, $7908, $7909, $7910, $7911, $7912, $7913, $7914, $7915, $7916, $7917, $7918, VersionRange($7919, $7920)), ($7921, $7922, $7923, $7924, $7925, $7926, $7927, $7928, $7929, $7930, $7931, $7932, $7933, $7934, $7935, $7936, $7937, $7938, $7939, $7940, $7941, $7942, $7943, $7944, $7945, $7946, $7947, $7948, VersionRange($7949, $7950)), ($7951, $7952, $7953, $7954, $7955, $7956, $7957, $7958, $7959, $7960, $7961, $7962, $7963, $7964, $7965, $7966, $7967, $7968, $7969, $7970, $7971, $7972, $7973, $7974, $7975, $7976, $7977, $7978, VersionRange($7979, $7980)), ($7981, $7982, $7983, $7984, $7985, $7986, $7987, $7988, $7989, $7990, $7991, $7992, $7993, $7994, $7995, $7996, $7997, $7998, $7999, $8000, $8001, $8002, $8003, $8004, $8005, $8006, $8007, $8008, VersionRange($8009, $8010)), ($8011, $8012, $8013, $8014, $8015, $8016, $8017, $8018, $8019, $8020, $8021, $8022, $8023, $8024, $8025, $8026, $8027, $8028, $8029, $8030, $8031, $8032, $8033, $8034, $8035, $8036, $8037, $8038, VersionRange($8039, $8040)), ($8041, $8042, $8043, $8044, $8045, $8046, $8047, $8048, $8049, $8050, $8051, $8052, $8053, $8054, $8055, $8056, $8057, $8058, $8059, $8060, $8061, $8062, $8063, $8064, $8065, $8066, $8067, $8068, VersionRange($8069, $8070)), ($8071, $8072, $8073, $8074, $8075, $8076, $8077, $8078, $8079, $8080, $8081, $8082, $8083, $8084, $8085, $8086, $8087, $8088, $8089, $8090, $8091, $8092, $8093, $8094, $8095, $8096, $8097, $8098, VersionRange($8099, $8100)), ($8101, $8102, $8103, $8104, $8105, $8106, $8107, $8108, $8109, $8110, $8111, $8112, $8113, $8114, $8115, $8116, $8117, $8118, $8119, $8120, $8121, $8122, $8123, $8124, $8125, $8126, $8127, $8128, VersionRange($8129, $8130)), ($8131, $8132, $8133, $8134, $8135, $8136, $8137, $8138, $8139, $8140, $8141, $8142, $8143, $8144, $8145, $8146, $8147, $8148, $8149, $8150, $8151, $8152, $8153, $8154, $8155, $8156, $8157, $8158, VersionRange($8159, $8160)), ($8161, $8162, $8163, $8164, $8165, $8166, $8167, $8168, $8169, $8170, $8171, $8172, $8173, $8174, $8175, $8176, $8177, $8178, $8179, $8180, $8181, $8182, $8183, $8184, $8185, $8186, $8187, $8188, VersionRange($8189, $8190)), ($8191, $8192, $8193, $8194, $8195, $8196, $8197, $8198, $8199, $8200, $8201, $8202, $8203, $8204, $8205, $8206, $8207, $8208, $8209, $8210, $8211, $8212, $8213, $8214, $8215, $8216, $8217, $8218, VersionRange($8219, $8220)), ($8221, $8222, $8223, $8224, $8225, $8226, $8227, $8228, $8229, $8230, $8231, $8232, $8233, $8234, $8235, $8236, $8237, $8238, $8239, $8240, $8241, $8242, $8243, $8244, $8245, $8246, $8247, $8248, VersionRange($8249, $8250)), ($8251, $8252, $8253, $8254, $8255, $8256, $8257, $8258, $8259, $8260, $8261, $8262, $8263, $8264, $8265, $8266, $8267, $8268, $8269, $8270, $8271, $8272, $8273, $8274, $8275, $8276, $8277, $8278, VersionRange($8279, $8280)), ($8281, $8282, $8283, $8284, $8285, $8286, $8287, $8288, $8289, $8290, $8291, $8292, $8293, $8294, $8295, $8296, $8297, $8298, $8299, $8300, $8301, $8302, $8303, $8304, $8305, $8306, $8307, $8308, VersionRange($8309, $8310)), ($8311, $8312, $8313, $8314, $8315, $8316, $8317, $8318, $8319, $8320, $8321, $8322, $8323, $8324, $8325, $8326, $8327, $8328, $8329, $8330, $8331, $8332, $8333, $8334, $8335, $8336, $8337, $8338, VersionRange($8339, $8340)), ($8341, $8342, $8343, $8344, $8345, $8346, $8347, $8348, $8349, $8350, $8351, $8352, $8353, $8354, $8355, $8356, $8357, $8358, $8359, $8360, $8361, $8362, $8363, $8364, $8365, $8366, $8367, $8368, VersionRange($8369, $8370)), ($8371, $8372, $8373, $8374, $8375, $8376, $8377, $8378, $8379, $8380, $8381, $8382, $8383, $8384, $8385, $8386, $8387, $8388, $8389, $8390, $8391, $8392, $8393, $8394, $8395, $8396, $8397, $8398, VersionRange($8399, $8400)), ($8401, $8402, $8403, $8404, $8405, $8406, $8407, $8408, $8409, $8410, $8411, $8412, $8413, $8414, $8415, $8416, $8417, $8418, $8419, $8420, $8421, $8422, $8423, $8424, $8425, $8426, $8427, $8428, VersionRange($8429, $8430)), ($8431, $8432, $8433, $8434, $8435, $8436, $8437, $8438, $8439, $8440, $8441, $8442, $8443, $8444, $8445, $8446, $8447, $8448, $8449, $8450, $8451, $8452, $8453, $8454, $8455, $8456, $8457, $8458, VersionRange($8459, $8460)), ($8461, $8462, $8463, $8464, $8465, $8466, $8467, $8468, $8469, $8470, $8471, $8472, $8473, $8474, $8475, $8476, $8477, $8478, $8479, $8480, $8481, $8482, $8483, $8484, $8485, $8486, $8487, $8488, VersionRange($8489, $8490)), ($8491, $8492, $8493, $8494, $8495, $8496, $8497, $8498, $8499, $8500, $8501, $8502, $8503, $8504, $8505, $8506, $8507, $8508, $8509, $8510, $8511, $8512, $8513, $8514, $8515, $8516, $8517, $8518, VersionRange($8519, $8520)), ($8521, $8522, $8523, $8524, $8525, $8526, $8527, $8528, $8529, $8530, $8531, $8532, $8533, $8534, $8535, $8536, $8537, $8538, $8539, $8540, $8541, $8542, $8543, $8544, $8545, $8546, $8547, $8548, VersionRange($8549, $8550)), ($8551, $8552, $8553, $8554, $8555, $8556, $8557, $8558, $8559, $8560, $8561, $8562, $8563, $8564, $8565, $8566, $8567, $8568, $8569, $8570, $8571, $8572, $8573, $8574, $8575, $8576, $8577, $8578, VersionRange($8579, $8580)), ($8581, $8582, $8583, $8584, $8585, $8586, $8587, $8588, $8589, $8590, $8591, $8592, $8593, $8594, $8595, $8596, $8597, $8598, $8599, $8600, $8601, $8602, $8603, $8604, $8605, $8606, $8607, $8608, VersionRange($8609, $8610)), ($8611, $8612, $8613, $8614, $8615, $8616, $8617, $8618, $8619, $8620, $8621, $8622, $8623, $8624, $8625, $8626, $8627, $8628, $8629, $8630, $8631, $8632, $8633, $8634, $8635, $8636, $8637, $8638, VersionRange($8639, $8640)), ($8641, $8642, $8643, $8644, $8645, $8646, $8647, $8648, $8649, $8650, $8651, $8652, $8653, $8654, $8655, $8656, $8657, $8658, $8659, $8660, $8661, $8662, $8663, $8664, $8665, $8666, $8667, $8668, VersionRange($8669, $8670)), ($8671, $8672, $8673, $8674, $8675, $8676, $8677, $8678, $8679, $8680, $8681, $8682, $8683, $8684, $8685, $8686, $8687, $8688, $8689, $8690, $8691, $8692, $8693, $8694, $8695, $8696, $8697, $8698, VersionRange($8699, $8700)), ($8701, $8702, $8703, $8704, $8705, $8706, $8707, $8708, $8709, $8710, $8711, $8712, $8713, $8714, $8715, $8716, $8717, $8718, $8719, $8720, $8721, $8722, $8723, $8724, $8725, $8726, $8727, $8728, VersionRange($8729, $8730)), ($8731, $8732, $8733, $8734, $8735, $8736, $8737, $8738, $8739, $8740, $8741, $8742, $8743, $8744, $8745, $8746, $8747, $8748, $8749, $8750, $8751, $8752, $8753, $8754, $8755, $8756, $8757, $8758, VersionRange($8759, $8760)), ($8761, $8762, $8763, $8764, $8765, $8766, $8767, $8768, $8769, $8770, $8771, $8772, $8773, $8774, $8775, $8776, $8777, $8778, $8779, $8780, $8781, $8782, $8783, $8784, $8785, $8786, $8787, $8788, VersionRange($8789, $8790)), ($8791, $8792, $8793, $8794, $8795, $8796, $8797, $8798, $8799, $8800, $8801, $8802, $8803, $8804, $8805, $8806, $8807, $8808, $8809, $8810, $8811, $8812, $8813, $8814, $8815, $8816, $8817, $8818, VersionRange($8819, $8820)), ($8821, $8822, $8823, $8824, $8825, $8826, $8827, $8828, $8829, $8830, $8831, $8832, $8833, $8834, $8835, $8836, $8837, $8838, $8839, $8840, $8841, $8842, $8843, $8844, $8845, $8846, $8847, $8848, VersionRange($8849, $8850)), ($8851, $8852, $8853, $8854, $8855, $8856, $8857, $8858, $8859, $8860, $8861, $8862, $8863, $8864, $8865, $8866, $8867, $8868, $8869, $8870, $8871, $8872, $8873, $8874, $8875, $8876, $8877, $8878, VersionRange($8879, $8880)), ($8881, $8882, $8883, $8884, $8885, $8886, $8887, $8888, $8889, $8890, $8891, $8892, $8893, $8894, $8895, $8896, $8897, $8898, $8899, $8900, $8901, $8902, $8903, $8904, $8905, $8906, $8907, $8908, VersionRange($8909, $8910)), ($8911, $8912, $8913, $8914, $8915, $8916, $8917, $8918, $8919, $8920, $8921, $8922, $8923, $8924, $8925, $8926, $8927, $8928, $8929, $8930, $8931, $8932, $8933, $8934, $8935, $8936, $8937, $8938, VersionRange($8939, $8940)), ($8941, $8942, $8943, $8944, $8945, $8946, $8947, $8948, $8949, $8950, $8951, $8952, $8953, $8954, $8955, $8956, $8957, $8958, $8959, $8960, $8961, $8962, $8963, $8964, $8965, $8966, $8967, $8968, VersionRange($8969, $8970)), ($8971, $8972, $8973, $8974, $8975, $8976, $8977, $8978, $8979, $8980, $8981, $8982, $8983, $8984, $8985, $8986, $8987, $8988, $8989, $8990, $8991, $8992, $8993, $8994, $8995, $8996, $8997, $8998, VersionRange($8999, $9000)), ($9001, $9002, $9003, $9004, $9005, $9006, $9007, $9008, $9009, $9010, $9011, $9012, $9013, $9014, $9015, $9016, $9017, $9018, $9019, $9020, $9021, $9022, $9023, $9024, $9025, $9026, $9027, $9028, VersionRange($9029, $9030)), ($9031, $9032, $9033, $9034, $9035, $9036, $9037, $9038, $9039, $9040, $9041, $9042, $9043, $9044, $9045, $9046, $9047, $9048, $9049, $9050, $9051, $9052, $9053, $9054, $9055, $9056, $9057, $9058, VersionRange($9059, $9060)), ($9061, $9062, $9063, $9064, $9065, $9066, $9067, $9068, $9069, $9070, $9071, $9072, $9073, $9074, $9075, $9076, $9077, $9078, $9079, $9080, $9081, $9082, $9083, $9084, $9085, $9086, $9087, $9088, VersionRange($9089, $9090)), ($9091, $9092, $9093, $9094, $9095, $9096, $9097, $9098, $9099, $9100, $9101, $9102, $9103, $9104, $9105, $9106, $9107, $9108, $9109, $9110, $9111, $9112, $9113, $9114, $9115, $9116, $9117, $9118, VersionRange($9119, $9120)), ($9121, $9122, $9123, $9124, $9125, $9126, $9127, $9128, $9129, $9130, $9131, $9132, $9133, $9134, $9135, $9136, $9137, $9138, $9139, $9140, $9141, $9142, $9143, $9144, $9145, $9146, $9147, $9148, VersionRange($9149, $9150)), ($9151, $9152, $9153, $9154, $9155, $9156, $9157, $9158, $9159, $9160, $9161, $9162, $9163, $9164, $9165, $9166, $9167, $9168, $9169, $9170, $9171, $9172, $9173, $9174, $9175, $9176, $9177, $9178, VersionRange($9179, $9180)), ($9181, $9182, $9183, $9184, $9185, $9186, $9187, $9188, $9189, $9190, $9191, $9192, $9193, $9194, $9195, $9196, $9197, $9198, $9199, $9200, $9201, $9202, $9203, $9204, $9205, $9206, $9207, $9208, VersionRange($9209, $9210)), ($9211, $9212, $9213, $9214, $9215, $9216, $9217, $9218, $9219, $9220, $9221, $9222, $9223, $9224, $9225, $9226, $9227, $9228, $9229, $9230, $9231, $9232, $9233, $9234, $9235, $9236, $9237, $9238, VersionRange($9239, $9240)), ($9241, $9242, $9243, $9244, $9245, $9246, $9247, $9248, $9249, $9250, $9251, $9252, $9253, $9254, $9255, $9256, $9257, $9258, $9259, $9260, $9261, $9262, $9263, $9264, $9265, $9266, $9267, $9268, VersionRange($9269, $9270)), ($9271, $9272, $9273, $9274, $9275, $9276, $9277, $9278, $9279, $9280, $9281, $9282, $9283, $9284, $9285, $9286, $9287, $9288, $9289, $9290, $9291, $9292, $9293, $9294, $9295, $9296, $9297, $9298, VersionRange($9299, $9300)), ($9301, $9302, $9303, $9304, $9305, $9306, $9307, $9308, $9309, $9310, $9311, $9312, $9313, $9314, $9315, $9316, $9317, $9318, $9319, $9320, $9321, $9322, $9323, $9324, $9325, $9326, $9327, $9328, VersionRange($9329, $9330)), ($9331, $9332, $9333, $9334, $9335, $9336, $9337, $9338, $9339, $9340, $9341, $9342, $9343, $9344, $9345, $9346, $9347, $9348, $9349, $9350, $9351, $9352, $9353, $9354, $9355, $9356, $9357, $9358, VersionRange($9359, $9360)), ($9361, $9362, $9363, $9364, $9365, $9366, $9367, $9368, $9369, $9370, $9371, $9372, $9373, $9374, $9375, $9376, $9377, $9378, $9379, $9380, $9381, $9382, $9383, $9384, $9385, $9386, $9387, $9388, VersionRange($9389, $9390)), ($9391, $9392, $9393, $9394, $9395, $9396, $9397, $9398, $9399, $9400, $9401, $9402, $9403, $9404, $9405, $9406, $9407, $9408, $9409, $9410, $9411, $9412, $9413, $9414, $9415, $9416, $9417, $9418, VersionRange($9419, $9420)), ($9421, $9422, $9423, $9424, $9425, $9426, $9427, $9428, $9429, $9430, $9431, $9432, $9433, $9434, $9435, $9436, $9437, $9438, $9439, $9440, $9441, $9442, $9443, $9444, $9445, $9446, $9447, $9448, VersionRange($9449, $9450)), ($9451, $9452, $9453, $9454, $9455, $9456, $9457, $9458, $9459, $9460, $9461, $9462, $9463, $9464, $9465, $9466, $9467, $9468, $9469, $9470, $9471, $9472, $9473, $9474, $9475, $9476, $9477, $9478, VersionRange($9479, $9480)), ($9481, $9482, $9483, $9484, $9485, $9486, $9487, $9488, $9489, $9490, $9491, $9492, $9493, $9494, $9495, $9496, $9497, $9498, $9499, $9500, $9501, $9502, $9503, $9504, $9505, $9506, $9507, $9508, VersionRange($9509, $9510)), ($9511, $9512, $9513, $9514, $9515, $9516, $9517, $9518, $9519, $9520, $9521, $9522, $9523, $9524, $9525, $9526, $9527, $9528, $9529, $9530, $9531, $9532, $9533, $9534, $9535, $9536, $9537, $9538, VersionRange($9539, $9540)), ($9541, $9542, $9543, $9544, $9545, $9546, $9547, $9548, $9549, $9550, $9551, $9552, $9553, $9554, $9555, $9556, $9557, $9558, $9559, $9560, $9561, $9562, $9563, $9564, $9565, $9566, $9567, $9568, VersionRange($9569, $9570)), ($9571, $9572, $9573, $9574, $9575, $9576, $9577, $9578, $9579, $9580, $9581, $9582, $9583, $9584, $9585, $9586, $9587, $9588, $9589, $9590, $9591, $9592, $9593, $9594, $9595, $9596, $9597, $9598, VersionRange($9599, $9600)), ($9601, $9602, $9603, $9604, $9605, $9606, $9607, $9608, $9609, $9610, $9611, $9612, $9613, $9614, $9615, $9616, $9617, $9618, $9619, $9620, $9621, $9622, $9623, $9624, $9625, $9626, $9627, $9628, VersionRange($9629, $9630)), ($9631, $9632, $9633, $9634, $9635, $9636, $9637, $9638, $9639, $9640, $9641, $9642, $9643, $9644, $9645, $9646, $9647, $9648, $9649, $9650, $9651, $9652, $9653, $9654, $9655, $9656, $9657, $9658, VersionRange($9659, $9660)), ($9661, $9662, $9663, $9664, $9665, $9666, $9667, $9668, $9669, $9670, $9671, $9672, $9673, $9674, $9675, $9676, $9677, $9678, $9679, $9680, $9681, $9682, $9683, $9684, $9685, $9686, $9687, $9688, VersionRange($9689, $9690)), ($9691, $9692, $9693, $9694, $9695, $9696, $9697, $9698, $9699, $9700, $9701, $9702, $9703, $9704, $9705, $9706, $9707, $9708, $9709, $9710, $9711, $9712, $9713, $9714, $9715, $9716, $9717, $9718, VersionRange($9719, $9720)), ($9721, $9722, $9723, $9724, $9725, $9726, $9727, $9728, $9729, $9730, $9731, $9732, $9733, $9734, $9735, $9736, $9737, $9738, $9739, $9740, $9741, $9742, $9743, $9744, $9745, $9746, $9747, $9748, VersionRange($9749, $9750)), ($9751, $9752, $9753, $9754, $9755, $9756, $9757, $9758, $9759, $9760, $9761, $9762, $9763, $9764, $9765, $9766, $9767, $9768, $9769, $9770, $9771, $9772, $9773, $9774, $9775, $9776, $9777, $9778, VersionRange($9779, $9780)), ($9781, $9782, $9783, $9784, $9785, $9786, $9787, $9788, $9789, $9790, $9791, $9792, $9793, $9794, $9795, $9796, $9797, $9798, $9799, $9800, $9801, $9802, $9803, $9804, $9805, $9806, $9807, $9808, VersionRange($9809, $9810)), ($9811, $9812, $9813, $9814, $9815, $9816, $9817, $9818, $9819, $9820, $9821, $9822, $9823, $9824, $9825, $9826, $9827, $9828, $9829, $9830, $9831, $9832, $9833, $9834, $9835, $9836, $9837, $9838, VersionRange($9839, $9840)), ($9841, $9842, $9843, $9844, $9845, $9846, $9847, $9848, $9849, $9850, $9851, $9852, $9853, $9854, $9855, $9856, $9857, $9858, $9859, $9860, $9861, $9862, $9863, $9864, $9865, $9866, $9867, $9868, VersionRange($9869, $9870)), ($9871, $9872, $9873, $9874, $9875, $9876, $9877, $9878, $9879, $9880, $9881, $9882, $9883, $9884, $9885, $9886, $9887, $9888, $9889, $9890, $9891, $9892, $9893, $9894, $9895, $9896, $9897, $9898, VersionRange($9899, $9900)), ($9901, $9902, $9903, $9904, $9905, $9906, $9907, $9908, $9909, $9910, $9911, $9912, $9913, $9914, $9915, $9916, $9917, $9918, $9919, $9920, $9921, $9922, $9923, $9924, $9925, $9926, $9927, $9928, VersionRange($9929, $9930)), ($9931, $9932, $9933, $9934, $9935, $9936, $9937, $9938, $9939, $9940, $9941, $9942, $9943, $9944, $9945, $9946, $9947, $9948, $9949, $9950, $9951, $9952, $9953, $9954, $9955, $9956, $9957, $9958, VersionRange($9959, $9960)), ($9961, $9962, $9963, $9964, $9965, $9966, $9967, $9968, $9969, $9970, $9971, $9972, $9973, $9974, $9975, $9976, $9977, $9978, $9979, $9980, $9981, $9982, $9983, $9984, $9985, $9986, $9987, $9988, VersionRange($9989, $9990)), ($9991, $9992, $9993, $9994, $9995, $9996, $9997, $9998, $9999, $10000, $10001, $10002, $10003, $10004, $10005, $10006, $10007, $10008, $10009, $10010, $10011, $10012, $10013, $10014, $10015, $10016, $10017, $10018, VersionRange($10019, $10020)), ($10021, $10022, $10023, $10024, $10025, $10026, $10027, $10028, $10029, $10030, $10031, $10032, $10033, $10034, $10035, $10036, $10037, $10038, $10039, $10040, $10041, $10042, $10043, $10044, $10045, $10046, $10047, $10048, VersionRange($10049, $10050)), ($10051, $10052, $10053, $10054, $10055, $10056, $10057, $10058, $10059, $10060, $10061, $10062, $10063, $10064, $10065, $10066, $10067, $10068, $10069, $10070, $10071, $10072, $10073, $10074, $10075, $10076, $10077, $10078, VersionRange($10079, $10080)), ($10081, $10082, $10083, $10084, $10085, $10086, $10087, $10088, $10089, $10090, $10091, $10092, $10093, $10094, $10095, $10096, $10097, $10098, $10099, $10100, $10101, $10102, $10103, $10104, $10105, $10106, $10107, $10108, VersionRange($10109, $10110)), ($10111, $10112, $10113, $10114, $10115, $10116, $10117, $10118, $10119, $10120, $10121, $10122, $10123, $10124, $10125, $10126, $10127, $10128, $10129, $10130, $10131, $10132, $10133, $10134, $10135, $10136, $10137, $10138, VersionRange($10139, $10140)), ($10141, $10142, $10143, $10144, $10145, $10146, $10147, $10148, $10149, $10150, $10151, $10152, $10153, $10154, $10155, $10156, $10157, $10158, $10159, $10160, $10161, $10162, $10163, $10164, $10165, $10166, $10167, $10168, VersionRange($10169, $10170)), ($10171, $10172, $10173, $10174, $10175, $10176, $10177, $10178, $10179, $10180, $10181, $10182, $10183, $10184, $10185, $10186, $10187, $10188, $10189, $10190, $10191, $10192, $10193, $10194, $10195, $10196, $10197, $10198, VersionRange($10199, $10200)), ($10201, $10202, $10203, $10204, $10205, $10206, $10207, $10208, $10209, $10210, $10211, $10212, $10213, $10214, $10215, $10216, $10217, $10218, $10219, $10220, $10221, $10222, $10223, $10224, $10225, $10226, $10227, $10228, VersionRange($10229, $10230)), ($10231, $10232, $10233, $10234, $10235, $10236, $10237, $10238, $10239, $10240, $10241, $10242, $10243, $10244, $10245, $10246, $10247, $10248, $10249, $10250, $10251, $10252, $10253, $10254, $10255, $10256, $10257, $10258, VersionRange($10259, $10260)), ($10261, $10262, $10263, $10264, $10265, $10266, $10267, $10268, $10269, $10270, $10271, $10272, $10273, $10274, $10275, $10276, $10277, $10278, $10279, $10280, $10281, $10282, $10283, $10284, $10285, $10286, $10287, $10288, VersionRange($10289, $10290)), ($10291, $10292, $10293, $10294, $10295, $10296, $10297, $10298, $10299, $10300, $10301, $10302, $10303, $10304, $10305, $10306, $10307, $10308, $10309, $10310, $10311, $10312, $10313, $10314, $10315, $10316, $10317, $10318, VersionRange($10319, $10320)), ($10321, $10322, $10323, $10324, $10325, $10326, $10327, $10328, $10329, $10330, $10331, $10332, $10333, $10334, $10335, $10336, $10337, $10338, $10339, $10340, $10341, $10342, $10343, $10344, $10345, $10346, $10347, $10348, VersionRange($10349, $10350)), ($10351, $10352, $10353, $10354, $10355, $10356, $10357, $10358, $10359, $10360, $10361, $10362, $10363, $10364, $10365, $10366, $10367, $10368, $10369, $10370, $10371, $10372, $10373, $10374, $10375, $10376, $10377, $10378, VersionRange($10379, $10380)), ($10381, $10382, $10383, $10384, $10385, $10386, $10387, $10388, $10389, $10390, $10391, $10392, $10393, $10394, $10395, $10396, $10397, $10398, $10399, $10400, $10401, $10402, $10403, $10404, $10405, $10406, $10407, $10408, VersionRange($10409, $10410)), ($10411, $10412, $10413, $10414, $10415, $10416, $10417, $10418, $10419, $10420, $10421, $10422, $10423, $10424, $10425, $10426, $10427, $10428, $10429, $10430, $10431, $10432, $10433, $10434, $10435, $10436, $10437, $10438, VersionRange($10439, $10440)), ($10441, $10442, $10443, $10444, $10445, $10446, $10447, $10448, $10449, $10450, $10451, $10452, $10453, $10454, $10455, $10456, $10457, $10458, $10459, $10460, $10461, $10462, $10463, $10464, $10465, $10466, $10467, $10468, VersionRange($10469, $10470)), ($10471, $10472, $10473, $10474, $10475, $10476, $10477, $10478, $10479, $10480, $10481, $10482, $10483, $10484, $10485, $10486, $10487, $10488, $10489, $10490, $10491, $10492, $10493, $10494, $10495, $10496, $10497, $10498, VersionRange($10499, $10500)), ($10501, $10502, $10503, $10504, $10505, $10506, $10507, $10508, $10509, $10510, $10511, $10512, $10513, $10514, $10515, $10516, $10517, $10518, $10519, $10520, $10521, $10522, $10523, $10524, $10525, $10526, $10527, $10528, VersionRange($10529, $10530)), ($10531, $10532, $10533, $10534, $10535, $10536, $10537, $10538, $10539, $10540, $10541, $10542, $10543, $10544, $10545, $10546, $10547, $10548, $10549, $10550, $10551, $10552, $10553, $10554, $10555, $10556, $10557, $10558, VersionRange($10559, $10560)), ($10561, $10562, $10563, $10564, $10565, $10566, $10567, $10568, $10569, $10570, $10571, $10572, $10573, $10574, $10575, $10576, $10577, $10578, $10579, $10580, $10581, $10582, $10583, $10584, $10585, $10586, $10587, $10588, VersionRange($10589, $10590)), ($10591, $10592, $10593, $10594, $10595, $10596, $10597, $10598, $10599, $10600, $10601, $10602, $10603, $10604, $10605, $10606, $10607, $10608, $10609, $10610, $10611, $10612, $10613, $10614, $10615, $10616, $10617, $10618, VersionRange($10619, $10620)), ($10621, $10622, $10623, $10624, $10625, $10626, $10627, $10628, $10629, $10630, $10631, $10632, $10633, $10634, $10635, $10636, $10637, $10638, $10639, $10640, $10641, $10642, $10643, $10644, $10645, $10646, $10647, $10648, VersionRange($10649, $10650)), ($10651, $10652, $10653, $10654, $10655, $10656, $10657, $10658, $10659, $10660, $10661, $10662, $10663, $10664, $10665, $10666, $10667, $10668, $10669, $10670, $10671, $10672, $10673, $10674, $10675, $10676, $10677, $10678, VersionRange($10679, $10680)), ($10681, $10682, $10683, $10684, $10685, $10686, $10687, $10688, $10689, $10690, $10691, $10692, $10693, $10694, $10695, $10696, $10697, $10698, $10699, $10700, $10701, $10702, $10703, $10704, $10705, $10706, $10707, $10708, VersionRange($10709, $10710)), ($10711, $10712, $10713, $10714, $10715, $10716, $10717, $10718, $10719, $10720, $10721, $10722, $10723, $10724, $10725, $10726, $10727, $10728, $10729, $10730, $10731, $10732, $10733, $10734, $10735, $10736, $10737, $10738, VersionRange($10739, $10740)), ($10741, $10742, $10743, $10744, $10745, $10746, $10747, $10748, $10749, $10750, $10751, $10752, $10753, $10754, $10755, $10756, $10757, $10758, $10759, $10760, $10761, $10762, $10763, $10764, $10765, $10766, $10767, $10768, VersionRange($10769, $10770)), ($10771, $10772, $10773, $10774, $10775, $10776, $10777, $10778, $10779, $10780, $10781, $10782, $10783, $10784, $10785, $10786, $10787, $10788, $10789, $10790, $10791, $10792, $10793, $10794, $10795, $10796, $10797, $10798, VersionRange($10799, $10800)), ($10801, $10802, $10803, $10804, $10805, $10806, $10807, $10808, $10809, $10810, $10811, $10812, $10813, $10814, $10815, $10816, $10817, $10818, $10819, $10820, $10821, $10822, $10823, $10824, $10825, $10826, $10827, $10828, VersionRange($10829, $10830)), ($10831, $10832, $10833, $10834, $10835, $10836, $10837, $10838, $10839, $10840, $10841, $10842, $10843, $10844, $10845, $10846, $10847, $10848, $10849, $10850, $10851, $10852, $10853, $10854, $10855, $10856, $10857, $10858, VersionRange($10859, $10860)), ($10861, $10862, $10863, $10864, $10865, $10866, $10867, $10868, $10869, $10870, $10871, $10872, $10873, $10874, $10875, $10876, $10877, $10878, $10879, $10880, $10881, $10882, $10883, $10884, $10885, $10886, $10887, $10888, VersionRange($10889, $10890)), ($10891, $10892, $10893, $10894, $10895, $10896, $10897, $10898, $10899, $10900, $10901, $10902, $10903, $10904, $10905, $10906, $10907, $10908, $10909, $10910, $10911, $10912, $10913, $10914, $10915, $10916, $10917, $10918, VersionRange($10919, $10920)), ($10921, $10922, $10923, $10924, $10925, $10926, $10927, $10928, $10929, $10930, $10931, $10932, $10933, $10934, $10935, $10936, $10937, $10938, $10939, $10940, $10941, $10942, $10943, $10944, $10945, $10946, $10947, $10948, VersionRange($10949, $10950)), ($10951, $10952, $10953, $10954, $10955, $10956, $10957, $10958, $10959, $10960, $10961, $10962, $10963, $10964, $10965, $10966, $10967, $10968, $10969, $10970, $10971, $10972, $10973, $10974, $10975, $10976, $10977, $10978, VersionRange($10979, $10980)), ($10981, $10982, $10983, $10984, $10985, $10986, $10987, $10988, $10989, $10990, $10991, $10992, $10993, $10994, $10995, $10996, $10997, $10998, $10999, $11000, $11001, $11002, $11003, $11004, $11005, $11006, $11007, $11008, VersionRange($11009, $11010)), ($11011, $11012, $11013, $11014, $11015, $11016, $11017, $11018, $11019, $11020, $11021, $11022, $11023, $11024, $11025, $11026, $11027, $11028, $11029, $11030, $11031, $11032, $11033, $11034, $11035, $11036, $11037, $11038, VersionRange($11039, $11040)), ($11041, $11042, $11043, $11044, $11045, $11046, $11047, $11048, $11049, $11050, $11051, $11052, $11053, $11054, $11055, $11056, $11057, $11058, $11059, $11060, $11061, $11062, $11063, $11064, $11065, $11066, $11067, $11068, VersionRange($11069, $11070)), ($11071, $11072, $11073, $11074, $11075, $11076, $11077, $11078, $11079, $11080, $11081, $11082, $11083, $11084, $11085, $11086, $11087, $11088, $11089, $11090, $11091, $11092, $11093, $11094, $11095, $11096, $11097, $11098, VersionRange($11099, $11100)), ($11101, $11102, $11103, $11104, $11105, $11106, $11107, $11108, $11109, $11110, $11111, $11112, $11113, $11114, $11115, $11116, $11117, $11118, $11119, $11120, $11121, $11122, $11123, $11124, $11125, $11126, $11127, $11128, VersionRange($11129, $11130)), ($11131, $11132, $11133, $11134, $11135, $11136, $11137, $11138, $11139, $11140, $11141, $11142, $11143, $11144, $11145, $11146, $11147, $11148, $11149, $11150, $11151, $11152, $11153, $11154, $11155, $11156, $11157, $11158, VersionRange($11159, $11160)), ($11161, $11162, $11163, $11164, $11165, $11166, $11167, $11168, $11169, $11170, $11171, $11172, $11173, $11174, $11175, $11176, $11177, $11178, $11179, $11180, $11181, $11182, $11183, $11184, $11185, $11186, $11187, $11188, VersionRange($11189, $11190)), ($11191, $11192, $11193, $11194, $11195, $11196, $11197, $11198, $11199, $11200, $11201, $11202, $11203, $11204, $11205, $11206, $11207, $11208, $11209, $11210, $11211, $11212, $11213, $11214, $11215, $11216, $11217, $11218, VersionRange($11219, $11220)), ($11221, $11222, $11223, $11224, $11225, $11226, $11227, $11228, $11229, $11230, $11231, $11232, $11233, $11234, $11235, $11236, $11237, $11238, $11239, $11240, $11241, $11242, $11243, $11244, $11245, $11246, $11247, $11248, VersionRange($11249, $11250)), ($11251, $11252, $11253, $11254, $11255, $11256, $11257, $11258, $11259, $11260, $11261, $11262, $11263, $11264, $11265, $11266, $11267, $11268, $11269, $11270, $11271, $11272, $11273, $11274, $11275, $11276, $11277, $11278, VersionRange($11279, $11280)), ($11281, $11282, $11283, $11284, $11285, $11286, $11287, $11288, $11289, $11290, $11291, $11292, $11293, $11294, $11295, $11296, $11297, $11298, $11299, $11300, $11301, $11302, $11303, $11304, $11305, $11306, $11307, $11308, VersionRange($11309, $11310)), ($11311, $11312, $11313, $11314, $11315, $11316, $11317, $11318, $11319, $11320, $11321, $11322, $11323, $11324, $11325, $11326, $11327, $11328, $11329, $11330, $11331, $11332, $11333, $11334, $11335, $11336, $11337, $11338, VersionRange($11339, $11340)), ($11341, $11342, $11343, $11344, $11345, $11346, $11347, $11348, $11349, $11350, $11351, $11352, $11353, $11354, $11355, $11356, $11357, $11358, $11359, $11360, $11361, $11362, $11363, $11364, $11365, $11366, $11367, $11368, VersionRange($11369, $11370)), ($11371, $11372, $11373, $11374, $11375, $11376, $11377, $11378, $11379, $11380, $11381, $11382, $11383, $11384, $11385, $11386, $11387, $11388, $11389, $11390, $11391, $11392, $11393, $11394, $11395, $11396, $11397, $11398, VersionRange($11399, $11400)), ($11401, $11402, $11403, $11404, $11405, $11406, $11407, $11408, $11409, $11410, $11411, $11412, $11413, $11414, $11415, $11416, $11417, $11418, $11419, $11420, $11421, $11422, $11423, $11424, $11425, $11426, $11427, $11428, VersionRange($11429, $11430)), ($11431, $11432, $11433, $11434, $11435, $11436, $11437, $11438, $11439, $11440, $11441, $11442, $11443, $11444, $11445, $11446, $11447, $11448, $11449, $11450, $11451, $11452, $11453, $11454, $11455, $11456, $11457, $11458, VersionRange($11459, $11460)), ($11461, $11462, $11463, $11464, $11465, $11466, $11467, $11468, $11469, $11470, $11471, $11472, $11473, $11474, $11475, $11476, $11477, $11478, $11479, $11480, $11481, $11482, $11483, $11484, $11485, $11486, $11487, $11488, VersionRange($11489, $11490)), ($11491, $11492, $11493, $11494, $11495, $11496, $11497, $11498, $11499, $11500, $11501, $11502, $11503, $11504, $11505, $11506, $11507, $11508, $11509, $11510, $11511, $11512, $11513, $11514, $11515, $11516, $11517, $11518, VersionRange($11519, $11520)), ($11521, $11522, $11523, $11524, $11525, $11526, $11527, $11528, $11529, $11530, $11531, $11532, $11533, $11534, $11535, $11536, $11537, $11538, $11539, $11540, $11541, $11542, $11543, $11544, $11545, $11546, $11547, $11548, VersionRange($11549, $11550)), ($11551, $11552, $11553, $11554, $11555, $11556, $11557, $11558, $11559, $11560, $11561, $11562, $11563, $11564, $11565, $11566, $11567, $11568, $11569, $11570, $11571, $11572, $11573, $11574, $11575, $11576, $11577, $11578, VersionRange($11579, $11580)), ($11581, $11582, $11583, $11584, $11585, $11586, $11587, $11588, $11589, $11590, $11591, $11592, $11593, $11594, $11595, $11596, $11597, $11598, $11599, $11600, $11601, $11602, $11603, $11604, $11605, $11606, $11607, $11608, VersionRange($11609, $11610)), ($11611, $11612, $11613, $11614, $11615, $11616, $11617, $11618, $11619, $11620, $11621, $11622, $11623, $11624, $11625, $11626, $11627, $11628, $11629, $11630, $11631, $11632, $11633, $11634, $11635, $11636, $11637, $11638, VersionRange($11639, $11640)), ($11641, $11642, $11643, $11644, $11645, $11646, $11647, $11648, $11649, $11650, $11651, $11652, $11653, $11654, $11655, $11656, $11657, $11658, $11659, $11660, $11661, $11662, $11663, $11664, $11665, $11666, $11667, $11668, VersionRange($11669, $11670)), ($11671, $11672, $11673, $11674, $11675, $11676, $11677, $11678, $11679, $11680, $11681, $11682, $11683, $11684, $11685, $11686, $11687, $11688, $11689, $11690, $11691, $11692, $11693, $11694, $11695, $11696, $11697, $11698, VersionRange($11699, $11700)), ($11701, $11702, $11703, $11704, $11705, $11706, $11707, $11708, $11709, $11710, $11711, $11712, $11713, $11714, $11715, $11716, $11717, $11718, $11719, $11720, $11721, $11722, $11723, $11724, $11725, $11726, $11727, $11728, VersionRange($11729, $11730)), ($11731, $11732, $11733, $11734, $11735, $11736, $11737, $11738, $11739, $11740, $11741, $11742, $11743, $11744, $11745, $11746, $11747, $11748, $11749, $11750, $11751, $11752, $11753, $11754, $11755, $11756, $11757, $11758, VersionRange($11759, $11760)), ($11761, $11762, $11763, $11764, $11765, $11766, $11767, $11768, $11769, $11770, $11771, $11772, $11773, $11774, $11775, $11776, $11777, $11778, $11779, $11780, $11781, $11782, $11783, $11784, $11785, $11786, $11787, $11788, VersionRange($11789, $11790)), ($11791, $11792, $11793, $11794, $11795, $11796, $11797, $11798, $11799, $11800, $11801, $11802, $11803, $11804, $11805, $11806, $11807, $11808, $11809, $11810, $11811, $11812, $11813, $11814, $11815, $11816, $11817, $11818, VersionRange($11819, $11820)), ($11821, $11822, $11823, $11824, $11825, $11826, $11827, $11828, $11829, $11830, $11831, $11832, $11833, $11834, $11835, $11836, $11837, $11838, $11839, $11840, $11841, $11842, $11843, $11844, $11845, $11846, $11847, $11848, VersionRange($11849, $11850)), ($11851, $11852, $11853, $11854, $11855, $11856, $11857, $11858, $11859, $11860, $11861, $11862, $11863, $11864, $11865, $11866, $11867, $11868, $11869, $11870, $11871, $11872, $11873, $11874, $11875, $11876, $11877, $11878, VersionRange($11879, $11880)), ($11881, $11882, $11883, $11884, $11885, $11886, $11887, $11888, $11889, $11890, $11891, $11892, $11893, $11894, $11895, $11896, $11897, $11898, $11899, $11900, $11901, $11902, $11903, $11904, $11905, $11906, $11907, $11908, VersionRange($11909, $11910)), ($11911, $11912, $11913, $11914, $11915, $11916, $11917, $11918, $11919, $11920, $11921, $11922, $11923, $11924, $11925, $11926, $11927, $11928, $11929, $11930, $11931, $11932, $11933, $11934, $11935, $11936, $11937, $11938, VersionRange($11939, $11940)), ($11941, $11942, $11943, $11944, $11945, $11946, $11947, $11948, $11949, $11950, $11951, $11952, $11953, $11954, $11955, $11956, $11957, $11958, $11959, $11960, $11961, $11962, $11963, $11964, $11965, $11966, $11967, $11968, VersionRange($11969, $11970)), ($11971, $11972, $11973, $11974, $11975, $11976, $11977, $11978, $11979, $11980, $11981, $11982, $11983, $11984, $11985, $11986, $11987, $11988, $11989, $11990, $11991, $11992, $11993, $11994, $11995, $11996, $11997, $11998, VersionRange($11999, $12000)), ($12001, $12002, $12003, $12004, $12005, $12006, $12007, $12008, $12009, $12010, $12011, $12012, $12013, $12014, $12015, $12016, $12017, $12018, $12019, $12020, $12021, $12022, $12023, $12024, $12025, $12026, $12027, $12028, VersionRange($12029, $12030)), ($12031, $12032, $12033, $12034, $12035, $12036, $12037, $12038, $12039, $12040, $12041, $12042, $12043, $12044, $12045, $12046, $12047, $12048, $12049, $12050, $12051, $12052, $12053, $12054, $12055, $12056, $12057, $12058, VersionRange($12059, $12060)), ($12061, $12062, $12063, $12064, $12065, $12066, $12067, $12068, $12069, $12070, $12071, $12072, $12073, $12074, $12075, $12076, $12077, $12078, $12079, $12080, $12081, $12082, $12083, $12084, $12085, $12086, $12087, $12088, VersionRange($12089, $12090)), ($12091, $12092, $12093, $12094, $12095, $12096, $12097, $12098, $12099, $12100, $12101, $12102, $12103, $12104, $12105, $12106, $12107, $12108, $12109, $12110, $12111, $12112, $12113, $12114, $12115, $12116, $12117, $12118, VersionRange($12119, $12120)), ($12121, $12122, $12123, $12124, $12125, $12126, $12127, $12128, $12129, $12130, $12131, $12132, $12133, $12134, $12135, $12136, $12137, $12138, $12139, $12140, $12141, $12142, $12143, $12144, $12145, $12146, $12147, $12148, VersionRange($12149, $12150)), ($12151, $12152, $12153, $12154, $12155, $12156, $12157, $12158, $12159, $12160, $12161, $12162, $12163, $12164, $12165, $12166, $12167, $12168, $12169, $12170, $12171, $12172, $12173, $12174, $12175, $12176, $12177, $12178, VersionRange($12179, $12180)), ($12181, $12182, $12183, $12184, $12185, $12186, $12187, $12188, $12189, $12190, $12191, $12192, $12193, $12194, $12195, $12196, $12197, $12198, $12199, $12200, $12201, $12202, $12203, $12204, $12205, $12206, $12207, $12208, VersionRange($12209, $12210)), ($12211, $12212, $12213, $12214, $12215, $12216, $12217, $12218, $12219, $12220, $12221, $12222, $12223, $12224, $12225, $12226, $12227, $12228, $12229, $12230, $12231, $12232, $12233, $12234, $12235, $12236, $12237, $12238, VersionRange($12239, $12240)), ($12241, $12242, $12243, $12244, $12245, $12246, $12247, $12248, $12249, $12250, $12251, $12252, $12253, $12254, $12255, $12256, $12257, $12258, $12259, $12260, $12261, $12262, $12263, $12264, $12265, $12266, $12267, $12268, VersionRange($12269, $12270)), ($12271, $12272, $12273, $12274, $12275, $12276, $12277, $12278, $12279, $12280, $12281, $12282, $12283, $12284, $12285, $12286, $12287, $12288, $12289, $12290, $12291, $12292, $12293, $12294, $12295, $12296, $12297, $12298, VersionRange($12299, $12300)), ($12301, $12302, $12303, $12304, $12305, $12306, $12307, $12308, $12309, $12310, $12311, $12312, $12313, $12314, $12315, $12316, $12317, $12318, $12319, $12320, $12321, $12322, $12323, $12324, $12325, $12326, $12327, $12328, VersionRange($12329, $12330)), ($12331, $12332, $12333, $12334, $12335, $12336, $12337, $12338, $12339, $12340, $12341, $12342, $12343, $12344, $12345, $12346, $12347, $12348, $12349, $12350, $12351, $12352, $12353, $12354, $12355, $12356, $12357, $12358, VersionRange($12359, $12360)), ($12361, $12362, $12363, $12364, $12365, $12366, $12367, $12368, $12369, $12370, $12371, $12372, $12373, $12374, $12375, $12376, $12377, $12378, $12379, $12380, $12381, $12382, $12383, $12384, $12385, $12386, $12387, $12388, VersionRange($12389, $12390)), ($12391, $12392, $12393, $12394, $12395, $12396, $12397, $12398, $12399, $12400, $12401, $12402, $12403, $12404, $12405, $12406, $12407, $12408, $12409, $12410, $12411, $12412, $12413, $12414, $12415, $12416, $12417, $12418, VersionRange($12419, $12420)), ($12421, $12422, $12423, $12424, $12425, $12426, $12427, $12428, $12429, $12430, $12431, $12432, $12433, $12434, $12435, $12436, $12437, $12438, $12439, $12440, $12441, $12442, $12443, $12444, $12445, $12446, $12447, $12448, VersionRange($12449, $12450)), ($12451, $12452, $12453, $12454, $12455, $12456, $12457, $12458, $12459, $12460, $12461, $12462, $12463, $12464, $12465, $12466, $12467, $12468, $12469, $12470, $12471, $12472, $12473, $12474, $12475, $12476, $12477, $12478, VersionRange($12479, $12480)), ($12481, $12482, $12483, $12484, $12485, $12486, $12487, $12488, $12489, $12490, $12491, $12492, $12493, $12494, $12495, $12496, $12497, $12498, $12499, $12500, $12501, $12502, $12503, $12504, $12505, $12506, $12507, $12508, VersionRange($12509, $12510)), ($12511, $12512, $12513, $12514, $12515, $12516, $12517, $12518, $12519, $12520, $12521, $12522, $12523, $12524, $12525, $12526, $12527, $12528, $12529, $12530, $12531, $12532, $12533, $12534, $12535, $12536, $12537, $12538, VersionRange($12539, $12540)), ($12541, $12542, $12543, $12544, $12545, $12546, $12547, $12548, $12549, $12550, $12551, $12552, $12553, $12554, $12555, $12556, $12557, $12558, $12559, $12560, $12561, $12562, $12563, $12564, $12565, $12566, $12567, $12568, VersionRange($12569, $12570)), ($12571, $12572, $12573, $12574, $12575, $12576, $12577, $12578, $12579, $12580, $12581, $12582, $12583, $12584, $12585, $12586, $12587, $12588, $12589, $12590, $12591, $12592, $12593, $12594, $12595, $12596, $12597, $12598, VersionRange($12599, $12600)), ($12601, $12602, $12603, $12604, $12605, $12606, $12607, $12608, $12609, $12610, $12611, $12612, $12613, $12614, $12615, $12616, $12617, $12618, $12619, $12620, $12621, $12622, $12623, $12624, $12625, $12626, $12627, $12628, VersionRange($12629, $12630)), ($12631, $12632, $12633, $12634, $12635, $12636, $12637, $12638, $12639, $12640, $12641, $12642, $12643, $12644, $12645, $12646, $12647, $12648, $12649, $12650, $12651, $12652, $12653, $12654, $12655, $12656, $12657, $12658, VersionRange($12659, $12660)), ($12661, $12662, $12663, $12664, $12665, $12666, $12667, $12668, $12669, $12670, $12671, $12672, $12673, $12674, $12675, $12676, $12677, $12678, $12679, $12680, $12681, $12682, $12683, $12684, $12685, $12686, $12687, $12688, VersionRange($12689, $12690)), ($12691, $12692, $12693, $12694, $12695, $12696, $12697, $12698, $12699, $12700, $12701, $12702, $12703, $12704, $12705, $12706, $12707, $12708, $12709, $12710, $12711, $12712, $12713, $12714, $12715, $12716, $12717, $12718, VersionRange($12719, $12720)), ($12721, $12722, $12723, $12724, $12725, $12726, $12727, $12728, $12729, $12730, $12731, $12732, $12733, $12734, $12735, $12736, $12737, $12738, $12739, $12740, $12741, $12742, $12743, $12744, $12745, $12746, $12747, $12748, VersionRange($12749, $12750)), ($12751, $12752, $12753, $12754, $12755, $12756, $12757, $12758, $12759, $12760, $12761, $12762, $12763, $12764, $12765, $12766, $12767, $12768, $12769, $12770, $12771, $12772, $12773, $12774, $12775, $12776, $12777, $12778, VersionRange($12779, $12780)), ($12781, $12782, $12783, $12784, $12785, $12786, $12787, $12788, $12789, $12790, $12791, $12792, $12793, $12794, $12795, $12796, $12797, $12798, $12799, $12800, $12801, $12802, $12803, $12804, $12805, $12806, $12807, $12808, VersionRange($12809, $12810)), ($12811, $12812, $12813, $12814, $12815, $12816, $12817, $12818, $12819, $12820, $12821, $12822, $12823, $12824, $12825, $12826, $12827, $12828, $12829, $12830, $12831, $12832, $12833, $12834, $12835, $12836, $12837, $12838, VersionRange($12839, $12840)), ($12841, $12842, $12843, $12844, $12845, $12846, $12847, $12848, $12849, $12850, $12851, $12852, $12853, $12854, $12855, $12856, $12857, $12858, $12859, $12860, $12861, $12862, $12863, $12864, $12865, $12866, $12867, $12868, VersionRange($12869, $12870)), ($12871, $12872, $12873, $12874, $12875, $12876, $12877, $12878, $12879, $12880, $12881, $12882, $12883, $12884, $12885, $12886, $12887, $12888, $12889, $12890, $12891, $12892, $12893, $12894, $12895, $12896, $12897, $12898, VersionRange($12899, $12900)), ($12901, $12902, $12903, $12904, $12905, $12906, $12907, $12908, $12909, $12910, $12911, $12912, $12913, $12914, $12915, $12916, $12917, $12918, $12919, $12920, $12921, $12922, $12923, $12924, $12925, $12926, $12927, $12928, VersionRange($12929, $12930)), ($12931, $12932, $12933, $12934, $12935, $12936, $12937, $12938, $12939, $12940, $12941, $12942, $12943, $12944, $12945, $12946, $12947, $12948, $12949, $12950, $12951, $12952, $12953, $12954, $12955, $12956, $12957, $12958, VersionRange($12959, $12960)), ($12961, $12962, $12963, $12964, $12965, $12966, $12967, $12968, $12969, $12970[...][ Date: 2023-07-04 18:40:04 ]
9 4s31ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30)), ($31, $32, $33, $34, $35, $36, $37, $38, $39, $40, $41, $42, $43, $44, $45, $46, $47, $48, $49, $50, $51, $52, $53, $54, $55, $56, $57, $58, VersionRange($59, $60)), ($61, $62, $63, $64, $65, $66, $67, $68, $69, $70, $71, $72, $73, $74, $75, $76, $77, $78, $79, $80, $81, $82, $83, $84, $85, $86, $87, $88, VersionRange($89, $90)), ($91, $92, $93, $94, $95, $96, $97, $98, $99, $100, $101, $102, $103, $104, $105, $106, $107, $108, $109, $110, $111, $112, $113, $114, $115, $116, $117, $118, VersionRange($119, $120)), ($121, $122, $123, $124, $125, $126, $127, $128, $129, $130, $131, $132, $133, $134, $135, $136, $137, $138, $139, $140, $141, $142, $143, $144, $145, $146, $147, $148, VersionRange($149, $150)), ($151, $152, $153, $154, $155, $156, $157, $158, $159, $160, $161, $162, $163, $164, $165, $166, $167, $168, $169, $170, $171, $172, $173, $174, $175, $176, $177, $178, VersionRange($179, $180)), ($181, $182, $183, $184, $185, $186, $187, $188, $189, $190, $191, $192, $193, $194, $195, $196, $197, $198, $199, $200, $201, $202, $203, $204, $205, $206, $207, $208, VersionRange($209, $210)), ($211, $212, $213, $214, $215, $216, $217, $218, $219, $220, $221, $222, $223, $224, $225, $226, $227, $228, $229, $230, $231, $232, $233, $234, $235, $236, $237, $238, VersionRange($239, $240)), ($241, $242, $243, $244, $245, $246, $247, $248, $249, $250, $251, $252, $253, $254, $255, $256, $257, $258, $259, $260, $261, $262, $263, $264, $265, $266, $267, $268, VersionRange($269, $270)), ($271, $272, $273, $274, $275, $276, $277, $278, $279, $280, $281, $282, $283, $284, $285, $286, $287, $288, $289, $290, $291, $292, $293, $294, $295, $296, $297, $298, VersionRange($299, $300)), ($301, $302, $303, $304, $305, $306, $307, $308, $309, $310, $311, $312, $313, $314, $315, $316, $317, $318, $319, $320, $321, $322, $323, $324, $325, $326, $327, $328, VersionRange($329, $330)), ($331, $332, $333, $334, $335, $336, $337, $338, $339, $340, $341, $342, $343, $344, $345, $346, $347, $348, $349, $350, $351, $352, $353, $354, $355, $356, $357, $358, VersionRange($359, $360)), ($361, $362, $363, $364, $365, $366, $367, $368, $369, $370, $371, $372, $373, $374, $375, $376, $377, $378, $379, $380, $381, $382, $383, $384, $385, $386, $387, $388, VersionRange($389, $390)), ($391, $392, $393, $394, $395, $396, $397, $398, $399, $400, $401, $402, $403, $404, $405, $406, $407, $408, $409, $410, $411, $412, $413, $414, $415, $416, $417, $418, VersionRange($419, $420)), ($421, $422, $423, $424, $425, $426, $427, $428, $429, $430, $431, $432, $433, $434, $435, $436, $437, $438, $439, $440, $441, $442, $443, $444, $445, $446, $447, $448, VersionRange($449, $450)), ($451, $452, $453, $454, $455, $456, $457, $458, $459, $460, $461, $462, $463, $464, $465, $466, $467, $468, $469, $470, $471, $472, $473, $474, $475, $476, $477, $478, VersionRange($479, $480)), ($481, $482, $483, $484, $485, $486, $487, $488, $489, $490, $491, $492, $493, $494, $495, $496, $497, $498, $499, $500, $501, $502, $503, $504, $505, $506, $507, $508, VersionRange($509, $510)), ($511, $512, $513, $514, $515, $516, $517, $518, $519, $520, $521, $522, $523, $524, $525, $526, $527, $528, $529, $530, $531, $532, $533, $534, $535, $536, $537, $538, VersionRange($539, $540)), ($541, $542, $543, $544, $545, $546, $547, $548, $549, $550, $551, $552, $553, $554, $555, $556, $557, $558, $559, $560, $561, $562, $563, $564, $565, $566, $567, $568, VersionRange($569, $570)), ($571, $572, $573, $574, $575, $576, $577, $578, $579, $580, $581, $582, $583, $584, $585, $586, $587, $588, $589, $590, $591, $592, $593, $594, $595, $596, $597, $598, VersionRange($599, $600)), ($601, $602, $603, $604, $605, $606, $607, $608, $609, $610, $611, $612, $613, $614, $615, $616, $617, $618, $619, $620, $621, $622, $623, $624, $625, $626, $627, $628, VersionRange($629, $630)), ($631, $632, $633, $634, $635, $636, $637, $638, $639, $640, $641, $642, $643, $644, $645, $646, $647, $648, $649, $650, $651, $652, $653, $654, $655, $656, $657, $658, VersionRange($659, $660)), ($661, $662, $663, $664, $665, $666, $667, $668, $669, $670, $671, $672, $673, $674, $675, $676, $677, $678, $679, $680, $681, $682, $683, $684, $685, $686, $687, $688, VersionRange($689, $690)), ($691, $692, $693, $694, $695, $696, $697, $698, $699, $700, $701, $702, $703, $704, $705, $706, $707, $708, $709, $710, $711, $712, $713, $714, $715, $716, $717, $718, VersionRange($719, $720)), ($721, $722, $723, $724, $725, $726, $727, $728, $729, $730, $731, $732, $733, $734, $735, $736, $737, $738, $739, $740, $741, $742, $743, $744, $745, $746, $747, $748, VersionRange($749, $750)), ($751, $752, $753, $754, $755, $756, $757, $758, $759, $760, $761, $762, $763, $764, $765, $766, $767, $768, $769, $770, $771, $772, $773, $774, $775, $776, $777, $778, VersionRange($779, $780)), ($781, $782, $783, $784, $785, $786, $787, $788, $789, $790, $791, $792, $793, $794, $795, $796, $797, $798, $799, $800, $801, $802, $803, $804, $805, $806, $807, $808, VersionRange($809, $810)), ($811, $812, $813, $814, $815, $816, $817, $818, $819, $820, $821, $822, $823, $824, $825, $826, $827, $828, $829, $830, $831, $832, $833, $834, $835, $836, $837, $838, VersionRange($839, $840)), ($841, $842, $843, $844, $845, $846, $847, $848, $849, $850, $851, $852, $853, $854, $855, $856, $857, $858, $859, $860, $861, $862, $863, $864, $865, $866, $867, $868, VersionRange($869, $870)), ($871, $872, $873, $874, $875, $876, $877, $878, $879, $880, $881, $882, $883, $884, $885, $886, $887, $888, $889, $890, $891, $892, $893, $894, $895, $896, $897, $898, VersionRange($899, $900)), ($901, $902, $903, $904, $905, $906, $907, $908, $909, $910, $911, $912, $913, $914, $915, $916, $917, $918, $919, $920, $921, $922, $923, $924, $925, $926, $927, $928, VersionRange($929, $930)), ($931, $932, $933, $934, $935, $936, $937, $938, $939, $940, $941, $942, $943, $944, $945, $946, $947, $948, $949, $950, $951, $952, $953, $954, $955, $956, $957, $958, VersionRange($959, $960)), ($961, $962, $963, $964, $965, $966, $967, $968, $969, $970, $971, $972, $973, $974, $975, $976, $977, $978, $979, $980, $981, $982, $983, $984, $985, $986, $987, $988, VersionRange($989, $990)), ($991, $992, $993, $994, $995, $996, $997, $998, $999, $1000, $1001, $1002, $1003, $1004, $1005, $1006, $1007, $1008, $1009, $1010, $1011, $1012, $1013, $1014, $1015, $1016, $1017, $1018, VersionRange($1019, $1020)), ($1021, $1022, $1023, $1024, $1025, $1026, $1027, $1028, $1029, $1030, $1031, $1032, $1033, $1034, $1035, $1036, $1037, $1038, $1039, $1040, $1041, $1042, $1043, $1044, $1045, $1046, $1047, $1048, VersionRange($1049, $1050)), ($1051, $1052, $1053, $1054, $1055, $1056, $1057, $1058, $1059, $1060, $1061, $1062, $1063, $1064, $1065, $1066, $1067, $1068, $1069, $1070, $1071, $1072, $1073, $1074, $1075, $1076, $1077, $1078, VersionRange($1079, $1080)), ($1081, $1082, $1083, $1084, $1085, $1086, $1087, $1088, $1089, $1090, $1091, $1092, $1093, $1094, $1095, $1096, $1097, $1098, $1099, $1100, $1101, $1102, $1103, $1104, $1105, $1106, $1107, $1108, VersionRange($1109, $1110)), ($1111, $1112, $1113, $1114, $1115, $1116, $1117, $1118, $1119, $1120, $1121, $1122, $1123, $1124, $1125, $1126, $1127, $1128, $1129, $1130, $1131, $1132, $1133, $1134, $1135, $1136, $1137, $1138, VersionRange($1139, $1140)), ($1141, $1142, $1143, $1144, $1145, $1146, $1147, $1148, $1149, $1150, $1151, $1152, $1153, $1154, $1155, $1156, $1157, $1158, $1159, $1160, $1161, $1162, $1163, $1164, $1165, $1166, $1167, $1168, VersionRange($1169, $1170)), ($1171, $1172, $1173, $1174, $1175, $1176, $1177, $1178, $1179, $1180, $1181, $1182, $1183, $1184, $1185, $1186, $1187, $1188, $1189, $1190, $1191, $1192, $1193, $1194, $1195, $1196, $1197, $1198, VersionRange($1199, $1200)), ($1201, $1202, $1203, $1204, $1205, $1206, $1207, $1208, $1209, $1210, $1211, $1212, $1213, $1214, $1215, $1216, $1217, $1218, $1219, $1220, $1221, $1222, $1223, $1224, $1225, $1226, $1227, $1228, VersionRange($1229, $1230)), ($1231, $1232, $1233, $1234, $1235, $1236, $1237, $1238, $1239, $1240, $1241, $1242, $1243, $1244, $1245, $1246, $1247, $1248, $1249, $1250, $1251, $1252, $1253, $1254, $1255, $1256, $1257, $1258, VersionRange($1259, $1260)), ($1261, $1262, $1263, $1264, $1265, $1266, $1267, $1268, $1269, $1270, $1271, $1272, $1273, $1274, $1275, $1276, $1277, $1278, $1279, $1280, $1281, $1282, $1283, $1284, $1285, $1286, $1287, $1288, VersionRange($1289, $1290)), ($1291, $1292, $1293, $1294, $1295, $1296, $1297, $1298, $1299, $1300, $1301, $1302, $1303, $1304, $1305, $1306, $1307, $1308, $1309, $1310, $1311, $1312, $1313, $1314, $1315, $1316, $1317, $1318, VersionRange($1319, $1320)), ($1321, $1322, $1323, $1324, $1325, $1326, $1327, $1328, $1329, $1330, $1331, $1332, $1333, $1334, $1335, $1336, $1337, $1338, $1339, $1340, $1341, $1342, $1343, $1344, $1345, $1346, $1347, $1348, VersionRange($1349, $1350)), ($1351, $1352, $1353, $1354, $1355, $1356, $1357, $1358, $1359, $1360, $1361, $1362, $1363, $1364, $1365, $1366, $1367, $1368, $1369, $1370, $1371, $1372, $1373, $1374, $1375, $1376, $1377, $1378, VersionRange($1379, $1380)), ($1381, $1382, $1383, $1384, $1385, $1386, $1387, $1388, $1389, $1390, $1391, $1392, $1393, $1394, $1395, $1396, $1397, $1398, $1399, $1400, $1401, $1402, $1403, $1404, $1405, $1406, $1407, $1408, VersionRange($1409, $1410)), ($1411, $1412, $1413, $1414, $1415, $1416, $1417, $1418, $1419, $1420, $1421, $1422, $1423, $1424, $1425, $1426, $1427, $1428, $1429, $1430, $1431, $1432, $1433, $1434, $1435, $1436, $1437, $1438, VersionRange($1439, $1440)), ($1441, $1442, $1443, $1444, $1445, $1446, $1447, $1448, $1449, $1450, $1451, $1452, $1453, $1454, $1455, $1456, $1457, $1458, $1459, $1460, $1461, $1462, $1463, $1464, $1465, $1466, $1467, $1468, VersionRange($1469, $1470)), ($1471, $1472, $1473, $1474, $1475, $1476, $1477, $1478, $1479, $1480, $1481, $1482, $1483, $1484, $1485, $1486, $1487, $1488, $1489, $1490, $1491, $1492, $1493, $1494, $1495, $1496, $1497, $1498, VersionRange($1499, $1500)), ($1501, $1502, $1503, $1504, $1505, $1506, $1507, $1508, $1509, $1510, $1511, $1512, $1513, $1514, $1515, $1516, $1517, $1518, $1519, $1520, $1521, $1522, $1523, $1524, $1525, $1526, $1527, $1528, VersionRange($1529, $1530)), ($1531, $1532, $1533, $1534, $1535, $1536, $1537, $1538, $1539, $1540, $1541, $1542, $1543, $1544, $1545, $1546, $1547, $1548, $1549, $1550, $1551, $1552, $1553, $1554, $1555, $1556, $1557, $1558, VersionRange($1559, $1560)), ($1561, $1562, $1563, $1564, $1565, $1566, $1567, $1568, $1569, $1570, $1571, $1572, $1573, $1574, $1575, $1576, $1577, $1578, $1579, $1580, $1581, $1582, $1583, $1584, $1585, $1586, $1587, $1588, VersionRange($1589, $1590)), ($1591, $1592, $1593, $1594, $1595, $1596, $1597, $1598, $1599, $1600, $1601, $1602, $1603, $1604, $1605, $1606, $1607, $1608, $1609, $1610, $1611, $1612, $1613, $1614, $1615, $1616, $1617, $1618, VersionRange($1619, $1620)), ($1621, $1622, $1623, $1624, $1625, $1626, $1627, $1628, $1629, $1630, $1631, $1632, $1633, $1634, $1635, $1636, $1637, $1638, $1639, $1640, $1641, $1642, $1643, $1644, $1645, $1646, $1647, $1648, VersionRange($1649, $1650)), ($1651, $1652, $1653, $1654, $1655, $1656, $1657, $1658, $1659, $1660, $1661, $1662, $1663, $1664, $1665, $1666, $1667, $1668, $1669, $1670, $1671, $1672, $1673, $1674, $1675, $1676, $1677, $1678, VersionRange($1679, $1680)), ($1681, $1682, $1683, $1684, $1685, $1686, $1687, $1688, $1689, $1690, $1691, $1692, $1693, $1694, $1695, $1696, $1697, $1698, $1699, $1700, $1701, $1702, $1703, $1704, $1705, $1706, $1707, $1708, VersionRange($1709, $1710)), ($1711, $1712, $1713, $1714, $1715, $1716, $1717, $1718, $1719, $1720, $1721, $1722, $1723, $1724, $1725, $1726, $1727, $1728, $1729, $1730, $1731, $1732, $1733, $1734, $1735, $1736, $1737, $1738, VersionRange($1739, $1740)), ($1741, $1742, $1743, $1744, $1745, $1746, $1747, $1748, $1749, $1750, $1751, $1752, $1753, $1754, $1755, $1756, $1757, $1758, $1759, $1760, $1761, $1762, $1763, $1764, $1765, $1766, $1767, $1768, VersionRange($1769, $1770)), ($1771, $1772, $1773, $1774, $1775, $1776, $1777, $1778, $1779, $1780, $1781, $1782, $1783, $1784, $1785, $1786, $1787, $1788, $1789, $1790, $1791, $1792, $1793, $1794, $1795, $1796, $1797, $1798, VersionRange($1799, $1800)), ($1801, $1802, $1803, $1804, $1805, $1806, $1807, $1808, $1809, $1810, $1811, $1812, $1813, $1814, $1815, $1816, $1817, $1818, $1819, $1820, $1821, $1822, $1823, $1824, $1825, $1826, $1827, $1828, VersionRange($1829, $1830)), ($1831, $1832, $1833, $1834, $1835, $1836, $1837, $1838, $1839, $1840, $1841, $1842, $1843, $1844, $1845, $1846, $1847, $1848, $1849, $1850, $1851, $1852, $1853, $1854, $1855, $1856, $1857, $1858, VersionRange($1859, $1860)), ($1861, $1862, $1863, $1864, $1865, $1866, $1867, $1868, $1869, $1870, $1871, $1872, $1873, $1874, $1875, $1876, $1877, $1878, $1879, $1880, $1881, $1882, $1883, $1884, $1885, $1886, $1887, $1888, VersionRange($1889, $1890)), ($1891, $1892, $1893, $1894, $1895, $1896, $1897, $1898, $1899, $1900, $1901, $1902, $1903, $1904, $1905, $1906, $1907, $1908, $1909, $1910, $1911, $1912, $1913, $1914, $1915, $1916, $1917, $1918, VersionRange($1919, $1920)), ($1921, $1922, $1923, $1924, $1925, $1926, $1927, $1928, $1929, $1930, $1931, $1932, $1933, $1934, $1935, $1936, $1937, $1938, $1939, $1940, $1941, $1942, $1943, $1944, $1945, $1946, $1947, $1948, VersionRange($1949, $1950)), ($1951, $1952, $1953, $1954, $1955, $1956, $1957, $1958, $1959, $1960, $1961, $1962, $1963, $1964, $1965, $1966, $1967, $1968, $1969, $1970, $1971, $1972, $1973, $1974, $1975, $1976, $1977, $1978, VersionRange($1979, $1980)), ($1981, $1982, $1983, $1984, $1985, $1986, $1987, $1988, $1989, $1990, $1991, $1992, $1993, $1994, $1995, $1996, $1997, $1998, $1999, $2000, $2001, $2002, $2003, $2004, $2005, $2006, $2007, $2008, VersionRange($2009, $2010)), ($2011, $2012, $2013, $2014, $2015, $2016, $2017, $2018, $2019, $2020, $2021, $2022, $2023, $2024, $2025, $2026, $2027, $2028, $2029, $2030, $2031, $2032, $2033, $2034, $2035, $2036, $2037, $2038, VersionRange($2039, $2040)), ($2041, $2042, $2043, $2044, $2045, $2046, $2047, $2048, $2049, $2050, $2051, $2052, $2053, $2054, $2055, $2056, $2057, $2058, $2059, $2060, $2061, $2062, $2063, $2064, $2065, $2066, $2067, $2068, VersionRange($2069, $2070)), ($2071, $2072, $2073, $2074, $2075, $2076, $2077, $2078, $2079, $2080, $2081, $2082, $2083, $2084, $2085, $2086, $2087, $2088, $2089, $2090, $2091, $2092, $2093, $2094, $2095, $2096, $2097, $2098, VersionRange($2099, $2100)), ($2101, $2102, $2103, $2104, $2105, $2106, $2107, $2108, $2109, $2110, $2111, $2112, $2113, $2114, $2115, $2116, $2117, $2118, $2119, $2120, $2121, $2122, $2123, $2124, $2125, $2126, $2127, $2128, VersionRange($2129, $2130)), ($2131, $2132, $2133, $2134, $2135, $2136, $2137, $2138, $2139, $2140, $2141, $2142, $2143, $2144, $2145, $2146, $2147, $2148, $2149, $2150, $2151, $2152, $2153, $2154, $2155, $2156, $2157, $2158, VersionRange($2159, $2160)), ($2161, $2162, $2163, $2164, $2165, $2166, $2167, $2168, $2169, $2170, $2171, $2172, $2173, $2174, $2175, $2176, $2177, $2178, $2179, $2180, $2181, $2182, $2183, $2184, $2185, $2186, $2187, $2188, VersionRange($2189, $2190)), ($2191, $2192, $2193, $2194, $2195, $2196, $2197, $2198, $2199, $2200, $2201, $2202, $2203, $2204, $2205, $2206, $2207, $2208, $2209, $2210, $2211, $2212, $2213, $2214, $2215, $2216, $2217, $2218, VersionRange($2219, $2220)), ($2221, $2222, $2223, $2224, $2225, $2226, $2227, $2228, $2229, $2230, $2231, $2232, $2233, $2234, $2235, $2236, $2237, $2238, $2239, $2240, $2241, $2242, $2243, $2244, $2245, $2246, $2247, $2248, VersionRange($2249, $2250)), ($2251, $2252, $2253, $2254, $2255, $2256, $2257, $2258, $2259, $2260, $2261, $2262, $2263, $2264, $2265, $2266, $2267, $2268, $2269, $2270, $2271, $2272, $2273, $2274, $2275, $2276, $2277, $2278, VersionRange($2279, $2280)), ($2281, $2282, $2283, $2284, $2285, $2286, $2287, $2288, $2289, $2290, $2291, $2292, $2293, $2294, $2295, $2296, $2297, $2298, $2299, $2300, $2301, $2302, $2303, $2304, $2305, $2306, $2307, $2308, VersionRange($2309, $2310)), ($2311, $2312, $2313, $2314, $2315, $2316, $2317, $2318, $2319, $2320, $2321, $2322, $2323, $2324, $2325, $2326, $2327, $2328, $2329, $2330, $2331, $2332, $2333, $2334, $2335, $2336, $2337, $2338, VersionRange($2339, $2340)), ($2341, $2342, $2343, $2344, $2345, $2346, $2347, $2348, $2349, $2350, $2351, $2352, $2353, $2354, $2355, $2356, $2357, $2358, $2359, $2360, $2361, $2362, $2363, $2364, $2365, $2366, $2367, $2368, VersionRange($2369, $2370)), ($2371, $2372, $2373, $2374, $2375, $2376, $2377, $2378, $2379, $2380, $2381, $2382, $2383, $2384, $2385, $2386, $2387, $2388, $2389, $2390, $2391, $2392, $2393, $2394, $2395, $2396, $2397, $2398, VersionRange($2399, $2400)), ($2401, $2402, $2403, $2404, $2405, $2406, $2407, $2408, $2409, $2410, $2411, $2412, $2413, $2414, $2415, $2416, $2417, $2418, $2419, $2420, $2421, $2422, $2423, $2424, $2425, $2426, $2427, $2428, VersionRange($2429, $2430)), ($2431, $2432, $2433, $2434, $2435, $2436, $2437, $2438, $2439, $2440, $2441, $2442, $2443, $2444, $2445, $2446, $2447, $2448, $2449, $2450, $2451, $2452, $2453, $2454, $2455, $2456, $2457, $2458, VersionRange($2459, $2460)), ($2461, $2462, $2463, $2464, $2465, $2466, $2467, $2468, $2469, $2470, $2471, $2472, $2473, $2474, $2475, $2476, $2477, $2478, $2479, $2480, $2481, $2482, $2483, $2484, $2485, $2486, $2487, $2488, VersionRange($2489, $2490)), ($2491, $2492, $2493, $2494, $2495, $2496, $2497, $2498, $2499, $2500, $2501, $2502, $2503, $2504, $2505, $2506, $2507, $2508, $2509, $2510, $2511, $2512, $2513, $2514, $2515, $2516, $2517, $2518, VersionRange($2519, $2520)), ($2521, $2522, $2523, $2524, $2525, $2526, $2527, $2528, $2529, $2530, $2531, $2532, $2533, $2534, $2535, $2536, $2537, $2538, $2539, $2540, $2541, $2542, $2543, $2544, $2545, $2546, $2547, $2548, VersionRange($2549, $2550)), ($2551, $2552, $2553, $2554, $2555, $2556, $2557, $2558, $2559, $2560, $2561, $2562, $2563, $2564, $2565, $2566, $2567, $2568, $2569, $2570, $2571, $2572, $2573, $2574, $2575, $2576, $2577, $2578, VersionRange($2579, $2580)), ($2581, $2582, $2583, $2584, $2585, $2586, $2587, $2588, $2589, $2590, $2591, $2592, $2593, $2594, $2595, $2596, $2597, $2598, $2599, $2600, $2601, $2602, $2603, $2604, $2605, $2606, $2607, $2608, VersionRange($2609, $2610)), ($2611, $2612, $2613, $2614, $2615, $2616, $2617, $2618, $2619, $2620, $2621, $2622, $2623, $2624, $2625, $2626, $2627, $2628, $2629, $2630, $2631, $2632, $2633, $2634, $2635, $2636, $2637, $2638, VersionRange($2639, $2640)), ($2641, $2642, $2643, $2644, $2645, $2646, $2647, $2648, $2649, $2650, $2651, $2652, $2653, $2654, $2655, $2656, $2657, $2658, $2659, $2660, $2661, $2662, $2663, $2664, $2665, $2666, $2667, $2668, VersionRange($2669, $2670)), ($2671, $2672, $2673, $2674, $2675, $2676, $2677, $2678, $2679, $2680, $2681, $2682, $2683, $2684, $2685, $2686, $2687, $2688, $2689, $2690, $2691, $2692, $2693, $2694, $2695, $2696, $2697, $2698, VersionRange($2699, $2700)), ($2701, $2702, $2703, $2704, $2705, $2706, $2707, $2708, $2709, $2710, $2711, $2712, $2713, $2714, $2715, $2716, $2717, $2718, $2719, $2720, $2721, $2722, $2723, $2724, $2725, $2726, $2727, $2728, VersionRange($2729, $2730)), ($2731, $2732, $2733, $2734, $2735, $2736, $2737, $2738, $2739, $2740, $2741, $2742, $2743, $2744, $2745, $2746, $2747, $2748, $2749, $2750, $2751, $2752, $2753, $2754, $2755, $2756, $2757, $2758, VersionRange($2759, $2760)), ($2761, $2762, $2763, $2764, $2765, $2766, $2767, $2768, $2769, $2770, $2771, $2772, $2773, $2774, $2775, $2776, $2777, $2778, $2779, $2780, $2781, $2782, $2783, $2784, $2785, $2786, $2787, $2788, VersionRange($2789, $2790)), ($2791, $2792, $2793, $2794, $2795, $2796, $2797, $2798, $2799, $2800, $2801, $2802, $2803, $2804, $2805, $2806, $2807, $2808, $2809, $2810, $2811, $2812, $2813, $2814, $2815, $2816, $2817, $2818, VersionRange($2819, $2820)), ($2821, $2822, $2823, $2824, $2825, $2826, $2827, $2828, $2829, $2830, $2831, $2832, $2833, $2834, $2835, $2836, $2837, $2838, $2839, $2840, $2841, $2842, $2843, $2844, $2845, $2846, $2847, $2848, VersionRange($2849, $2850)), ($2851, $2852, $2853, $2854, $2855, $2856, $2857, $2858, $2859, $2860, $2861, $2862, $2863, $2864, $2865, $2866, $2867, $2868, $2869, $2870, $2871, $2872, $2873, $2874, $2875, $2876, $2877, $2878, VersionRange($2879, $2880)), ($2881, $2882, $2883, $2884, $2885, $2886, $2887, $2888, $2889, $2890, $2891, $2892, $2893, $2894, $2895, $2896, $2897, $2898, $2899, $2900, $2901, $2902, $2903, $2904, $2905, $2906, $2907, $2908, VersionRange($2909, $2910)), ($2911, $2912, $2913, $2914, $2915, $2916, $2917, $2918, $2919, $2920, $2921, $2922, $2923, $2924, $2925, $2926, $2927, $2928, $2929, $2930, $2931, $2932, $2933, $2934, $2935, $2936, $2937, $2938, VersionRange($2939, $2940)), ($2941, $2942, $2943, $2944, $2945, $2946, $2947, $2948, $2949, $2950, $2951, $2952, $2953, $2954, $2955, $2956, $2957, $2958, $2959, $2960, $2961, $2962, $2963, $2964, $2965, $2966, $2967, $2968, VersionRange($2969, $2970)), ($2971, $2972, $2973, $2974, $2975, $2976, $2977, $2978, $2979, $2980, $2981, $2982, $2983, $2984, $2985, $2986, $2987, $2988, $2989, $2990, $2991, $2992, $2993, $2994, $2995, $2996, $2997, $2998, VersionRange($2999, $3000)), ($3001, $3002, $3003, $3004, $3005, $3006, $3007, $3008, $3009, $3010, $3011, $3012, $3013, $3014, $3015, $3016, $3017, $3018, $3019, $3020, $3021, $3022, $3023, $3024, $3025, $3026, $3027, $3028, VersionRange($3029, $3030)), ($3031, $3032, $3033, $3034, $3035, $3036, $3037, $3038, $3039, $3040, $3041, $3042, $3043, $3044, $3045, $3046, $3047, $3048, $3049, $3050, $3051, $3052, $3053, $3054, $3055, $3056, $3057, $3058, VersionRange($3059, $3060)), ($3061, $3062, $3063, $3064, $3065, $3066, $3067, $3068, $3069, $3070, $3071, $3072, $3073, $3074, $3075, $3076, $3077, $3078, $3079, $3080, $3081, $3082, $3083, $3084, $3085, $3086, $3087, $3088, VersionRange($3089, $3090)), ($3091, $3092, $3093, $3094, $3095, $3096, $3097, $3098, $3099, $3100, $3101, $3102, $3103, $3104, $3105, $3106, $3107, $3108, $3109, $3110, $3111, $3112, $3113, $3114, $3115, $3116, $3117, $3118, VersionRange($3119, $3120)), ($3121, $3122, $3123, $3124, $3125, $3126, $3127, $3128, $3129, $3130, $3131, $3132, $3133, $3134, $3135, $3136, $3137, $3138, $3139, $3140, $3141, $3142, $3143, $3144, $3145, $3146, $3147, $3148, VersionRange($3149, $3150)), ($3151, $3152, $3153, $3154, $3155, $3156, $3157, $3158, $3159, $3160, $3161, $3162, $3163, $3164, $3165, $3166, $3167, $3168, $3169, $3170, $3171, $3172, $3173, $3174, $3175, $3176, $3177, $3178, VersionRange($3179, $3180)), ($3181, $3182, $3183, $3184, $3185, $3186, $3187, $3188, $3189, $3190, $3191, $3192, $3193, $3194, $3195, $3196, $3197, $3198, $3199, $3200, $3201, $3202, $3203, $3204, $3205, $3206, $3207, $3208, VersionRange($3209, $3210)), ($3211, $3212, $3213, $3214, $3215, $3216, $3217, $3218, $3219, $3220, $3221, $3222, $3223, $3224, $3225, $3226, $3227, $3228, $3229, $3230, $3231, $3232, $3233, $3234, $3235, $3236, $3237, $3238, VersionRange($3239, $3240)), ($3241, $3242, $3243, $3244, $3245, $3246, $3247, $3248, $3249, $3250, $3251, $3252, $3253, $3254, $3255, $3256, $3257, $3258, $3259, $3260, $3261, $3262, $3263, $3264, $3265, $3266, $3267, $3268, VersionRange($3269, $3270)), ($3271, $3272, $3273, $3274, $3275, $3276, $3277, $3278, $3279, $3280, $3281, $3282, $3283, $3284, $3285, $3286, $3287, $3288, $3289, $3290, $3291, $3292, $3293, $3294, $3295, $3296, $3297, $3298, VersionRange($3299, $3300)), ($3301, $3302, $3303, $3304, $3305, $3306, $3307, $3308, $3309, $3310, $3311, $3312, $3313, $3314, $3315, $3316, $3317, $3318, $3319, $3320, $3321, $3322, $3323, $3324, $3325, $3326, $3327, $3328, VersionRange($3329, $3330)), ($3331, $3332, $3333, $3334, $3335, $3336, $3337, $3338, $3339, $3340, $3341, $3342, $3343, $3344, $3345, $3346, $3347, $3348, $3349, $3350, $3351, $3352, $3353, $3354, $3355, $3356, $3357, $3358, VersionRange($3359, $3360)), ($3361, $3362, $3363, $3364, $3365, $3366, $3367, $3368, $3369, $3370, $3371, $3372, $3373, $3374, $3375, $3376, $3377, $3378, $3379, $3380, $3381, $3382, $3383, $3384, $3385, $3386, $3387, $3388, VersionRange($3389, $3390)), ($3391, $3392, $3393, $3394, $3395, $3396, $3397, $3398, $3399, $3400, $3401, $3402, $3403, $3404, $3405, $3406, $3407, $3408, $3409, $3410, $3411, $3412, $3413, $3414, $3415, $3416, $3417, $3418, VersionRange($3419, $3420)), ($3421, $3422, $3423, $3424, $3425, $3426, $3427, $3428, $3429, $3430, $3431, $3432, $3433, $3434, $3435, $3436, $3437, $3438, $3439, $3440, $3441, $3442, $3443, $3444, $3445, $3446, $3447, $3448, VersionRange($3449, $3450)), ($3451, $3452, $3453, $3454, $3455, $3456, $3457, $3458, $3459, $3460, $3461, $3462, $3463, $3464, $3465, $3466, $3467, $3468, $3469, $3470, $3471, $3472, $3473, $3474, $3475, $3476, $3477, $3478, VersionRange($3479, $3480)), ($3481, $3482, $3483, $3484, $3485, $3486, $3487, $3488, $3489, $3490, $3491, $3492, $3493, $3494, $3495, $3496, $3497, $3498, $3499, $3500, $3501, $3502, $3503, $3504, $3505, $3506, $3507, $3508, VersionRange($3509, $3510)), ($3511, $3512, $3513, $3514, $3515, $3516, $3517, $3518, $3519, $3520, $3521, $3522, $3523, $3524, $3525, $3526, $3527, $3528, $3529, $3530, $3531, $3532, $3533, $3534, $3535, $3536, $3537, $3538, VersionRange($3539, $3540)), ($3541, $3542, $3543, $3544, $3545, $3546, $3547, $3548, $3549, $3550, $3551, $3552, $3553, $3554, $3555, $3556, $3557, $3558, $3559, $3560, $3561, $3562, $3563, $3564, $3565, $3566, $3567, $3568, VersionRange($3569, $3570)), ($3571, $3572, $3573, $3574, $3575, $3576, $3577, $3578, $3579, $3580, $3581, $3582, $3583, $3584, $3585, $3586, $3587, $3588, $3589, $3590, $3591, $3592, $3593, $3594, $3595, $3596, $3597, $3598, VersionRange($3599, $3600)), ($3601, $3602, $3603, $3604, $3605, $3606, $3607, $3608, $3609, $3610, $3611, $3612, $3613, $3614, $3615, $3616, $3617, $3618, $3619, $3620, $3621, $3622, $3623, $3624, $3625, $3626, $3627, $3628, VersionRange($3629, $3630)), ($3631, $3632, $3633, $3634, $3635, $3636, $3637, $3638, $3639, $3640, $3641, $3642, $3643, $3644, $3645, $3646, $3647, $3648, $3649, $3650, $3651, $3652, $3653, $3654, $3655, $3656, $3657, $3658, VersionRange($3659, $3660)), ($3661, $3662, $3663, $3664, $3665, $3666, $3667, $3668, $3669, $3670, $3671, $3672, $3673, $3674, $3675, $3676, $3677, $3678, $3679, $3680, $3681, $3682, $3683, $3684, $3685, $3686, $3687, $3688, VersionRange($3689, $3690)), ($3691, $3692, $3693, $3694, $3695, $3696, $3697, $3698, $3699, $3700, $3701, $3702, $3703, $3704, $3705, $3706, $3707, $3708, $3709, $3710, $3711, $3712, $3713, $3714, $3715, $3716, $3717, $3718, VersionRange($3719, $3720)), ($3721, $3722, $3723, $3724, $3725, $3726, $3727, $3728, $3729, $3730, $3731, $3732, $3733, $3734, $3735, $3736, $3737, $3738, $3739, $3740, $3741, $3742, $3743, $3744, $3745, $3746, $3747, $3748, VersionRange($3749, $3750)), ($3751, $3752, $3753, $3754, $3755, $3756, $3757, $3758, $3759, $3760, $3761, $3762, $3763, $3764, $3765, $3766, $3767, $3768, $3769, $3770, $3771, $3772, $3773, $3774, $3775, $3776, $3777, $3778, VersionRange($3779, $3780)), ($3781, $3782, $3783, $3784, $3785, $3786, $3787, $3788, $3789, $3790, $3791, $3792, $3793, $3794, $3795, $3796, $3797, $3798, $3799, $3800, $3801, $3802, $3803, $3804, $3805, $3806, $3807, $3808, VersionRange($3809, $3810)), ($3811, $3812, $3813, $3814, $3815, $3816, $3817, $3818, $3819, $3820, $3821, $3822, $3823, $3824, $3825, $3826, $3827, $3828, $3829, $3830, $3831, $3832, $3833, $3834, $3835, $3836, $3837, $3838, VersionRange($3839, $3840)), ($3841, $3842, $3843, $3844, $3845, $3846, $3847, $3848, $3849, $3850, $3851, $3852, $3853, $3854, $3855, $3856, $3857, $3858, $3859, $3860, $3861, $3862, $3863, $3864, $3865, $3866, $3867, $3868, VersionRange($3869, $3870)), ($3871, $3872, $3873, $3874, $3875, $3876, $3877, $3878, $3879, $3880, $3881, $3882, $3883, $3884, $3885, $3886, $3887, $3888, $3889, $3890, $3891, $3892, $3893, $3894, $3895, $3896, $3897, $3898, VersionRange($3899, $3900)), ($3901, $3902, $3903, $3904, $3905, $3906, $3907, $3908, $3909, $3910, $3911, $3912, $3913, $3914, $3915, $3916, $3917, $3918, $3919, $3920, $3921, $3922, $3923, $3924, $3925, $3926, $3927, $3928, VersionRange($3929, $3930)), ($3931, $3932, $3933, $3934, $3935, $3936, $3937, $3938, $3939, $3940, $3941, $3942, $3943, $3944, $3945, $3946, $3947, $3948, $3949, $3950, $3951, $3952, $3953, $3954, $3955, $3956, $3957, $3958, VersionRange($3959, $3960)), ($3961, $3962, $3963, $3964, $3965, $3966, $3967, $3968, $3969, $3970, $3971, $3972, $3973, $3974, $3975, $3976, $3977, $3978, $3979, $3980, $3981, $3982, $3983, $3984, $3985, $3986, $3987, $3988, VersionRange($3989, $3990)), ($3991, $3992, $3993, $3994, $3995, $3996, $3997, $3998, $3999, $4000, $4001, $4002, $4003, $4004, $4005, $4006, $4007, $4008, $4009, $4010, $4011, $4012, $4013, $4014, $4015, $4016, $4017, $4018, VersionRange($4019, $4020)), ($4021, $4022, $4023, $4024, $4025, $4026, $4027, $4028, $4029, $4030, $4031, $4032, $4033, $4034, $4035, $4036, $4037, $4038, $4039, $4040, $4041, $4042, $4043, $4044, $4045, $4046, $4047, $4048, VersionRange($4049, $4050)), ($4051, $4052, $4053, $4054, $4055, $4056, $4057, $4058, $4059, $4060, $4061, $4062, $4063, $4064, $4065, $4066, $4067, $4068, $4069, $4070, $4071, $4072, $4073, $4074, $4075, $4076, $4077, $4078, VersionRange($4079, $4080)), ($4081, $4082, $4083, $4084, $4085, $4086, $4087, $4088, $4089, $4090, $4091, $4092, $4093, $4094, $4095, $4096, $4097, $4098, $4099, $4100, $4101, $4102, $4103, $4104, $4105, $4106, $4107, $4108, VersionRange($4109, $4110)), ($4111, $4112, $4113, $4114, $4115, $4116, $4117, $4118, $4119, $4120, $4121, $4122, $4123, $4124, $4125, $4126, $4127, $4128, $4129, $4130, $4131, $4132, $4133, $4134, $4135, $4136, $4137, $4138, VersionRange($4139, $4140)), ($4141, $4142, $4143, $4144, $4145, $4146, $4147, $4148, $4149, $4150, $4151, $4152, $4153, $4154, $4155, $4156, $4157, $4158, $4159, $4160, $4161, $4162, $4163, $4164, $4165, $4166, $4167, $4168, VersionRange($4169, $4170)), ($4171, $4172, $4173, $4174, $4175, $4176, $4177, $4178, $4179, $4180, $4181, $4182, $4183, $4184, $4185, $4186, $4187, $4188, $4189, $4190, $4191, $4192, $4193, $4194, $4195, $4196, $4197, $4198, VersionRange($4199, $4200)), ($4201, $4202, $4203, $4204, $4205, $4206, $4207, $4208, $4209, $4210, $4211, $4212, $4213, $4214, $4215, $4216, $4217, $4218, $4219, $4220, $4221, $4222, $4223, $4224, $4225, $4226, $4227, $4228, VersionRange($4229, $4230)), ($4231, $4232, $4233, $4234, $4235, $4236, $4237, $4238, $4239, $4240, $4241, $4242, $4243, $4244, $4245, $4246, $4247, $4248, $4249, $4250, $4251, $4252, $4253, $4254, $4255, $4256, $4257, $4258, VersionRange($4259, $4260)), ($4261, $4262, $4263, $4264, $4265, $4266, $4267, $4268, $4269, $4270, $4271, $4272, $4273, $4274, $4275, $4276, $4277, $4278, $4279, $4280, $4281, $4282, $4283, $4284, $4285, $4286, $4287, $4288, VersionRange($4289, $4290)), ($4291, $4292, $4293, $4294, $4295, $4296, $4297, $4298, $4299, $4300, $4301, $4302, $4303, $4304, $4305, $4306, $4307, $4308, $4309, $4310, $4311, $4312, $4313, $4314, $4315, $4316, $4317, $4318, VersionRange($4319, $4320)), ($4321, $4322, $4323, $4324, $4325, $4326, $4327, $4328, $4329, $4330, $4331, $4332, $4333, $4334, $4335, $4336, $4337, $4338, $4339, $4340, $4341, $4342, $4343, $4344, $4345, $4346, $4347, $4348, VersionRange($4349, $4350)), ($4351, $4352, $4353, $4354, $4355, $4356, $4357, $4358, $4359, $4360, $4361, $4362, $4363, $4364, $4365, $4366, $4367, $4368, $4369, $4370, $4371, $4372, $4373, $4374, $4375, $4376, $4377, $4378, VersionRange($4379, $4380)), ($4381, $4382, $4383, $4384, $4385, $4386, $4387, $4388, $4389, $4390, $4391, $4392, $4393, $4394, $4395, $4396, $4397, $4398, $4399, $4400, $4401, $4402, $4403, $4404, $4405, $4406, $4407, $4408, VersionRange($4409, $4410)), ($4411, $4412, $4413, $4414, $4415, $4416, $4417, $4418, $4419, $4420, $4421, $4422, $4423, $4424, $4425, $4426, $4427, $4428, $4429, $4430, $4431, $4432, $4433, $4434, $4435, $4436, $4437, $4438, VersionRange($4439, $4440)), ($4441, $4442, $4443, $4444, $4445, $4446, $4447, $4448, $4449, $4450, $4451, $4452, $4453, $4454, $4455, $4456, $4457, $4458, $4459, $4460, $4461, $4462, $4463, $4464, $4465, $4466, $4467, $4468, VersionRange($4469, $4470)), ($4471, $4472, $4473, $4474, $4475, $4476, $4477, $4478, $4479, $4480, $4481, $4482, $4483, $4484, $4485, $4486, $4487, $4488, $4489, $4490, $4491, $4492, $4493, $4494, $4495, $4496, $4497, $4498, VersionRange($4499, $4500)), ($4501, $4502, $4503, $4504, $4505, $4506, $4507, $4508, $4509, $4510, $4511, $4512, $4513, $4514, $4515, $4516, $4517, $4518, $4519, $4520, $4521, $4522, $4523, $4524, $4525, $4526, $4527, $4528, VersionRange($4529, $4530)), ($4531, $4532, $4533, $4534, $4535, $4536, $4537, $4538, $4539, $4540, $4541, $4542, $4543, $4544, $4545, $4546, $4547, $4548, $4549, $4550, $4551, $4552, $4553, $4554, $4555, $4556, $4557, $4558, VersionRange($4559, $4560)), ($4561, $4562, $4563, $4564, $4565, $4566, $4567, $4568, $4569, $4570, $4571, $4572, $4573, $4574, $4575, $4576, $4577, $4578, $4579, $4580, $4581, $4582, $4583, $4584, $4585, $4586, $4587, $4588, VersionRange($4589, $4590)), ($4591, $4592, $4593, $4594, $4595, $4596, $4597, $4598, $4599, $4600, $4601, $4602, $4603, $4604, $4605, $4606, $4607, $4608, $4609, $4610, $4611, $4612, $4613, $4614, $4615, $4616, $4617, $4618, VersionRange($4619, $4620)), ($4621, $4622, $4623, $4624, $4625, $4626, $4627, $4628, $4629, $4630, $4631, $4632, $4633, $4634, $4635, $4636, $4637, $4638, $4639, $4640, $4641, $4642, $4643, $4644, $4645, $4646, $4647, $4648, VersionRange($4649, $4650)), ($4651, $4652, $4653, $4654, $4655, $4656, $4657, $4658, $4659, $4660, $4661, $4662, $4663, $4664, $4665, $4666, $4667, $4668, $4669, $4670, $4671, $4672, $4673, $4674, $4675, $4676, $4677, $4678, VersionRange($4679, $4680)), ($4681, $4682, $4683, $4684, $4685, $4686, $4687, $4688, $4689, $4690, $4691, $4692, $4693, $4694, $4695, $4696, $4697, $4698, $4699, $4700, $4701, $4702, $4703, $4704, $4705, $4706, $4707, $4708, VersionRange($4709, $4710)), ($4711, $4712, $4713, $4714, $4715, $4716, $4717, $4718, $4719, $4720, $4721, $4722, $4723, $4724, $4725, $4726, $4727, $4728, $4729, $4730, $4731, $4732, $4733, $4734, $4735, $4736, $4737, $4738, VersionRange($4739, $4740)), ($4741, $4742, $4743, $4744, $4745, $4746, $4747, $4748, $4749, $4750, $4751, $4752, $4753, $4754, $4755, $4756, $4757, $4758, $4759, $4760, $4761, $4762, $4763, $4764, $4765, $4766, $4767, $4768, VersionRange($4769, $4770)), ($4771, $4772, $4773, $4774, $4775, $4776, $4777, $4778, $4779, $4780, $4781, $4782, $4783, $4784, $4785, $4786, $4787, $4788, $4789, $4790, $4791, $4792, $4793, $4794, $4795, $4796, $4797, $4798, VersionRange($4799, $4800)), ($4801, $4802, $4803, $4804, $4805, $4806, $4807, $4808, $4809, $4810, $4811, $4812, $4813, $4814, $4815, $4816, $4817, $4818, $4819, $4820, $4821, $4822, $4823, $4824, $4825, $4826, $4827, $4828, VersionRange($4829, $4830)), ($4831, $4832, $4833, $4834, $4835, $4836, $4837, $4838, $4839, $4840, $4841, $4842, $4843, $4844, $4845, $4846, $4847, $4848, $4849, $4850, $4851, $4852, $4853, $4854, $4855, $4856, $4857, $4858, VersionRange($4859, $4860)), ($4861, $4862, $4863, $4864, $4865, $4866, $4867, $4868, $4869, $4870, $4871, $4872, $4873, $4874, $4875, $4876, $4877, $4878, $4879, $4880, $4881, $4882, $4883, $4884, $4885, $4886, $4887, $4888, VersionRange($4889, $4890)), ($4891, $4892, $4893, $4894, $4895, $4896, $4897, $4898, $4899, $4900, $4901, $4902, $4903, $4904, $4905, $4906, $4907, $4908, $4909, $4910, $4911, $4912, $4913, $4914, $4915, $4916, $4917, $4918, VersionRange($4919, $4920)), ($4921, $4922, $4923, $4924, $4925, $4926, $4927, $4928, $4929, $4930, $4931, $4932, $4933, $4934, $4935, $4936, $4937, $4938, $4939, $4940, $4941, $4942, $4943, $4944, $4945, $4946, $4947, $4948, VersionRange($4949, $4950)), ($4951, $4952, $4953, $4954, $4955, $4956, $4957, $4958, $4959, $4960, $4961, $4962, $4963, $4964, $4965, $4966, $4967, $4968, $4969, $4970, $4971, $4972, $4973, $4974, $4975, $4976, $4977, $4978, VersionRange($4979, $4980)), ($4981, $4982, $4983, $4984, $4985, $4986, $4987, $4988, $4989, $4990, $4991, $4992, $4993, $4994, $4995, $4996, $4997, $4998, $4999, $5000, $5001, $5002, $5003, $5004, $5005, $5006, $5007, $5008, VersionRange($5009, $5010)), ($5011, $5012, $5013, $5014, $5015, $5016, $5017, $5018, $5019, $5020, $5021, $5022, $5023, $5024, $5025, $5026, $5027, $5028, $5029, $5030, $5031, $5032, $5033, $5034, $5035, $5036, $5037, $5038, VersionRange($5039, $5040)), ($5041, $5042, $5043, $5044, $5045, $5046, $5047, $5048, $5049, $5050, $5051, $5052, $5053, $5054, $5055, $5056, $5057, $5058, $5059, $5060, $5061, $5062, $5063, $5064, $5065, $5066, $5067, $5068, VersionRange($5069, $5070)), ($5071, $5072, $5073, $5074, $5075, $5076, $5077, $5078, $5079, $5080, $5081, $5082, $5083, $5084, $5085, $5086, $5087, $5088, $5089, $5090, $5091, $5092, $5093, $5094, $5095, $5096, $5097, $5098, VersionRange($5099, $5100)), ($5101, $5102, $5103, $5104, $5105, $5106, $5107, $5108, $5109, $5110, $5111, $5112, $5113, $5114, $5115, $5116, $5117, $5118, $5119, $5120, $5121, $5122, $5123, $5124, $5125, $5126, $5127, $5128, VersionRange($5129, $5130)), ($5131, $5132, $5133, $5134, $5135, $5136, $5137, $5138, $5139, $5140, $5141, $5142, $5143, $5144, $5145, $5146, $5147, $5148, $5149, $5150, $5151, $5152, $5153, $5154, $5155, $5156, $5157, $5158, VersionRange($5159, $5160)), ($5161, $5162, $5163, $5164, $5165, $5166, $5167, $5168, $5169, $5170, $5171, $5172, $5173, $5174, $5175, $5176, $5177, $5178, $5179, $5180, $5181, $5182, $5183, $5184, $5185, $5186, $5187, $5188, VersionRange($5189, $5190)), ($5191, $5192, $5193, $5194, $5195, $5196, $5197, $5198, $5199, $5200, $5201, $5202, $5203, $5204, $5205, $5206, $5207, $5208, $5209, $5210, $5211, $5212, $5213, $5214, $5215, $5216, $5217, $5218, VersionRange($5219, $5220)), ($5221, $5222, $5223, $5224, $5225, $5226, $5227, $5228, $5229, $5230, $5231, $5232, $5233, $5234, $5235, $5236, $5237, $5238, $5239, $5240, $5241, $5242, $5243, $5244, $5245, $5246, $5247, $5248, VersionRange($5249, $5250)), ($5251, $5252, $5253, $5254, $5255, $5256, $5257, $5258, $5259, $5260, $5261, $5262, $5263, $5264, $5265, $5266, $5267, $5268, $5269, $5270, $5271, $5272, $5273, $5274, $5275, $5276, $5277, $5278, VersionRange($5279, $5280)), ($5281, $5282, $5283, $5284, $5285, $5286, $5287, $5288, $5289, $5290, $5291, $5292, $5293, $5294, $5295, $5296, $5297, $5298, $5299, $5300, $5301, $5302, $5303, $5304, $5305, $5306, $5307, $5308, VersionRange($5309, $5310)), ($5311, $5312, $5313, $5314, $5315, $5316, $5317, $5318, $5319, $5320, $5321, $5322, $5323, $5324, $5325, $5326, $5327, $5328, $5329, $5330, $5331, $5332, $5333, $5334, $5335, $5336, $5337, $5338, VersionRange($5339, $5340)), ($5341, $5342, $5343, $5344, $5345, $5346, $5347, $5348, $5349, $5350, $5351, $5352, $5353, $5354, $5355, $5356, $5357, $5358, $5359, $5360, $5361, $5362, $5363, $5364, $5365, $5366, $5367, $5368, VersionRange($5369, $5370)), ($5371, $5372, $5373, $5374, $5375, $5376, $5377, $5378, $5379, $5380, $5381, $5382, $5383, $5384, $5385, $5386, $5387, $5388, $5389, $5390, $5391, $5392, $5393, $5394, $5395, $5396, $5397, $5398, VersionRange($5399, $5400)), ($5401, $5402, $5403, $5404, $5405, $5406, $5407, $5408, $5409, $5410, $5411, $5412, $5413, $5414, $5415, $5416, $5417, $5418, $5419, $5420, $5421, $5422, $5423, $5424, $5425, $5426, $5427, $5428, VersionRange($5429, $5430)), ($5431, $5432, $5433, $5434, $5435, $5436, $5437, $5438, $5439, $5440, $5441, $5442, $5443, $5444, $5445, $5446, $5447, $5448, $5449, $5450, $5451, $5452, $5453, $5454, $5455, $5456, $5457, $5458, VersionRange($5459, $5460)), ($5461, $5462, $5463, $5464, $5465, $5466, $5467, $5468, $5469, $5470, $5471, $5472, $5473, $5474, $5475, $5476, $5477, $5478, $5479, $5480, $5481, $5482, $5483, $5484, $5485, $5486, $5487, $5488, VersionRange($5489, $5490)), ($5491, $5492, $5493, $5494, $5495, $5496, $5497, $5498, $5499, $5500, $5501, $5502, $5503, $5504, $5505, $5506, $5507, $5508, $5509, $5510, $5511, $5512, $5513, $5514, $5515, $5516, $5517, $5518, VersionRange($5519, $5520)), ($5521, $5522, $5523, $5524, $5525, $5526, $5527, $5528, $5529, $5530, $5531, $5532, $5533, $5534, $5535, $5536, $5537, $5538, $5539, $5540, $5541, $5542, $5543, $5544, $5545, $5546, $5547, $5548, VersionRange($5549, $5550)), ($5551, $5552, $5553, $5554, $5555, $5556, $5557, $5558, $5559, $5560, $5561, $5562, $5563, $5564, $5565, $5566, $5567, $5568, $5569, $5570, $5571, $5572, $5573, $5574, $5575, $5576, $5577, $5578, VersionRange($5579, $5580)), ($5581, $5582, $5583, $5584, $5585, $5586, $5587, $5588, $5589, $5590, $5591, $5592, $5593, $5594, $5595, $5596, $5597, $5598, $5599, $5600, $5601, $5602, $5603, $5604, $5605, $5606, $5607, $5608, VersionRange($5609, $5610)), ($5611, $5612, $5613, $5614, $5615, $5616, $5617, $5618, $5619, $5620, $5621, $5622, $5623, $5624, $5625, $5626, $5627, $5628, $5629, $5630, $5631, $5632, $5633, $5634, $5635, $5636, $5637, $5638, VersionRange($5639, $5640)), ($5641, $5642, $5643, $5644, $5645, $5646, $5647, $5648, $5649, $5650, $5651, $5652, $5653, $5654, $5655, $5656, $5657, $5658, $5659, $5660, $5661, $5662, $5663, $5664, $5665, $5666, $5667, $5668, VersionRange($5669, $5670)), ($5671, $5672, $5673, $5674, $5675, $5676, $5677, $5678, $5679, $5680, $5681, $5682, $5683, $5684, $5685, $5686, $5687, $5688, $5689, $5690, $5691, $5692, $5693, $5694, $5695, $5696, $5697, $5698, VersionRange($5699, $5700)), ($5701, $5702, $5703, $5704, $5705, $5706, $5707, $5708, $5709, $5710, $5711, $5712, $5713, $5714, $5715, $5716, $5717, $5718, $5719, $5720, $5721, $5722, $5723, $5724, $5725, $5726, $5727, $5728, VersionRange($5729, $5730)), ($5731, $5732, $5733, $5734, $5735, $5736, $5737, $5738, $5739, $5740, $5741, $5742, $5743, $5744, $5745, $5746, $5747, $5748, $5749, $5750, $5751, $5752, $5753, $5754, $5755, $5756, $5757, $5758, VersionRange($5759, $5760)), ($5761, $5762, $5763, $5764, $5765, $5766, $5767, $5768, $5769, $5770, $5771, $5772, $5773, $5774, $5775, $5776, $5777, $5778, $5779, $5780, $5781, $5782, $5783, $5784, $5785, $5786, $5787, $5788, VersionRange($5789, $5790)), ($5791, $5792, $5793, $5794, $5795, $5796, $5797, $5798, $5799, $5800, $5801, $5802, $5803, $5804, $5805, $5806, $5807, $5808, $5809, $5810, $5811, $5812, $5813, $5814, $5815, $5816, $5817, $5818, VersionRange($5819, $5820)), ($5821, $5822, $5823, $5824, $5825, $5826, $5827, $5828, $5829, $5830, $5831, $5832, $5833, $5834, $5835, $5836, $5837, $5838, $5839, $5840, $5841, $5842, $5843, $5844, $5845, $5846, $5847, $5848, VersionRange($5849, $5850)), ($5851, $5852, $5853, $5854, $5855, $5856, $5857, $5858, $5859, $5860, $5861, $5862, $5863, $5864, $5865, $5866, $5867, $5868, $5869, $5870, $5871, $5872, $5873, $5874, $5875, $5876, $5877, $5878, VersionRange($5879, $5880)), ($5881, $5882, $5883, $5884, $5885, $5886, $5887, $5888, $5889, $5890, $5891, $5892, $5893, $5894, $5895, $5896, $5897, $5898, $5899, $5900, $5901, $5902, $5903, $5904, $5905, $5906, $5907, $5908, VersionRange($5909, $5910)), ($5911, $5912, $5913, $5914, $5915, $5916, $5917, $5918, $5919, $5920, $5921, $5922, $5923, $5924, $5925, $5926, $5927, $5928, $5929, $5930, $5931, $5932, $5933, $5934, $5935, $5936, $5937, $5938, VersionRange($5939, $5940)), ($5941, $5942, $5943, $5944, $5945, $5946, $5947, $5948, $5949, $5950, $5951, $5952, $5953, $5954, $5955, $5956, $5957, $5958, $5959, $5960, $5961, $5962, $5963, $5964, $5965, $5966, $5967, $5968, VersionRange($5969, $5970)), ($5971, $5972, $5973, $5974, $5975, $5976, $5977, $5978, $5979, $5980, $5981, $5982, $5983, $5984, $5985, $5986, $5987, $5988, $5989, $5990, $5991, $5992, $5993, $5994, $5995, $5996, $5997, $5998, VersionRange($5999, $6000)), ($6001, $6002, $6003, $6004, $6005, $6006, $6007, $6008, $6009, $6010, $6011, $6012, $6013, $6014, $6015, $6016, $6017, $6018, $6019, $6020, $6021, $6022, $6023, $6024, $6025, $6026, $6027, $6028, VersionRange($6029, $6030)), ($6031, $6032, $6033, $6034, $6035, $6036, $6037, $6038, $6039, $6040, $6041, $6042, $6043, $6044, $6045, $6046, $6047, $6048, $6049, $6050, $6051, $6052, $6053, $6054, $6055, $6056, $6057, $6058, VersionRange($6059, $6060)), ($6061, $6062, $6063, $6064, $6065, $6066, $6067, $6068, $6069, $6070, $6071, $6072, $6073, $6074, $6075, $6076, $6077, $6078, $6079, $6080, $6081, $6082, $6083, $6084, $6085, $6086, $6087, $6088, VersionRange($6089, $6090)), ($6091, $6092, $6093, $6094, $6095, $6096, $6097, $6098, $6099, $6100, $6101, $6102, $6103, $6104, $6105, $6106, $6107, $6108, $6109, $6110, $6111, $6112, $6113, $6114, $6115, $6116, $6117, $6118, VersionRange($6119, $6120)), ($6121, $6122, $6123, $6124, $6125, $6126, $6127, $6128, $6129, $6130, $6131, $6132, $6133, $6134, $6135, $6136, $6137, $6138, $6139, $6140, $6141, $6142, $6143, $6144, $6145, $6146, $6147, $6148, VersionRange($6149, $6150)), ($6151, $6152, $6153, $6154, $6155, $6156, $6157, $6158, $6159, $6160, $6161, $6162, $6163, $6164, $6165, $6166, $6167, $6168, $6169, $6170, $6171, $6172, $6173, $6174, $6175, $6176, $6177, $6178, VersionRange($6179, $6180)), ($6181, $6182, $6183, $6184, $6185, $6186, $6187, $6188, $6189, $6190, $6191, $6192, $6193, $6194, $6195, $6196, $6197, $6198, $6199, $6200, $6201, $6202, $6203, $6204, $6205, $6206, $6207, $6208, VersionRange($6209, $6210)), ($6211, $6212, $6213, $6214, $6215, $6216, $6217, $6218, $6219, $6220, $6221, $6222, $6223, $6224, $6225, $6226, $6227, $6228, $6229, $6230, $6231, $6232, $6233, $6234, $6235, $6236, $6237, $6238, VersionRange($6239, $6240)), ($6241, $6242, $6243, $6244, $6245, $6246, $6247, $6248, $6249, $6250, $6251, $6252, $6253, $6254, $6255, $6256, $6257, $6258, $6259, $6260, $6261, $6262, $6263, $6264, $6265, $6266, $6267, $6268, VersionRange($6269, $6270)), ($6271, $6272, $6273, $6274, $6275, $6276, $6277, $6278, $6279, $6280, $6281, $6282, $6283, $6284, $6285, $6286, $6287, $6288, $6289, $6290, $6291, $6292, $6293, $6294, $6295, $6296, $6297, $6298, VersionRange($6299, $6300)), ($6301, $6302, $6303, $6304, $6305, $6306, $6307, $6308, $6309, $6310, $6311, $6312, $6313, $6314, $6315, $6316, $6317, $6318, $6319, $6320, $6321, $6322, $6323, $6324, $6325, $6326, $6327, $6328, VersionRange($6329, $6330)), ($6331, $6332, $6333, $6334, $6335, $6336, $6337, $6338, $6339, $6340, $6341, $6342, $6343, $6344, $6345, $6346, $6347, $6348, $6349, $6350, $6351, $6352, $6353, $6354, $6355, $6356, $6357, $6358, VersionRange($6359, $6360)), ($6361, $6362, $6363, $6364, $6365, $6366, $6367, $6368, $6369, $6370, $6371, $6372, $6373, $6374, $6375, $6376, $6377, $6378, $6379, $6380, $6381, $6382, $6383, $6384, $6385, $6386, $6387, $6388, VersionRange($6389, $6390)), ($6391, $6392, $6393, $6394, $6395, $6396, $6397, $6398, $6399, $6400, $6401, $6402, $6403, $6404, $6405, $6406, $6407, $6408, $6409, $6410, $6411, $6412, $6413, $6414, $6415, $6416, $6417, $6418, VersionRange($6419, $6420)), ($6421, $6422, $6423, $6424, $6425, $6426, $6427, $6428, $6429, $6430, $6431, $6432, $6433, $6434, $6435, $6436, $6437, $6438, $6439, $6440, $6441, $6442, $6443, $6444, $6445, $6446, $6447, $6448, VersionRange($6449, $6450)), ($6451, $6452, $6453, $6454, $6455, $6456, $6457, $6458, $6459, $6460, $6461, $6462, $6463, $6464, $6465, $6466, $6467, $6468, $6469, $6470, $6471, $6472, $6473, $6474, $6475, $6476, $6477, $6478, VersionRange($6479, $6480)), ($6481, $6482, $6483, $6484, $6485, $6486, $6487, $6488, $6489, $6490, $6491, $6492, $6493, $6494, $6495, $6496, $6497, $6498, $6499, $6500, $6501, $6502, $6503, $6504, $6505, $6506, $6507, $6508, VersionRange($6509, $6510)), ($6511, $6512, $6513, $6514, $6515, $6516, $6517, $6518, $6519, $6520, $6521, $6522, $6523, $6524, $6525, $6526, $6527, $6528, $6529, $6530, $6531, $6532, $6533, $6534, $6535, $6536, $6537, $6538, VersionRange($6539, $6540)), ($6541, $6542, $6543, $6544, $6545, $6546, $6547, $6548, $6549, $6550, $6551, $6552, $6553, $6554, $6555, $6556, $6557, $6558, $6559, $6560, $6561, $6562, $6563, $6564, $6565, $6566, $6567, $6568, VersionRange($6569, $6570)), ($6571, $6572, $6573, $6574, $6575, $6576, $6577, $6578, $6579, $6580, $6581, $6582, $6583, $6584, $6585, $6586, $6587, $6588, $6589, $6590, $6591, $6592, $6593, $6594, $6595, $6596, $6597, $6598, VersionRange($6599, $6600)), ($6601, $6602, $6603, $6604, $6605, $6606, $6607, $6608, $6609, $6610, $6611, $6612, $6613, $6614, $6615, $6616, $6617, $6618, $6619, $6620, $6621, $6622, $6623, $6624, $6625, $6626, $6627, $6628, VersionRange($6629, $6630)), ($6631, $6632, $6633, $6634, $6635, $6636, $6637, $6638, $6639, $6640, $6641, $6642, $6643, $6644, $6645, $6646, $6647, $6648, $6649, $6650, $6651, $6652, $6653, $6654, $6655, $6656, $6657, $6658, VersionRange($6659, $6660)), ($6661, $6662, $6663, $6664, $6665, $6666, $6667, $6668, $6669, $6670, $6671, $6672, $6673, $6674, $6675, $6676, $6677, $6678, $6679, $6680, $6681, $6682, $6683, $6684, $6685, $6686, $6687, $6688, VersionRange($6689, $6690)), ($6691, $6692, $6693, $6694, $6695, $6696, $6697, $6698, $6699, $6700, $6701, $6702, $6703, $6704, $6705, $6706, $6707, $6708, $6709, $6710, $6711, $6712, $6713, $6714, $6715, $6716, $6717, $6718, VersionRange($6719, $6720)), ($6721, $6722, $6723, $6724, $6725, $6726, $6727, $6728, $6729, $6730, $6731, $6732, $6733, $6734, $6735, $6736, $6737, $6738, $6739, $6740, $6741, $6742, $6743, $6744, $6745, $6746, $6747, $6748, VersionRange($6749, $6750)), ($6751, $6752, $6753, $6754, $6755, $6756, $6757, $6758, $6759, $6760, $6761, $6762, $6763, $6764, $6765, $6766, $6767, $6768, $6769, $6770, $6771, $6772, $6773, $6774, $6775, $6776, $6777, $6778, VersionRange($6779, $6780)), ($6781, $6782, $6783, $6784, $6785, $6786, $6787, $6788, $6789, $6790, $6791, $6792, $6793, $6794, $6795, $6796, $6797, $6798, $6799, $6800, $6801, $6802, $6803, $6804, $6805, $6806, $6807, $6808, VersionRange($6809, $6810)), ($6811, $6812, $6813, $6814, $6815, $6816, $6817, $6818, $6819, $6820, $6821, $6822, $6823, $6824, $6825, $6826, $6827, $6828, $6829, $6830, $6831, $6832, $6833, $6834, $6835, $6836, $6837, $6838, VersionRange($6839, $6840)), ($6841, $6842, $6843, $6844, $6845, $6846, $6847, $6848, $6849, $6850, $6851, $6852, $6853, $6854, $6855, $6856, $6857, $6858, $6859, $6860, $6861, $6862, $6863, $6864, $6865, $6866, $6867, $6868, VersionRange($6869, $6870)), ($6871, $6872, $6873, $6874, $6875, $6876, $6877, $6878, $6879, $6880, $6881, $6882, $6883, $6884, $6885, $6886, $6887, $6888, $6889, $6890, $6891, $6892, $6893, $6894, $6895, $6896, $6897, $6898, VersionRange($6899, $6900)), ($6901, $6902, $6903, $6904, $6905, $6906, $6907, $6908, $6909, $6910, $6911, $6912, $6913, $6914, $6915, $6916, $6917, $6918, $6919, $6920, $6921, $6922, $6923, $6924, $6925, $6926, $6927, $6928, VersionRange($6929, $6930)), ($6931, $6932, $6933, $6934, $6935, $6936, $6937, $6938, $6939, $6940, $6941, $6942, $6943, $6944, $6945, $6946, $6947, $6948, $6949, $6950, $6951, $6952, $6953, $6954, $6955, $6956, $6957, $6958, VersionRange($6959, $6960)), ($6961, $6962, $6963, $6964, $6965, $6966, $6967, $6968, $6969, $6970, $6971, $6972, $6973, $6974, $6975, $6976, $6977, $6978, $6979, $6980, $6981, $6982, $6983, $6984, $6985, $6986, $6987, $6988, VersionRange($6989, $6990)), ($6991, $6992, $6993, $6994, $6995, $6996, $6997, $6998, $6999, $7000, $7001, $7002, $7003, $7004, $7005, $7006, $7007, $7008, $7009, $7010, $7011, $7012, $7013, $7014, $7015, $7016, $7017, $7018, VersionRange($7019, $7020)), ($7021, $7022, $7023, $7024, $7025, $7026, $7027, $7028, $7029, $7030, $7031, $7032, $7033, $7034, $7035, $7036, $7037, $7038, $7039, $7040, $7041, $7042, $7043, $7044, $7045, $7046, $7047, $7048, VersionRange($7049, $7050)), ($7051, $7052, $7053, $7054, $7055, $7056, $7057, $7058, $7059, $7060, $7061, $7062, $7063, $7064, $7065, $7066, $7067, $7068, $7069, $7070, $7071, $7072, $7073, $7074, $7075, $7076, $7077, $7078, VersionRange($7079, $7080)), ($7081, $7082, $7083, $7084, $7085, $7086, $7087, $7088, $7089, $7090, $7091, $7092, $7093, $7094, $7095, $7096, $7097, $7098, $7099, $7100, $7101, $7102, $7103, $7104, $7105, $7106, $7107, $7108, VersionRange($7109, $7110)), ($7111, $7112, $7113, $7114, $7115, $7116, $7117, $7118, $7119, $7120, $7121, $7122, $7123, $7124, $7125, $7126, $7127, $7128, $7129, $7130, $7131, $7132, $7133, $7134, $7135, $7136, $7137, $7138, VersionRange($7139, $7140)), ($7141, $7142, $7143, $7144, $7145, $7146, $7147, $7148, $7149, $7150, $7151, $7152, $7153, $7154, $7155, $7156, $7157, $7158, $7159, $7160, $7161, $7162, $7163, $7164, $7165, $7166, $7167, $7168, VersionRange($7169, $7170)), ($7171, $7172, $7173, $7174, $7175, $7176, $7177, $7178, $7179, $7180, $7181, $7182, $7183, $7184, $7185, $7186, $7187, $7188, $7189, $7190, $7191, $7192, $7193, $7194, $7195, $7196, $7197, $7198, VersionRange($7199, $7200)), ($7201, $7202, $7203, $7204, $7205, $7206, $7207, $7208, $7209, $7210, $7211, $7212, $7213, $7214, $7215, $7216, $7217, $7218, $7219, $7220, $7221, $7222, $7223, $7224, $7225, $7226, $7227, $7228, VersionRange($7229, $7230)), ($7231, $7232, $7233, $7234, $7235, $7236, $7237, $7238, $7239, $7240, $7241, $7242, $7243, $7244, $7245, $7246, $7247, $7248, $7249, $7250, $7251, $7252, $7253, $7254, $7255, $7256, $7257, $7258, VersionRange($7259, $7260)), ($7261, $7262, $7263, $7264, $7265, $7266, $7267, $7268, $7269, $7270, $7271, $7272, $7273, $7274, $7275, $7276, $7277, $7278, $7279, $7280, $7281, $7282, $7283, $7284, $7285, $7286, $7287, $7288, VersionRange($7289, $7290)), ($7291, $7292, $7293, $7294, $7295, $7296, $7297, $7298, $7299, $7300, $7301, $7302, $7303, $7304, $7305, $7306, $7307, $7308, $7309, $7310, $7311, $7312, $7313, $7314, $7315, $7316, $7317, $7318, VersionRange($7319, $7320)), ($7321, $7322, $7323, $7324, $7325, $7326, $7327, $7328, $7329, $7330, $7331, $7332, $7333, $7334, $7335, $7336, $7337, $7338, $7339, $7340, $7341, $7342, $7343, $7344, $7345, $7346, $7347, $7348, VersionRange($7349, $7350)), ($7351, $7352, $7353, $7354, $7355, $7356, $7357, $7358, $7359, $7360, $7361, $7362, $7363, $7364, $7365, $7366, $7367, $7368, $7369, $7370, $7371, $7372, $7373, $7374, $7375, $7376, $7377, $7378, VersionRange($7379, $7380)), ($7381, $7382, $7383, $7384, $7385, $7386, $7387, $7388, $7389, $7390, $7391, $7392, $7393, $7394, $7395, $7396, $7397, $7398, $7399, $7400, $7401, $7402, $7403, $7404, $7405, $7406, $7407, $7408, VersionRange($7409, $7410)), ($7411, $7412, $7413, $7414, $7415, $7416, $7417, $7418, $7419, $7420, $7421, $7422, $7423, $7424, $7425, $7426, $7427, $7428, $7429, $7430, $7431, $7432, $7433, $7434, $7435, $7436, $7437, $7438, VersionRange($7439, $7440)), ($7441, $7442, $7443, $7444, $7445, $7446, $7447, $7448, $7449, $7450, $7451, $7452, $7453, $7454, $7455, $7456, $7457, $7458, $7459, $7460, $7461, $7462, $7463, $7464, $7465, $7466, $7467, $7468, VersionRange($7469, $7470)), ($7471, $7472, $7473, $7474, $7475, $7476, $7477, $7478, $7479, $7480, $7481, $7482, $7483, $7484, $7485, $7486, $7487, $7488, $7489, $7490, $7491, $7492, $7493, $7494, $7495, $7496, $7497, $7498, VersionRange($7499, $7500)), ($7501, $7502, $7503, $7504, $7505, $7506, $7507, $7508, $7509, $7510, $7511, $7512, $7513, $7514, $7515, $7516, $7517, $7518, $7519, $7520, $7521, $7522, $7523, $7524, $7525, $7526, $7527, $7528, VersionRange($7529, $7530)), ($7531, $7532, $7533, $7534, $7535, $7536, $7537, $7538, $7539, $7540, $7541, $7542, $7543, $7544, $7545, $7546, $7547, $7548, $7549, $7550, $7551, $7552, $7553, $7554, $7555, $7556, $7557, $7558, VersionRange($7559, $7560)), ($7561, $7562, $7563, $7564, $7565, $7566, $7567, $7568, $7569, $7570, $7571, $7572, $7573, $7574, $7575, $7576, $7577, $7578, $7579, $7580, $7581, $7582, $7583, $7584, $7585, $7586, $7587, $7588, VersionRange($7589, $7590)), ($7591, $7592, $7593, $7594, $7595, $7596, $7597, $7598, $7599, $7600, $7601, $7602, $7603, $7604, $7605, $7606, $7607, $7608, $7609, $7610, $7611, $7612, $7613, $7614, $7615, $7616, $7617, $7618, VersionRange($7619, $7620)), ($7621, $7622, $7623, $7624, $7625, $7626, $7627, $7628, $7629, $7630, $7631, $7632, $7633, $7634, $7635, $7636, $7637, $7638, $7639, $7640, $7641, $7642, $7643, $7644, $7645, $7646, $7647, $7648, VersionRange($7649, $7650)), ($7651, $7652, $7653, $7654, $7655, $7656, $7657, $7658, $7659, $7660, $7661, $7662, $7663, $7664, $7665, $7666, $7667, $7668, $7669, $7670, $7671, $7672, $7673, $7674, $7675, $7676, $7677, $7678, VersionRange($7679, $7680)), ($7681, $7682, $7683, $7684, $7685, $7686, $7687, $7688, $7689, $7690, $7691, $7692, $7693, $7694, $7695, $7696, $7697, $7698, $7699, $7700, $7701, $7702, $7703, $7704, $7705, $7706, $7707, $7708, VersionRange($7709, $7710)), ($7711, $7712, $7713, $7714, $7715, $7716, $7717, $7718, $7719, $7720, $7721, $7722, $7723, $7724, $7725, $7726, $7727, $7728, $7729, $7730, $7731, $7732, $7733, $7734, $7735, $7736, $7737, $7738, VersionRange($7739, $7740)), ($7741, $7742, $7743, $7744, $7745, $7746, $7747, $7748, $7749, $7750, $7751, $7752, $7753, $7754, $7755, $7756, $7757, $7758, $7759, $7760, $7761, $7762, $7763, $7764, $7765, $7766, $7767, $7768, VersionRange($7769, $7770)), ($7771, $7772, $7773, $7774, $7775, $7776, $7777, $7778, $7779, $7780, $7781, $7782, $7783, $7784, $7785, $7786, $7787, $7788, $7789, $7790, $7791, $7792, $7793, $7794, $7795, $7796, $7797, $7798, VersionRange($7799, $7800)), ($7801, $7802, $7803, $7804, $7805, $7806, $7807, $7808, $7809, $7810, $7811, $7812, $7813, $7814, $7815, $7816, $7817, $7818, $7819, $7820, $7821, $7822, $7823, $7824, $7825, $7826, $7827, $7828, VersionRange($7829, $7830)), ($7831, $7832, $7833, $7834, $7835, $7836, $7837, $7838, $7839, $7840, $7841, $7842, $7843, $7844, $7845, $7846, $7847, $7848, $7849, $7850, $7851, $7852, $7853, $7854, $7855, $7856, $7857, $7858, VersionRange($7859, $7860)), ($7861, $7862, $7863, $7864, $7865, $7866, $7867, $7868, $7869, $7870, $7871, $7872, $7873, $7874, $7875, $7876, $7877, $7878, $7879, $7880, $7881, $7882, $7883, $7884, $7885, $7886, $7887, $7888, VersionRange($7889, $7890)), ($7891, $7892, $7893, $7894, $7895, $7896, $7897, $7898, $7899, $7900, $7901, $7902, $7903, $7904, $7905, $7906, $7907, $7908, $7909, $7910, $7911, $7912, $7913, $7914, $7915, $7916, $7917, $7918, VersionRange($7919, $7920)), ($7921, $7922, $7923, $7924, $7925, $7926, $7927, $7928, $7929, $7930, $7931, $7932, $7933, $7934, $7935, $7936, $7937, $7938, $7939, $7940, $7941, $7942, $7943, $7944, $7945, $7946, $7947, $7948, VersionRange($7949, $7950)), ($7951, $7952, $7953, $7954, $7955, $7956, $7957, $7958, $7959, $7960, $7961, $7962, $7963, $7964, $7965, $7966, $7967, $7968, $7969, $7970, $7971, $7972, $7973, $7974, $7975, $7976, $7977, $7978, VersionRange($7979, $7980)), ($7981, $7982, $7983, $7984, $7985, $7986, $7987, $7988, $7989, $7990, $7991, $7992, $7993, $7994, $7995, $7996, $7997, $7998, $7999, $8000, $8001, $8002, $8003, $8004, $8005, $8006, $8007, $8008, VersionRange($8009, $8010)), ($8011, $8012, $8013, $8014, $8015, $8016, $8017, $8018, $8019, $8020, $8021, $8022, $8023, $8024, $8025, $8026, $8027, $8028, $8029, $8030, $8031, $8032, $8033, $8034, $8035, $8036, $8037, $8038, VersionRange($8039, $8040)), ($8041, $8042, $8043, $8044, $8045, $8046, $8047, $8048, $8049, $8050, $8051, $8052, $8053, $8054, $8055, $8056, $8057, $8058, $8059, $8060, $8061, $8062, $8063, $8064, $8065, $8066, $8067, $8068, VersionRange($8069, $8070)), ($8071, $8072, $8073, $8074, $8075, $8076, $8077, $8078, $8079, $8080, $8081, $8082, $8083, $8084, $8085, $8086, $8087, $8088, $8089, $8090, $8091, $8092, $8093, $8094, $8095, $8096, $8097, $8098, VersionRange($8099, $8100)), ($8101, $8102, $8103, $8104, $8105, $8106, $8107, $8108, $8109, $8110, $8111, $8112, $8113, $8114, $8115, $8116, $8117, $8118, $8119, $8120, $8121, $8122, $8123, $8124, $8125, $8126, $8127, $8128, VersionRange($8129, $8130)), ($8131, $8132, $8133, $8134, $8135, $8136, $8137, $8138, $8139, $8140, $8141, $8142, $8143, $8144, $8145, $8146, $8147, $8148, $8149, $8150, $8151, $8152, $8153, $8154, $8155, $8156, $8157, $8158, VersionRange($8159, $8160)), ($8161, $8162, $8163, $8164, $8165, $8166, $8167, $8168, $8169, $8170, $8171, $8172, $8173, $8174, $8175, $8176, $8177, $8178, $8179, $8180, $8181, $8182, $8183, $8184, $8185, $8186, $8187, $8188, VersionRange($8189, $8190)), ($8191, $8192, $8193, $8194, $8195, $8196, $8197, $8198, $8199, $8200, $8201, $8202, $8203, $8204, $8205, $8206, $8207, $8208, $8209, $8210, $8211, $8212, $8213, $8214, $8215, $8216, $8217, $8218, VersionRange($8219, $8220)), ($8221, $8222, $8223, $8224, $8225, $8226, $8227, $8228, $8229, $8230, $8231, $8232, $8233, $8234, $8235, $8236, $8237, $8238, $8239, $8240, $8241, $8242, $8243, $8244, $8245, $8246, $8247, $8248, VersionRange($8249, $8250)), ($8251, $8252, $8253, $8254, $8255, $8256, $8257, $8258, $8259, $8260, $8261, $8262, $8263, $8264, $8265, $8266, $8267, $8268, $8269, $8270, $8271, $8272, $8273, $8274, $8275, $8276, $8277, $8278, VersionRange($8279, $8280)), ($8281, $8282, $8283, $8284, $8285, $8286, $8287, $8288, $8289, $8290, $8291, $8292, $8293, $8294, $8295, $8296, $8297, $8298, $8299, $8300, $8301, $8302, $8303, $8304, $8305, $8306, $8307, $8308, VersionRange($8309, $8310)), ($8311, $8312, $8313, $8314, $8315, $8316, $8317, $8318, $8319, $8320, $8321, $8322, $8323, $8324, $8325, $8326, $8327, $8328, $8329, $8330, $8331, $8332, $8333, $8334, $8335, $8336, $8337, $8338, VersionRange($8339, $8340)), ($8341, $8342, $8343, $8344, $8345, $8346, $8347, $8348, $8349, $8350, $8351, $8352, $8353, $8354, $8355, $8356, $8357, $8358, $8359, $8360, $8361, $8362, $8363, $8364, $8365, $8366, $8367, $8368, VersionRange($8369, $8370)), ($8371, $8372, $8373, $8374, $8375, $8376, $8377, $8378, $8379, $8380, $8381, $8382, $8383, $8384, $8385, $8386, $8387, $8388, $8389, $8390, $8391, $8392, $8393, $8394, $8395, $8396, $8397, $8398, VersionRange($8399, $8400)), ($8401, $8402, $8403, $8404, $8405, $8406, $8407, $8408, $8409, $8410, $8411, $8412, $8413, $8414, $8415, $8416, $8417, $8418, $8419, $8420, $8421, $8422, $8423, $8424, $8425, $8426, $8427, $8428, VersionRange($8429, $8430)), ($8431, $8432, $8433, $8434, $8435, $8436, $8437, $8438, $8439, $8440, $8441, $8442, $8443, $8444, $8445, $8446, $8447, $8448, $8449, $8450, $8451, $8452, $8453, $8454, $8455, $8456, $8457, $8458, VersionRange($8459, $8460)), ($8461, $8462, $8463, $8464, $8465, $8466, $8467, $8468, $8469, $8470, $8471, $8472, $8473, $8474, $8475, $8476, $8477, $8478, $8479, $8480, $8481, $8482, $8483, $8484, $8485, $8486, $8487, $8488, VersionRange($8489, $8490)), ($8491, $8492, $8493, $8494, $8495, $8496, $8497, $8498, $8499, $8500, $8501, $8502, $8503, $8504, $8505, $8506, $8507, $8508, $8509, $8510, $8511, $8512, $8513, $8514, $8515, $8516, $8517, $8518, VersionRange($8519, $8520)), ($8521, $8522, $8523, $8524, $8525, $8526, $8527, $8528, $8529, $8530, $8531, $8532, $8533, $8534, $8535, $8536, $8537, $8538, $8539, $8540, $8541, $8542, $8543, $8544, $8545, $8546, $8547, $8548, VersionRange($8549, $8550)), ($8551, $8552, $8553, $8554, $8555, $8556, $8557, $8558, $8559, $8560, $8561, $8562, $8563, $8564, $8565, $8566, $8567, $8568, $8569, $8570, $8571, $8572, $8573, $8574, $8575, $8576, $8577, $8578, VersionRange($8579, $8580)), ($8581, $8582, $8583, $8584, $8585, $8586, $8587, $8588, $8589, $8590, $8591, $8592, $8593, $8594, $8595, $8596, $8597, $8598, $8599, $8600, $8601, $8602, $8603, $8604, $8605, $8606, $8607, $8608, VersionRange($8609, $8610)), ($8611, $8612, $8613, $8614, $8615, $8616, $8617, $8618, $8619, $8620, $8621, $8622, $8623, $8624, $8625, $8626, $8627, $8628, $8629, $8630, $8631, $8632, $8633, $8634, $8635, $8636, $8637, $8638, VersionRange($8639, $8640)), ($8641, $8642, $8643, $8644, $8645, $8646, $8647, $8648, $8649, $8650, $8651, $8652, $8653, $8654, $8655, $8656, $8657, $8658, $8659, $8660, $8661, $8662, $8663, $8664, $8665, $8666, $8667, $8668, VersionRange($8669, $8670)), ($8671, $8672, $8673, $8674, $8675, $8676, $8677, $8678, $8679, $8680, $8681, $8682, $8683, $8684, $8685, $8686, $8687, $8688, $8689, $8690, $8691, $8692, $8693, $8694, $8695, $8696, $8697, $8698, VersionRange($8699, $8700)), ($8701, $8702, $8703, $8704, $8705, $8706, $8707, $8708, $8709, $8710, $8711, $8712, $8713, $8714, $8715, $8716, $8717, $8718, $8719, $8720, $8721, $8722, $8723, $8724, $8725, $8726, $8727, $8728, VersionRange($8729, $8730)), ($8731, $8732, $8733, $8734, $8735, $8736, $8737, $8738, $8739, $8740, $8741, $8742, $8743, $8744, $8745, $8746, $8747, $8748, $8749, $8750, $8751, $8752, $8753, $8754, $8755, $8756, $8757, $8758, VersionRange($8759, $8760)), ($8761, $8762, $8763, $8764, $8765, $8766, $8767, $8768, $8769, $8770, $8771, $8772, $8773, $8774, $8775, $8776, $8777, $8778, $8779, $8780, $8781, $8782, $8783, $8784, $8785, $8786, $8787, $8788, VersionRange($8789, $8790)), ($8791, $8792, $8793, $8794, $8795, $8796, $8797, $8798, $8799, $8800, $8801, $8802, $8803, $8804, $8805, $8806, $8807, $8808, $8809, $8810, $8811, $8812, $8813, $8814, $8815, $8816, $8817, $8818, VersionRange($8819, $8820)), ($8821, $8822, $8823, $8824, $8825, $8826, $8827, $8828, $8829, $8830, $8831, $8832, $8833, $8834, $8835, $8836, $8837, $8838, $8839, $8840, $8841, $8842, $8843, $8844, $8845, $8846, $8847, $8848, VersionRange($8849, $8850)), ($8851, $8852, $8853, $8854, $8855, $8856, $8857, $8858, $8859, $8860, $8861, $8862, $8863, $8864, $8865, $8866, $8867, $8868, $8869, $8870, $8871, $8872, $8873, $8874, $8875, $8876, $8877, $8878, VersionRange($8879, $8880)), ($8881, $8882, $8883, $8884, $8885, $8886, $8887, $8888, $8889, $8890, $8891, $8892, $8893, $8894, $8895, $8896, $8897, $8898, $8899, $8900, $8901, $8902, $8903, $8904, $8905, $8906, $8907, $8908, VersionRange($8909, $8910)), ($8911, $8912, $8913, $8914, $8915, $8916, $8917, $8918, $8919, $8920, $8921, $8922, $8923, $8924, $8925, $8926, $8927, $8928, $8929, $8930, $8931, $8932, $8933, $8934, $8935, $8936, $8937, $8938, VersionRange($8939, $8940)), ($8941, $8942, $8943, $8944, $8945, $8946, $8947, $8948, $8949, $8950, $8951, $8952, $8953, $8954, $8955, $8956, $8957, $8958, $8959, $8960, $8961, $8962, $8963, $8964, $8965, $8966, $8967, $8968, VersionRange($8969, $8970)), ($8971, $8972, $8973, $8974, $8975, $8976, $8977, $8978, $8979, $8980, $8981, $8982, $8983, $8984, $8985, $8986, $8987, $8988, $8989, $8990, $8991, $8992, $8993, $8994, $8995, $8996, $8997, $8998, VersionRange($8999, $9000)), ($9001, $9002, $9003, $9004, $9005, $9006, $9007, $9008, $9009, $9010, $9011, $9012, $9013, $9014, $9015, $9016, $9017, $9018, $9019, $9020, $9021, $9022, $9023, $9024, $9025, $9026, $9027, $9028, VersionRange($9029, $9030)), ($9031, $9032, $9033, $9034, $9035, $9036, $9037, $9038, $9039, $9040, $9041, $9042, $9043, $9044, $9045, $9046, $9047, $9048, $9049, $9050, $9051, $9052, $9053, $9054, $9055, $9056, $9057, $9058, VersionRange($9059, $9060)), ($9061, $9062, $9063, $9064, $9065, $9066, $9067, $9068, $9069, $9070, $9071, $9072, $9073, $9074, $9075, $9076, $9077, $9078, $9079, $9080, $9081, $9082, $9083, $9084, $9085, $9086, $9087, $9088, VersionRange($9089, $9090)), ($9091, $9092, $9093, $9094, $9095, $9096, $9097, $9098, $9099, $9100, $9101, $9102, $9103, $9104, $9105, $9106, $9107, $9108, $9109, $9110, $9111, $9112, $9113, $9114, $9115, $9116, $9117, $9118, VersionRange($9119, $9120)), ($9121, $9122, $9123, $9124, $9125, $9126, $9127, $9128, $9129, $9130, $9131, $9132, $9133, $9134, $9135, $9136, $9137, $9138, $9139, $9140, $9141, $9142, $9143, $9144, $9145, $9146, $9147, $9148, VersionRange($9149, $9150)), ($9151, $9152, $9153, $9154, $9155, $9156, $9157, $9158, $9159, $9160, $9161, $9162, $9163, $9164, $9165, $9166, $9167, $9168, $9169, $9170, $9171, $9172, $9173, $9174, $9175, $9176, $9177, $9178, VersionRange($9179, $9180)), ($9181, $9182, $9183, $9184, $9185, $9186, $9187, $9188, $9189, $9190, $9191, $9192, $9193, $9194, $9195, $9196, $9197, $9198, $9199, $9200, $9201, $9202, $9203, $9204, $9205, $9206, $9207, $9208, VersionRange($9209, $9210)), ($9211, $9212, $9213, $9214, $9215, $9216, $9217, $9218, $9219, $9220, $9221, $9222, $9223, $9224, $9225, $9226, $9227, $9228, $9229, $9230, $9231, $9232, $9233, $9234, $9235, $9236, $9237, $9238, VersionRange($9239, $9240)), ($9241, $9242, $9243, $9244, $9245, $9246, $9247, $9248, $9249, $9250, $9251, $9252, $9253, $9254, $9255, $9256, $9257, $9258, $9259, $9260, $9261, $9262, $9263, $9264, $9265, $9266, $9267, $9268, VersionRange($9269, $9270)), ($9271, $9272, $9273, $9274, $9275, $9276, $9277, $9278, $9279, $9280, $9281, $9282, $9283, $9284, $9285, $9286, $9287, $9288, $9289, $9290, $9291, $9292, $9293, $9294, $9295, $9296, $9297, $9298, VersionRange($9299, $9300)), ($9301, $9302, $9303, $9304, $9305, $9306, $9307, $9308, $9309, $9310, $9311, $9312, $9313, $9314, $9315, $9316, $9317, $9318, $9319, $9320, $9321, $9322, $9323, $9324, $9325, $9326, $9327, $9328, VersionRange($9329, $9330)), ($9331, $9332, $9333, $9334, $9335, $9336, $9337, $9338, $9339, $9340, $9341, $9342, $9343, $9344, $9345, $9346, $9347, $9348, $9349, $9350, $9351, $9352, $9353, $9354, $9355, $9356, $9357, $9358, VersionRange($9359, $9360)), ($9361, $9362, $9363, $9364, $9365, $9366, $9367, $9368, $9369, $9370, $9371, $9372, $9373, $9374, $9375, $9376, $9377, $9378, $9379, $9380, $9381, $9382, $9383, $9384, $9385, $9386, $9387, $9388, VersionRange($9389, $9390)), ($9391, $9392, $9393, $9394, $9395, $9396, $9397, $9398, $9399, $9400, $9401, $9402, $9403, $9404, $9405, $9406, $9407, $9408, $9409, $9410, $9411, $9412, $9413, $9414, $9415, $9416, $9417, $9418, VersionRange($9419, $9420)), ($9421, $9422, $9423, $9424, $9425, $9426, $9427, $9428, $9429, $9430, $9431, $9432, $9433, $9434, $9435, $9436, $9437, $9438, $9439, $9440, $9441, $9442, $9443, $9444, $9445, $9446, $9447, $9448, VersionRange($9449, $9450)), ($9451, $9452, $9453, $9454, $9455, $9456, $9457, $9458, $9459, $9460, $9461, $9462, $9463, $9464, $9465, $9466, $9467, $9468, $9469, $9470, $9471, $9472, $9473, $9474, $9475, $9476, $9477, $9478, VersionRange($9479, $9480)), ($9481, $9482, $9483, $9484, $9485, $9486, $9487, $9488, $9489, $9490, $9491, $9492, $9493, $9494, $9495, $9496, $9497, $9498, $9499, $9500, $9501, $9502, $9503, $9504, $9505, $9506, $9507, $9508, VersionRange($9509, $9510)), ($9511, $9512, $9513, $9514, $9515, $9516, $9517, $9518, $9519, $9520, $9521, $9522, $9523, $9524, $9525, $9526, $9527, $9528, $9529, $9530, $9531, $9532, $9533, $9534, $9535, $9536, $9537, $9538, VersionRange($9539, $9540)), ($9541, $9542, $9543, $9544, $9545, $9546, $9547, $9548, $9549, $9550, $9551, $9552, $9553, $9554, $9555, $9556, $9557, $9558, $9559, $9560, $9561, $9562, $9563, $9564, $9565, $9566, $9567, $9568, VersionRange($9569, $9570)), ($9571, $9572, $9573, $9574, $9575, $9576, $9577, $9578, $9579, $9580, $9581, $9582, $9583, $9584, $9585, $9586, $9587, $9588, $9589, $9590, $9591, $9592, $9593, $9594, $9595, $9596, $9597, $9598, VersionRange($9599, $9600)), ($9601, $9602, $9603, $9604, $9605, $9606, $9607, $9608, $9609, $9610, $9611, $9612, $9613, $9614, $9615, $9616, $9617, $9618, $9619, $9620, $9621, $9622, $9623, $9624, $9625, $9626, $9627, $9628, VersionRange($9629, $9630)), ($9631, $9632, $9633, $9634, $9635, $9636, $9637, $9638, $9639, $9640, $9641, $9642, $9643, $9644, $9645, $9646, $9647, $9648, $9649, $9650, $9651, $9652, $9653, $9654, $9655, $9656, $9657, $9658, VersionRange($9659, $9660)), ($9661, $9662, $9663, $9664, $9665, $9666, $9667, $9668, $9669, $9670, $9671, $9672, $9673, $9674, $9675, $9676, $9677, $9678, $9679, $9680, $9681, $9682, $9683, $9684, $9685, $9686, $9687, $9688, VersionRange($9689, $9690)), ($9691, $9692, $9693, $9694, $9695, $9696, $9697, $9698, $9699, $9700, $9701, $9702, $9703, $9704, $9705, $9706, $9707, $9708, $9709, $9710, $9711, $9712, $9713, $9714, $9715, $9716, $9717, $9718, VersionRange($9719, $9720)), ($9721, $9722, $9723, $9724, $9725, $9726, $9727, $9728, $9729, $9730, $9731, $9732, $9733, $9734, $9735, $9736, $9737, $9738, $9739, $9740, $9741, $9742, $9743, $9744, $9745, $9746, $9747, $9748, VersionRange($9749, $9750)), ($9751, $9752, $9753, $9754, $9755, $9756, $9757, $9758, $9759, $9760, $9761, $9762, $9763, $9764, $9765, $9766, $9767, $9768, $9769, $9770, $9771, $9772, $9773, $9774, $9775, $9776, $9777, $9778, VersionRange($9779, $9780)), ($9781, $9782, $9783, $9784, $9785, $9786, $9787, $9788, $9789, $9790, $9791, $9792, $9793, $9794, $9795, $9796, $9797, $9798, $9799, $9800, $9801, $9802, $9803, $9804, $9805, $9806, $9807, $9808, VersionRange($9809, $9810)), ($9811, $9812, $9813, $9814, $9815, $9816, $9817, $9818, $9819, $9820, $9821, $9822, $9823, $9824, $9825, $9826, $9827, $9828, $9829, $9830, $9831, $9832, $9833, $9834, $9835, $9836, $9837, $9838, VersionRange($9839, $9840)), ($9841, $9842, $9843, $9844, $9845, $9846, $9847, $9848, $9849, $9850, $9851, $9852, $9853, $9854, $9855, $9856, $9857, $9858, $9859, $9860, $9861, $9862, $9863, $9864, $9865, $9866, $9867, $9868, VersionRange($9869, $9870)), ($9871, $9872, $9873, $9874, $9875, $9876, $9877, $9878, $9879, $9880, $9881, $9882, $9883, $9884, $9885, $9886, $9887, $9888, $9889, $9890, $9891, $9892, $9893, $9894, $9895, $9896, $9897, $9898, VersionRange($9899, $9900)), ($9901, $9902, $9903, $9904, $9905, $9906, $9907, $9908, $9909, $9910, $9911, $9912, $9913, $9914, $9915, $9916, $9917, $9918, $9919, $9920, $9921, $9922, $9923, $9924, $9925, $9926, $9927, $9928, VersionRange($9929, $9930)), ($9931, $9932, $9933, $9934, $9935, $9936, $9937, $9938, $9939, $9940, $9941, $9942, $9943, $9944, $9945, $9946, $9947, $9948, $9949, $9950, $9951, $9952, $9953, $9954, $9955, $9956, $9957, $9958, VersionRange($9959, $9960)), ($9961, $9962, $9963, $9964, $9965, $9966, $9967, $9968, $9969, $9970, $9971, $9972, $9973, $9974, $9975, $9976, $9977, $9978, $9979, $9980, $9981, $9982, $9983, $9984, $9985, $9986, $9987, $9988, VersionRange($9989, $9990)), ($9991, $9992, $9993, $9994, $9995, $9996, $9997, $9998, $9999, $10000, $10001, $10002, $10003, $10004, $10005, $10006, $10007, $10008, $10009, $10010, $10011, $10012, $10013, $10014, $10015, $10016, $10017, $10018, VersionRange($10019, $10020)), ($10021, $10022, $10023, $10024, $10025, $10026, $10027, $10028, $10029, $10030, $10031, $10032, $10033, $10034, $10035, $10036, $10037, $10038, $10039, $10040, $10041, $10042, $10043, $10044, $10045, $10046, $10047, $10048, VersionRange($10049, $10050)), ($10051, $10052, $10053, $10054, $10055, $10056, $10057, $10058, $10059, $10060, $10061, $10062, $10063, $10064, $10065, $10066, $10067, $10068, $10069, $10070, $10071, $10072, $10073, $10074, $10075, $10076, $10077, $10078, VersionRange($10079, $10080)), ($10081, $10082, $10083, $10084, $10085, $10086, $10087, $10088, $10089, $10090, $10091, $10092, $10093, $10094, $10095, $10096, $10097, $10098, $10099, $10100, $10101, $10102, $10103, $10104, $10105, $10106, $10107, $10108, VersionRange($10109, $10110)), ($10111, $10112, $10113, $10114, $10115, $10116, $10117, $10118, $10119, $10120, $10121, $10122, $10123, $10124, $10125, $10126, $10127, $10128, $10129, $10130, $10131, $10132, $10133, $10134, $10135, $10136, $10137, $10138, VersionRange($10139, $10140)), ($10141, $10142, $10143, $10144, $10145, $10146, $10147, $10148, $10149, $10150, $10151, $10152, $10153, $10154, $10155, $10156, $10157, $10158, $10159, $10160, $10161, $10162, $10163, $10164, $10165, $10166, $10167, $10168, VersionRange($10169, $10170)), ($10171, $10172, $10173, $10174, $10175, $10176, $10177, $10178, $10179, $10180, $10181, $10182, $10183, $10184, $10185, $10186, $10187, $10188, $10189, $10190, $10191, $10192, $10193, $10194, $10195, $10196, $10197, $10198, VersionRange($10199, $10200)), ($10201, $10202, $10203, $10204, $10205, $10206, $10207, $10208, $10209, $10210, $10211, $10212, $10213, $10214, $10215, $10216, $10217, $10218, $10219, $10220, $10221, $10222, $10223, $10224, $10225, $10226, $10227, $10228, VersionRange($10229, $10230)), ($10231, $10232, $10233, $10234, $10235, $10236, $10237, $10238, $10239, $10240, $10241, $10242, $10243, $10244, $10245, $10246, $10247, $10248, $10249, $10250, $10251, $10252, $10253, $10254, $10255, $10256, $10257, $10258, VersionRange($10259, $10260)), ($10261, $10262, $10263, $10264, $10265, $10266, $10267, $10268, $10269, $10270, $10271, $10272, $10273, $10274, $10275, $10276, $10277, $10278, $10279, $10280, $10281, $10282, $10283, $10284, $10285, $10286, $10287, $10288, VersionRange($10289, $10290)), ($10291, $10292, $10293, $10294, $10295, $10296, $10297, $10298, $10299, $10300, $10301, $10302, $10303, $10304, $10305, $10306, $10307, $10308, $10309, $10310, $10311, $10312, $10313, $10314, $10315, $10316, $10317, $10318, VersionRange($10319, $10320)), ($10321, $10322, $10323, $10324, $10325, $10326, $10327, $10328, $10329, $10330, $10331, $10332, $10333, $10334, $10335, $10336, $10337, $10338, $10339, $10340, $10341, $10342, $10343, $10344, $10345, $10346, $10347, $10348, VersionRange($10349, $10350)), ($10351, $10352, $10353, $10354, $10355, $10356, $10357, $10358, $10359, $10360, $10361, $10362, $10363, $10364, $10365, $10366, $10367, $10368, $10369, $10370, $10371, $10372, $10373, $10374, $10375, $10376, $10377, $10378, VersionRange($10379, $10380)), ($10381, $10382, $10383, $10384, $10385, $10386, $10387, $10388, $10389, $10390, $10391, $10392, $10393, $10394, $10395, $10396, $10397, $10398, $10399, $10400, $10401, $10402, $10403, $10404, $10405, $10406, $10407, $10408, VersionRange($10409, $10410)), ($10411, $10412, $10413, $10414, $10415, $10416, $10417, $10418, $10419, $10420, $10421, $10422, $10423, $10424, $10425, $10426, $10427, $10428, $10429, $10430, $10431, $10432, $10433, $10434, $10435, $10436, $10437, $10438, VersionRange($10439, $10440)), ($10441, $10442, $10443, $10444, $10445, $10446, $10447, $10448, $10449, $10450, $10451, $10452, $10453, $10454, $10455, $10456, $10457, $10458, $10459, $10460, $10461, $10462, $10463, $10464, $10465, $10466, $10467, $10468, VersionRange($10469, $10470)), ($10471, $10472, $10473, $10474, $10475, $10476, $10477, $10478, $10479, $10480, $10481, $10482, $10483, $10484, $10485, $10486, $10487, $10488, $10489, $10490, $10491, $10492, $10493, $10494, $10495, $10496, $10497, $10498, VersionRange($10499, $10500)), ($10501, $10502, $10503, $10504, $10505, $10506, $10507, $10508, $10509, $10510, $10511, $10512, $10513, $10514, $10515, $10516, $10517, $10518, $10519, $10520, $10521, $10522, $10523, $10524, $10525, $10526, $10527, $10528, VersionRange($10529, $10530)), ($10531, $10532, $10533, $10534, $10535, $10536, $10537, $10538, $10539, $10540, $10541, $10542, $10543, $10544, $10545, $10546, $10547, $10548, $10549, $10550, $10551, $10552, $10553, $10554, $10555, $10556, $10557, $10558, VersionRange($10559, $10560)), ($10561, $10562, $10563, $10564, $10565, $10566, $10567, $10568, $10569, $10570, $10571, $10572, $10573, $10574, $10575, $10576, $10577, $10578, $10579, $10580, $10581, $10582, $10583, $10584, $10585, $10586, $10587, $10588, VersionRange($10589, $10590)), ($10591, $10592, $10593, $10594, $10595, $10596, $10597, $10598, $10599, $10600, $10601, $10602, $10603, $10604, $10605, $10606, $10607, $10608, $10609, $10610, $10611, $10612, $10613, $10614, $10615, $10616, $10617, $10618, VersionRange($10619, $10620)), ($10621, $10622, $10623, $10624, $10625, $10626, $10627, $10628, $10629, $10630, $10631, $10632, $10633, $10634, $10635, $10636, $10637, $10638, $10639, $10640, $10641, $10642, $10643, $10644, $10645, $10646, $10647, $10648, VersionRange($10649, $10650)), ($10651, $10652, $10653, $10654, $10655, $10656, $10657, $10658, $10659, $10660, $10661, $10662, $10663, $10664, $10665, $10666, $10667, $10668, $10669, $10670, $10671, $10672, $10673, $10674, $10675, $10676, $10677, $10678, VersionRange($10679, $10680)), ($10681, $10682, $10683, $10684, $10685, $10686, $10687, $10688, $10689, $10690, $10691, $10692, $10693, $10694, $10695, $10696, $10697, $10698, $10699, $10700, $10701, $10702, $10703, $10704, $10705, $10706, $10707, $10708, VersionRange($10709, $10710)), ($10711, $10712, $10713, $10714, $10715, $10716, $10717, $10718, $10719, $10720, $10721, $10722, $10723, $10724, $10725, $10726, $10727, $10728, $10729, $10730, $10731, $10732, $10733, $10734, $10735, $10736, $10737, $10738, VersionRange($10739, $10740)), ($10741, $10742, $10743, $10744, $10745, $10746, $10747, $10748, $10749, $10750, $10751, $10752, $10753, $10754, $10755, $10756, $10757, $10758, $10759, $10760, $10761, $10762, $10763, $10764, $10765, $10766, $10767, $10768, VersionRange($10769, $10770)), ($10771, $10772, $10773, $10774, $10775, $10776, $10777, $10778, $10779, $10780, $10781, $10782, $10783, $10784, $10785, $10786, $10787, $10788, $10789, $10790, $10791, $10792, $10793, $10794, $10795, $10796, $10797, $10798, VersionRange($10799, $10800)), ($10801, $10802, $10803, $10804, $10805, $10806, $10807, $10808, $10809, $10810, $10811, $10812, $10813, $10814, $10815, $10816, $10817, $10818, $10819, $10820, $10821, $10822, $10823, $10824, $10825, $10826, $10827, $10828, VersionRange($10829, $10830)), ($10831, $10832, $10833, $10834, $10835, $10836, $10837, $10838, $10839, $10840, $10841, $10842, $10843, $10844, $10845, $10846, $10847, $10848, $10849, $10850, $10851, $10852, $10853, $10854, $10855, $10856, $10857, $10858, VersionRange($10859, $10860)), ($10861, $10862, $10863, $10864, $10865, $10866, $10867, $10868, $10869, $10870, $10871, $10872, $10873, $10874, $10875, $10876, $10877, $10878, $10879, $10880, $10881, $10882, $10883, $10884, $10885, $10886, $10887, $10888, VersionRange($10889, $10890)), ($10891, $10892, $10893, $10894, $10895, $10896, $10897, $10898, $10899, $10900, $10901, $10902, $10903, $10904, $10905, $10906, $10907, $10908, $10909, $10910, $10911, $10912, $10913, $10914, $10915, $10916, $10917, $10918, VersionRange($10919, $10920)), ($10921, $10922, $10923, $10924, $10925, $10926, $10927, $10928, $10929, $10930, $10931, $10932, $10933, $10934, $10935, $10936, $10937, $10938, $10939, $10940, $10941, $10942, $10943, $10944, $10945, $10946, $10947, $10948, VersionRange($10949, $10950)), ($10951, $10952, $10953, $10954, $10955, $10956, $10957, $10958, $10959, $10960, $10961, $10962, $10963, $10964, $10965, $10966, $10967, $10968, $10969, $10970, $10971, $10972, $10973, $10974, $10975, $10976, $10977, $10978, VersionRange($10979, $10980)), ($10981, $10982, $10983, $10984, $10985, $10986, $10987, $10988, $10989, $10990, $10991, $10992, $10993, $10994, $10995, $10996, $10997, $10998, $10999, $11000, $11001, $11002, $11003, $11004, $11005, $11006, $11007, $11008, VersionRange($11009, $11010)), ($11011, $11012, $11013, $11014, $11015, $11016, $11017, $11018, $11019, $11020, $11021, $11022, $11023, $11024, $11025, $11026, $11027, $11028, $11029, $11030, $11031, $11032, $11033, $11034, $11035, $11036, $11037, $11038, VersionRange($11039, $11040)), ($11041, $11042, $11043, $11044, $11045, $11046, $11047, $11048, $11049, $11050, $11051, $11052, $11053, $11054, $11055, $11056, $11057, $11058, $11059, $11060, $11061, $11062, $11063, $11064, $11065, $11066, $11067, $11068, VersionRange($11069, $11070)), ($11071, $11072, $11073, $11074, $11075, $11076, $11077, $11078, $11079, $11080, $11081, $11082, $11083, $11084, $11085, $11086, $11087, $11088, $11089, $11090, $11091, $11092, $11093, $11094, $11095, $11096, $11097, $11098, VersionRange($11099, $11100)), ($11101, $11102, $11103, $11104, $11105, $11106, $11107, $11108, $11109, $11110, $11111, $11112, $11113, $11114, $11115, $11116, $11117, $11118, $11119, $11120, $11121, $11122, $11123, $11124, $11125, $11126, $11127, $11128, VersionRange($11129, $11130)), ($11131, $11132, $11133, $11134, $11135, $11136, $11137, $11138, $11139, $11140, $11141, $11142, $11143, $11144, $11145, $11146, $11147, $11148, $11149, $11150, $11151, $11152, $11153, $11154, $11155, $11156, $11157, $11158, VersionRange($11159, $11160)), ($11161, $11162, $11163, $11164, $11165, $11166, $11167, $11168, $11169, $11170, $11171, $11172, $11173, $11174, $11175, $11176, $11177, $11178, $11179, $11180, $11181, $11182, $11183, $11184, $11185, $11186, $11187, $11188, VersionRange($11189, $11190)), ($11191, $11192, $11193, $11194, $11195, $11196, $11197, $11198, $11199, $11200, $11201, $11202, $11203, $11204, $11205, $11206, $11207, $11208, $11209, $11210, $11211, $11212, $11213, $11214, $11215, $11216, $11217, $11218, VersionRange($11219, $11220)), ($11221, $11222, $11223, $11224, $11225, $11226, $11227, $11228, $11229, $11230, $11231, $11232, $11233, $11234, $11235, $11236, $11237, $11238, $11239, $11240, $11241, $11242, $11243, $11244, $11245, $11246, $11247, $11248, VersionRange($11249, $11250)), ($11251, $11252, $11253, $11254, $11255, $11256, $11257, $11258, $11259, $11260, $11261, $11262, $11263, $11264, $11265, $11266, $11267, $11268, $11269, $11270, $11271, $11272, $11273, $11274, $11275, $11276, $11277, $11278, VersionRange($11279, $11280)), ($11281, $11282, $11283, $11284, $11285, $11286, $11287, $11288, $11289, $11290, $11291, $11292, $11293, $11294, $11295, $11296, $11297, $11298, $11299, $11300, $11301, $11302, $11303, $11304, $11305, $11306, $11307, $11308, VersionRange($11309, $11310)), ($11311, $11312, $11313, $11314, $11315, $11316, $11317, $11318, $11319, $11320, $11321, $11322, $11323, $11324, $11325, $11326, $11327, $11328, $11329, $11330, $11331, $11332, $11333, $11334, $11335, $11336, $11337, $11338, VersionRange($11339, $11340)), ($11341, $11342, $11343, $11344, $11345, $11346, $11347, $11348, $11349, $11350, $11351, $11352, $11353, $11354, $11355, $11356, $11357, $11358, $11359, $11360, $11361, $11362, $11363, $11364, $11365, $11366, $11367, $11368, VersionRange($11369, $11370)), ($11371, $11372, $11373, $11374, $11375, $11376, $11377, $11378, $11379, $11380, $11381, $11382, $11383, $11384, $11385, $11386, $11387, $11388, $11389, $11390, $11391, $11392, $11393, $11394, $11395, $11396, $11397, $11398, VersionRange($11399, $11400)), ($11401, $11402, $11403, $11404, $11405, $11406, $11407, $11408, $11409, $11410, $11411, $11412, $11413, $11414, $11415, $11416, $11417, $11418, $11419, $11420, $11421, $11422, $11423, $11424, $11425, $11426, $11427, $11428, VersionRange($11429, $11430)), ($11431, $11432, $11433, $11434, $11435, $11436, $11437, $11438, $11439, $11440, $11441, $11442, $11443, $11444, $11445, $11446, $11447, $11448, $11449, $11450, $11451, $11452, $11453, $11454, $11455, $11456, $11457, $11458, VersionRange($11459, $11460)), ($11461, $11462, $11463, $11464, $11465, $11466, $11467, $11468, $11469, $11470, $11471, $11472, $11473, $11474, $11475, $11476, $11477, $11478, $11479, $11480, $11481, $11482, $11483, $11484, $11485, $11486, $11487, $11488, VersionRange($11489, $11490)), ($11491, $11492, $11493, $11494, $11495, $11496, $11497, $11498, $11499, $11500, $11501, $11502, $11503, $11504, $11505, $11506, $11507, $11508, $11509, $11510, $11511, $11512, $11513, $11514, $11515, $11516, $11517, $11518, VersionRange($11519, $11520)), ($11521, $11522, $11523, $11524, $11525, $11526, $11527, $11528, $11529, $11530, $11531, $11532, $11533, $11534, $11535, $11536, $11537, $11538, $11539, $11540, $11541, $11542, $11543, $11544, $11545, $11546, $11547, $11548, VersionRange($11549, $11550)), ($11551, $11552, $11553, $11554, $11555, $11556, $11557, $11558, $11559, $11560, $11561, $11562, $11563, $11564, $11565, $11566, $11567, $11568, $11569, $11570, $11571, $11572, $11573, $11574, $11575, $11576, $11577, $11578, VersionRange($11579, $11580)), ($11581, $11582, $11583, $11584, $11585, $11586, $11587, $11588, $11589, $11590, $11591, $11592, $11593, $11594, $11595, $11596, $11597, $11598, $11599, $11600, $11601, $11602, $11603, $11604, $11605, $11606, $11607, $11608, VersionRange($11609, $11610)), ($11611, $11612, $11613, $11614, $11615, $11616, $11617, $11618, $11619, $11620, $11621, $11622, $11623, $11624, $11625, $11626, $11627, $11628, $11629, $11630, $11631, $11632, $11633, $11634, $11635, $11636, $11637, $11638, VersionRange($11639, $11640)), ($11641, $11642, $11643, $11644, $11645, $11646, $11647, $11648, $11649, $11650, $11651, $11652, $11653, $11654, $11655, $11656, $11657, $11658, $11659, $11660, $11661, $11662, $11663, $11664, $11665, $11666, $11667, $11668, VersionRange($11669, $11670)), ($11671, $11672, $11673, $11674, $11675, $11676, $11677, $11678, $11679, $11680, $11681, $11682, $11683, $11684, $11685, $11686, $11687, $11688, $11689, $11690, $11691, $11692, $11693, $11694, $11695, $11696, $11697, $11698, VersionRange($11699, $11700)), ($11701, $11702, $11703, $11704, $11705, $11706, $11707, $11708, $11709, $11710, $11711, $11712, $11713, $11714, $11715, $11716, $11717, $11718, $11719, $11720, $11721, $11722, $11723, $11724, $11725, $11726, $11727, $11728, VersionRange($11729, $11730)), ($11731, $11732, $11733, $11734, $11735, $11736, $11737, $11738, $11739, $11740, $11741, $11742, $11743, $11744, $11745, $11746, $11747, $11748, $11749, $11750, $11751, $11752, $11753, $11754, $11755, $11756, $11757, $11758, VersionRange($11759, $11760)), ($11761, $11762, $11763, $11764, $11765, $11766, $11767, $11768, $11769, $11770, $11771, $11772, $11773, $11774, $11775, $11776, $11777, $11778, $11779, $11780, $11781, $11782, $11783, $11784, $11785, $11786, $11787, $11788, VersionRange($11789, $11790)), ($11791, $11792, $11793, $11794, $11795, $11796, $11797, $11798, $11799, $11800, $11801, $11802, $11803, $11804, $11805, $11806, $11807, $11808, $11809, $11810, $11811, $11812, $11813, $11814, $11815, $11816, $11817, $11818, VersionRange($11819, $11820)), ($11821, $11822, $11823, $11824, $11825, $11826, $11827, $11828, $11829, $11830, $11831, $11832, $11833, $11834, $11835, $11836, $11837, $11838, $11839, $11840, $11841, $11842, $11843, $11844, $11845, $11846, $11847, $11848, VersionRange($11849, $11850)), ($11851, $11852, $11853, $11854, $11855, $11856, $11857, $11858, $11859, $11860, $11861, $11862, $11863, $11864, $11865, $11866, $11867, $11868, $11869, $11870, $11871, $11872, $11873, $11874, $11875, $11876, $11877, $11878, VersionRange($11879, $11880)), ($11881, $11882, $11883, $11884, $11885, $11886, $11887, $11888, $11889, $11890, $11891, $11892, $11893, $11894, $11895, $11896, $11897, $11898, $11899, $11900, $11901, $11902, $11903, $11904, $11905, $11906, $11907, $11908, VersionRange($11909, $11910)), ($11911, $11912, $11913, $11914, $11915, $11916, $11917, $11918, $11919, $11920, $11921, $11922, $11923, $11924, $11925, $11926, $11927, $11928, $11929, $11930, $11931, $11932, $11933, $11934, $11935, $11936, $11937, $11938, VersionRange($11939, $11940)), ($11941, $11942, $11943, $11944, $11945, $11946, $11947, $11948, $11949, $11950, $11951, $11952, $11953, $11954, $11955, $11956, $11957, $11958, $11959, $11960, $11961, $11962, $11963, $11964, $11965, $11966, $11967, $11968, VersionRange($11969, $11970)), ($11971, $11972, $11973, $11974, $11975, $11976, $11977, $11978, $11979, $11980, $11981, $11982, $11983, $11984, $11985, $11986, $11987, $11988, $11989, $11990, $11991, $11992, $11993, $11994, $11995, $11996, $11997, $11998, VersionRange($11999, $12000)), ($12001, $12002, $12003, $12004, $12005, $12006, $12007, $12008, $12009, $12010, $12011, $12012, $12013, $12014, $12015, $12016, $12017, $12018, $12019, $12020, $12021, $12022, $12023, $12024, $12025, $12026, $12027, $12028, VersionRange($12029, $12030)), ($12031, $12032, $12033, $12034, $12035, $12036, $12037, $12038, $12039, $12040, $12041, $12042, $12043, $12044, $12045, $12046, $12047, $12048, $12049, $12050, $12051, $12052, $12053, $12054, $12055, $12056, $12057, $12058, VersionRange($12059, $12060)), ($12061, $12062, $12063, $12064, $12065, $12066, $12067, $12068, $12069, $12070, $12071, $12072, $12073, $12074, $12075, $12076, $12077, $12078, $12079, $12080, $12081, $12082, $12083, $12084, $12085, $12086, $12087, $12088, VersionRange($12089, $12090)), ($12091, $12092, $12093, $12094, $12095, $12096, $12097, $12098, $12099, $12100, $12101, $12102, $12103, $12104, $12105, $12106, $12107, $12108, $12109, $12110, $12111, $12112, $12113, $12114, $12115, $12116, $12117, $12118, VersionRange($12119, $12120)), ($12121, $12122, $12123, $12124, $12125, $12126, $12127, $12128, $12129, $12130, $12131, $12132, $12133, $12134, $12135, $12136, $12137, $12138, $12139, $12140, $12141, $12142, $12143, $12144, $12145, $12146, $12147, $12148, VersionRange($12149, $12150)), ($12151, $12152, $12153, $12154, $12155, $12156, $12157, $12158, $12159, $12160, $12161, $12162, $12163, $12164, $12165, $12166, $12167, $12168, $12169, $12170, $12171, $12172, $12173, $12174, $12175, $12176, $12177, $12178, VersionRange($12179, $12180)), ($12181, $12182, $12183, $12184, $12185, $12186, $12187, $12188, $12189, $12190, $12191, $12192, $12193, $12194, $12195, $12196, $12197, $12198, $12199, $12200, $12201, $12202, $12203, $12204, $12205, $12206, $12207, $12208, VersionRange($12209, $12210)), ($12211, $12212, $12213, $12214, $12215, $12216, $12217, $12218, $12219, $12220, $12221, $12222, $12223, $12224, $12225, $12226, $12227, $12228, $12229, $12230, $12231, $12232, $12233, $12234, $12235, $12236, $12237, $12238, VersionRange($12239, $12240)), ($12241, $12242, $12243, $12244, $12245, $12246, $12247, $12248, $12249, $12250, $12251, $12252, $12253, $12254, $12255, $12256, $12257, $12258, $12259, $12260, $12261, $12262, $12263, $12264, $12265, $12266, $12267, $12268, VersionRange($12269, $12270)), ($12271, $12272, $12273, $12274, $12275, $12276, $12277, $12278, $12279, $12280, $12281, $12282, $12283, $12284, $12285, $12286, $12287, $12288, $12289, $12290, $12291, $12292, $12293, $12294, $12295, $12296, $12297, $12298, VersionRange($12299, $12300)), ($12301, $12302, $12303, $12304, $12305, $12306, $12307, $12308, $12309, $12310, $12311, $12312, $12313, $12314, $12315, $12316, $12317, $12318, $12319, $12320, $12321, $12322, $12323, $12324, $12325, $12326, $12327, $12328, VersionRange($12329, $12330)), ($12331, $12332, $12333, $12334, $12335, $12336, $12337, $12338, $12339, $12340, $12341, $12342, $12343, $12344, $12345, $12346, $12347, $12348, $12349, $12350, $12351, $12352, $12353, $12354, $12355, $12356, $12357, $12358, VersionRange($12359, $12360)), ($12361, $12362, $12363, $12364, $12365, $12366, $12367, $12368, $12369, $12370, $12371, $12372, $12373, $12374, $12375, $12376, $12377, $12378, $12379, $12380, $12381, $12382, $12383, $12384, $12385, $12386, $12387, $12388, VersionRange($12389, $12390)), ($12391, $12392, $12393, $12394, $12395, $12396, $12397, $12398, $12399, $12400, $12401, $12402, $12403, $12404, $12405, $12406, $12407, $12408, $12409, $12410, $12411, $12412, $12413, $12414, $12415, $12416, $12417, $12418, VersionRange($12419, $12420)), ($12421, $12422, $12423, $12424, $12425, $12426, $12427, $12428, $12429, $12430, $12431, $12432, $12433, $12434, $12435, $12436, $12437, $12438, $12439, $12440, $12441, $12442, $12443, $12444, $12445, $12446, $12447, $12448, VersionRange($12449, $12450)), ($12451, $12452, $12453, $12454, $12455, $12456, $12457, $12458, $12459, $12460, $12461, $12462, $12463, $12464, $12465, $12466, $12467, $12468, $12469, $12470, $12471, $12472, $12473, $12474, $12475, $12476, $12477, $12478, VersionRange($12479, $12480)), ($12481, $12482, $12483, $12484, $12485, $12486, $12487, $12488, $12489, $12490, $12491, $12492, $12493, $12494, $12495, $12496, $12497, $12498, $12499, $12500, $12501, $12502, $12503, $12504, $12505, $12506, $12507, $12508, VersionRange($12509, $12510)), ($12511, $12512, $12513, $12514, $12515, $12516, $12517, $12518, $12519, $12520, $12521, $12522, $12523, $12524, $12525, $12526, $12527, $12528, $12529, $12530, $12531, $12532, $12533, $12534, $12535, $12536, $12537, $12538, VersionRange($12539, $12540)), ($12541, $12542, $12543, $12544, $12545, $12546, $12547, $12548, $12549, $12550, $12551, $12552, $12553, $12554, $12555, $12556, $12557, $12558, $12559, $12560, $12561, $12562, $12563, $12564, $12565, $12566, $12567, $12568, VersionRange($12569, $12570)), ($12571, $12572, $12573, $12574, $12575, $12576, $12577, $12578, $12579, $12580, $12581, $12582, $12583, $12584, $12585, $12586, $12587, $12588, $12589, $12590, $12591, $12592, $12593, $12594, $12595, $12596, $12597, $12598, VersionRange($12599, $12600)), ($12601, $12602, $12603, $12604, $12605, $12606, $12607, $12608, $12609, $12610, $12611, $12612, $12613, $12614, $12615, $12616, $12617, $12618, $12619, $12620, $12621, $12622, $12623, $12624, $12625, $12626, $12627, $12628, VersionRange($12629, $12630)), ($12631, $12632, $12633, $12634, $12635, $12636, $12637, $12638, $12639, $12640, $12641, $12642, $12643, $12644, $12645, $12646, $12647, $12648, $12649, $12650, $12651, $12652, $12653, $12654, $12655, $12656, $12657, $12658, VersionRange($12659, $12660)), ($12661, $12662, $12663, $12664, $12665, $12666, $12667, $12668, $12669, $12670, $12671, $12672, $12673, $12674, $12675, $12676, $12677, $12678, $12679, $12680, $12681, $12682, $12683, $12684, $12685, $12686, $12687, $12688, VersionRange($12689, $12690)), ($12691, $12692, $12693, $12694, $12695, $12696, $12697, $12698, $12699, $12700, $12701, $12702, $12703, $12704, $12705, $12706, $12707, $12708, $12709, $12710, $12711, $12712, $12713, $12714, $12715, $12716, $12717, $12718, VersionRange($12719, $12720)), ($12721, $12722, $12723, $12724, $12725, $12726, $12727, $12728, $12729, $12730, $12731, $12732, $12733, $12734, $12735, $12736, $12737, $12738, $12739, $12740, $12741, $12742, $12743, $12744, $12745, $12746, $12747, $12748, VersionRange($12749, $12750)), ($12751, $12752, $12753, $12754, $12755, $12756, $12757, $12758, $12759, $12760, $12761, $12762, $12763, $12764, $12765, $12766, $12767, $12768, $12769, $12770, $12771, $12772, $12773, $12774, $12775, $12776, $12777, $12778, VersionRange($12779, $12780)), ($12781, $12782, $12783, $12784, $12785, $12786, $12787, $12788, $12789, $12790, $12791, $12792, $12793, $12794, $12795, $12796, $12797, $12798, $12799, $12800, $12801, $12802, $12803, $12804, $12805, $12806, $12807, $12808, VersionRange($12809, $12810)), ($12811, $12812, $12813, $12814, $12815, $12816, $12817, $12818, $12819, $12820, $12821, $12822, $12823, $12824, $12825, $12826, $12827, $12828, $12829, $12830, $12831, $12832, $12833, $12834, $12835, $12836, $12837, $12838, VersionRange($12839, $12840)), ($12841, $12842, $12843, $12844, $12845, $12846, $12847, $12848, $12849, $12850, $12851, $12852, $12853, $12854, $12855, $12856, $12857, $12858, $12859, $12860, $12861, $12862, $12863, $12864, $12865, $12866, $12867, $12868, VersionRange($12869, $12870)), ($12871, $12872, $12873, $12874, $12875, $12876, $12877, $12878, $12879, $12880, $12881, $12882, $12883, $12884, $12885, $12886, $12887, $12888, $12889, $12890, $12891, $12892, $12893, $12894, $12895, $12896, $12897, $12898, VersionRange($12899, $12900)), ($12901, $12902, $12903, $12904, $12905, $12906, $12907, $12908, $12909, $12910, $12911, $12912, $12913, $12914, $12915, $12916, $12917, $12918, $12919, $12920, $12921, $12922, $12923, $12924, $12925, $12926, $12927, $12928, VersionRange($12929, $12930)), ($12931, $12932, $12933, $12934, $12935, $12936, $12937, $12938, $12939, $12940, $12941, $12942, $12943, $12944, $12945, $12946, $12947, $12948, $12949, $12950, $12951, $12952, $12953, $12954, $12955, $12956, $12957, $12958, VersionRange($12959, $12960)), ($12961, $12962, $12963, $12964, $12965, $12966, $12967, $12968, $12969, $12970[...][ Date: 2023-07-04 18:39:45 ]
10 3s988ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30)), ($31, $32, $33, $34, $35, $36, $37, $38, $39, $40, $41, $42, $43, $44, $45, $46, $47, $48, $49, $50, $51, $52, $53, $54, $55, $56, $57, $58, VersionRange($59, $60)), ($61, $62, $63, $64, $65, $66, $67, $68, $69, $70, $71, $72, $73, $74, $75, $76, $77, $78, $79, $80, $81, $82, $83, $84, $85, $86, $87, $88, VersionRange($89, $90)), ($91, $92, $93, $94, $95, $96, $97, $98, $99, $100, $101, $102, $103, $104, $105, $106, $107, $108, $109, $110, $111, $112, $113, $114, $115, $116, $117, $118, VersionRange($119, $120)), ($121, $122, $123, $124, $125, $126, $127, $128, $129, $130, $131, $132, $133, $134, $135, $136, $137, $138, $139, $140, $141, $142, $143, $144, $145, $146, $147, $148, VersionRange($149, $150)), ($151, $152, $153, $154, $155, $156, $157, $158, $159, $160, $161, $162, $163, $164, $165, $166, $167, $168, $169, $170, $171, $172, $173, $174, $175, $176, $177, $178, VersionRange($179, $180)), ($181, $182, $183, $184, $185, $186, $187, $188, $189, $190, $191, $192, $193, $194, $195, $196, $197, $198, $199, $200, $201, $202, $203, $204, $205, $206, $207, $208, VersionRange($209, $210)), ($211, $212, $213, $214, $215, $216, $217, $218, $219, $220, $221, $222, $223, $224, $225, $226, $227, $228, $229, $230, $231, $232, $233, $234, $235, $236, $237, $238, VersionRange($239, $240)), ($241, $242, $243, $244, $245, $246, $247, $248, $249, $250, $251, $252, $253, $254, $255, $256, $257, $258, $259, $260, $261, $262, $263, $264, $265, $266, $267, $268, VersionRange($269, $270)), ($271, $272, $273, $274, $275, $276, $277, $278, $279, $280, $281, $282, $283, $284, $285, $286, $287, $288, $289, $290, $291, $292, $293, $294, $295, $296, $297, $298, VersionRange($299, $300)), ($301, $302, $303, $304, $305, $306, $307, $308, $309, $310, $311, $312, $313, $314, $315, $316, $317, $318, $319, $320, $321, $322, $323, $324, $325, $326, $327, $328, VersionRange($329, $330)), ($331, $332, $333, $334, $335, $336, $337, $338, $339, $340, $341, $342, $343, $344, $345, $346, $347, $348, $349, $350, $351, $352, $353, $354, $355, $356, $357, $358, VersionRange($359, $360)), ($361, $362, $363, $364, $365, $366, $367, $368, $369, $370, $371, $372, $373, $374, $375, $376, $377, $378, $379, $380, $381, $382, $383, $384, $385, $386, $387, $388, VersionRange($389, $390)), ($391, $392, $393, $394, $395, $396, $397, $398, $399, $400, $401, $402, $403, $404, $405, $406, $407, $408, $409, $410, $411, $412, $413, $414, $415, $416, $417, $418, VersionRange($419, $420)), ($421, $422, $423, $424, $425, $426, $427, $428, $429, $430, $431, $432, $433, $434, $435, $436, $437, $438, $439, $440, $441, $442, $443, $444, $445, $446, $447, $448, VersionRange($449, $450)), ($451, $452, $453, $454, $455, $456, $457, $458, $459, $460, $461, $462, $463, $464, $465, $466, $467, $468, $469, $470, $471, $472, $473, $474, $475, $476, $477, $478, VersionRange($479, $480)), ($481, $482, $483, $484, $485, $486, $487, $488, $489, $490, $491, $492, $493, $494, $495, $496, $497, $498, $499, $500, $501, $502, $503, $504, $505, $506, $507, $508, VersionRange($509, $510)), ($511, $512, $513, $514, $515, $516, $517, $518, $519, $520, $521, $522, $523, $524, $525, $526, $527, $528, $529, $530, $531, $532, $533, $534, $535, $536, $537, $538, VersionRange($539, $540)), ($541, $542, $543, $544, $545, $546, $547, $548, $549, $550, $551, $552, $553, $554, $555, $556, $557, $558, $559, $560, $561, $562, $563, $564, $565, $566, $567, $568, VersionRange($569, $570)), ($571, $572, $573, $574, $575, $576, $577, $578, $579, $580, $581, $582, $583, $584, $585, $586, $587, $588, $589, $590, $591, $592, $593, $594, $595, $596, $597, $598, VersionRange($599, $600)), ($601, $602, $603, $604, $605, $606, $607, $608, $609, $610, $611, $612, $613, $614, $615, $616, $617, $618, $619, $620, $621, $622, $623, $624, $625, $626, $627, $628, VersionRange($629, $630)), ($631, $632, $633, $634, $635, $636, $637, $638, $639, $640, $641, $642, $643, $644, $645, $646, $647, $648, $649, $650, $651, $652, $653, $654, $655, $656, $657, $658, VersionRange($659, $660)), ($661, $662, $663, $664, $665, $666, $667, $668, $669, $670, $671, $672, $673, $674, $675, $676, $677, $678, $679, $680, $681, $682, $683, $684, $685, $686, $687, $688, VersionRange($689, $690)), ($691, $692, $693, $694, $695, $696, $697, $698, $699, $700, $701, $702, $703, $704, $705, $706, $707, $708, $709, $710, $711, $712, $713, $714, $715, $716, $717, $718, VersionRange($719, $720)), ($721, $722, $723, $724, $725, $726, $727, $728, $729, $730, $731, $732, $733, $734, $735, $736, $737, $738, $739, $740, $741, $742, $743, $744, $745, $746, $747, $748, VersionRange($749, $750)), ($751, $752, $753, $754, $755, $756, $757, $758, $759, $760, $761, $762, $763, $764, $765, $766, $767, $768, $769, $770, $771, $772, $773, $774, $775, $776, $777, $778, VersionRange($779, $780)), ($781, $782, $783, $784, $785, $786, $787, $788, $789, $790, $791, $792, $793, $794, $795, $796, $797, $798, $799, $800, $801, $802, $803, $804, $805, $806, $807, $808, VersionRange($809, $810)), ($811, $812, $813, $814, $815, $816, $817, $818, $819, $820, $821, $822, $823, $824, $825, $826, $827, $828, $829, $830, $831, $832, $833, $834, $835, $836, $837, $838, VersionRange($839, $840)), ($841, $842, $843, $844, $845, $846, $847, $848, $849, $850, $851, $852, $853, $854, $855, $856, $857, $858, $859, $860, $861, $862, $863, $864, $865, $866, $867, $868, VersionRange($869, $870)), ($871, $872, $873, $874, $875, $876, $877, $878, $879, $880, $881, $882, $883, $884, $885, $886, $887, $888, $889, $890, $891, $892, $893, $894, $895, $896, $897, $898, VersionRange($899, $900)), ($901, $902, $903, $904, $905, $906, $907, $908, $909, $910, $911, $912, $913, $914, $915, $916, $917, $918, $919, $920, $921, $922, $923, $924, $925, $926, $927, $928, VersionRange($929, $930)), ($931, $932, $933, $934, $935, $936, $937, $938, $939, $940, $941, $942, $943, $944, $945, $946, $947, $948, $949, $950, $951, $952, $953, $954, $955, $956, $957, $958, VersionRange($959, $960)), ($961, $962, $963, $964, $965, $966, $967, $968, $969, $970, $971, $972, $973, $974, $975, $976, $977, $978, $979, $980, $981, $982, $983, $984, $985, $986, $987, $988, VersionRange($989, $990)), ($991, $992, $993, $994, $995, $996, $997, $998, $999, $1000, $1001, $1002, $1003, $1004, $1005, $1006, $1007, $1008, $1009, $1010, $1011, $1012, $1013, $1014, $1015, $1016, $1017, $1018, VersionRange($1019, $1020)), ($1021, $1022, $1023, $1024, $1025, $1026, $1027, $1028, $1029, $1030, $1031, $1032, $1033, $1034, $1035, $1036, $1037, $1038, $1039, $1040, $1041, $1042, $1043, $1044, $1045, $1046, $1047, $1048, VersionRange($1049, $1050)), ($1051, $1052, $1053, $1054, $1055, $1056, $1057, $1058, $1059, $1060, $1061, $1062, $1063, $1064, $1065, $1066, $1067, $1068, $1069, $1070, $1071, $1072, $1073, $1074, $1075, $1076, $1077, $1078, VersionRange($1079, $1080)), ($1081, $1082, $1083, $1084, $1085, $1086, $1087, $1088, $1089, $1090, $1091, $1092, $1093, $1094, $1095, $1096, $1097, $1098, $1099, $1100, $1101, $1102, $1103, $1104, $1105, $1106, $1107, $1108, VersionRange($1109, $1110)), ($1111, $1112, $1113, $1114, $1115, $1116, $1117, $1118, $1119, $1120, $1121, $1122, $1123, $1124, $1125, $1126, $1127, $1128, $1129, $1130, $1131, $1132, $1133, $1134, $1135, $1136, $1137, $1138, VersionRange($1139, $1140)), ($1141, $1142, $1143, $1144, $1145, $1146, $1147, $1148, $1149, $1150, $1151, $1152, $1153, $1154, $1155, $1156, $1157, $1158, $1159, $1160, $1161, $1162, $1163, $1164, $1165, $1166, $1167, $1168, VersionRange($1169, $1170)), ($1171, $1172, $1173, $1174, $1175, $1176, $1177, $1178, $1179, $1180, $1181, $1182, $1183, $1184, $1185, $1186, $1187, $1188, $1189, $1190, $1191, $1192, $1193, $1194, $1195, $1196, $1197, $1198, VersionRange($1199, $1200)), ($1201, $1202, $1203, $1204, $1205, $1206, $1207, $1208, $1209, $1210, $1211, $1212, $1213, $1214, $1215, $1216, $1217, $1218, $1219, $1220, $1221, $1222, $1223, $1224, $1225, $1226, $1227, $1228, VersionRange($1229, $1230)), ($1231, $1232, $1233, $1234, $1235, $1236, $1237, $1238, $1239, $1240, $1241, $1242, $1243, $1244, $1245, $1246, $1247, $1248, $1249, $1250, $1251, $1252, $1253, $1254, $1255, $1256, $1257, $1258, VersionRange($1259, $1260)), ($1261, $1262, $1263, $1264, $1265, $1266, $1267, $1268, $1269, $1270, $1271, $1272, $1273, $1274, $1275, $1276, $1277, $1278, $1279, $1280, $1281, $1282, $1283, $1284, $1285, $1286, $1287, $1288, VersionRange($1289, $1290)), ($1291, $1292, $1293, $1294, $1295, $1296, $1297, $1298, $1299, $1300, $1301, $1302, $1303, $1304, $1305, $1306, $1307, $1308, $1309, $1310, $1311, $1312, $1313, $1314, $1315, $1316, $1317, $1318, VersionRange($1319, $1320)), ($1321, $1322, $1323, $1324, $1325, $1326, $1327, $1328, $1329, $1330, $1331, $1332, $1333, $1334, $1335, $1336, $1337, $1338, $1339, $1340, $1341, $1342, $1343, $1344, $1345, $1346, $1347, $1348, VersionRange($1349, $1350)), ($1351, $1352, $1353, $1354, $1355, $1356, $1357, $1358, $1359, $1360, $1361, $1362, $1363, $1364, $1365, $1366, $1367, $1368, $1369, $1370, $1371, $1372, $1373, $1374, $1375, $1376, $1377, $1378, VersionRange($1379, $1380)), ($1381, $1382, $1383, $1384, $1385, $1386, $1387, $1388, $1389, $1390, $1391, $1392, $1393, $1394, $1395, $1396, $1397, $1398, $1399, $1400, $1401, $1402, $1403, $1404, $1405, $1406, $1407, $1408, VersionRange($1409, $1410)), ($1411, $1412, $1413, $1414, $1415, $1416, $1417, $1418, $1419, $1420, $1421, $1422, $1423, $1424, $1425, $1426, $1427, $1428, $1429, $1430, $1431, $1432, $1433, $1434, $1435, $1436, $1437, $1438, VersionRange($1439, $1440)), ($1441, $1442, $1443, $1444, $1445, $1446, $1447, $1448, $1449, $1450, $1451, $1452, $1453, $1454, $1455, $1456, $1457, $1458, $1459, $1460, $1461, $1462, $1463, $1464, $1465, $1466, $1467, $1468, VersionRange($1469, $1470)), ($1471, $1472, $1473, $1474, $1475, $1476, $1477, $1478, $1479, $1480, $1481, $1482, $1483, $1484, $1485, $1486, $1487, $1488, $1489, $1490, $1491, $1492, $1493, $1494, $1495, $1496, $1497, $1498, VersionRange($1499, $1500)), ($1501, $1502, $1503, $1504, $1505, $1506, $1507, $1508, $1509, $1510, $1511, $1512, $1513, $1514, $1515, $1516, $1517, $1518, $1519, $1520, $1521, $1522, $1523, $1524, $1525, $1526, $1527, $1528, VersionRange($1529, $1530)), ($1531, $1532, $1533, $1534, $1535, $1536, $1537, $1538, $1539, $1540, $1541, $1542, $1543, $1544, $1545, $1546, $1547, $1548, $1549, $1550, $1551, $1552, $1553, $1554, $1555, $1556, $1557, $1558, VersionRange($1559, $1560)), ($1561, $1562, $1563, $1564, $1565, $1566, $1567, $1568, $1569, $1570, $1571, $1572, $1573, $1574, $1575, $1576, $1577, $1578, $1579, $1580, $1581, $1582, $1583, $1584, $1585, $1586, $1587, $1588, VersionRange($1589, $1590)), ($1591, $1592, $1593, $1594, $1595, $1596, $1597, $1598, $1599, $1600, $1601, $1602, $1603, $1604, $1605, $1606, $1607, $1608, $1609, $1610, $1611, $1612, $1613, $1614, $1615, $1616, $1617, $1618, VersionRange($1619, $1620)), ($1621, $1622, $1623, $1624, $1625, $1626, $1627, $1628, $1629, $1630, $1631, $1632, $1633, $1634, $1635, $1636, $1637, $1638, $1639, $1640, $1641, $1642, $1643, $1644, $1645, $1646, $1647, $1648, VersionRange($1649, $1650)), ($1651, $1652, $1653, $1654, $1655, $1656, $1657, $1658, $1659, $1660, $1661, $1662, $1663, $1664, $1665, $1666, $1667, $1668, $1669, $1670, $1671, $1672, $1673, $1674, $1675, $1676, $1677, $1678, VersionRange($1679, $1680)), ($1681, $1682, $1683, $1684, $1685, $1686, $1687, $1688, $1689, $1690, $1691, $1692, $1693, $1694, $1695, $1696, $1697, $1698, $1699, $1700, $1701, $1702, $1703, $1704, $1705, $1706, $1707, $1708, VersionRange($1709, $1710)), ($1711, $1712, $1713, $1714, $1715, $1716, $1717, $1718, $1719, $1720, $1721, $1722, $1723, $1724, $1725, $1726, $1727, $1728, $1729, $1730, $1731, $1732, $1733, $1734, $1735, $1736, $1737, $1738, VersionRange($1739, $1740)), ($1741, $1742, $1743, $1744, $1745, $1746, $1747, $1748, $1749, $1750, $1751, $1752, $1753, $1754, $1755, $1756, $1757, $1758, $1759, $1760, $1761, $1762, $1763, $1764, $1765, $1766, $1767, $1768, VersionRange($1769, $1770)), ($1771, $1772, $1773, $1774, $1775, $1776, $1777, $1778, $1779, $1780, $1781, $1782, $1783, $1784, $1785, $1786, $1787, $1788, $1789, $1790, $1791, $1792, $1793, $1794, $1795, $1796, $1797, $1798, VersionRange($1799, $1800)), ($1801, $1802, $1803, $1804, $1805, $1806, $1807, $1808, $1809, $1810, $1811, $1812, $1813, $1814, $1815, $1816, $1817, $1818, $1819, $1820, $1821, $1822, $1823, $1824, $1825, $1826, $1827, $1828, VersionRange($1829, $1830)), ($1831, $1832, $1833, $1834, $1835, $1836, $1837, $1838, $1839, $1840, $1841, $1842, $1843, $1844, $1845, $1846, $1847, $1848, $1849, $1850, $1851, $1852, $1853, $1854, $1855, $1856, $1857, $1858, VersionRange($1859, $1860)), ($1861, $1862, $1863, $1864, $1865, $1866, $1867, $1868, $1869, $1870, $1871, $1872, $1873, $1874, $1875, $1876, $1877, $1878, $1879, $1880, $1881, $1882, $1883, $1884, $1885, $1886, $1887, $1888, VersionRange($1889, $1890)), ($1891, $1892, $1893, $1894, $1895, $1896, $1897, $1898, $1899, $1900, $1901, $1902, $1903, $1904, $1905, $1906, $1907, $1908, $1909, $1910, $1911, $1912, $1913, $1914, $1915, $1916, $1917, $1918, VersionRange($1919, $1920)), ($1921, $1922, $1923, $1924, $1925, $1926, $1927, $1928, $1929, $1930, $1931, $1932, $1933, $1934, $1935, $1936, $1937, $1938, $1939, $1940, $1941, $1942, $1943, $1944, $1945, $1946, $1947, $1948, VersionRange($1949, $1950)), ($1951, $1952, $1953, $1954, $1955, $1956, $1957, $1958, $1959, $1960, $1961, $1962, $1963, $1964, $1965, $1966, $1967, $1968, $1969, $1970, $1971, $1972, $1973, $1974, $1975, $1976, $1977, $1978, VersionRange($1979, $1980)), ($1981, $1982, $1983, $1984, $1985, $1986, $1987, $1988, $1989, $1990, $1991, $1992, $1993, $1994, $1995, $1996, $1997, $1998, $1999, $2000, $2001, $2002, $2003, $2004, $2005, $2006, $2007, $2008, VersionRange($2009, $2010)), ($2011, $2012, $2013, $2014, $2015, $2016, $2017, $2018, $2019, $2020, $2021, $2022, $2023, $2024, $2025, $2026, $2027, $2028, $2029, $2030, $2031, $2032, $2033, $2034, $2035, $2036, $2037, $2038, VersionRange($2039, $2040)), ($2041, $2042, $2043, $2044, $2045, $2046, $2047, $2048, $2049, $2050, $2051, $2052, $2053, $2054, $2055, $2056, $2057, $2058, $2059, $2060, $2061, $2062, $2063, $2064, $2065, $2066, $2067, $2068, VersionRange($2069, $2070)), ($2071, $2072, $2073, $2074, $2075, $2076, $2077, $2078, $2079, $2080, $2081, $2082, $2083, $2084, $2085, $2086, $2087, $2088, $2089, $2090, $2091, $2092, $2093, $2094, $2095, $2096, $2097, $2098, VersionRange($2099, $2100)), ($2101, $2102, $2103, $2104, $2105, $2106, $2107, $2108, $2109, $2110, $2111, $2112, $2113, $2114, $2115, $2116, $2117, $2118, $2119, $2120, $2121, $2122, $2123, $2124, $2125, $2126, $2127, $2128, VersionRange($2129, $2130)), ($2131, $2132, $2133, $2134, $2135, $2136, $2137, $2138, $2139, $2140, $2141, $2142, $2143, $2144, $2145, $2146, $2147, $2148, $2149, $2150, $2151, $2152, $2153, $2154, $2155, $2156, $2157, $2158, VersionRange($2159, $2160)), ($2161, $2162, $2163, $2164, $2165, $2166, $2167, $2168, $2169, $2170, $2171, $2172, $2173, $2174, $2175, $2176, $2177, $2178, $2179, $2180, $2181, $2182, $2183, $2184, $2185, $2186, $2187, $2188, VersionRange($2189, $2190)), ($2191, $2192, $2193, $2194, $2195, $2196, $2197, $2198, $2199, $2200, $2201, $2202, $2203, $2204, $2205, $2206, $2207, $2208, $2209, $2210, $2211, $2212, $2213, $2214, $2215, $2216, $2217, $2218, VersionRange($2219, $2220)), ($2221, $2222, $2223, $2224, $2225, $2226, $2227, $2228, $2229, $2230, $2231, $2232, $2233, $2234, $2235, $2236, $2237, $2238, $2239, $2240, $2241, $2242, $2243, $2244, $2245, $2246, $2247, $2248, VersionRange($2249, $2250)), ($2251, $2252, $2253, $2254, $2255, $2256, $2257, $2258, $2259, $2260, $2261, $2262, $2263, $2264, $2265, $2266, $2267, $2268, $2269, $2270, $2271, $2272, $2273, $2274, $2275, $2276, $2277, $2278, VersionRange($2279, $2280)), ($2281, $2282, $2283, $2284, $2285, $2286, $2287, $2288, $2289, $2290, $2291, $2292, $2293, $2294, $2295, $2296, $2297, $2298, $2299, $2300, $2301, $2302, $2303, $2304, $2305, $2306, $2307, $2308, VersionRange($2309, $2310)), ($2311, $2312, $2313, $2314, $2315, $2316, $2317, $2318, $2319, $2320, $2321, $2322, $2323, $2324, $2325, $2326, $2327, $2328, $2329, $2330, $2331, $2332, $2333, $2334, $2335, $2336, $2337, $2338, VersionRange($2339, $2340)), ($2341, $2342, $2343, $2344, $2345, $2346, $2347, $2348, $2349, $2350, $2351, $2352, $2353, $2354, $2355, $2356, $2357, $2358, $2359, $2360, $2361, $2362, $2363, $2364, $2365, $2366, $2367, $2368, VersionRange($2369, $2370)), ($2371, $2372, $2373, $2374, $2375, $2376, $2377, $2378, $2379, $2380, $2381, $2382, $2383, $2384, $2385, $2386, $2387, $2388, $2389, $2390, $2391, $2392, $2393, $2394, $2395, $2396, $2397, $2398, VersionRange($2399, $2400)), ($2401, $2402, $2403, $2404, $2405, $2406, $2407, $2408, $2409, $2410, $2411, $2412, $2413, $2414, $2415, $2416, $2417, $2418, $2419, $2420, $2421, $2422, $2423, $2424, $2425, $2426, $2427, $2428, VersionRange($2429, $2430)), ($2431, $2432, $2433, $2434, $2435, $2436, $2437, $2438, $2439, $2440, $2441, $2442, $2443, $2444, $2445, $2446, $2447, $2448, $2449, $2450, $2451, $2452, $2453, $2454, $2455, $2456, $2457, $2458, VersionRange($2459, $2460)), ($2461, $2462, $2463, $2464, $2465, $2466, $2467, $2468, $2469, $2470, $2471, $2472, $2473, $2474, $2475, $2476, $2477, $2478, $2479, $2480, $2481, $2482, $2483, $2484, $2485, $2486, $2487, $2488, VersionRange($2489, $2490)), ($2491, $2492, $2493, $2494, $2495, $2496, $2497, $2498, $2499, $2500, $2501, $2502, $2503, $2504, $2505, $2506, $2507, $2508, $2509, $2510, $2511, $2512, $2513, $2514, $2515, $2516, $2517, $2518, VersionRange($2519, $2520)), ($2521, $2522, $2523, $2524, $2525, $2526, $2527, $2528, $2529, $2530, $2531, $2532, $2533, $2534, $2535, $2536, $2537, $2538, $2539, $2540, $2541, $2542, $2543, $2544, $2545, $2546, $2547, $2548, VersionRange($2549, $2550)), ($2551, $2552, $2553, $2554, $2555, $2556, $2557, $2558, $2559, $2560, $2561, $2562, $2563, $2564, $2565, $2566, $2567, $2568, $2569, $2570, $2571, $2572, $2573, $2574, $2575, $2576, $2577, $2578, VersionRange($2579, $2580)), ($2581, $2582, $2583, $2584, $2585, $2586, $2587, $2588, $2589, $2590, $2591, $2592, $2593, $2594, $2595, $2596, $2597, $2598, $2599, $2600, $2601, $2602, $2603, $2604, $2605, $2606, $2607, $2608, VersionRange($2609, $2610)), ($2611, $2612, $2613, $2614, $2615, $2616, $2617, $2618, $2619, $2620, $2621, $2622, $2623, $2624, $2625, $2626, $2627, $2628, $2629, $2630, $2631, $2632, $2633, $2634, $2635, $2636, $2637, $2638, VersionRange($2639, $2640)), ($2641, $2642, $2643, $2644, $2645, $2646, $2647, $2648, $2649, $2650, $2651, $2652, $2653, $2654, $2655, $2656, $2657, $2658, $2659, $2660, $2661, $2662, $2663, $2664, $2665, $2666, $2667, $2668, VersionRange($2669, $2670)), ($2671, $2672, $2673, $2674, $2675, $2676, $2677, $2678, $2679, $2680, $2681, $2682, $2683, $2684, $2685, $2686, $2687, $2688, $2689, $2690, $2691, $2692, $2693, $2694, $2695, $2696, $2697, $2698, VersionRange($2699, $2700)), ($2701, $2702, $2703, $2704, $2705, $2706, $2707, $2708, $2709, $2710, $2711, $2712, $2713, $2714, $2715, $2716, $2717, $2718, $2719, $2720, $2721, $2722, $2723, $2724, $2725, $2726, $2727, $2728, VersionRange($2729, $2730)), ($2731, $2732, $2733, $2734, $2735, $2736, $2737, $2738, $2739, $2740, $2741, $2742, $2743, $2744, $2745, $2746, $2747, $2748, $2749, $2750, $2751, $2752, $2753, $2754, $2755, $2756, $2757, $2758, VersionRange($2759, $2760)), ($2761, $2762, $2763, $2764, $2765, $2766, $2767, $2768, $2769, $2770, $2771, $2772, $2773, $2774, $2775, $2776, $2777, $2778, $2779, $2780, $2781, $2782, $2783, $2784, $2785, $2786, $2787, $2788, VersionRange($2789, $2790)), ($2791, $2792, $2793, $2794, $2795, $2796, $2797, $2798, $2799, $2800, $2801, $2802, $2803, $2804, $2805, $2806, $2807, $2808, $2809, $2810, $2811, $2812, $2813, $2814, $2815, $2816, $2817, $2818, VersionRange($2819, $2820)), ($2821, $2822, $2823, $2824, $2825, $2826, $2827, $2828, $2829, $2830, $2831, $2832, $2833, $2834, $2835, $2836, $2837, $2838, $2839, $2840, $2841, $2842, $2843, $2844, $2845, $2846, $2847, $2848, VersionRange($2849, $2850)), ($2851, $2852, $2853, $2854, $2855, $2856, $2857, $2858, $2859, $2860, $2861, $2862, $2863, $2864, $2865, $2866, $2867, $2868, $2869, $2870, $2871, $2872, $2873, $2874, $2875, $2876, $2877, $2878, VersionRange($2879, $2880)), ($2881, $2882, $2883, $2884, $2885, $2886, $2887, $2888, $2889, $2890, $2891, $2892, $2893, $2894, $2895, $2896, $2897, $2898, $2899, $2900, $2901, $2902, $2903, $2904, $2905, $2906, $2907, $2908, VersionRange($2909, $2910)), ($2911, $2912, $2913, $2914, $2915, $2916, $2917, $2918, $2919, $2920, $2921, $2922, $2923, $2924, $2925, $2926, $2927, $2928, $2929, $2930, $2931, $2932, $2933, $2934, $2935, $2936, $2937, $2938, VersionRange($2939, $2940)), ($2941, $2942, $2943, $2944, $2945, $2946, $2947, $2948, $2949, $2950, $2951, $2952, $2953, $2954, $2955, $2956, $2957, $2958, $2959, $2960, $2961, $2962, $2963, $2964, $2965, $2966, $2967, $2968, VersionRange($2969, $2970)), ($2971, $2972, $2973, $2974, $2975, $2976, $2977, $2978, $2979, $2980, $2981, $2982, $2983, $2984, $2985, $2986, $2987, $2988, $2989, $2990, $2991, $2992, $2993, $2994, $2995, $2996, $2997, $2998, VersionRange($2999, $3000)), ($3001, $3002, $3003, $3004, $3005, $3006, $3007, $3008, $3009, $3010, $3011, $3012, $3013, $3014, $3015, $3016, $3017, $3018, $3019, $3020, $3021, $3022, $3023, $3024, $3025, $3026, $3027, $3028, VersionRange($3029, $3030)), ($3031, $3032, $3033, $3034, $3035, $3036, $3037, $3038, $3039, $3040, $3041, $3042, $3043, $3044, $3045, $3046, $3047, $3048, $3049, $3050, $3051, $3052, $3053, $3054, $3055, $3056, $3057, $3058, VersionRange($3059, $3060)), ($3061, $3062, $3063, $3064, $3065, $3066, $3067, $3068, $3069, $3070, $3071, $3072, $3073, $3074, $3075, $3076, $3077, $3078, $3079, $3080, $3081, $3082, $3083, $3084, $3085, $3086, $3087, $3088, VersionRange($3089, $3090)), ($3091, $3092, $3093, $3094, $3095, $3096, $3097, $3098, $3099, $3100, $3101, $3102, $3103, $3104, $3105, $3106, $3107, $3108, $3109, $3110, $3111, $3112, $3113, $3114, $3115, $3116, $3117, $3118, VersionRange($3119, $3120)), ($3121, $3122, $3123, $3124, $3125, $3126, $3127, $3128, $3129, $3130, $3131, $3132, $3133, $3134, $3135, $3136, $3137, $3138, $3139, $3140, $3141, $3142, $3143, $3144, $3145, $3146, $3147, $3148, VersionRange($3149, $3150)), ($3151, $3152, $3153, $3154, $3155, $3156, $3157, $3158, $3159, $3160, $3161, $3162, $3163, $3164, $3165, $3166, $3167, $3168, $3169, $3170, $3171, $3172, $3173, $3174, $3175, $3176, $3177, $3178, VersionRange($3179, $3180)), ($3181, $3182, $3183, $3184, $3185, $3186, $3187, $3188, $3189, $3190, $3191, $3192, $3193, $3194, $3195, $3196, $3197, $3198, $3199, $3200, $3201, $3202, $3203, $3204, $3205, $3206, $3207, $3208, VersionRange($3209, $3210)), ($3211, $3212, $3213, $3214, $3215, $3216, $3217, $3218, $3219, $3220, $3221, $3222, $3223, $3224, $3225, $3226, $3227, $3228, $3229, $3230, $3231, $3232, $3233, $3234, $3235, $3236, $3237, $3238, VersionRange($3239, $3240)), ($3241, $3242, $3243, $3244, $3245, $3246, $3247, $3248, $3249, $3250, $3251, $3252, $3253, $3254, $3255, $3256, $3257, $3258, $3259, $3260, $3261, $3262, $3263, $3264, $3265, $3266, $3267, $3268, VersionRange($3269, $3270)), ($3271, $3272, $3273, $3274, $3275, $3276, $3277, $3278, $3279, $3280, $3281, $3282, $3283, $3284, $3285, $3286, $3287, $3288, $3289, $3290, $3291, $3292, $3293, $3294, $3295, $3296, $3297, $3298, VersionRange($3299, $3300)), ($3301, $3302, $3303, $3304, $3305, $3306, $3307, $3308, $3309, $3310, $3311, $3312, $3313, $3314, $3315, $3316, $3317, $3318, $3319, $3320, $3321, $3322, $3323, $3324, $3325, $3326, $3327, $3328, VersionRange($3329, $3330)), ($3331, $3332, $3333, $3334, $3335, $3336, $3337, $3338, $3339, $3340, $3341, $3342, $3343, $3344, $3345, $3346, $3347, $3348, $3349, $3350, $3351, $3352, $3353, $3354, $3355, $3356, $3357, $3358, VersionRange($3359, $3360)), ($3361, $3362, $3363, $3364, $3365, $3366, $3367, $3368, $3369, $3370, $3371, $3372, $3373, $3374, $3375, $3376, $3377, $3378, $3379, $3380, $3381, $3382, $3383, $3384, $3385, $3386, $3387, $3388, VersionRange($3389, $3390)), ($3391, $3392, $3393, $3394, $3395, $3396, $3397, $3398, $3399, $3400, $3401, $3402, $3403, $3404, $3405, $3406, $3407, $3408, $3409, $3410, $3411, $3412, $3413, $3414, $3415, $3416, $3417, $3418, VersionRange($3419, $3420)), ($3421, $3422, $3423, $3424, $3425, $3426, $3427, $3428, $3429, $3430, $3431, $3432, $3433, $3434, $3435, $3436, $3437, $3438, $3439, $3440, $3441, $3442, $3443, $3444, $3445, $3446, $3447, $3448, VersionRange($3449, $3450)), ($3451, $3452, $3453, $3454, $3455, $3456, $3457, $3458, $3459, $3460, $3461, $3462, $3463, $3464, $3465, $3466, $3467, $3468, $3469, $3470, $3471, $3472, $3473, $3474, $3475, $3476, $3477, $3478, VersionRange($3479, $3480)), ($3481, $3482, $3483, $3484, $3485, $3486, $3487, $3488, $3489, $3490, $3491, $3492, $3493, $3494, $3495, $3496, $3497, $3498, $3499, $3500, $3501, $3502, $3503, $3504, $3505, $3506, $3507, $3508, VersionRange($3509, $3510)), ($3511, $3512, $3513, $3514, $3515, $3516, $3517, $3518, $3519, $3520, $3521, $3522, $3523, $3524, $3525, $3526, $3527, $3528, $3529, $3530, $3531, $3532, $3533, $3534, $3535, $3536, $3537, $3538, VersionRange($3539, $3540)), ($3541, $3542, $3543, $3544, $3545, $3546, $3547, $3548, $3549, $3550, $3551, $3552, $3553, $3554, $3555, $3556, $3557, $3558, $3559, $3560, $3561, $3562, $3563, $3564, $3565, $3566, $3567, $3568, VersionRange($3569, $3570)), ($3571, $3572, $3573, $3574, $3575, $3576, $3577, $3578, $3579, $3580, $3581, $3582, $3583, $3584, $3585, $3586, $3587, $3588, $3589, $3590, $3591, $3592, $3593, $3594, $3595, $3596, $3597, $3598, VersionRange($3599, $3600)), ($3601, $3602, $3603, $3604, $3605, $3606, $3607, $3608, $3609, $3610, $3611, $3612, $3613, $3614, $3615, $3616, $3617, $3618, $3619, $3620, $3621, $3622, $3623, $3624, $3625, $3626, $3627, $3628, VersionRange($3629, $3630)), ($3631, $3632, $3633, $3634, $3635, $3636, $3637, $3638, $3639, $3640, $3641, $3642, $3643, $3644, $3645, $3646, $3647, $3648, $3649, $3650, $3651, $3652, $3653, $3654, $3655, $3656, $3657, $3658, VersionRange($3659, $3660)), ($3661, $3662, $3663, $3664, $3665, $3666, $3667, $3668, $3669, $3670, $3671, $3672, $3673, $3674, $3675, $3676, $3677, $3678, $3679, $3680, $3681, $3682, $3683, $3684, $3685, $3686, $3687, $3688, VersionRange($3689, $3690)), ($3691, $3692, $3693, $3694, $3695, $3696, $3697, $3698, $3699, $3700, $3701, $3702, $3703, $3704, $3705, $3706, $3707, $3708, $3709, $3710, $3711, $3712, $3713, $3714, $3715, $3716, $3717, $3718, VersionRange($3719, $3720)), ($3721, $3722, $3723, $3724, $3725, $3726, $3727, $3728, $3729, $3730, $3731, $3732, $3733, $3734, $3735, $3736, $3737, $3738, $3739, $3740, $3741, $3742, $3743, $3744, $3745, $3746, $3747, $3748, VersionRange($3749, $3750)), ($3751, $3752, $3753, $3754, $3755, $3756, $3757, $3758, $3759, $3760, $3761, $3762, $3763, $3764, $3765, $3766, $3767, $3768, $3769, $3770, $3771, $3772, $3773, $3774, $3775, $3776, $3777, $3778, VersionRange($3779, $3780)), ($3781, $3782, $3783, $3784, $3785, $3786, $3787, $3788, $3789, $3790, $3791, $3792, $3793, $3794, $3795, $3796, $3797, $3798, $3799, $3800, $3801, $3802, $3803, $3804, $3805, $3806, $3807, $3808, VersionRange($3809, $3810)), ($3811, $3812, $3813, $3814, $3815, $3816, $3817, $3818, $3819, $3820, $3821, $3822, $3823, $3824, $3825, $3826, $3827, $3828, $3829, $3830, $3831, $3832, $3833, $3834, $3835, $3836, $3837, $3838, VersionRange($3839, $3840)), ($3841, $3842, $3843, $3844, $3845, $3846, $3847, $3848, $3849, $3850, $3851, $3852, $3853, $3854, $3855, $3856, $3857, $3858, $3859, $3860, $3861, $3862, $3863, $3864, $3865, $3866, $3867, $3868, VersionRange($3869, $3870)), ($3871, $3872, $3873, $3874, $3875, $3876, $3877, $3878, $3879, $3880, $3881, $3882, $3883, $3884, $3885, $3886, $3887, $3888, $3889, $3890, $3891, $3892, $3893, $3894, $3895, $3896, $3897, $3898, VersionRange($3899, $3900)), ($3901, $3902, $3903, $3904, $3905, $3906, $3907, $3908, $3909, $3910, $3911, $3912, $3913, $3914, $3915, $3916, $3917, $3918, $3919, $3920, $3921, $3922, $3923, $3924, $3925, $3926, $3927, $3928, VersionRange($3929, $3930)), ($3931, $3932, $3933, $3934, $3935, $3936, $3937, $3938, $3939, $3940, $3941, $3942, $3943, $3944, $3945, $3946, $3947, $3948, $3949, $3950, $3951, $3952, $3953, $3954, $3955, $3956, $3957, $3958, VersionRange($3959, $3960)), ($3961, $3962, $3963, $3964, $3965, $3966, $3967, $3968, $3969, $3970, $3971, $3972, $3973, $3974, $3975, $3976, $3977, $3978, $3979, $3980, $3981, $3982, $3983, $3984, $3985, $3986, $3987, $3988, VersionRange($3989, $3990)), ($3991, $3992, $3993, $3994, $3995, $3996, $3997, $3998, $3999, $4000, $4001, $4002, $4003, $4004, $4005, $4006, $4007, $4008, $4009, $4010, $4011, $4012, $4013, $4014, $4015, $4016, $4017, $4018, VersionRange($4019, $4020)), ($4021, $4022, $4023, $4024, $4025, $4026, $4027, $4028, $4029, $4030, $4031, $4032, $4033, $4034, $4035, $4036, $4037, $4038, $4039, $4040, $4041, $4042, $4043, $4044, $4045, $4046, $4047, $4048, VersionRange($4049, $4050)), ($4051, $4052, $4053, $4054, $4055, $4056, $4057, $4058, $4059, $4060, $4061, $4062, $4063, $4064, $4065, $4066, $4067, $4068, $4069, $4070, $4071, $4072, $4073, $4074, $4075, $4076, $4077, $4078, VersionRange($4079, $4080)), ($4081, $4082, $4083, $4084, $4085, $4086, $4087, $4088, $4089, $4090, $4091, $4092, $4093, $4094, $4095, $4096, $4097, $4098, $4099, $4100, $4101, $4102, $4103, $4104, $4105, $4106, $4107, $4108, VersionRange($4109, $4110)), ($4111, $4112, $4113, $4114, $4115, $4116, $4117, $4118, $4119, $4120, $4121, $4122, $4123, $4124, $4125, $4126, $4127, $4128, $4129, $4130, $4131, $4132, $4133, $4134, $4135, $4136, $4137, $4138, VersionRange($4139, $4140)), ($4141, $4142, $4143, $4144, $4145, $4146, $4147, $4148, $4149, $4150, $4151, $4152, $4153, $4154, $4155, $4156, $4157, $4158, $4159, $4160, $4161, $4162, $4163, $4164, $4165, $4166, $4167, $4168, VersionRange($4169, $4170)), ($4171, $4172, $4173, $4174, $4175, $4176, $4177, $4178, $4179, $4180, $4181, $4182, $4183, $4184, $4185, $4186, $4187, $4188, $4189, $4190, $4191, $4192, $4193, $4194, $4195, $4196, $4197, $4198, VersionRange($4199, $4200)), ($4201, $4202, $4203, $4204, $4205, $4206, $4207, $4208, $4209, $4210, $4211, $4212, $4213, $4214, $4215, $4216, $4217, $4218, $4219, $4220, $4221, $4222, $4223, $4224, $4225, $4226, $4227, $4228, VersionRange($4229, $4230)), ($4231, $4232, $4233, $4234, $4235, $4236, $4237, $4238, $4239, $4240, $4241, $4242, $4243, $4244, $4245, $4246, $4247, $4248, $4249, $4250, $4251, $4252, $4253, $4254, $4255, $4256, $4257, $4258, VersionRange($4259, $4260)), ($4261, $4262, $4263, $4264, $4265, $4266, $4267, $4268, $4269, $4270, $4271, $4272, $4273, $4274, $4275, $4276, $4277, $4278, $4279, $4280, $4281, $4282, $4283, $4284, $4285, $4286, $4287, $4288, VersionRange($4289, $4290)), ($4291, $4292, $4293, $4294, $4295, $4296, $4297, $4298, $4299, $4300, $4301, $4302, $4303, $4304, $4305, $4306, $4307, $4308, $4309, $4310, $4311, $4312, $4313, $4314, $4315, $4316, $4317, $4318, VersionRange($4319, $4320)), ($4321, $4322, $4323, $4324, $4325, $4326, $4327, $4328, $4329, $4330, $4331, $4332, $4333, $4334, $4335, $4336, $4337, $4338, $4339, $4340, $4341, $4342, $4343, $4344, $4345, $4346, $4347, $4348, VersionRange($4349, $4350)), ($4351, $4352, $4353, $4354, $4355, $4356, $4357, $4358, $4359, $4360, $4361, $4362, $4363, $4364, $4365, $4366, $4367, $4368, $4369, $4370, $4371, $4372, $4373, $4374, $4375, $4376, $4377, $4378, VersionRange($4379, $4380)), ($4381, $4382, $4383, $4384, $4385, $4386, $4387, $4388, $4389, $4390, $4391, $4392, $4393, $4394, $4395, $4396, $4397, $4398, $4399, $4400, $4401, $4402, $4403, $4404, $4405, $4406, $4407, $4408, VersionRange($4409, $4410)), ($4411, $4412, $4413, $4414, $4415, $4416, $4417, $4418, $4419, $4420, $4421, $4422, $4423, $4424, $4425, $4426, $4427, $4428, $4429, $4430, $4431, $4432, $4433, $4434, $4435, $4436, $4437, $4438, VersionRange($4439, $4440)), ($4441, $4442, $4443, $4444, $4445, $4446, $4447, $4448, $4449, $4450, $4451, $4452, $4453, $4454, $4455, $4456, $4457, $4458, $4459, $4460, $4461, $4462, $4463, $4464, $4465, $4466, $4467, $4468, VersionRange($4469, $4470)), ($4471, $4472, $4473, $4474, $4475, $4476, $4477, $4478, $4479, $4480, $4481, $4482, $4483, $4484, $4485, $4486, $4487, $4488, $4489, $4490, $4491, $4492, $4493, $4494, $4495, $4496, $4497, $4498, VersionRange($4499, $4500)), ($4501, $4502, $4503, $4504, $4505, $4506, $4507, $4508, $4509, $4510, $4511, $4512, $4513, $4514, $4515, $4516, $4517, $4518, $4519, $4520, $4521, $4522, $4523, $4524, $4525, $4526, $4527, $4528, VersionRange($4529, $4530)), ($4531, $4532, $4533, $4534, $4535, $4536, $4537, $4538, $4539, $4540, $4541, $4542, $4543, $4544, $4545, $4546, $4547, $4548, $4549, $4550, $4551, $4552, $4553, $4554, $4555, $4556, $4557, $4558, VersionRange($4559, $4560)), ($4561, $4562, $4563, $4564, $4565, $4566, $4567, $4568, $4569, $4570, $4571, $4572, $4573, $4574, $4575, $4576, $4577, $4578, $4579, $4580, $4581, $4582, $4583, $4584, $4585, $4586, $4587, $4588, VersionRange($4589, $4590)), ($4591, $4592, $4593, $4594, $4595, $4596, $4597, $4598, $4599, $4600, $4601, $4602, $4603, $4604, $4605, $4606, $4607, $4608, $4609, $4610, $4611, $4612, $4613, $4614, $4615, $4616, $4617, $4618, VersionRange($4619, $4620)), ($4621, $4622, $4623, $4624, $4625, $4626, $4627, $4628, $4629, $4630, $4631, $4632, $4633, $4634, $4635, $4636, $4637, $4638, $4639, $4640, $4641, $4642, $4643, $4644, $4645, $4646, $4647, $4648, VersionRange($4649, $4650)), ($4651, $4652, $4653, $4654, $4655, $4656, $4657, $4658, $4659, $4660, $4661, $4662, $4663, $4664, $4665, $4666, $4667, $4668, $4669, $4670, $4671, $4672, $4673, $4674, $4675, $4676, $4677, $4678, VersionRange($4679, $4680)), ($4681, $4682, $4683, $4684, $4685, $4686, $4687, $4688, $4689, $4690, $4691, $4692, $4693, $4694, $4695, $4696, $4697, $4698, $4699, $4700, $4701, $4702, $4703, $4704, $4705, $4706, $4707, $4708, VersionRange($4709, $4710)), ($4711, $4712, $4713, $4714, $4715, $4716, $4717, $4718, $4719, $4720, $4721, $4722, $4723, $4724, $4725, $4726, $4727, $4728, $4729, $4730, $4731, $4732, $4733, $4734, $4735, $4736, $4737, $4738, VersionRange($4739, $4740)), ($4741, $4742, $4743, $4744, $4745, $4746, $4747, $4748, $4749, $4750, $4751, $4752, $4753, $4754, $4755, $4756, $4757, $4758, $4759, $4760, $4761, $4762, $4763, $4764, $4765, $4766, $4767, $4768, VersionRange($4769, $4770)), ($4771, $4772, $4773, $4774, $4775, $4776, $4777, $4778, $4779, $4780, $4781, $4782, $4783, $4784, $4785, $4786, $4787, $4788, $4789, $4790, $4791, $4792, $4793, $4794, $4795, $4796, $4797, $4798, VersionRange($4799, $4800)), ($4801, $4802, $4803, $4804, $4805, $4806, $4807, $4808, $4809, $4810, $4811, $4812, $4813, $4814, $4815, $4816, $4817, $4818, $4819, $4820, $4821, $4822, $4823, $4824, $4825, $4826, $4827, $4828, VersionRange($4829, $4830)), ($4831, $4832, $4833, $4834, $4835, $4836, $4837, $4838, $4839, $4840, $4841, $4842, $4843, $4844, $4845, $4846, $4847, $4848, $4849, $4850, $4851, $4852, $4853, $4854, $4855, $4856, $4857, $4858, VersionRange($4859, $4860)), ($4861, $4862, $4863, $4864, $4865, $4866, $4867, $4868, $4869, $4870, $4871, $4872, $4873, $4874, $4875, $4876, $4877, $4878, $4879, $4880, $4881, $4882, $4883, $4884, $4885, $4886, $4887, $4888, VersionRange($4889, $4890)), ($4891, $4892, $4893, $4894, $4895, $4896, $4897, $4898, $4899, $4900, $4901, $4902, $4903, $4904, $4905, $4906, $4907, $4908, $4909, $4910, $4911, $4912, $4913, $4914, $4915, $4916, $4917, $4918, VersionRange($4919, $4920)), ($4921, $4922, $4923, $4924, $4925, $4926, $4927, $4928, $4929, $4930, $4931, $4932, $4933, $4934, $4935, $4936, $4937, $4938, $4939, $4940, $4941, $4942, $4943, $4944, $4945, $4946, $4947, $4948, VersionRange($4949, $4950)), ($4951, $4952, $4953, $4954, $4955, $4956, $4957, $4958, $4959, $4960, $4961, $4962, $4963, $4964, $4965, $4966, $4967, $4968, $4969, $4970, $4971, $4972, $4973, $4974, $4975, $4976, $4977, $4978, VersionRange($4979, $4980)), ($4981, $4982, $4983, $4984, $4985, $4986, $4987, $4988, $4989, $4990, $4991, $4992, $4993, $4994, $4995, $4996, $4997, $4998, $4999, $5000, $5001, $5002, $5003, $5004, $5005, $5006, $5007, $5008, VersionRange($5009, $5010)), ($5011, $5012, $5013, $5014, $5015, $5016, $5017, $5018, $5019, $5020, $5021, $5022, $5023, $5024, $5025, $5026, $5027, $5028, $5029, $5030, $5031, $5032, $5033, $5034, $5035, $5036, $5037, $5038, VersionRange($5039, $5040)), ($5041, $5042, $5043, $5044, $5045, $5046, $5047, $5048, $5049, $5050, $5051, $5052, $5053, $5054, $5055, $5056, $5057, $5058, $5059, $5060, $5061, $5062, $5063, $5064, $5065, $5066, $5067, $5068, VersionRange($5069, $5070)), ($5071, $5072, $5073, $5074, $5075, $5076, $5077, $5078, $5079, $5080, $5081, $5082, $5083, $5084, $5085, $5086, $5087, $5088, $5089, $5090, $5091, $5092, $5093, $5094, $5095, $5096, $5097, $5098, VersionRange($5099, $5100)), ($5101, $5102, $5103, $5104, $5105, $5106, $5107, $5108, $5109, $5110, $5111, $5112, $5113, $5114, $5115, $5116, $5117, $5118, $5119, $5120, $5121, $5122, $5123, $5124, $5125, $5126, $5127, $5128, VersionRange($5129, $5130)), ($5131, $5132, $5133, $5134, $5135, $5136, $5137, $5138, $5139, $5140, $5141, $5142, $5143, $5144, $5145, $5146, $5147, $5148, $5149, $5150, $5151, $5152, $5153, $5154, $5155, $5156, $5157, $5158, VersionRange($5159, $5160)), ($5161, $5162, $5163, $5164, $5165, $5166, $5167, $5168, $5169, $5170, $5171, $5172, $5173, $5174, $5175, $5176, $5177, $5178, $5179, $5180, $5181, $5182, $5183, $5184, $5185, $5186, $5187, $5188, VersionRange($5189, $5190)), ($5191, $5192, $5193, $5194, $5195, $5196, $5197, $5198, $5199, $5200, $5201, $5202, $5203, $5204, $5205, $5206, $5207, $5208, $5209, $5210, $5211, $5212, $5213, $5214, $5215, $5216, $5217, $5218, VersionRange($5219, $5220)), ($5221, $5222, $5223, $5224, $5225, $5226, $5227, $5228, $5229, $5230, $5231, $5232, $5233, $5234, $5235, $5236, $5237, $5238, $5239, $5240, $5241, $5242, $5243, $5244, $5245, $5246, $5247, $5248, VersionRange($5249, $5250)), ($5251, $5252, $5253, $5254, $5255, $5256, $5257, $5258, $5259, $5260, $5261, $5262, $5263, $5264, $5265, $5266, $5267, $5268, $5269, $5270, $5271, $5272, $5273, $5274, $5275, $5276, $5277, $5278, VersionRange($5279, $5280)), ($5281, $5282, $5283, $5284, $5285, $5286, $5287, $5288, $5289, $5290, $5291, $5292, $5293, $5294, $5295, $5296, $5297, $5298, $5299, $5300, $5301, $5302, $5303, $5304, $5305, $5306, $5307, $5308, VersionRange($5309, $5310)), ($5311, $5312, $5313, $5314, $5315, $5316, $5317, $5318, $5319, $5320, $5321, $5322, $5323, $5324, $5325, $5326, $5327, $5328, $5329, $5330, $5331, $5332, $5333, $5334, $5335, $5336, $5337, $5338, VersionRange($5339, $5340)), ($5341, $5342, $5343, $5344, $5345, $5346, $5347, $5348, $5349, $5350, $5351, $5352, $5353, $5354, $5355, $5356, $5357, $5358, $5359, $5360, $5361, $5362, $5363, $5364, $5365, $5366, $5367, $5368, VersionRange($5369, $5370)), ($5371, $5372, $5373, $5374, $5375, $5376, $5377, $5378, $5379, $5380, $5381, $5382, $5383, $5384, $5385, $5386, $5387, $5388, $5389, $5390, $5391, $5392, $5393, $5394, $5395, $5396, $5397, $5398, VersionRange($5399, $5400)), ($5401, $5402, $5403, $5404, $5405, $5406, $5407, $5408, $5409, $5410, $5411, $5412, $5413, $5414, $5415, $5416, $5417, $5418, $5419, $5420, $5421, $5422, $5423, $5424, $5425, $5426, $5427, $5428, VersionRange($5429, $5430)), ($5431, $5432, $5433, $5434, $5435, $5436, $5437, $5438, $5439, $5440, $5441, $5442, $5443, $5444, $5445, $5446, $5447, $5448, $5449, $5450, $5451, $5452, $5453, $5454, $5455, $5456, $5457, $5458, VersionRange($5459, $5460)), ($5461, $5462, $5463, $5464, $5465, $5466, $5467, $5468, $5469, $5470, $5471, $5472, $5473, $5474, $5475, $5476, $5477, $5478, $5479, $5480, $5481, $5482, $5483, $5484, $5485, $5486, $5487, $5488, VersionRange($5489, $5490)), ($5491, $5492, $5493, $5494, $5495, $5496, $5497, $5498, $5499, $5500, $5501, $5502, $5503, $5504, $5505, $5506, $5507, $5508, $5509, $5510, $5511, $5512, $5513, $5514, $5515, $5516, $5517, $5518, VersionRange($5519, $5520)), ($5521, $5522, $5523, $5524, $5525, $5526, $5527, $5528, $5529, $5530, $5531, $5532, $5533, $5534, $5535, $5536, $5537, $5538, $5539, $5540, $5541, $5542, $5543, $5544, $5545, $5546, $5547, $5548, VersionRange($5549, $5550)), ($5551, $5552, $5553, $5554, $5555, $5556, $5557, $5558, $5559, $5560, $5561, $5562, $5563, $5564, $5565, $5566, $5567, $5568, $5569, $5570, $5571, $5572, $5573, $5574, $5575, $5576, $5577, $5578, VersionRange($5579, $5580)), ($5581, $5582, $5583, $5584, $5585, $5586, $5587, $5588, $5589, $5590, $5591, $5592, $5593, $5594, $5595, $5596, $5597, $5598, $5599, $5600, $5601, $5602, $5603, $5604, $5605, $5606, $5607, $5608, VersionRange($5609, $5610)), ($5611, $5612, $5613, $5614, $5615, $5616, $5617, $5618, $5619, $5620, $5621, $5622, $5623, $5624, $5625, $5626, $5627, $5628, $5629, $5630, $5631, $5632, $5633, $5634, $5635, $5636, $5637, $5638, VersionRange($5639, $5640)), ($5641, $5642, $5643, $5644, $5645, $5646, $5647, $5648, $5649, $5650, $5651, $5652, $5653, $5654, $5655, $5656, $5657, $5658, $5659, $5660, $5661, $5662, $5663, $5664, $5665, $5666, $5667, $5668, VersionRange($5669, $5670)), ($5671, $5672, $5673, $5674, $5675, $5676, $5677, $5678, $5679, $5680, $5681, $5682, $5683, $5684, $5685, $5686, $5687, $5688, $5689, $5690, $5691, $5692, $5693, $5694, $5695, $5696, $5697, $5698, VersionRange($5699, $5700)), ($5701, $5702, $5703, $5704, $5705, $5706, $5707, $5708, $5709, $5710, $5711, $5712, $5713, $5714, $5715, $5716, $5717, $5718, $5719, $5720, $5721, $5722, $5723, $5724, $5725, $5726, $5727, $5728, VersionRange($5729, $5730)), ($5731, $5732, $5733, $5734, $5735, $5736, $5737, $5738, $5739, $5740, $5741, $5742, $5743, $5744, $5745, $5746, $5747, $5748, $5749, $5750, $5751, $5752, $5753, $5754, $5755, $5756, $5757, $5758, VersionRange($5759, $5760)), ($5761, $5762, $5763, $5764, $5765, $5766, $5767, $5768, $5769, $5770, $5771, $5772, $5773, $5774, $5775, $5776, $5777, $5778, $5779, $5780, $5781, $5782, $5783, $5784, $5785, $5786, $5787, $5788, VersionRange($5789, $5790)), ($5791, $5792, $5793, $5794, $5795, $5796, $5797, $5798, $5799, $5800, $5801, $5802, $5803, $5804, $5805, $5806, $5807, $5808, $5809, $5810, $5811, $5812, $5813, $5814, $5815, $5816, $5817, $5818, VersionRange($5819, $5820)), ($5821, $5822, $5823, $5824, $5825, $5826, $5827, $5828, $5829, $5830, $5831, $5832, $5833, $5834, $5835, $5836, $5837, $5838, $5839, $5840, $5841, $5842, $5843, $5844, $5845, $5846, $5847, $5848, VersionRange($5849, $5850)), ($5851, $5852, $5853, $5854, $5855, $5856, $5857, $5858, $5859, $5860, $5861, $5862, $5863, $5864, $5865, $5866, $5867, $5868, $5869, $5870, $5871, $5872, $5873, $5874, $5875, $5876, $5877, $5878, VersionRange($5879, $5880)), ($5881, $5882, $5883, $5884, $5885, $5886, $5887, $5888, $5889, $5890, $5891, $5892, $5893, $5894, $5895, $5896, $5897, $5898, $5899, $5900, $5901, $5902, $5903, $5904, $5905, $5906, $5907, $5908, VersionRange($5909, $5910)), ($5911, $5912, $5913, $5914, $5915, $5916, $5917, $5918, $5919, $5920, $5921, $5922, $5923, $5924, $5925, $5926, $5927, $5928, $5929, $5930, $5931, $5932, $5933, $5934, $5935, $5936, $5937, $5938, VersionRange($5939, $5940)), ($5941, $5942, $5943, $5944, $5945, $5946, $5947, $5948, $5949, $5950, $5951, $5952, $5953, $5954, $5955, $5956, $5957, $5958, $5959, $5960, $5961, $5962, $5963, $5964, $5965, $5966, $5967, $5968, VersionRange($5969, $5970)), ($5971, $5972, $5973, $5974, $5975, $5976, $5977, $5978, $5979, $5980, $5981, $5982, $5983, $5984, $5985, $5986, $5987, $5988, $5989, $5990, $5991, $5992, $5993, $5994, $5995, $5996, $5997, $5998, VersionRange($5999, $6000)), ($6001, $6002, $6003, $6004, $6005, $6006, $6007, $6008, $6009, $6010, $6011, $6012, $6013, $6014, $6015, $6016, $6017, $6018, $6019, $6020, $6021, $6022, $6023, $6024, $6025, $6026, $6027, $6028, VersionRange($6029, $6030)), ($6031, $6032, $6033, $6034, $6035, $6036, $6037, $6038, $6039, $6040, $6041, $6042, $6043, $6044, $6045, $6046, $6047, $6048, $6049, $6050, $6051, $6052, $6053, $6054, $6055, $6056, $6057, $6058, VersionRange($6059, $6060)), ($6061, $6062, $6063, $6064, $6065, $6066, $6067, $6068, $6069, $6070, $6071, $6072, $6073, $6074, $6075, $6076, $6077, $6078, $6079, $6080, $6081, $6082, $6083, $6084, $6085, $6086, $6087, $6088, VersionRange($6089, $6090)), ($6091, $6092, $6093, $6094, $6095, $6096, $6097, $6098, $6099, $6100, $6101, $6102, $6103, $6104, $6105, $6106, $6107, $6108, $6109, $6110, $6111, $6112, $6113, $6114, $6115, $6116, $6117, $6118, VersionRange($6119, $6120)), ($6121, $6122, $6123, $6124, $6125, $6126, $6127, $6128, $6129, $6130, $6131, $6132, $6133, $6134, $6135, $6136, $6137, $6138, $6139, $6140, $6141, $6142, $6143, $6144, $6145, $6146, $6147, $6148, VersionRange($6149, $6150)), ($6151, $6152, $6153, $6154, $6155, $6156, $6157, $6158, $6159, $6160, $6161, $6162, $6163, $6164, $6165, $6166, $6167, $6168, $6169, $6170, $6171, $6172, $6173, $6174, $6175, $6176, $6177, $6178, VersionRange($6179, $6180)), ($6181, $6182, $6183, $6184, $6185, $6186, $6187, $6188, $6189, $6190, $6191, $6192, $6193, $6194, $6195, $6196, $6197, $6198, $6199, $6200, $6201, $6202, $6203, $6204, $6205, $6206, $6207, $6208, VersionRange($6209, $6210)), ($6211, $6212, $6213, $6214, $6215, $6216, $6217, $6218, $6219, $6220, $6221, $6222, $6223, $6224, $6225, $6226, $6227, $6228, $6229, $6230, $6231, $6232, $6233, $6234, $6235, $6236, $6237, $6238, VersionRange($6239, $6240)), ($6241, $6242, $6243, $6244, $6245, $6246, $6247, $6248, $6249, $6250, $6251, $6252, $6253, $6254, $6255, $6256, $6257, $6258, $6259, $6260, $6261, $6262, $6263, $6264, $6265, $6266, $6267, $6268, VersionRange($6269, $6270)), ($6271, $6272, $6273, $6274, $6275, $6276, $6277, $6278, $6279, $6280, $6281, $6282, $6283, $6284, $6285, $6286, $6287, $6288, $6289, $6290, $6291, $6292, $6293, $6294, $6295, $6296, $6297, $6298, VersionRange($6299, $6300)), ($6301, $6302, $6303, $6304, $6305, $6306, $6307, $6308, $6309, $6310, $6311, $6312, $6313, $6314, $6315, $6316, $6317, $6318, $6319, $6320, $6321, $6322, $6323, $6324, $6325, $6326, $6327, $6328, VersionRange($6329, $6330)), ($6331, $6332, $6333, $6334, $6335, $6336, $6337, $6338, $6339, $6340, $6341, $6342, $6343, $6344, $6345, $6346, $6347, $6348, $6349, $6350, $6351, $6352, $6353, $6354, $6355, $6356, $6357, $6358, VersionRange($6359, $6360)), ($6361, $6362, $6363, $6364, $6365, $6366, $6367, $6368, $6369, $6370, $6371, $6372, $6373, $6374, $6375, $6376, $6377, $6378, $6379, $6380, $6381, $6382, $6383, $6384, $6385, $6386, $6387, $6388, VersionRange($6389, $6390)), ($6391, $6392, $6393, $6394, $6395, $6396, $6397, $6398, $6399, $6400, $6401, $6402, $6403, $6404, $6405, $6406, $6407, $6408, $6409, $6410, $6411, $6412, $6413, $6414, $6415, $6416, $6417, $6418, VersionRange($6419, $6420)), ($6421, $6422, $6423, $6424, $6425, $6426, $6427, $6428, $6429, $6430, $6431, $6432, $6433, $6434, $6435, $6436, $6437, $6438, $6439, $6440, $6441, $6442, $6443, $6444, $6445, $6446, $6447, $6448, VersionRange($6449, $6450)), ($6451, $6452, $6453, $6454, $6455, $6456, $6457, $6458, $6459, $6460, $6461, $6462, $6463, $6464, $6465, $6466, $6467, $6468, $6469, $6470, $6471, $6472, $6473, $6474, $6475, $6476, $6477, $6478, VersionRange($6479, $6480)), ($6481, $6482, $6483, $6484, $6485, $6486, $6487, $6488, $6489, $6490, $6491, $6492, $6493, $6494, $6495, $6496, $6497, $6498, $6499, $6500, $6501, $6502, $6503, $6504, $6505, $6506, $6507, $6508, VersionRange($6509, $6510)), ($6511, $6512, $6513, $6514, $6515, $6516, $6517, $6518, $6519, $6520, $6521, $6522, $6523, $6524, $6525, $6526, $6527, $6528, $6529, $6530, $6531, $6532, $6533, $6534, $6535, $6536, $6537, $6538, VersionRange($6539, $6540)), ($6541, $6542, $6543, $6544, $6545, $6546, $6547, $6548, $6549, $6550, $6551, $6552, $6553, $6554, $6555, $6556, $6557, $6558, $6559, $6560, $6561, $6562, $6563, $6564, $6565, $6566, $6567, $6568, VersionRange($6569, $6570)), ($6571, $6572, $6573, $6574, $6575, $6576, $6577, $6578, $6579, $6580, $6581, $6582, $6583, $6584, $6585, $6586, $6587, $6588, $6589, $6590, $6591, $6592, $6593, $6594, $6595, $6596, $6597, $6598, VersionRange($6599, $6600)), ($6601, $6602, $6603, $6604, $6605, $6606, $6607, $6608, $6609, $6610, $6611, $6612, $6613, $6614, $6615, $6616, $6617, $6618, $6619, $6620, $6621, $6622, $6623, $6624, $6625, $6626, $6627, $6628, VersionRange($6629, $6630)), ($6631, $6632, $6633, $6634, $6635, $6636, $6637, $6638, $6639, $6640, $6641, $6642, $6643, $6644, $6645, $6646, $6647, $6648, $6649, $6650, $6651, $6652, $6653, $6654, $6655, $6656, $6657, $6658, VersionRange($6659, $6660)), ($6661, $6662, $6663, $6664, $6665, $6666, $6667, $6668, $6669, $6670, $6671, $6672, $6673, $6674, $6675, $6676, $6677, $6678, $6679, $6680, $6681, $6682, $6683, $6684, $6685, $6686, $6687, $6688, VersionRange($6689, $6690)), ($6691, $6692, $6693, $6694, $6695, $6696, $6697, $6698, $6699, $6700, $6701, $6702, $6703, $6704, $6705, $6706, $6707, $6708, $6709, $6710, $6711, $6712, $6713, $6714, $6715, $6716, $6717, $6718, VersionRange($6719, $6720)), ($6721, $6722, $6723, $6724, $6725, $6726, $6727, $6728, $6729, $6730, $6731, $6732, $6733, $6734, $6735, $6736, $6737, $6738, $6739, $6740, $6741, $6742, $6743, $6744, $6745, $6746, $6747, $6748, VersionRange($6749, $6750)), ($6751, $6752, $6753, $6754, $6755, $6756, $6757, $6758, $6759, $6760, $6761, $6762, $6763, $6764, $6765, $6766, $6767, $6768, $6769, $6770, $6771, $6772, $6773, $6774, $6775, $6776, $6777, $6778, VersionRange($6779, $6780)), ($6781, $6782, $6783, $6784, $6785, $6786, $6787, $6788, $6789, $6790, $6791, $6792, $6793, $6794, $6795, $6796, $6797, $6798, $6799, $6800, $6801, $6802, $6803, $6804, $6805, $6806, $6807, $6808, VersionRange($6809, $6810)), ($6811, $6812, $6813, $6814, $6815, $6816, $6817, $6818, $6819, $6820, $6821, $6822, $6823, $6824, $6825, $6826, $6827, $6828, $6829, $6830, $6831, $6832, $6833, $6834, $6835, $6836, $6837, $6838, VersionRange($6839, $6840)), ($6841, $6842, $6843, $6844, $6845, $6846, $6847, $6848, $6849, $6850, $6851, $6852, $6853, $6854, $6855, $6856, $6857, $6858, $6859, $6860, $6861, $6862, $6863, $6864, $6865, $6866, $6867, $6868, VersionRange($6869, $6870)), ($6871, $6872, $6873, $6874, $6875, $6876, $6877, $6878, $6879, $6880, $6881, $6882, $6883, $6884, $6885, $6886, $6887, $6888, $6889, $6890, $6891, $6892, $6893, $6894, $6895, $6896, $6897, $6898, VersionRange($6899, $6900)), ($6901, $6902, $6903, $6904, $6905, $6906, $6907, $6908, $6909, $6910, $6911, $6912, $6913, $6914, $6915, $6916, $6917, $6918, $6919, $6920, $6921, $6922, $6923, $6924, $6925, $6926, $6927, $6928, VersionRange($6929, $6930)), ($6931, $6932, $6933, $6934, $6935, $6936, $6937, $6938, $6939, $6940, $6941, $6942, $6943, $6944, $6945, $6946, $6947, $6948, $6949, $6950, $6951, $6952, $6953, $6954, $6955, $6956, $6957, $6958, VersionRange($6959, $6960)), ($6961, $6962, $6963, $6964, $6965, $6966, $6967, $6968, $6969, $6970, $6971, $6972, $6973, $6974, $6975, $6976, $6977, $6978, $6979, $6980, $6981, $6982, $6983, $6984, $6985, $6986, $6987, $6988, VersionRange($6989, $6990)), ($6991, $6992, $6993, $6994, $6995, $6996, $6997, $6998, $6999, $7000, $7001, $7002, $7003, $7004, $7005, $7006, $7007, $7008, $7009, $7010, $7011, $7012, $7013, $7014, $7015, $7016, $7017, $7018, VersionRange($7019, $7020)), ($7021, $7022, $7023, $7024, $7025, $7026, $7027, $7028, $7029, $7030, $7031, $7032, $7033, $7034, $7035, $7036, $7037, $7038, $7039, $7040, $7041, $7042, $7043, $7044, $7045, $7046, $7047, $7048, VersionRange($7049, $7050)), ($7051, $7052, $7053, $7054, $7055, $7056, $7057, $7058, $7059, $7060, $7061, $7062, $7063, $7064, $7065, $7066, $7067, $7068, $7069, $7070, $7071, $7072, $7073, $7074, $7075, $7076, $7077, $7078, VersionRange($7079, $7080)), ($7081, $7082, $7083, $7084, $7085, $7086, $7087, $7088, $7089, $7090, $7091, $7092, $7093, $7094, $7095, $7096, $7097, $7098, $7099, $7100, $7101, $7102, $7103, $7104, $7105, $7106, $7107, $7108, VersionRange($7109, $7110)), ($7111, $7112, $7113, $7114, $7115, $7116, $7117, $7118, $7119, $7120, $7121, $7122, $7123, $7124, $7125, $7126, $7127, $7128, $7129, $7130, $7131, $7132, $7133, $7134, $7135, $7136, $7137, $7138, VersionRange($7139, $7140)), ($7141, $7142, $7143, $7144, $7145, $7146, $7147, $7148, $7149, $7150, $7151, $7152, $7153, $7154, $7155, $7156, $7157, $7158, $7159, $7160, $7161, $7162, $7163, $7164, $7165, $7166, $7167, $7168, VersionRange($7169, $7170)), ($7171, $7172, $7173, $7174, $7175, $7176, $7177, $7178, $7179, $7180, $7181, $7182, $7183, $7184, $7185, $7186, $7187, $7188, $7189, $7190, $7191, $7192, $7193, $7194, $7195, $7196, $7197, $7198, VersionRange($7199, $7200)), ($7201, $7202, $7203, $7204, $7205, $7206, $7207, $7208, $7209, $7210, $7211, $7212, $7213, $7214, $7215, $7216, $7217, $7218, $7219, $7220, $7221, $7222, $7223, $7224, $7225, $7226, $7227, $7228, VersionRange($7229, $7230)), ($7231, $7232, $7233, $7234, $7235, $7236, $7237, $7238, $7239, $7240, $7241, $7242, $7243, $7244, $7245, $7246, $7247, $7248, $7249, $7250, $7251, $7252, $7253, $7254, $7255, $7256, $7257, $7258, VersionRange($7259, $7260)), ($7261, $7262, $7263, $7264, $7265, $7266, $7267, $7268, $7269, $7270, $7271, $7272, $7273, $7274, $7275, $7276, $7277, $7278, $7279, $7280, $7281, $7282, $7283, $7284, $7285, $7286, $7287, $7288, VersionRange($7289, $7290)), ($7291, $7292, $7293, $7294, $7295, $7296, $7297, $7298, $7299, $7300, $7301, $7302, $7303, $7304, $7305, $7306, $7307, $7308, $7309, $7310, $7311, $7312, $7313, $7314, $7315, $7316, $7317, $7318, VersionRange($7319, $7320)), ($7321, $7322, $7323, $7324, $7325, $7326, $7327, $7328, $7329, $7330, $7331, $7332, $7333, $7334, $7335, $7336, $7337, $7338, $7339, $7340, $7341, $7342, $7343, $7344, $7345, $7346, $7347, $7348, VersionRange($7349, $7350)), ($7351, $7352, $7353, $7354, $7355, $7356, $7357, $7358, $7359, $7360, $7361, $7362, $7363, $7364, $7365, $7366, $7367, $7368, $7369, $7370, $7371, $7372, $7373, $7374, $7375, $7376, $7377, $7378, VersionRange($7379, $7380)), ($7381, $7382, $7383, $7384, $7385, $7386, $7387, $7388, $7389, $7390, $7391, $7392, $7393, $7394, $7395, $7396, $7397, $7398, $7399, $7400, $7401, $7402, $7403, $7404, $7405, $7406, $7407, $7408, VersionRange($7409, $7410)), ($7411, $7412, $7413, $7414, $7415, $7416, $7417, $7418, $7419, $7420, $7421, $7422, $7423, $7424, $7425, $7426, $7427, $7428, $7429, $7430, $7431, $7432, $7433, $7434, $7435, $7436, $7437, $7438, VersionRange($7439, $7440)), ($7441, $7442, $7443, $7444, $7445, $7446, $7447, $7448, $7449, $7450, $7451, $7452, $7453, $7454, $7455, $7456, $7457, $7458, $7459, $7460, $7461, $7462, $7463, $7464, $7465, $7466, $7467, $7468, VersionRange($7469, $7470)), ($7471, $7472, $7473, $7474, $7475, $7476, $7477, $7478, $7479, $7480, $7481, $7482, $7483, $7484, $7485, $7486, $7487, $7488, $7489, $7490, $7491, $7492, $7493, $7494, $7495, $7496, $7497, $7498, VersionRange($7499, $7500)), ($7501, $7502, $7503, $7504, $7505, $7506, $7507, $7508, $7509, $7510, $7511, $7512, $7513, $7514, $7515, $7516, $7517, $7518, $7519, $7520, $7521, $7522, $7523, $7524, $7525, $7526, $7527, $7528, VersionRange($7529, $7530)), ($7531, $7532, $7533, $7534, $7535, $7536, $7537, $7538, $7539, $7540, $7541, $7542, $7543, $7544, $7545, $7546, $7547, $7548, $7549, $7550, $7551, $7552, $7553, $7554, $7555, $7556, $7557, $7558, VersionRange($7559, $7560)), ($7561, $7562, $7563, $7564, $7565, $7566, $7567, $7568, $7569, $7570, $7571, $7572, $7573, $7574, $7575, $7576, $7577, $7578, $7579, $7580, $7581, $7582, $7583, $7584, $7585, $7586, $7587, $7588, VersionRange($7589, $7590)), ($7591, $7592, $7593, $7594, $7595, $7596, $7597, $7598, $7599, $7600, $7601, $7602, $7603, $7604, $7605, $7606, $7607, $7608, $7609, $7610, $7611, $7612, $7613, $7614, $7615, $7616, $7617, $7618, VersionRange($7619, $7620)), ($7621, $7622, $7623, $7624, $7625, $7626, $7627, $7628, $7629, $7630, $7631, $7632, $7633, $7634, $7635, $7636, $7637, $7638, $7639, $7640, $7641, $7642, $7643, $7644, $7645, $7646, $7647, $7648, VersionRange($7649, $7650)), ($7651, $7652, $7653, $7654, $7655, $7656, $7657, $7658, $7659, $7660, $7661, $7662, $7663, $7664, $7665, $7666, $7667, $7668, $7669, $7670, $7671, $7672, $7673, $7674, $7675, $7676, $7677, $7678, VersionRange($7679, $7680)), ($7681, $7682, $7683, $7684, $7685, $7686, $7687, $7688, $7689, $7690, $7691, $7692, $7693, $7694, $7695, $7696, $7697, $7698, $7699, $7700, $7701, $7702, $7703, $7704, $7705, $7706, $7707, $7708, VersionRange($7709, $7710)), ($7711, $7712, $7713, $7714, $7715, $7716, $7717, $7718, $7719, $7720, $7721, $7722, $7723, $7724, $7725, $7726, $7727, $7728, $7729, $7730, $7731, $7732, $7733, $7734, $7735, $7736, $7737, $7738, VersionRange($7739, $7740)), ($7741, $7742, $7743, $7744, $7745, $7746, $7747, $7748, $7749, $7750, $7751, $7752, $7753, $7754, $7755, $7756, $7757, $7758, $7759, $7760, $7761, $7762, $7763, $7764, $7765, $7766, $7767, $7768, VersionRange($7769, $7770)), ($7771, $7772, $7773, $7774, $7775, $7776, $7777, $7778, $7779, $7780, $7781, $7782, $7783, $7784, $7785, $7786, $7787, $7788, $7789, $7790, $7791, $7792, $7793, $7794, $7795, $7796, $7797, $7798, VersionRange($7799, $7800)), ($7801, $7802, $7803, $7804, $7805, $7806, $7807, $7808, $7809, $7810, $7811, $7812, $7813, $7814, $7815, $7816, $7817, $7818, $7819, $7820, $7821, $7822, $7823, $7824, $7825, $7826, $7827, $7828, VersionRange($7829, $7830)), ($7831, $7832, $7833, $7834, $7835, $7836, $7837, $7838, $7839, $7840, $7841, $7842, $7843, $7844, $7845, $7846, $7847, $7848, $7849, $7850, $7851, $7852, $7853, $7854, $7855, $7856, $7857, $7858, VersionRange($7859, $7860)), ($7861, $7862, $7863, $7864, $7865, $7866, $7867, $7868, $7869, $7870, $7871, $7872, $7873, $7874, $7875, $7876, $7877, $7878, $7879, $7880, $7881, $7882, $7883, $7884, $7885, $7886, $7887, $7888, VersionRange($7889, $7890)), ($7891, $7892, $7893, $7894, $7895, $7896, $7897, $7898, $7899, $7900, $7901, $7902, $7903, $7904, $7905, $7906, $7907, $7908, $7909, $7910, $7911, $7912, $7913, $7914, $7915, $7916, $7917, $7918, VersionRange($7919, $7920)), ($7921, $7922, $7923, $7924, $7925, $7926, $7927, $7928, $7929, $7930, $7931, $7932, $7933, $7934, $7935, $7936, $7937, $7938, $7939, $7940, $7941, $7942, $7943, $7944, $7945, $7946, $7947, $7948, VersionRange($7949, $7950)), ($7951, $7952, $7953, $7954, $7955, $7956, $7957, $7958, $7959, $7960, $7961, $7962, $7963, $7964, $7965, $7966, $7967, $7968, $7969, $7970, $7971, $7972, $7973, $7974, $7975, $7976, $7977, $7978, VersionRange($7979, $7980)), ($7981, $7982, $7983, $7984, $7985, $7986, $7987, $7988, $7989, $7990, $7991, $7992, $7993, $7994, $7995, $7996, $7997, $7998, $7999, $8000, $8001, $8002, $8003, $8004, $8005, $8006, $8007, $8008, VersionRange($8009, $8010)), ($8011, $8012, $8013, $8014, $8015, $8016, $8017, $8018, $8019, $8020, $8021, $8022, $8023, $8024, $8025, $8026, $8027, $8028, $8029, $8030, $8031, $8032, $8033, $8034, $8035, $8036, $8037, $8038, VersionRange($8039, $8040)), ($8041, $8042, $8043, $8044, $8045, $8046, $8047, $8048, $8049, $8050, $8051, $8052, $8053, $8054, $8055, $8056, $8057, $8058, $8059, $8060, $8061, $8062, $8063, $8064, $8065, $8066, $8067, $8068, VersionRange($8069, $8070)), ($8071, $8072, $8073, $8074, $8075, $8076, $8077, $8078, $8079, $8080, $8081, $8082, $8083, $8084, $8085, $8086, $8087, $8088, $8089, $8090, $8091, $8092, $8093, $8094, $8095, $8096, $8097, $8098, VersionRange($8099, $8100)), ($8101, $8102, $8103, $8104, $8105, $8106, $8107, $8108, $8109, $8110, $8111, $8112, $8113, $8114, $8115, $8116, $8117, $8118, $8119, $8120, $8121, $8122, $8123, $8124, $8125, $8126, $8127, $8128, VersionRange($8129, $8130)), ($8131, $8132, $8133, $8134, $8135, $8136, $8137, $8138, $8139, $8140, $8141, $8142, $8143, $8144, $8145, $8146, $8147, $8148, $8149, $8150, $8151, $8152, $8153, $8154, $8155, $8156, $8157, $8158, VersionRange($8159, $8160)), ($8161, $8162, $8163, $8164, $8165, $8166, $8167, $8168, $8169, $8170, $8171, $8172, $8173, $8174, $8175, $8176, $8177, $8178, $8179, $8180, $8181, $8182, $8183, $8184, $8185, $8186, $8187, $8188, VersionRange($8189, $8190)), ($8191, $8192, $8193, $8194, $8195, $8196, $8197, $8198, $8199, $8200, $8201, $8202, $8203, $8204, $8205, $8206, $8207, $8208, $8209, $8210, $8211, $8212, $8213, $8214, $8215, $8216, $8217, $8218, VersionRange($8219, $8220)), ($8221, $8222, $8223, $8224, $8225, $8226, $8227, $8228, $8229, $8230, $8231, $8232, $8233, $8234, $8235, $8236, $8237, $8238, $8239, $8240, $8241, $8242, $8243, $8244, $8245, $8246, $8247, $8248, VersionRange($8249, $8250)), ($8251, $8252, $8253, $8254, $8255, $8256, $8257, $8258, $8259, $8260, $8261, $8262, $8263, $8264, $8265, $8266, $8267, $8268, $8269, $8270, $8271, $8272, $8273, $8274, $8275, $8276, $8277, $8278, VersionRange($8279, $8280)), ($8281, $8282, $8283, $8284, $8285, $8286, $8287, $8288, $8289, $8290, $8291, $8292, $8293, $8294, $8295, $8296, $8297, $8298, $8299, $8300, $8301, $8302, $8303, $8304, $8305, $8306, $8307, $8308, VersionRange($8309, $8310)), ($8311, $8312, $8313, $8314, $8315, $8316, $8317, $8318, $8319, $8320, $8321, $8322, $8323, $8324, $8325, $8326, $8327, $8328, $8329, $8330, $8331, $8332, $8333, $8334, $8335, $8336, $8337, $8338, VersionRange($8339, $8340)), ($8341, $8342, $8343, $8344, $8345, $8346, $8347, $8348, $8349, $8350, $8351, $8352, $8353, $8354, $8355, $8356, $8357, $8358, $8359, $8360, $8361, $8362, $8363, $8364, $8365, $8366, $8367, $8368, VersionRange($8369, $8370)), ($8371, $8372, $8373, $8374, $8375, $8376, $8377, $8378, $8379, $8380, $8381, $8382, $8383, $8384, $8385, $8386, $8387, $8388, $8389, $8390, $8391, $8392, $8393, $8394, $8395, $8396, $8397, $8398, VersionRange($8399, $8400)), ($8401, $8402, $8403, $8404, $8405, $8406, $8407, $8408, $8409, $8410, $8411, $8412, $8413, $8414, $8415, $8416, $8417, $8418, $8419, $8420, $8421, $8422, $8423, $8424, $8425, $8426, $8427, $8428, VersionRange($8429, $8430)), ($8431, $8432, $8433, $8434, $8435, $8436, $8437, $8438, $8439, $8440, $8441, $8442, $8443, $8444, $8445, $8446, $8447, $8448, $8449, $8450, $8451, $8452, $8453, $8454, $8455, $8456, $8457, $8458, VersionRange($8459, $8460)), ($8461, $8462, $8463, $8464, $8465, $8466, $8467, $8468, $8469, $8470, $8471, $8472, $8473, $8474, $8475, $8476, $8477, $8478, $8479, $8480, $8481, $8482, $8483, $8484, $8485, $8486, $8487, $8488, VersionRange($8489, $8490)), ($8491, $8492, $8493, $8494, $8495, $8496, $8497, $8498, $8499, $8500, $8501, $8502, $8503, $8504, $8505, $8506, $8507, $8508, $8509, $8510, $8511, $8512, $8513, $8514, $8515, $8516, $8517, $8518, VersionRange($8519, $8520)), ($8521, $8522, $8523, $8524, $8525, $8526, $8527, $8528, $8529, $8530, $8531, $8532, $8533, $8534, $8535, $8536, $8537, $8538, $8539, $8540, $8541, $8542, $8543, $8544, $8545, $8546, $8547, $8548, VersionRange($8549, $8550)), ($8551, $8552, $8553, $8554, $8555, $8556, $8557, $8558, $8559, $8560, $8561, $8562, $8563, $8564, $8565, $8566, $8567, $8568, $8569, $8570, $8571, $8572, $8573, $8574, $8575, $8576, $8577, $8578, VersionRange($8579, $8580)), ($8581, $8582, $8583, $8584, $8585, $8586, $8587, $8588, $8589, $8590, $8591, $8592, $8593, $8594, $8595, $8596, $8597, $8598, $8599, $8600, $8601, $8602, $8603, $8604, $8605, $8606, $8607, $8608, VersionRange($8609, $8610)), ($8611, $8612, $8613, $8614, $8615, $8616, $8617, $8618, $8619, $8620, $8621, $8622, $8623, $8624, $8625, $8626, $8627, $8628, $8629, $8630, $8631, $8632, $8633, $8634, $8635, $8636, $8637, $8638, VersionRange($8639, $8640)), ($8641, $8642, $8643, $8644, $8645, $8646, $8647, $8648, $8649, $8650, $8651, $8652, $8653, $8654, $8655, $8656, $8657, $8658, $8659, $8660, $8661, $8662, $8663, $8664, $8665, $8666, $8667, $8668, VersionRange($8669, $8670)), ($8671, $8672, $8673, $8674, $8675, $8676, $8677, $8678, $8679, $8680, $8681, $8682, $8683, $8684, $8685, $8686, $8687, $8688, $8689, $8690, $8691, $8692, $8693, $8694, $8695, $8696, $8697, $8698, VersionRange($8699, $8700)), ($8701, $8702, $8703, $8704, $8705, $8706, $8707, $8708, $8709, $8710, $8711, $8712, $8713, $8714, $8715, $8716, $8717, $8718, $8719, $8720, $8721, $8722, $8723, $8724, $8725, $8726, $8727, $8728, VersionRange($8729, $8730)), ($8731, $8732, $8733, $8734, $8735, $8736, $8737, $8738, $8739, $8740, $8741, $8742, $8743, $8744, $8745, $8746, $8747, $8748, $8749, $8750, $8751, $8752, $8753, $8754, $8755, $8756, $8757, $8758, VersionRange($8759, $8760)), ($8761, $8762, $8763, $8764, $8765, $8766, $8767, $8768, $8769, $8770, $8771, $8772, $8773, $8774, $8775, $8776, $8777, $8778, $8779, $8780, $8781, $8782, $8783, $8784, $8785, $8786, $8787, $8788, VersionRange($8789, $8790)), ($8791, $8792, $8793, $8794, $8795, $8796, $8797, $8798, $8799, $8800, $8801, $8802, $8803, $8804, $8805, $8806, $8807, $8808, $8809, $8810, $8811, $8812, $8813, $8814, $8815, $8816, $8817, $8818, VersionRange($8819, $8820)), ($8821, $8822, $8823, $8824, $8825, $8826, $8827, $8828, $8829, $8830, $8831, $8832, $8833, $8834, $8835, $8836, $8837, $8838, $8839, $8840, $8841, $8842, $8843, $8844, $8845, $8846, $8847, $8848, VersionRange($8849, $8850)), ($8851, $8852, $8853, $8854, $8855, $8856, $8857, $8858, $8859, $8860, $8861, $8862, $8863, $8864, $8865, $8866, $8867, $8868, $8869, $8870, $8871, $8872, $8873, $8874, $8875, $8876, $8877, $8878, VersionRange($8879, $8880)), ($8881, $8882, $8883, $8884, $8885, $8886, $8887, $8888, $8889, $8890, $8891, $8892, $8893, $8894, $8895, $8896, $8897, $8898, $8899, $8900, $8901, $8902, $8903, $8904, $8905, $8906, $8907, $8908, VersionRange($8909, $8910)), ($8911, $8912, $8913, $8914, $8915, $8916, $8917, $8918, $8919, $8920, $8921, $8922, $8923, $8924, $8925, $8926, $8927, $8928, $8929, $8930, $8931, $8932, $8933, $8934, $8935, $8936, $8937, $8938, VersionRange($8939, $8940)), ($8941, $8942, $8943, $8944, $8945, $8946, $8947, $8948, $8949, $8950, $8951, $8952, $8953, $8954, $8955, $8956, $8957, $8958, $8959, $8960, $8961, $8962, $8963, $8964, $8965, $8966, $8967, $8968, VersionRange($8969, $8970)), ($8971, $8972, $8973, $8974, $8975, $8976, $8977, $8978, $8979, $8980, $8981, $8982, $8983, $8984, $8985, $8986, $8987, $8988, $8989, $8990, $8991, $8992, $8993, $8994, $8995, $8996, $8997, $8998, VersionRange($8999, $9000)), ($9001, $9002, $9003, $9004, $9005, $9006, $9007, $9008, $9009, $9010, $9011, $9012, $9013, $9014, $9015, $9016, $9017, $9018, $9019, $9020, $9021, $9022, $9023, $9024, $9025, $9026, $9027, $9028, VersionRange($9029, $9030)), ($9031, $9032, $9033, $9034, $9035, $9036, $9037, $9038, $9039, $9040, $9041, $9042, $9043, $9044, $9045, $9046, $9047, $9048, $9049, $9050, $9051, $9052, $9053, $9054, $9055, $9056, $9057, $9058, VersionRange($9059, $9060)), ($9061, $9062, $9063, $9064, $9065, $9066, $9067, $9068, $9069, $9070, $9071, $9072, $9073, $9074, $9075, $9076, $9077, $9078, $9079, $9080, $9081, $9082, $9083, $9084, $9085, $9086, $9087, $9088, VersionRange($9089, $9090)), ($9091, $9092, $9093, $9094, $9095, $9096, $9097, $9098, $9099, $9100, $9101, $9102, $9103, $9104, $9105, $9106, $9107, $9108, $9109, $9110, $9111, $9112, $9113, $9114, $9115, $9116, $9117, $9118, VersionRange($9119, $9120)), ($9121, $9122, $9123, $9124, $9125, $9126, $9127, $9128, $9129, $9130, $9131, $9132, $9133, $9134, $9135, $9136, $9137, $9138, $9139, $9140, $9141, $9142, $9143, $9144, $9145, $9146, $9147, $9148, VersionRange($9149, $9150)), ($9151, $9152, $9153, $9154, $9155, $9156, $9157, $9158, $9159, $9160, $9161, $9162, $9163, $9164, $9165, $9166, $9167, $9168, $9169, $9170, $9171, $9172, $9173, $9174, $9175, $9176, $9177, $9178, VersionRange($9179, $9180)), ($9181, $9182, $9183, $9184, $9185, $9186, $9187, $9188, $9189, $9190, $9191, $9192, $9193, $9194, $9195, $9196, $9197, $9198, $9199, $9200, $9201, $9202, $9203, $9204, $9205, $9206, $9207, $9208, VersionRange($9209, $9210)), ($9211, $9212, $9213, $9214, $9215, $9216, $9217, $9218, $9219, $9220, $9221, $9222, $9223, $9224, $9225, $9226, $9227, $9228, $9229, $9230, $9231, $9232, $9233, $9234, $9235, $9236, $9237, $9238, VersionRange($9239, $9240)), ($9241, $9242, $9243, $9244, $9245, $9246, $9247, $9248, $9249, $9250, $9251, $9252, $9253, $9254, $9255, $9256, $9257, $9258, $9259, $9260, $9261, $9262, $9263, $9264, $9265, $9266, $9267, $9268, VersionRange($9269, $9270)), ($9271, $9272, $9273, $9274, $9275, $9276, $9277, $9278, $9279, $9280, $9281, $9282, $9283, $9284, $9285, $9286, $9287, $9288, $9289, $9290, $9291, $9292, $9293, $9294, $9295, $9296, $9297, $9298, VersionRange($9299, $9300)), ($9301, $9302, $9303, $9304, $9305, $9306, $9307, $9308, $9309, $9310, $9311, $9312, $9313, $9314, $9315, $9316, $9317, $9318, $9319, $9320, $9321, $9322, $9323, $9324, $9325, $9326, $9327, $9328, VersionRange($9329, $9330)), ($9331, $9332, $9333, $9334, $9335, $9336, $9337, $9338, $9339, $9340, $9341, $9342, $9343, $9344, $9345, $9346, $9347, $9348, $9349, $9350, $9351, $9352, $9353, $9354, $9355, $9356, $9357, $9358, VersionRange($9359, $9360)), ($9361, $9362, $9363, $9364, $9365, $9366, $9367, $9368, $9369, $9370, $9371, $9372, $9373, $9374, $9375, $9376, $9377, $9378, $9379, $9380, $9381, $9382, $9383, $9384, $9385, $9386, $9387, $9388, VersionRange($9389, $9390)), ($9391, $9392, $9393, $9394, $9395, $9396, $9397, $9398, $9399, $9400, $9401, $9402, $9403, $9404, $9405, $9406, $9407, $9408, $9409, $9410, $9411, $9412, $9413, $9414, $9415, $9416, $9417, $9418, VersionRange($9419, $9420)), ($9421, $9422, $9423, $9424, $9425, $9426, $9427, $9428, $9429, $9430, $9431, $9432, $9433, $9434, $9435, $9436, $9437, $9438, $9439, $9440, $9441, $9442, $9443, $9444, $9445, $9446, $9447, $9448, VersionRange($9449, $9450)), ($9451, $9452, $9453, $9454, $9455, $9456, $9457, $9458, $9459, $9460, $9461, $9462, $9463, $9464, $9465, $9466, $9467, $9468, $9469, $9470, $9471, $9472, $9473, $9474, $9475, $9476, $9477, $9478, VersionRange($9479, $9480)), ($9481, $9482, $9483, $9484, $9485, $9486, $9487, $9488, $9489, $9490, $9491, $9492, $9493, $9494, $9495, $9496, $9497, $9498, $9499, $9500, $9501, $9502, $9503, $9504, $9505, $9506, $9507, $9508, VersionRange($9509, $9510)), ($9511, $9512, $9513, $9514, $9515, $9516, $9517, $9518, $9519, $9520, $9521, $9522, $9523, $9524, $9525, $9526, $9527, $9528, $9529, $9530, $9531, $9532, $9533, $9534, $9535, $9536, $9537, $9538, VersionRange($9539, $9540)), ($9541, $9542, $9543, $9544, $9545, $9546, $9547, $9548, $9549, $9550, $9551, $9552, $9553, $9554, $9555, $9556, $9557, $9558, $9559, $9560, $9561, $9562, $9563, $9564, $9565, $9566, $9567, $9568, VersionRange($9569, $9570)), ($9571, $9572, $9573, $9574, $9575, $9576, $9577, $9578, $9579, $9580, $9581, $9582, $9583, $9584, $9585, $9586, $9587, $9588, $9589, $9590, $9591, $9592, $9593, $9594, $9595, $9596, $9597, $9598, VersionRange($9599, $9600)), ($9601, $9602, $9603, $9604, $9605, $9606, $9607, $9608, $9609, $9610, $9611, $9612, $9613, $9614, $9615, $9616, $9617, $9618, $9619, $9620, $9621, $9622, $9623, $9624, $9625, $9626, $9627, $9628, VersionRange($9629, $9630)), ($9631, $9632, $9633, $9634, $9635, $9636, $9637, $9638, $9639, $9640, $9641, $9642, $9643, $9644, $9645, $9646, $9647, $9648, $9649, $9650, $9651, $9652, $9653, $9654, $9655, $9656, $9657, $9658, VersionRange($9659, $9660)), ($9661, $9662, $9663, $9664, $9665, $9666, $9667, $9668, $9669, $9670, $9671, $9672, $9673, $9674, $9675, $9676, $9677, $9678, $9679, $9680, $9681, $9682, $9683, $9684, $9685, $9686, $9687, $9688, VersionRange($9689, $9690)), ($9691, $9692, $9693, $9694, $9695, $9696, $9697, $9698, $9699, $9700, $9701, $9702, $9703, $9704, $9705, $9706, $9707, $9708, $9709, $9710, $9711, $9712, $9713, $9714, $9715, $9716, $9717, $9718, VersionRange($9719, $9720)), ($9721, $9722, $9723, $9724, $9725, $9726, $9727, $9728, $9729, $9730, $9731, $9732, $9733, $9734, $9735, $9736, $9737, $9738, $9739, $9740, $9741, $9742, $9743, $9744, $9745, $9746, $9747, $9748, VersionRange($9749, $9750)), ($9751, $9752, $9753, $9754, $9755, $9756, $9757, $9758, $9759, $9760, $9761, $9762, $9763, $9764, $9765, $9766, $9767, $9768, $9769, $9770, $9771, $9772, $9773, $9774, $9775, $9776, $9777, $9778, VersionRange($9779, $9780)), ($9781, $9782, $9783, $9784, $9785, $9786, $9787, $9788, $9789, $9790, $9791, $9792, $9793, $9794, $9795, $9796, $9797, $9798, $9799, $9800, $9801, $9802, $9803, $9804, $9805, $9806, $9807, $9808, VersionRange($9809, $9810)), ($9811, $9812, $9813, $9814, $9815, $9816, $9817, $9818, $9819, $9820, $9821, $9822, $9823, $9824, $9825, $9826, $9827, $9828, $9829, $9830, $9831, $9832, $9833, $9834, $9835, $9836, $9837, $9838, VersionRange($9839, $9840)), ($9841, $9842, $9843, $9844, $9845, $9846, $9847, $9848, $9849, $9850, $9851, $9852, $9853, $9854, $9855, $9856, $9857, $9858, $9859, $9860, $9861, $9862, $9863, $9864, $9865, $9866, $9867, $9868, VersionRange($9869, $9870)), ($9871, $9872, $9873, $9874, $9875, $9876, $9877, $9878, $9879, $9880, $9881, $9882, $9883, $9884, $9885, $9886, $9887, $9888, $9889, $9890, $9891, $9892, $9893, $9894, $9895, $9896, $9897, $9898, VersionRange($9899, $9900)), ($9901, $9902, $9903, $9904, $9905, $9906, $9907, $9908, $9909, $9910, $9911, $9912, $9913, $9914, $9915, $9916, $9917, $9918, $9919, $9920, $9921, $9922, $9923, $9924, $9925, $9926, $9927, $9928, VersionRange($9929, $9930)), ($9931, $9932, $9933, $9934, $9935, $9936, $9937, $9938, $9939, $9940, $9941, $9942, $9943, $9944, $9945, $9946, $9947, $9948, $9949, $9950, $9951, $9952, $9953, $9954, $9955, $9956, $9957, $9958, VersionRange($9959, $9960)), ($9961, $9962, $9963, $9964, $9965, $9966, $9967, $9968, $9969, $9970, $9971, $9972, $9973, $9974, $9975, $9976, $9977, $9978, $9979, $9980, $9981, $9982, $9983, $9984, $9985, $9986, $9987, $9988, VersionRange($9989, $9990)), ($9991, $9992, $9993, $9994, $9995, $9996, $9997, $9998, $9999, $10000, $10001, $10002, $10003, $10004, $10005, $10006, $10007, $10008, $10009, $10010, $10011, $10012, $10013, $10014, $10015, $10016, $10017, $10018, VersionRange($10019, $10020)), ($10021, $10022, $10023, $10024, $10025, $10026, $10027, $10028, $10029, $10030, $10031, $10032, $10033, $10034, $10035, $10036, $10037, $10038, $10039, $10040, $10041, $10042, $10043, $10044, $10045, $10046, $10047, $10048, VersionRange($10049, $10050)), ($10051, $10052, $10053, $10054, $10055, $10056, $10057, $10058, $10059, $10060, $10061, $10062, $10063, $10064, $10065, $10066, $10067, $10068, $10069, $10070, $10071, $10072, $10073, $10074, $10075, $10076, $10077, $10078, VersionRange($10079, $10080)), ($10081, $10082, $10083, $10084, $10085, $10086, $10087, $10088, $10089, $10090, $10091, $10092, $10093, $10094, $10095, $10096, $10097, $10098, $10099, $10100, $10101, $10102, $10103, $10104, $10105, $10106, $10107, $10108, VersionRange($10109, $10110)), ($10111, $10112, $10113, $10114, $10115, $10116, $10117, $10118, $10119, $10120, $10121, $10122, $10123, $10124, $10125, $10126, $10127, $10128, $10129, $10130, $10131, $10132, $10133, $10134, $10135, $10136, $10137, $10138, VersionRange($10139, $10140)), ($10141, $10142, $10143, $10144, $10145, $10146, $10147, $10148, $10149, $10150, $10151, $10152, $10153, $10154, $10155, $10156, $10157, $10158, $10159, $10160, $10161, $10162, $10163, $10164, $10165, $10166, $10167, $10168, VersionRange($10169, $10170)), ($10171, $10172, $10173, $10174, $10175, $10176, $10177, $10178, $10179, $10180, $10181, $10182, $10183, $10184, $10185, $10186, $10187, $10188, $10189, $10190, $10191, $10192, $10193, $10194, $10195, $10196, $10197, $10198, VersionRange($10199, $10200)), ($10201, $10202, $10203, $10204, $10205, $10206, $10207, $10208, $10209, $10210, $10211, $10212, $10213, $10214, $10215, $10216, $10217, $10218, $10219, $10220, $10221, $10222, $10223, $10224, $10225, $10226, $10227, $10228, VersionRange($10229, $10230)), ($10231, $10232, $10233, $10234, $10235, $10236, $10237, $10238, $10239, $10240, $10241, $10242, $10243, $10244, $10245, $10246, $10247, $10248, $10249, $10250, $10251, $10252, $10253, $10254, $10255, $10256, $10257, $10258, VersionRange($10259, $10260)), ($10261, $10262, $10263, $10264, $10265, $10266, $10267, $10268, $10269, $10270, $10271, $10272, $10273, $10274, $10275, $10276, $10277, $10278, $10279, $10280, $10281, $10282, $10283, $10284, $10285, $10286, $10287, $10288, VersionRange($10289, $10290)), ($10291, $10292, $10293, $10294, $10295, $10296, $10297, $10298, $10299, $10300, $10301, $10302, $10303, $10304, $10305, $10306, $10307, $10308, $10309, $10310, $10311, $10312, $10313, $10314, $10315, $10316, $10317, $10318, VersionRange($10319, $10320)), ($10321, $10322, $10323, $10324, $10325, $10326, $10327, $10328, $10329, $10330, $10331, $10332, $10333, $10334, $10335, $10336, $10337, $10338, $10339, $10340, $10341, $10342, $10343, $10344, $10345, $10346, $10347, $10348, VersionRange($10349, $10350)), ($10351, $10352, $10353, $10354, $10355, $10356, $10357, $10358, $10359, $10360, $10361, $10362, $10363, $10364, $10365, $10366, $10367, $10368, $10369, $10370, $10371, $10372, $10373, $10374, $10375, $10376, $10377, $10378, VersionRange($10379, $10380)), ($10381, $10382, $10383, $10384, $10385, $10386, $10387, $10388, $10389, $10390, $10391, $10392, $10393, $10394, $10395, $10396, $10397, $10398, $10399, $10400, $10401, $10402, $10403, $10404, $10405, $10406, $10407, $10408, VersionRange($10409, $10410)), ($10411, $10412, $10413, $10414, $10415, $10416, $10417, $10418, $10419, $10420, $10421, $10422, $10423, $10424, $10425, $10426, $10427, $10428, $10429, $10430, $10431, $10432, $10433, $10434, $10435, $10436, $10437, $10438, VersionRange($10439, $10440)), ($10441, $10442, $10443, $10444, $10445, $10446, $10447, $10448, $10449, $10450, $10451, $10452, $10453, $10454, $10455, $10456, $10457, $10458, $10459, $10460, $10461, $10462, $10463, $10464, $10465, $10466, $10467, $10468, VersionRange($10469, $10470)), ($10471, $10472, $10473, $10474, $10475, $10476, $10477, $10478, $10479, $10480, $10481, $10482, $10483, $10484, $10485, $10486, $10487, $10488, $10489, $10490, $10491, $10492, $10493, $10494, $10495, $10496, $10497, $10498, VersionRange($10499, $10500)), ($10501, $10502, $10503, $10504, $10505, $10506, $10507, $10508, $10509, $10510, $10511, $10512, $10513, $10514, $10515, $10516, $10517, $10518, $10519, $10520, $10521, $10522, $10523, $10524, $10525, $10526, $10527, $10528, VersionRange($10529, $10530)), ($10531, $10532, $10533, $10534, $10535, $10536, $10537, $10538, $10539, $10540, $10541, $10542, $10543, $10544, $10545, $10546, $10547, $10548, $10549, $10550, $10551, $10552, $10553, $10554, $10555, $10556, $10557, $10558, VersionRange($10559, $10560)), ($10561, $10562, $10563, $10564, $10565, $10566, $10567, $10568, $10569, $10570, $10571, $10572, $10573, $10574, $10575, $10576, $10577, $10578, $10579, $10580, $10581, $10582, $10583, $10584, $10585, $10586, $10587, $10588, VersionRange($10589, $10590)), ($10591, $10592, $10593, $10594, $10595, $10596, $10597, $10598, $10599, $10600, $10601, $10602, $10603, $10604, $10605, $10606, $10607, $10608, $10609, $10610, $10611, $10612, $10613, $10614, $10615, $10616, $10617, $10618, VersionRange($10619, $10620)), ($10621, $10622, $10623, $10624, $10625, $10626, $10627, $10628, $10629, $10630, $10631, $10632, $10633, $10634, $10635, $10636, $10637, $10638, $10639, $10640, $10641, $10642, $10643, $10644, $10645, $10646, $10647, $10648, VersionRange($10649, $10650)), ($10651, $10652, $10653, $10654, $10655, $10656, $10657, $10658, $10659, $10660, $10661, $10662, $10663, $10664, $10665, $10666, $10667, $10668, $10669, $10670, $10671, $10672, $10673, $10674, $10675, $10676, $10677, $10678, VersionRange($10679, $10680)), ($10681, $10682, $10683, $10684, $10685, $10686, $10687, $10688, $10689, $10690, $10691, $10692, $10693, $10694, $10695, $10696, $10697, $10698, $10699, $10700, $10701, $10702, $10703, $10704, $10705, $10706, $10707, $10708, VersionRange($10709, $10710)), ($10711, $10712, $10713, $10714, $10715, $10716, $10717, $10718, $10719, $10720, $10721, $10722, $10723, $10724, $10725, $10726, $10727, $10728, $10729, $10730, $10731, $10732, $10733, $10734, $10735, $10736, $10737, $10738, VersionRange($10739, $10740)), ($10741, $10742, $10743, $10744, $10745, $10746, $10747, $10748, $10749, $10750, $10751, $10752, $10753, $10754, $10755, $10756, $10757, $10758, $10759, $10760, $10761, $10762, $10763, $10764, $10765, $10766, $10767, $10768, VersionRange($10769, $10770)), ($10771, $10772, $10773, $10774, $10775, $10776, $10777, $10778, $10779, $10780, $10781, $10782, $10783, $10784, $10785, $10786, $10787, $10788, $10789, $10790, $10791, $10792, $10793, $10794, $10795, $10796, $10797, $10798, VersionRange($10799, $10800)), ($10801, $10802, $10803, $10804, $10805, $10806, $10807, $10808, $10809, $10810, $10811, $10812, $10813, $10814, $10815, $10816, $10817, $10818, $10819, $10820, $10821, $10822, $10823, $10824, $10825, $10826, $10827, $10828, VersionRange($10829, $10830)), ($10831, $10832, $10833, $10834, $10835, $10836, $10837, $10838, $10839, $10840, $10841, $10842, $10843, $10844, $10845, $10846, $10847, $10848, $10849, $10850, $10851, $10852, $10853, $10854, $10855, $10856, $10857, $10858, VersionRange($10859, $10860)), ($10861, $10862, $10863, $10864, $10865, $10866, $10867, $10868, $10869, $10870, $10871, $10872, $10873, $10874, $10875, $10876, $10877, $10878, $10879, $10880, $10881, $10882, $10883, $10884, $10885, $10886, $10887, $10888, VersionRange($10889, $10890)), ($10891, $10892, $10893, $10894, $10895, $10896, $10897, $10898, $10899, $10900, $10901, $10902, $10903, $10904, $10905, $10906, $10907, $10908, $10909, $10910, $10911, $10912, $10913, $10914, $10915, $10916, $10917, $10918, VersionRange($10919, $10920)), ($10921, $10922, $10923, $10924, $10925, $10926, $10927, $10928, $10929, $10930, $10931, $10932, $10933, $10934, $10935, $10936, $10937, $10938, $10939, $10940, $10941, $10942, $10943, $10944, $10945, $10946, $10947, $10948, VersionRange($10949, $10950)), ($10951, $10952, $10953, $10954, $10955, $10956, $10957, $10958, $10959, $10960, $10961, $10962, $10963, $10964, $10965, $10966, $10967, $10968, $10969, $10970, $10971, $10972, $10973, $10974, $10975, $10976, $10977, $10978, VersionRange($10979, $10980)), ($10981, $10982, $10983, $10984, $10985, $10986, $10987, $10988, $10989, $10990, $10991, $10992, $10993, $10994, $10995, $10996, $10997, $10998, $10999, $11000, $11001, $11002, $11003, $11004, $11005, $11006, $11007, $11008, VersionRange($11009, $11010)), ($11011, $11012, $11013, $11014, $11015, $11016, $11017, $11018, $11019, $11020, $11021, $11022, $11023, $11024, $11025, $11026, $11027, $11028, $11029, $11030, $11031, $11032, $11033, $11034, $11035, $11036, $11037, $11038, VersionRange($11039, $11040)), ($11041, $11042, $11043, $11044, $11045, $11046, $11047, $11048, $11049, $11050, $11051, $11052, $11053, $11054, $11055, $11056, $11057, $11058, $11059, $11060, $11061, $11062, $11063, $11064, $11065, $11066, $11067, $11068, VersionRange($11069, $11070)), ($11071, $11072, $11073, $11074, $11075, $11076, $11077, $11078, $11079, $11080, $11081, $11082, $11083, $11084, $11085, $11086, $11087, $11088, $11089, $11090, $11091, $11092, $11093, $11094, $11095, $11096, $11097, $11098, VersionRange($11099, $11100)), ($11101, $11102, $11103, $11104, $11105, $11106, $11107, $11108, $11109, $11110, $11111, $11112, $11113, $11114, $11115, $11116, $11117, $11118, $11119, $11120, $11121, $11122, $11123, $11124, $11125, $11126, $11127, $11128, VersionRange($11129, $11130)), ($11131, $11132, $11133, $11134, $11135, $11136, $11137, $11138, $11139, $11140, $11141, $11142, $11143, $11144, $11145, $11146, $11147, $11148, $11149, $11150, $11151, $11152, $11153, $11154, $11155, $11156, $11157, $11158, VersionRange($11159, $11160)), ($11161, $11162, $11163, $11164, $11165, $11166, $11167, $11168, $11169, $11170, $11171, $11172, $11173, $11174, $11175, $11176, $11177, $11178, $11179, $11180, $11181, $11182, $11183, $11184, $11185, $11186, $11187, $11188, VersionRange($11189, $11190)), ($11191, $11192, $11193, $11194, $11195, $11196, $11197, $11198, $11199, $11200, $11201, $11202, $11203, $11204, $11205, $11206, $11207, $11208, $11209, $11210, $11211, $11212, $11213, $11214, $11215, $11216, $11217, $11218, VersionRange($11219, $11220)), ($11221, $11222, $11223, $11224, $11225, $11226, $11227, $11228, $11229, $11230, $11231, $11232, $11233, $11234, $11235, $11236, $11237, $11238, $11239, $11240, $11241, $11242, $11243, $11244, $11245, $11246, $11247, $11248, VersionRange($11249, $11250)), ($11251, $11252, $11253, $11254, $11255, $11256, $11257, $11258, $11259, $11260, $11261, $11262, $11263, $11264, $11265, $11266, $11267, $11268, $11269, $11270, $11271, $11272, $11273, $11274, $11275, $11276, $11277, $11278, VersionRange($11279, $11280)), ($11281, $11282, $11283, $11284, $11285, $11286, $11287, $11288, $11289, $11290, $11291, $11292, $11293, $11294, $11295, $11296, $11297, $11298, $11299, $11300, $11301, $11302, $11303, $11304, $11305, $11306, $11307, $11308, VersionRange($11309, $11310)), ($11311, $11312, $11313, $11314, $11315, $11316, $11317, $11318, $11319, $11320, $11321, $11322, $11323, $11324, $11325, $11326, $11327, $11328, $11329, $11330, $11331, $11332, $11333, $11334, $11335, $11336, $11337, $11338, VersionRange($11339, $11340)), ($11341, $11342, $11343, $11344, $11345, $11346, $11347, $11348, $11349, $11350, $11351, $11352, $11353, $11354, $11355, $11356, $11357, $11358, $11359, $11360, $11361, $11362, $11363, $11364, $11365, $11366, $11367, $11368, VersionRange($11369, $11370)), ($11371, $11372, $11373, $11374, $11375, $11376, $11377, $11378, $11379, $11380, $11381, $11382, $11383, $11384, $11385, $11386, $11387, $11388, $11389, $11390, $11391, $11392, $11393, $11394, $11395, $11396, $11397, $11398, VersionRange($11399, $11400)), ($11401, $11402, $11403, $11404, $11405, $11406, $11407, $11408, $11409, $11410, $11411, $11412, $11413, $11414, $11415, $11416, $11417, $11418, $11419, $11420, $11421, $11422, $11423, $11424, $11425, $11426, $11427, $11428, VersionRange($11429, $11430)), ($11431, $11432, $11433, $11434, $11435, $11436, $11437, $11438, $11439, $11440, $11441, $11442, $11443, $11444, $11445, $11446, $11447, $11448, $11449, $11450, $11451, $11452, $11453, $11454, $11455, $11456, $11457, $11458, VersionRange($11459, $11460)), ($11461, $11462, $11463, $11464, $11465, $11466, $11467, $11468, $11469, $11470, $11471, $11472, $11473, $11474, $11475, $11476, $11477, $11478, $11479, $11480, $11481, $11482, $11483, $11484, $11485, $11486, $11487, $11488, VersionRange($11489, $11490)), ($11491, $11492, $11493, $11494, $11495, $11496, $11497, $11498, $11499, $11500, $11501, $11502, $11503, $11504, $11505, $11506, $11507, $11508, $11509, $11510, $11511, $11512, $11513, $11514, $11515, $11516, $11517, $11518, VersionRange($11519, $11520)), ($11521, $11522, $11523, $11524, $11525, $11526, $11527, $11528, $11529, $11530, $11531, $11532, $11533, $11534, $11535, $11536, $11537, $11538, $11539, $11540, $11541, $11542, $11543, $11544, $11545, $11546, $11547, $11548, VersionRange($11549, $11550)), ($11551, $11552, $11553, $11554, $11555, $11556, $11557, $11558, $11559, $11560, $11561, $11562, $11563, $11564, $11565, $11566, $11567, $11568, $11569, $11570, $11571, $11572, $11573, $11574, $11575, $11576, $11577, $11578, VersionRange($11579, $11580)), ($11581, $11582, $11583, $11584, $11585, $11586, $11587, $11588, $11589, $11590, $11591, $11592, $11593, $11594, $11595, $11596, $11597, $11598, $11599, $11600, $11601, $11602, $11603, $11604, $11605, $11606, $11607, $11608, VersionRange($11609, $11610)), ($11611, $11612, $11613, $11614, $11615, $11616, $11617, $11618, $11619, $11620, $11621, $11622, $11623, $11624, $11625, $11626, $11627, $11628, $11629, $11630, $11631, $11632, $11633, $11634, $11635, $11636, $11637, $11638, VersionRange($11639, $11640)), ($11641, $11642, $11643, $11644, $11645, $11646, $11647, $11648, $11649, $11650, $11651, $11652, $11653, $11654, $11655, $11656, $11657, $11658, $11659, $11660, $11661, $11662, $11663, $11664, $11665, $11666, $11667, $11668, VersionRange($11669, $11670)), ($11671, $11672, $11673, $11674, $11675, $11676, $11677, $11678, $11679, $11680, $11681, $11682, $11683, $11684, $11685, $11686, $11687, $11688, $11689, $11690, $11691, $11692, $11693, $11694, $11695, $11696, $11697, $11698, VersionRange($11699, $11700)), ($11701, $11702, $11703, $11704, $11705, $11706, $11707, $11708, $11709, $11710, $11711, $11712, $11713, $11714, $11715, $11716, $11717, $11718, $11719, $11720, $11721, $11722, $11723, $11724, $11725, $11726, $11727, $11728, VersionRange($11729, $11730)), ($11731, $11732, $11733, $11734, $11735, $11736, $11737, $11738, $11739, $11740, $11741, $11742, $11743, $11744, $11745, $11746, $11747, $11748, $11749, $11750, $11751, $11752, $11753, $11754, $11755, $11756, $11757, $11758, VersionRange($11759, $11760)), ($11761, $11762, $11763, $11764, $11765, $11766, $11767, $11768, $11769, $11770, $11771, $11772, $11773, $11774, $11775, $11776, $11777, $11778, $11779, $11780, $11781, $11782, $11783, $11784, $11785, $11786, $11787, $11788, VersionRange($11789, $11790)), ($11791, $11792, $11793, $11794, $11795, $11796, $11797, $11798, $11799, $11800, $11801, $11802, $11803, $11804, $11805, $11806, $11807, $11808, $11809, $11810, $11811, $11812, $11813, $11814, $11815, $11816, $11817, $11818, VersionRange($11819, $11820)), ($11821, $11822, $11823, $11824, $11825, $11826, $11827, $11828, $11829, $11830, $11831, $11832, $11833, $11834, $11835, $11836, $11837, $11838, $11839, $11840, $11841, $11842, $11843, $11844, $11845, $11846, $11847, $11848, VersionRange($11849, $11850)), ($11851, $11852, $11853, $11854, $11855, $11856, $11857, $11858, $11859, $11860, $11861, $11862, $11863, $11864, $11865, $11866, $11867, $11868, $11869, $11870, $11871, $11872, $11873, $11874, $11875, $11876, $11877, $11878, VersionRange($11879, $11880)), ($11881, $11882, $11883, $11884, $11885, $11886, $11887, $11888, $11889, $11890, $11891, $11892, $11893, $11894, $11895, $11896, $11897, $11898, $11899, $11900, $11901, $11902, $11903, $11904, $11905, $11906, $11907, $11908, VersionRange($11909, $11910)), ($11911, $11912, $11913, $11914, $11915, $11916, $11917, $11918, $11919, $11920, $11921, $11922, $11923, $11924, $11925, $11926, $11927, $11928, $11929, $11930, $11931, $11932, $11933, $11934, $11935, $11936, $11937, $11938, VersionRange($11939, $11940)), ($11941, $11942, $11943, $11944, $11945, $11946, $11947, $11948, $11949, $11950, $11951, $11952, $11953, $11954, $11955, $11956, $11957, $11958, $11959, $11960, $11961, $11962, $11963, $11964, $11965, $11966, $11967, $11968, VersionRange($11969, $11970)), ($11971, $11972, $11973, $11974, $11975, $11976, $11977, $11978, $11979, $11980, $11981, $11982, $11983, $11984, $11985, $11986, $11987, $11988, $11989, $11990, $11991, $11992, $11993, $11994, $11995, $11996, $11997, $11998, VersionRange($11999, $12000)), ($12001, $12002, $12003, $12004, $12005, $12006, $12007, $12008, $12009, $12010, $12011, $12012, $12013, $12014, $12015, $12016, $12017, $12018, $12019, $12020, $12021, $12022, $12023, $12024, $12025, $12026, $12027, $12028, VersionRange($12029, $12030)), ($12031, $12032, $12033, $12034, $12035, $12036, $12037, $12038, $12039, $12040, $12041, $12042, $12043, $12044, $12045, $12046, $12047, $12048, $12049, $12050, $12051, $12052, $12053, $12054, $12055, $12056, $12057, $12058, VersionRange($12059, $12060)), ($12061, $12062, $12063, $12064, $12065, $12066, $12067, $12068, $12069, $12070, $12071, $12072, $12073, $12074, $12075, $12076, $12077, $12078, $12079, $12080, $12081, $12082, $12083, $12084, $12085, $12086, $12087, $12088, VersionRange($12089, $12090)), ($12091, $12092, $12093, $12094, $12095, $12096, $12097, $12098, $12099, $12100, $12101, $12102, $12103, $12104, $12105, $12106, $12107, $12108, $12109, $12110, $12111, $12112, $12113, $12114, $12115, $12116, $12117, $12118, VersionRange($12119, $12120)), ($12121, $12122, $12123, $12124, $12125, $12126, $12127, $12128, $12129, $12130, $12131, $12132, $12133, $12134, $12135, $12136, $12137, $12138, $12139, $12140, $12141, $12142, $12143, $12144, $12145, $12146, $12147, $12148, VersionRange($12149, $12150)), ($12151, $12152, $12153, $12154, $12155, $12156, $12157, $12158, $12159, $12160, $12161, $12162, $12163, $12164, $12165, $12166, $12167, $12168, $12169, $12170, $12171, $12172, $12173, $12174, $12175, $12176, $12177, $12178, VersionRange($12179, $12180)), ($12181, $12182, $12183, $12184, $12185, $12186, $12187, $12188, $12189, $12190, $12191, $12192, $12193, $12194, $12195, $12196, $12197, $12198, $12199, $12200, $12201, $12202, $12203, $12204, $12205, $12206, $12207, $12208, VersionRange($12209, $12210)), ($12211, $12212, $12213, $12214, $12215, $12216, $12217, $12218, $12219, $12220, $12221, $12222, $12223, $12224, $12225, $12226, $12227, $12228, $12229, $12230, $12231, $12232, $12233, $12234, $12235, $12236, $12237, $12238, VersionRange($12239, $12240)), ($12241, $12242, $12243, $12244, $12245, $12246, $12247, $12248, $12249, $12250, $12251, $12252, $12253, $12254, $12255, $12256, $12257, $12258, $12259, $12260, $12261, $12262, $12263, $12264, $12265, $12266, $12267, $12268, VersionRange($12269, $12270)), ($12271, $12272, $12273, $12274, $12275, $12276, $12277, $12278, $12279, $12280, $12281, $12282, $12283, $12284, $12285, $12286, $12287, $12288, $12289, $12290, $12291, $12292, $12293, $12294, $12295, $12296, $12297, $12298, VersionRange($12299, $12300)), ($12301, $12302, $12303, $12304, $12305, $12306, $12307, $12308, $12309, $12310, $12311, $12312, $12313, $12314, $12315, $12316, $12317, $12318, $12319, $12320, $12321, $12322, $12323, $12324, $12325, $12326, $12327, $12328, VersionRange($12329, $12330)), ($12331, $12332, $12333, $12334, $12335, $12336, $12337, $12338, $12339, $12340, $12341, $12342, $12343, $12344, $12345, $12346, $12347, $12348, $12349, $12350, $12351, $12352, $12353, $12354, $12355, $12356, $12357, $12358, VersionRange($12359, $12360)), ($12361, $12362, $12363, $12364, $12365, $12366, $12367, $12368, $12369, $12370, $12371, $12372, $12373, $12374, $12375, $12376, $12377, $12378, $12379, $12380, $12381, $12382, $12383, $12384, $12385, $12386, $12387, $12388, VersionRange($12389, $12390)), ($12391, $12392, $12393, $12394, $12395, $12396, $12397, $12398, $12399, $12400, $12401, $12402, $12403, $12404, $12405, $12406, $12407, $12408, $12409, $12410, $12411, $12412, $12413, $12414, $12415, $12416, $12417, $12418, VersionRange($12419, $12420)), ($12421, $12422, $12423, $12424, $12425, $12426, $12427, $12428, $12429, $12430, $12431, $12432, $12433, $12434, $12435, $12436, $12437, $12438, $12439, $12440, $12441, $12442, $12443, $12444, $12445, $12446, $12447, $12448, VersionRange($12449, $12450)), ($12451, $12452, $12453, $12454, $12455, $12456, $12457, $12458, $12459, $12460, $12461, $12462, $12463, $12464, $12465, $12466, $12467, $12468, $12469, $12470, $12471, $12472, $12473, $12474, $12475, $12476, $12477, $12478, VersionRange($12479, $12480)), ($12481, $12482, $12483, $12484, $12485, $12486, $12487, $12488, $12489, $12490, $12491, $12492, $12493, $12494, $12495, $12496, $12497, $12498, $12499, $12500, $12501, $12502, $12503, $12504, $12505, $12506, $12507, $12508, VersionRange($12509, $12510)), ($12511, $12512, $12513, $12514, $12515, $12516, $12517, $12518, $12519, $12520, $12521, $12522, $12523, $12524, $12525, $12526, $12527, $12528, $12529, $12530, $12531, $12532, $12533, $12534, $12535, $12536, $12537, $12538, VersionRange($12539, $12540)), ($12541, $12542, $12543, $12544, $12545, $12546, $12547, $12548, $12549, $12550, $12551, $12552, $12553, $12554, $12555, $12556, $12557, $12558, $12559, $12560, $12561, $12562, $12563, $12564, $12565, $12566, $12567, $12568, VersionRange($12569, $12570)), ($12571, $12572, $12573, $12574, $12575, $12576, $12577, $12578, $12579, $12580, $12581, $12582, $12583, $12584, $12585, $12586, $12587, $12588, $12589, $12590, $12591, $12592, $12593, $12594, $12595, $12596, $12597, $12598, VersionRange($12599, $12600)), ($12601, $12602, $12603, $12604, $12605, $12606, $12607, $12608, $12609, $12610, $12611, $12612, $12613, $12614, $12615, $12616, $12617, $12618, $12619, $12620, $12621, $12622, $12623, $12624, $12625, $12626, $12627, $12628, VersionRange($12629, $12630)), ($12631, $12632, $12633, $12634, $12635, $12636, $12637, $12638, $12639, $12640, $12641, $12642, $12643, $12644, $12645, $12646, $12647, $12648, $12649, $12650, $12651, $12652, $12653, $12654, $12655, $12656, $12657, $12658, VersionRange($12659, $12660)), ($12661, $12662, $12663, $12664, $12665, $12666, $12667, $12668, $12669, $12670, $12671, $12672, $12673, $12674, $12675, $12676, $12677, $12678, $12679, $12680, $12681, $12682, $12683, $12684, $12685, $12686, $12687, $12688, VersionRange($12689, $12690)), ($12691, $12692, $12693, $12694, $12695, $12696, $12697, $12698, $12699, $12700, $12701, $12702, $12703, $12704, $12705, $12706, $12707, $12708, $12709, $12710, $12711, $12712, $12713, $12714, $12715, $12716, $12717, $12718, VersionRange($12719, $12720)), ($12721, $12722, $12723, $12724, $12725, $12726, $12727, $12728, $12729, $12730, $12731, $12732, $12733, $12734, $12735, $12736, $12737, $12738, $12739, $12740, $12741, $12742, $12743, $12744, $12745, $12746, $12747, $12748, VersionRange($12749, $12750)), ($12751, $12752, $12753, $12754, $12755, $12756, $12757, $12758, $12759, $12760, $12761, $12762, $12763, $12764, $12765, $12766, $12767, $12768, $12769, $12770, $12771, $12772, $12773, $12774, $12775, $12776, $12777, $12778, VersionRange($12779, $12780)), ($12781, $12782, $12783, $12784, $12785, $12786, $12787, $12788, $12789, $12790, $12791, $12792, $12793, $12794, $12795, $12796, $12797, $12798, $12799, $12800, $12801, $12802, $12803, $12804, $12805, $12806, $12807, $12808, VersionRange($12809, $12810)), ($12811, $12812, $12813, $12814, $12815, $12816, $12817, $12818, $12819, $12820, $12821, $12822, $12823, $12824, $12825, $12826, $12827, $12828, $12829, $12830, $12831, $12832, $12833, $12834, $12835, $12836, $12837, $12838, VersionRange($12839, $12840)), ($12841, $12842, $12843, $12844, $12845, $12846, $12847, $12848, $12849, $12850, $12851, $12852, $12853, $12854, $12855, $12856, $12857, $12858, $12859, $12860, $12861, $12862, $12863, $12864, $12865, $12866, $12867, $12868, VersionRange($12869, $12870)), ($12871, $12872, $12873, $12874, $12875, $12876, $12877, $12878, $12879, $12880, $12881, $12882, $12883, $12884, $12885, $12886, $12887, $12888, $12889, $12890, $12891, $12892, $12893, $12894, $12895, $12896, $12897, $12898, VersionRange($12899, $12900)), ($12901, $12902, $12903, $12904, $12905, $12906, $12907, $12908, $12909, $12910, $12911, $12912, $12913, $12914, $12915, $12916, $12917, $12918, $12919, $12920, $12921, $12922, $12923, $12924, $12925, $12926, $12927, $12928, VersionRange($12929, $12930)), ($12931, $12932, $12933, $12934, $12935, $12936, $12937, $12938, $12939, $12940, $12941, $12942, $12943, $12944, $12945, $12946, $12947, $12948, $12949, $12950, $12951, $12952, $12953, $12954, $12955, $12956, $12957, $12958, VersionRange($12959, $12960)), ($12961, $12962, $12963, $12964, $12965, $12966, $12967, $12968, $12969, $12970[...][ Date: 2023-07-04 18:40:10 ]
11 3s961ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30)), ($31, $32, $33, $34, $35, $36, $37, $38, $39, $40, $41, $42, $43, $44, $45, $46, $47, $48, $49, $50, $51, $52, $53, $54, $55, $56, $57, $58, VersionRange($59, $60)), ($61, $62, $63, $64, $65, $66, $67, $68, $69, $70, $71, $72, $73, $74, $75, $76, $77, $78, $79, $80, $81, $82, $83, $84, $85, $86, $87, $88, VersionRange($89, $90)), ($91, $92, $93, $94, $95, $96, $97, $98, $99, $100, $101, $102, $103, $104, $105, $106, $107, $108, $109, $110, $111, $112, $113, $114, $115, $116, $117, $118, VersionRange($119, $120)), ($121, $122, $123, $124, $125, $126, $127, $128, $129, $130, $131, $132, $133, $134, $135, $136, $137, $138, $139, $140, $141, $142, $143, $144, $145, $146, $147, $148, VersionRange($149, $150)), ($151, $152, $153, $154, $155, $156, $157, $158, $159, $160, $161, $162, $163, $164, $165, $166, $167, $168, $169, $170, $171, $172, $173, $174, $175, $176, $177, $178, VersionRange($179, $180)), ($181, $182, $183, $184, $185, $186, $187, $188, $189, $190, $191, $192, $193, $194, $195, $196, $197, $198, $199, $200, $201, $202, $203, $204, $205, $206, $207, $208, VersionRange($209, $210)), ($211, $212, $213, $214, $215, $216, $217, $218, $219, $220, $221, $222, $223, $224, $225, $226, $227, $228, $229, $230, $231, $232, $233, $234, $235, $236, $237, $238, VersionRange($239, $240)), ($241, $242, $243, $244, $245, $246, $247, $248, $249, $250, $251, $252, $253, $254, $255, $256, $257, $258, $259, $260, $261, $262, $263, $264, $265, $266, $267, $268, VersionRange($269, $270)), ($271, $272, $273, $274, $275, $276, $277, $278, $279, $280, $281, $282, $283, $284, $285, $286, $287, $288, $289, $290, $291, $292, $293, $294, $295, $296, $297, $298, VersionRange($299, $300)), ($301, $302, $303, $304, $305, $306, $307, $308, $309, $310, $311, $312, $313, $314, $315, $316, $317, $318, $319, $320, $321, $322, $323, $324, $325, $326, $327, $328, VersionRange($329, $330)), ($331, $332, $333, $334, $335, $336, $337, $338, $339, $340, $341, $342, $343, $344, $345, $346, $347, $348, $349, $350, $351, $352, $353, $354, $355, $356, $357, $358, VersionRange($359, $360)), ($361, $362, $363, $364, $365, $366, $367, $368, $369, $370, $371, $372, $373, $374, $375, $376, $377, $378, $379, $380, $381, $382, $383, $384, $385, $386, $387, $388, VersionRange($389, $390)), ($391, $392, $393, $394, $395, $396, $397, $398, $399, $400, $401, $402, $403, $404, $405, $406, $407, $408, $409, $410, $411, $412, $413, $414, $415, $416, $417, $418, VersionRange($419, $420)), ($421, $422, $423, $424, $425, $426, $427, $428, $429, $430, $431, $432, $433, $434, $435, $436, $437, $438, $439, $440, $441, $442, $443, $444, $445, $446, $447, $448, VersionRange($449, $450)), ($451, $452, $453, $454, $455, $456, $457, $458, $459, $460, $461, $462, $463, $464, $465, $466, $467, $468, $469, $470, $471, $472, $473, $474, $475, $476, $477, $478, VersionRange($479, $480)), ($481, $482, $483, $484, $485, $486, $487, $488, $489, $490, $491, $492, $493, $494, $495, $496, $497, $498, $499, $500, $501, $502, $503, $504, $505, $506, $507, $508, VersionRange($509, $510)), ($511, $512, $513, $514, $515, $516, $517, $518, $519, $520, $521, $522, $523, $524, $525, $526, $527, $528, $529, $530, $531, $532, $533, $534, $535, $536, $537, $538, VersionRange($539, $540)), ($541, $542, $543, $544, $545, $546, $547, $548, $549, $550, $551, $552, $553, $554, $555, $556, $557, $558, $559, $560, $561, $562, $563, $564, $565, $566, $567, $568, VersionRange($569, $570)), ($571, $572, $573, $574, $575, $576, $577, $578, $579, $580, $581, $582, $583, $584, $585, $586, $587, $588, $589, $590, $591, $592, $593, $594, $595, $596, $597, $598, VersionRange($599, $600)), ($601, $602, $603, $604, $605, $606, $607, $608, $609, $610, $611, $612, $613, $614, $615, $616, $617, $618, $619, $620, $621, $622, $623, $624, $625, $626, $627, $628, VersionRange($629, $630)), ($631, $632, $633, $634, $635, $636, $637, $638, $639, $640, $641, $642, $643, $644, $645, $646, $647, $648, $649, $650, $651, $652, $653, $654, $655, $656, $657, $658, VersionRange($659, $660)), ($661, $662, $663, $664, $665, $666, $667, $668, $669, $670, $671, $672, $673, $674, $675, $676, $677, $678, $679, $680, $681, $682, $683, $684, $685, $686, $687, $688, VersionRange($689, $690)), ($691, $692, $693, $694, $695, $696, $697, $698, $699, $700, $701, $702, $703, $704, $705, $706, $707, $708, $709, $710, $711, $712, $713, $714, $715, $716, $717, $718, VersionRange($719, $720)), ($721, $722, $723, $724, $725, $726, $727, $728, $729, $730, $731, $732, $733, $734, $735, $736, $737, $738, $739, $740, $741, $742, $743, $744, $745, $746, $747, $748, VersionRange($749, $750)), ($751, $752, $753, $754, $755, $756, $757, $758, $759, $760, $761, $762, $763, $764, $765, $766, $767, $768, $769, $770, $771, $772, $773, $774, $775, $776, $777, $778, VersionRange($779, $780)), ($781, $782, $783, $784, $785, $786, $787, $788, $789, $790, $791, $792, $793, $794, $795, $796, $797, $798, $799, $800, $801, $802, $803, $804, $805, $806, $807, $808, VersionRange($809, $810)), ($811, $812, $813, $814, $815, $816, $817, $818, $819, $820, $821, $822, $823, $824, $825, $826, $827, $828, $829, $830, $831, $832, $833, $834, $835, $836, $837, $838, VersionRange($839, $840)), ($841, $842, $843, $844, $845, $846, $847, $848, $849, $850, $851, $852, $853, $854, $855, $856, $857, $858, $859, $860, $861, $862, $863, $864, $865, $866, $867, $868, VersionRange($869, $870)), ($871, $872, $873, $874, $875, $876, $877, $878, $879, $880, $881, $882, $883, $884, $885, $886, $887, $888, $889, $890, $891, $892, $893, $894, $895, $896, $897, $898, VersionRange($899, $900)), ($901, $902, $903, $904, $905, $906, $907, $908, $909, $910, $911, $912, $913, $914, $915, $916, $917, $918, $919, $920, $921, $922, $923, $924, $925, $926, $927, $928, VersionRange($929, $930)), ($931, $932, $933, $934, $935, $936, $937, $938, $939, $940, $941, $942, $943, $944, $945, $946, $947, $948, $949, $950, $951, $952, $953, $954, $955, $956, $957, $958, VersionRange($959, $960)), ($961, $962, $963, $964, $965, $966, $967, $968, $969, $970, $971, $972, $973, $974, $975, $976, $977, $978, $979, $980, $981, $982, $983, $984, $985, $986, $987, $988, VersionRange($989, $990)), ($991, $992, $993, $994, $995, $996, $997, $998, $999, $1000, $1001, $1002, $1003, $1004, $1005, $1006, $1007, $1008, $1009, $1010, $1011, $1012, $1013, $1014, $1015, $1016, $1017, $1018, VersionRange($1019, $1020)), ($1021, $1022, $1023, $1024, $1025, $1026, $1027, $1028, $1029, $1030, $1031, $1032, $1033, $1034, $1035, $1036, $1037, $1038, $1039, $1040, $1041, $1042, $1043, $1044, $1045, $1046, $1047, $1048, VersionRange($1049, $1050)), ($1051, $1052, $1053, $1054, $1055, $1056, $1057, $1058, $1059, $1060, $1061, $1062, $1063, $1064, $1065, $1066, $1067, $1068, $1069, $1070, $1071, $1072, $1073, $1074, $1075, $1076, $1077, $1078, VersionRange($1079, $1080)), ($1081, $1082, $1083, $1084, $1085, $1086, $1087, $1088, $1089, $1090, $1091, $1092, $1093, $1094, $1095, $1096, $1097, $1098, $1099, $1100, $1101, $1102, $1103, $1104, $1105, $1106, $1107, $1108, VersionRange($1109, $1110)), ($1111, $1112, $1113, $1114, $1115, $1116, $1117, $1118, $1119, $1120, $1121, $1122, $1123, $1124, $1125, $1126, $1127, $1128, $1129, $1130, $1131, $1132, $1133, $1134, $1135, $1136, $1137, $1138, VersionRange($1139, $1140)), ($1141, $1142, $1143, $1144, $1145, $1146, $1147, $1148, $1149, $1150, $1151, $1152, $1153, $1154, $1155, $1156, $1157, $1158, $1159, $1160, $1161, $1162, $1163, $1164, $1165, $1166, $1167, $1168, VersionRange($1169, $1170)), ($1171, $1172, $1173, $1174, $1175, $1176, $1177, $1178, $1179, $1180, $1181, $1182, $1183, $1184, $1185, $1186, $1187, $1188, $1189, $1190, $1191, $1192, $1193, $1194, $1195, $1196, $1197, $1198, VersionRange($1199, $1200)), ($1201, $1202, $1203, $1204, $1205, $1206, $1207, $1208, $1209, $1210, $1211, $1212, $1213, $1214, $1215, $1216, $1217, $1218, $1219, $1220, $1221, $1222, $1223, $1224, $1225, $1226, $1227, $1228, VersionRange($1229, $1230)), ($1231, $1232, $1233, $1234, $1235, $1236, $1237, $1238, $1239, $1240, $1241, $1242, $1243, $1244, $1245, $1246, $1247, $1248, $1249, $1250, $1251, $1252, $1253, $1254, $1255, $1256, $1257, $1258, VersionRange($1259, $1260)), ($1261, $1262, $1263, $1264, $1265, $1266, $1267, $1268, $1269, $1270, $1271, $1272, $1273, $1274, $1275, $1276, $1277, $1278, $1279, $1280, $1281, $1282, $1283, $1284, $1285, $1286, $1287, $1288, VersionRange($1289, $1290)), ($1291, $1292, $1293, $1294, $1295, $1296, $1297, $1298, $1299, $1300, $1301, $1302, $1303, $1304, $1305, $1306, $1307, $1308, $1309, $1310, $1311, $1312, $1313, $1314, $1315, $1316, $1317, $1318, VersionRange($1319, $1320)), ($1321, $1322, $1323, $1324, $1325, $1326, $1327, $1328, $1329, $1330, $1331, $1332, $1333, $1334, $1335, $1336, $1337, $1338, $1339, $1340, $1341, $1342, $1343, $1344, $1345, $1346, $1347, $1348, VersionRange($1349, $1350)), ($1351, $1352, $1353, $1354, $1355, $1356, $1357, $1358, $1359, $1360, $1361, $1362, $1363, $1364, $1365, $1366, $1367, $1368, $1369, $1370, $1371, $1372, $1373, $1374, $1375, $1376, $1377, $1378, VersionRange($1379, $1380)), ($1381, $1382, $1383, $1384, $1385, $1386, $1387, $1388, $1389, $1390, $1391, $1392, $1393, $1394, $1395, $1396, $1397, $1398, $1399, $1400, $1401, $1402, $1403, $1404, $1405, $1406, $1407, $1408, VersionRange($1409, $1410)), ($1411, $1412, $1413, $1414, $1415, $1416, $1417, $1418, $1419, $1420, $1421, $1422, $1423, $1424, $1425, $1426, $1427, $1428, $1429, $1430, $1431, $1432, $1433, $1434, $1435, $1436, $1437, $1438, VersionRange($1439, $1440)), ($1441, $1442, $1443, $1444, $1445, $1446, $1447, $1448, $1449, $1450, $1451, $1452, $1453, $1454, $1455, $1456, $1457, $1458, $1459, $1460, $1461, $1462, $1463, $1464, $1465, $1466, $1467, $1468, VersionRange($1469, $1470)), ($1471, $1472, $1473, $1474, $1475, $1476, $1477, $1478, $1479, $1480, $1481, $1482, $1483, $1484, $1485, $1486, $1487, $1488, $1489, $1490, $1491, $1492, $1493, $1494, $1495, $1496, $1497, $1498, VersionRange($1499, $1500)), ($1501, $1502, $1503, $1504, $1505, $1506, $1507, $1508, $1509, $1510, $1511, $1512, $1513, $1514, $1515, $1516, $1517, $1518, $1519, $1520, $1521, $1522, $1523, $1524, $1525, $1526, $1527, $1528, VersionRange($1529, $1530)), ($1531, $1532, $1533, $1534, $1535, $1536, $1537, $1538, $1539, $1540, $1541, $1542, $1543, $1544, $1545, $1546, $1547, $1548, $1549, $1550, $1551, $1552, $1553, $1554, $1555, $1556, $1557, $1558, VersionRange($1559, $1560)), ($1561, $1562, $1563, $1564, $1565, $1566, $1567, $1568, $1569, $1570, $1571, $1572, $1573, $1574, $1575, $1576, $1577, $1578, $1579, $1580, $1581, $1582, $1583, $1584, $1585, $1586, $1587, $1588, VersionRange($1589, $1590)), ($1591, $1592, $1593, $1594, $1595, $1596, $1597, $1598, $1599, $1600, $1601, $1602, $1603, $1604, $1605, $1606, $1607, $1608, $1609, $1610, $1611, $1612, $1613, $1614, $1615, $1616, $1617, $1618, VersionRange($1619, $1620)), ($1621, $1622, $1623, $1624, $1625, $1626, $1627, $1628, $1629, $1630, $1631, $1632, $1633, $1634, $1635, $1636, $1637, $1638, $1639, $1640, $1641, $1642, $1643, $1644, $1645, $1646, $1647, $1648, VersionRange($1649, $1650)), ($1651, $1652, $1653, $1654, $1655, $1656, $1657, $1658, $1659, $1660, $1661, $1662, $1663, $1664, $1665, $1666, $1667, $1668, $1669, $1670, $1671, $1672, $1673, $1674, $1675, $1676, $1677, $1678, VersionRange($1679, $1680)), ($1681, $1682, $1683, $1684, $1685, $1686, $1687, $1688, $1689, $1690, $1691, $1692, $1693, $1694, $1695, $1696, $1697, $1698, $1699, $1700, $1701, $1702, $1703, $1704, $1705, $1706, $1707, $1708, VersionRange($1709, $1710)), ($1711, $1712, $1713, $1714, $1715, $1716, $1717, $1718, $1719, $1720, $1721, $1722, $1723, $1724, $1725, $1726, $1727, $1728, $1729, $1730, $1731, $1732, $1733, $1734, $1735, $1736, $1737, $1738, VersionRange($1739, $1740)), ($1741, $1742, $1743, $1744, $1745, $1746, $1747, $1748, $1749, $1750, $1751, $1752, $1753, $1754, $1755, $1756, $1757, $1758, $1759, $1760, $1761, $1762, $1763, $1764, $1765, $1766, $1767, $1768, VersionRange($1769, $1770)), ($1771, $1772, $1773, $1774, $1775, $1776, $1777, $1778, $1779, $1780, $1781, $1782, $1783, $1784, $1785, $1786, $1787, $1788, $1789, $1790, $1791, $1792, $1793, $1794, $1795, $1796, $1797, $1798, VersionRange($1799, $1800)), ($1801, $1802, $1803, $1804, $1805, $1806, $1807, $1808, $1809, $1810, $1811, $1812, $1813, $1814, $1815, $1816, $1817, $1818, $1819, $1820, $1821, $1822, $1823, $1824, $1825, $1826, $1827, $1828, VersionRange($1829, $1830)), ($1831, $1832, $1833, $1834, $1835, $1836, $1837, $1838, $1839, $1840, $1841, $1842, $1843, $1844, $1845, $1846, $1847, $1848, $1849, $1850, $1851, $1852, $1853, $1854, $1855, $1856, $1857, $1858, VersionRange($1859, $1860)), ($1861, $1862, $1863, $1864, $1865, $1866, $1867, $1868, $1869, $1870, $1871, $1872, $1873, $1874, $1875, $1876, $1877, $1878, $1879, $1880, $1881, $1882, $1883, $1884, $1885, $1886, $1887, $1888, VersionRange($1889, $1890)), ($1891, $1892, $1893, $1894, $1895, $1896, $1897, $1898, $1899, $1900, $1901, $1902, $1903, $1904, $1905, $1906, $1907, $1908, $1909, $1910, $1911, $1912, $1913, $1914, $1915, $1916, $1917, $1918, VersionRange($1919, $1920)), ($1921, $1922, $1923, $1924, $1925, $1926, $1927, $1928, $1929, $1930, $1931, $1932, $1933, $1934, $1935, $1936, $1937, $1938, $1939, $1940, $1941, $1942, $1943, $1944, $1945, $1946, $1947, $1948, VersionRange($1949, $1950)), ($1951, $1952, $1953, $1954, $1955, $1956, $1957, $1958, $1959, $1960, $1961, $1962, $1963, $1964, $1965, $1966, $1967, $1968, $1969, $1970, $1971, $1972, $1973, $1974, $1975, $1976, $1977, $1978, VersionRange($1979, $1980)), ($1981, $1982, $1983, $1984, $1985, $1986, $1987, $1988, $1989, $1990, $1991, $1992, $1993, $1994, $1995, $1996, $1997, $1998, $1999, $2000, $2001, $2002, $2003, $2004, $2005, $2006, $2007, $2008, VersionRange($2009, $2010)), ($2011, $2012, $2013, $2014, $2015, $2016, $2017, $2018, $2019, $2020, $2021, $2022, $2023, $2024, $2025, $2026, $2027, $2028, $2029, $2030, $2031, $2032, $2033, $2034, $2035, $2036, $2037, $2038, VersionRange($2039, $2040)), ($2041, $2042, $2043, $2044, $2045, $2046, $2047, $2048, $2049, $2050, $2051, $2052, $2053, $2054, $2055, $2056, $2057, $2058, $2059, $2060, $2061, $2062, $2063, $2064, $2065, $2066, $2067, $2068, VersionRange($2069, $2070)), ($2071, $2072, $2073, $2074, $2075, $2076, $2077, $2078, $2079, $2080, $2081, $2082, $2083, $2084, $2085, $2086, $2087, $2088, $2089, $2090, $2091, $2092, $2093, $2094, $2095, $2096, $2097, $2098, VersionRange($2099, $2100)), ($2101, $2102, $2103, $2104, $2105, $2106, $2107, $2108, $2109, $2110, $2111, $2112, $2113, $2114, $2115, $2116, $2117, $2118, $2119, $2120, $2121, $2122, $2123, $2124, $2125, $2126, $2127, $2128, VersionRange($2129, $2130)), ($2131, $2132, $2133, $2134, $2135, $2136, $2137, $2138, $2139, $2140, $2141, $2142, $2143, $2144, $2145, $2146, $2147, $2148, $2149, $2150, $2151, $2152, $2153, $2154, $2155, $2156, $2157, $2158, VersionRange($2159, $2160)), ($2161, $2162, $2163, $2164, $2165, $2166, $2167, $2168, $2169, $2170, $2171, $2172, $2173, $2174, $2175, $2176, $2177, $2178, $2179, $2180, $2181, $2182, $2183, $2184, $2185, $2186, $2187, $2188, VersionRange($2189, $2190)), ($2191, $2192, $2193, $2194, $2195, $2196, $2197, $2198, $2199, $2200, $2201, $2202, $2203, $2204, $2205, $2206, $2207, $2208, $2209, $2210, $2211, $2212, $2213, $2214, $2215, $2216, $2217, $2218, VersionRange($2219, $2220)), ($2221, $2222, $2223, $2224, $2225, $2226, $2227, $2228, $2229, $2230, $2231, $2232, $2233, $2234, $2235, $2236, $2237, $2238, $2239, $2240, $2241, $2242, $2243, $2244, $2245, $2246, $2247, $2248, VersionRange($2249, $2250)), ($2251, $2252, $2253, $2254, $2255, $2256, $2257, $2258, $2259, $2260, $2261, $2262, $2263, $2264, $2265, $2266, $2267, $2268, $2269, $2270, $2271, $2272, $2273, $2274, $2275, $2276, $2277, $2278, VersionRange($2279, $2280)), ($2281, $2282, $2283, $2284, $2285, $2286, $2287, $2288, $2289, $2290, $2291, $2292, $2293, $2294, $2295, $2296, $2297, $2298, $2299, $2300, $2301, $2302, $2303, $2304, $2305, $2306, $2307, $2308, VersionRange($2309, $2310)), ($2311, $2312, $2313, $2314, $2315, $2316, $2317, $2318, $2319, $2320, $2321, $2322, $2323, $2324, $2325, $2326, $2327, $2328, $2329, $2330, $2331, $2332, $2333, $2334, $2335, $2336, $2337, $2338, VersionRange($2339, $2340)), ($2341, $2342, $2343, $2344, $2345, $2346, $2347, $2348, $2349, $2350, $2351, $2352, $2353, $2354, $2355, $2356, $2357, $2358, $2359, $2360, $2361, $2362, $2363, $2364, $2365, $2366, $2367, $2368, VersionRange($2369, $2370)), ($2371, $2372, $2373, $2374, $2375, $2376, $2377, $2378, $2379, $2380, $2381, $2382, $2383, $2384, $2385, $2386, $2387, $2388, $2389, $2390, $2391, $2392, $2393, $2394, $2395, $2396, $2397, $2398, VersionRange($2399, $2400)), ($2401, $2402, $2403, $2404, $2405, $2406, $2407, $2408, $2409, $2410, $2411, $2412, $2413, $2414, $2415, $2416, $2417, $2418, $2419, $2420, $2421, $2422, $2423, $2424, $2425, $2426, $2427, $2428, VersionRange($2429, $2430)), ($2431, $2432, $2433, $2434, $2435, $2436, $2437, $2438, $2439, $2440, $2441, $2442, $2443, $2444, $2445, $2446, $2447, $2448, $2449, $2450, $2451, $2452, $2453, $2454, $2455, $2456, $2457, $2458, VersionRange($2459, $2460)), ($2461, $2462, $2463, $2464, $2465, $2466, $2467, $2468, $2469, $2470, $2471, $2472, $2473, $2474, $2475, $2476, $2477, $2478, $2479, $2480, $2481, $2482, $2483, $2484, $2485, $2486, $2487, $2488, VersionRange($2489, $2490)), ($2491, $2492, $2493, $2494, $2495, $2496, $2497, $2498, $2499, $2500, $2501, $2502, $2503, $2504, $2505, $2506, $2507, $2508, $2509, $2510, $2511, $2512, $2513, $2514, $2515, $2516, $2517, $2518, VersionRange($2519, $2520)), ($2521, $2522, $2523, $2524, $2525, $2526, $2527, $2528, $2529, $2530, $2531, $2532, $2533, $2534, $2535, $2536, $2537, $2538, $2539, $2540, $2541, $2542, $2543, $2544, $2545, $2546, $2547, $2548, VersionRange($2549, $2550)), ($2551, $2552, $2553, $2554, $2555, $2556, $2557, $2558, $2559, $2560, $2561, $2562, $2563, $2564, $2565, $2566, $2567, $2568, $2569, $2570, $2571, $2572, $2573, $2574, $2575, $2576, $2577, $2578, VersionRange($2579, $2580)), ($2581, $2582, $2583, $2584, $2585, $2586, $2587, $2588, $2589, $2590, $2591, $2592, $2593, $2594, $2595, $2596, $2597, $2598, $2599, $2600, $2601, $2602, $2603, $2604, $2605, $2606, $2607, $2608, VersionRange($2609, $2610)), ($2611, $2612, $2613, $2614, $2615, $2616, $2617, $2618, $2619, $2620, $2621, $2622, $2623, $2624, $2625, $2626, $2627, $2628, $2629, $2630, $2631, $2632, $2633, $2634, $2635, $2636, $2637, $2638, VersionRange($2639, $2640)), ($2641, $2642, $2643, $2644, $2645, $2646, $2647, $2648, $2649, $2650, $2651, $2652, $2653, $2654, $2655, $2656, $2657, $2658, $2659, $2660, $2661, $2662, $2663, $2664, $2665, $2666, $2667, $2668, VersionRange($2669, $2670)), ($2671, $2672, $2673, $2674, $2675, $2676, $2677, $2678, $2679, $2680, $2681, $2682, $2683, $2684, $2685, $2686, $2687, $2688, $2689, $2690, $2691, $2692, $2693, $2694, $2695, $2696, $2697, $2698, VersionRange($2699, $2700)), ($2701, $2702, $2703, $2704, $2705, $2706, $2707, $2708, $2709, $2710, $2711, $2712, $2713, $2714, $2715, $2716, $2717, $2718, $2719, $2720, $2721, $2722, $2723, $2724, $2725, $2726, $2727, $2728, VersionRange($2729, $2730)), ($2731, $2732, $2733, $2734, $2735, $2736, $2737, $2738, $2739, $2740, $2741, $2742, $2743, $2744, $2745, $2746, $2747, $2748, $2749, $2750, $2751, $2752, $2753, $2754, $2755, $2756, $2757, $2758, VersionRange($2759, $2760)), ($2761, $2762, $2763, $2764, $2765, $2766, $2767, $2768, $2769, $2770, $2771, $2772, $2773, $2774, $2775, $2776, $2777, $2778, $2779, $2780, $2781, $2782, $2783, $2784, $2785, $2786, $2787, $2788, VersionRange($2789, $2790)), ($2791, $2792, $2793, $2794, $2795, $2796, $2797, $2798, $2799, $2800, $2801, $2802, $2803, $2804, $2805, $2806, $2807, $2808, $2809, $2810, $2811, $2812, $2813, $2814, $2815, $2816, $2817, $2818, VersionRange($2819, $2820)), ($2821, $2822, $2823, $2824, $2825, $2826, $2827, $2828, $2829, $2830, $2831, $2832, $2833, $2834, $2835, $2836, $2837, $2838, $2839, $2840, $2841, $2842, $2843, $2844, $2845, $2846, $2847, $2848, VersionRange($2849, $2850)), ($2851, $2852, $2853, $2854, $2855, $2856, $2857, $2858, $2859, $2860, $2861, $2862, $2863, $2864, $2865, $2866, $2867, $2868, $2869, $2870, $2871, $2872, $2873, $2874, $2875, $2876, $2877, $2878, VersionRange($2879, $2880)), ($2881, $2882, $2883, $2884, $2885, $2886, $2887, $2888, $2889, $2890, $2891, $2892, $2893, $2894, $2895, $2896, $2897, $2898, $2899, $2900, $2901, $2902, $2903, $2904, $2905, $2906, $2907, $2908, VersionRange($2909, $2910)), ($2911, $2912, $2913, $2914, $2915, $2916, $2917, $2918, $2919, $2920, $2921, $2922, $2923, $2924, $2925, $2926, $2927, $2928, $2929, $2930, $2931, $2932, $2933, $2934, $2935, $2936, $2937, $2938, VersionRange($2939, $2940)), ($2941, $2942, $2943, $2944, $2945, $2946, $2947, $2948, $2949, $2950, $2951, $2952, $2953, $2954, $2955, $2956, $2957, $2958, $2959, $2960, $2961, $2962, $2963, $2964, $2965, $2966, $2967, $2968, VersionRange($2969, $2970)), ($2971, $2972, $2973, $2974, $2975, $2976, $2977, $2978, $2979, $2980, $2981, $2982, $2983, $2984, $2985, $2986, $2987, $2988, $2989, $2990, $2991, $2992, $2993, $2994, $2995, $2996, $2997, $2998, VersionRange($2999, $3000)), ($3001, $3002, $3003, $3004, $3005, $3006, $3007, $3008, $3009, $3010, $3011, $3012, $3013, $3014, $3015, $3016, $3017, $3018, $3019, $3020, $3021, $3022, $3023, $3024, $3025, $3026, $3027, $3028, VersionRange($3029, $3030)), ($3031, $3032, $3033, $3034, $3035, $3036, $3037, $3038, $3039, $3040, $3041, $3042, $3043, $3044, $3045, $3046, $3047, $3048, $3049, $3050, $3051, $3052, $3053, $3054, $3055, $3056, $3057, $3058, VersionRange($3059, $3060)), ($3061, $3062, $3063, $3064, $3065, $3066, $3067, $3068, $3069, $3070, $3071, $3072, $3073, $3074, $3075, $3076, $3077, $3078, $3079, $3080, $3081, $3082, $3083, $3084, $3085, $3086, $3087, $3088, VersionRange($3089, $3090)), ($3091, $3092, $3093, $3094, $3095, $3096, $3097, $3098, $3099, $3100, $3101, $3102, $3103, $3104, $3105, $3106, $3107, $3108, $3109, $3110, $3111, $3112, $3113, $3114, $3115, $3116, $3117, $3118, VersionRange($3119, $3120)), ($3121, $3122, $3123, $3124, $3125, $3126, $3127, $3128, $3129, $3130, $3131, $3132, $3133, $3134, $3135, $3136, $3137, $3138, $3139, $3140, $3141, $3142, $3143, $3144, $3145, $3146, $3147, $3148, VersionRange($3149, $3150)), ($3151, $3152, $3153, $3154, $3155, $3156, $3157, $3158, $3159, $3160, $3161, $3162, $3163, $3164, $3165, $3166, $3167, $3168, $3169, $3170, $3171, $3172, $3173, $3174, $3175, $3176, $3177, $3178, VersionRange($3179, $3180)), ($3181, $3182, $3183, $3184, $3185, $3186, $3187, $3188, $3189, $3190, $3191, $3192, $3193, $3194, $3195, $3196, $3197, $3198, $3199, $3200, $3201, $3202, $3203, $3204, $3205, $3206, $3207, $3208, VersionRange($3209, $3210)), ($3211, $3212, $3213, $3214, $3215, $3216, $3217, $3218, $3219, $3220, $3221, $3222, $3223, $3224, $3225, $3226, $3227, $3228, $3229, $3230, $3231, $3232, $3233, $3234, $3235, $3236, $3237, $3238, VersionRange($3239, $3240)), ($3241, $3242, $3243, $3244, $3245, $3246, $3247, $3248, $3249, $3250, $3251, $3252, $3253, $3254, $3255, $3256, $3257, $3258, $3259, $3260, $3261, $3262, $3263, $3264, $3265, $3266, $3267, $3268, VersionRange($3269, $3270)), ($3271, $3272, $3273, $3274, $3275, $3276, $3277, $3278, $3279, $3280, $3281, $3282, $3283, $3284, $3285, $3286, $3287, $3288, $3289, $3290, $3291, $3292, $3293, $3294, $3295, $3296, $3297, $3298, VersionRange($3299, $3300)), ($3301, $3302, $3303, $3304, $3305, $3306, $3307, $3308, $3309, $3310, $3311, $3312, $3313, $3314, $3315, $3316, $3317, $3318, $3319, $3320, $3321, $3322, $3323, $3324, $3325, $3326, $3327, $3328, VersionRange($3329, $3330)), ($3331, $3332, $3333, $3334, $3335, $3336, $3337, $3338, $3339, $3340, $3341, $3342, $3343, $3344, $3345, $3346, $3347, $3348, $3349, $3350, $3351, $3352, $3353, $3354, $3355, $3356, $3357, $3358, VersionRange($3359, $3360)), ($3361, $3362, $3363, $3364, $3365, $3366, $3367, $3368, $3369, $3370, $3371, $3372, $3373, $3374, $3375, $3376, $3377, $3378, $3379, $3380, $3381, $3382, $3383, $3384, $3385, $3386, $3387, $3388, VersionRange($3389, $3390)), ($3391, $3392, $3393, $3394, $3395, $3396, $3397, $3398, $3399, $3400, $3401, $3402, $3403, $3404, $3405, $3406, $3407, $3408, $3409, $3410, $3411, $3412, $3413, $3414, $3415, $3416, $3417, $3418, VersionRange($3419, $3420)), ($3421, $3422, $3423, $3424, $3425, $3426, $3427, $3428, $3429, $3430, $3431, $3432, $3433, $3434, $3435, $3436, $3437, $3438, $3439, $3440, $3441, $3442, $3443, $3444, $3445, $3446, $3447, $3448, VersionRange($3449, $3450)), ($3451, $3452, $3453, $3454, $3455, $3456, $3457, $3458, $3459, $3460, $3461, $3462, $3463, $3464, $3465, $3466, $3467, $3468, $3469, $3470, $3471, $3472, $3473, $3474, $3475, $3476, $3477, $3478, VersionRange($3479, $3480)), ($3481, $3482, $3483, $3484, $3485, $3486, $3487, $3488, $3489, $3490, $3491, $3492, $3493, $3494, $3495, $3496, $3497, $3498, $3499, $3500, $3501, $3502, $3503, $3504, $3505, $3506, $3507, $3508, VersionRange($3509, $3510)), ($3511, $3512, $3513, $3514, $3515, $3516, $3517, $3518, $3519, $3520, $3521, $3522, $3523, $3524, $3525, $3526, $3527, $3528, $3529, $3530, $3531, $3532, $3533, $3534, $3535, $3536, $3537, $3538, VersionRange($3539, $3540)), ($3541, $3542, $3543, $3544, $3545, $3546, $3547, $3548, $3549, $3550, $3551, $3552, $3553, $3554, $3555, $3556, $3557, $3558, $3559, $3560, $3561, $3562, $3563, $3564, $3565, $3566, $3567, $3568, VersionRange($3569, $3570)), ($3571, $3572, $3573, $3574, $3575, $3576, $3577, $3578, $3579, $3580, $3581, $3582, $3583, $3584, $3585, $3586, $3587, $3588, $3589, $3590, $3591, $3592, $3593, $3594, $3595, $3596, $3597, $3598, VersionRange($3599, $3600)), ($3601, $3602, $3603, $3604, $3605, $3606, $3607, $3608, $3609, $3610, $3611, $3612, $3613, $3614, $3615, $3616, $3617, $3618, $3619, $3620, $3621, $3622, $3623, $3624, $3625, $3626, $3627, $3628, VersionRange($3629, $3630)), ($3631, $3632, $3633, $3634, $3635, $3636, $3637, $3638, $3639, $3640, $3641, $3642, $3643, $3644, $3645, $3646, $3647, $3648, $3649, $3650, $3651, $3652, $3653, $3654, $3655, $3656, $3657, $3658, VersionRange($3659, $3660)), ($3661, $3662, $3663, $3664, $3665, $3666, $3667, $3668, $3669, $3670, $3671, $3672, $3673, $3674, $3675, $3676, $3677, $3678, $3679, $3680, $3681, $3682, $3683, $3684, $3685, $3686, $3687, $3688, VersionRange($3689, $3690)), ($3691, $3692, $3693, $3694, $3695, $3696, $3697, $3698, $3699, $3700, $3701, $3702, $3703, $3704, $3705, $3706, $3707, $3708, $3709, $3710, $3711, $3712, $3713, $3714, $3715, $3716, $3717, $3718, VersionRange($3719, $3720)), ($3721, $3722, $3723, $3724, $3725, $3726, $3727, $3728, $3729, $3730, $3731, $3732, $3733, $3734, $3735, $3736, $3737, $3738, $3739, $3740, $3741, $3742, $3743, $3744, $3745, $3746, $3747, $3748, VersionRange($3749, $3750)), ($3751, $3752, $3753, $3754, $3755, $3756, $3757, $3758, $3759, $3760, $3761, $3762, $3763, $3764, $3765, $3766, $3767, $3768, $3769, $3770, $3771, $3772, $3773, $3774, $3775, $3776, $3777, $3778, VersionRange($3779, $3780)), ($3781, $3782, $3783, $3784, $3785, $3786, $3787, $3788, $3789, $3790, $3791, $3792, $3793, $3794, $3795, $3796, $3797, $3798, $3799, $3800, $3801, $3802, $3803, $3804, $3805, $3806, $3807, $3808, VersionRange($3809, $3810)), ($3811, $3812, $3813, $3814, $3815, $3816, $3817, $3818, $3819, $3820, $3821, $3822, $3823, $3824, $3825, $3826, $3827, $3828, $3829, $3830, $3831, $3832, $3833, $3834, $3835, $3836, $3837, $3838, VersionRange($3839, $3840)), ($3841, $3842, $3843, $3844, $3845, $3846, $3847, $3848, $3849, $3850, $3851, $3852, $3853, $3854, $3855, $3856, $3857, $3858, $3859, $3860, $3861, $3862, $3863, $3864, $3865, $3866, $3867, $3868, VersionRange($3869, $3870)), ($3871, $3872, $3873, $3874, $3875, $3876, $3877, $3878, $3879, $3880, $3881, $3882, $3883, $3884, $3885, $3886, $3887, $3888, $3889, $3890, $3891, $3892, $3893, $3894, $3895, $3896, $3897, $3898, VersionRange($3899, $3900)), ($3901, $3902, $3903, $3904, $3905, $3906, $3907, $3908, $3909, $3910, $3911, $3912, $3913, $3914, $3915, $3916, $3917, $3918, $3919, $3920, $3921, $3922, $3923, $3924, $3925, $3926, $3927, $3928, VersionRange($3929, $3930)), ($3931, $3932, $3933, $3934, $3935, $3936, $3937, $3938, $3939, $3940, $3941, $3942, $3943, $3944, $3945, $3946, $3947, $3948, $3949, $3950, $3951, $3952, $3953, $3954, $3955, $3956, $3957, $3958, VersionRange($3959, $3960)), ($3961, $3962, $3963, $3964, $3965, $3966, $3967, $3968, $3969, $3970, $3971, $3972, $3973, $3974, $3975, $3976, $3977, $3978, $3979, $3980, $3981, $3982, $3983, $3984, $3985, $3986, $3987, $3988, VersionRange($3989, $3990)), ($3991, $3992, $3993, $3994, $3995, $3996, $3997, $3998, $3999, $4000, $4001, $4002, $4003, $4004, $4005, $4006, $4007, $4008, $4009, $4010, $4011, $4012, $4013, $4014, $4015, $4016, $4017, $4018, VersionRange($4019, $4020)), ($4021, $4022, $4023, $4024, $4025, $4026, $4027, $4028, $4029, $4030, $4031, $4032, $4033, $4034, $4035, $4036, $4037, $4038, $4039, $4040, $4041, $4042, $4043, $4044, $4045, $4046, $4047, $4048, VersionRange($4049, $4050)), ($4051, $4052, $4053, $4054, $4055, $4056, $4057, $4058, $4059, $4060, $4061, $4062, $4063, $4064, $4065, $4066, $4067, $4068, $4069, $4070, $4071, $4072, $4073, $4074, $4075, $4076, $4077, $4078, VersionRange($4079, $4080)), ($4081, $4082, $4083, $4084, $4085, $4086, $4087, $4088, $4089, $4090, $4091, $4092, $4093, $4094, $4095, $4096, $4097, $4098, $4099, $4100, $4101, $4102, $4103, $4104, $4105, $4106, $4107, $4108, VersionRange($4109, $4110)), ($4111, $4112, $4113, $4114, $4115, $4116, $4117, $4118, $4119, $4120, $4121, $4122, $4123, $4124, $4125, $4126, $4127, $4128, $4129, $4130, $4131, $4132, $4133, $4134, $4135, $4136, $4137, $4138, VersionRange($4139, $4140)), ($4141, $4142, $4143, $4144, $4145, $4146, $4147, $4148, $4149, $4150, $4151, $4152, $4153, $4154, $4155, $4156, $4157, $4158, $4159, $4160, $4161, $4162, $4163, $4164, $4165, $4166, $4167, $4168, VersionRange($4169, $4170)), ($4171, $4172, $4173, $4174, $4175, $4176, $4177, $4178, $4179, $4180, $4181, $4182, $4183, $4184, $4185, $4186, $4187, $4188, $4189, $4190, $4191, $4192, $4193, $4194, $4195, $4196, $4197, $4198, VersionRange($4199, $4200)), ($4201, $4202, $4203, $4204, $4205, $4206, $4207, $4208, $4209, $4210, $4211, $4212, $4213, $4214, $4215, $4216, $4217, $4218, $4219, $4220, $4221, $4222, $4223, $4224, $4225, $4226, $4227, $4228, VersionRange($4229, $4230)), ($4231, $4232, $4233, $4234, $4235, $4236, $4237, $4238, $4239, $4240, $4241, $4242, $4243, $4244, $4245, $4246, $4247, $4248, $4249, $4250, $4251, $4252, $4253, $4254, $4255, $4256, $4257, $4258, VersionRange($4259, $4260)), ($4261, $4262, $4263, $4264, $4265, $4266, $4267, $4268, $4269, $4270, $4271, $4272, $4273, $4274, $4275, $4276, $4277, $4278, $4279, $4280, $4281, $4282, $4283, $4284, $4285, $4286, $4287, $4288, VersionRange($4289, $4290)), ($4291, $4292, $4293, $4294, $4295, $4296, $4297, $4298, $4299, $4300, $4301, $4302, $4303, $4304, $4305, $4306, $4307, $4308, $4309, $4310, $4311, $4312, $4313, $4314, $4315, $4316, $4317, $4318, VersionRange($4319, $4320)), ($4321, $4322, $4323, $4324, $4325, $4326, $4327, $4328, $4329, $4330, $4331, $4332, $4333, $4334, $4335, $4336, $4337, $4338, $4339, $4340, $4341, $4342, $4343, $4344, $4345, $4346, $4347, $4348, VersionRange($4349, $4350)), ($4351, $4352, $4353, $4354, $4355, $4356, $4357, $4358, $4359, $4360, $4361, $4362, $4363, $4364, $4365, $4366, $4367, $4368, $4369, $4370, $4371, $4372, $4373, $4374, $4375, $4376, $4377, $4378, VersionRange($4379, $4380)), ($4381, $4382, $4383, $4384, $4385, $4386, $4387, $4388, $4389, $4390, $4391, $4392, $4393, $4394, $4395, $4396, $4397, $4398, $4399, $4400, $4401, $4402, $4403, $4404, $4405, $4406, $4407, $4408, VersionRange($4409, $4410)), ($4411, $4412, $4413, $4414, $4415, $4416, $4417, $4418, $4419, $4420, $4421, $4422, $4423, $4424, $4425, $4426, $4427, $4428, $4429, $4430, $4431, $4432, $4433, $4434, $4435, $4436, $4437, $4438, VersionRange($4439, $4440)), ($4441, $4442, $4443, $4444, $4445, $4446, $4447, $4448, $4449, $4450, $4451, $4452, $4453, $4454, $4455, $4456, $4457, $4458, $4459, $4460, $4461, $4462, $4463, $4464, $4465, $4466, $4467, $4468, VersionRange($4469, $4470)), ($4471, $4472, $4473, $4474, $4475, $4476, $4477, $4478, $4479, $4480, $4481, $4482, $4483, $4484, $4485, $4486, $4487, $4488, $4489, $4490, $4491, $4492, $4493, $4494, $4495, $4496, $4497, $4498, VersionRange($4499, $4500)), ($4501, $4502, $4503, $4504, $4505, $4506, $4507, $4508, $4509, $4510, $4511, $4512, $4513, $4514, $4515, $4516, $4517, $4518, $4519, $4520, $4521, $4522, $4523, $4524, $4525, $4526, $4527, $4528, VersionRange($4529, $4530)), ($4531, $4532, $4533, $4534, $4535, $4536, $4537, $4538, $4539, $4540, $4541, $4542, $4543, $4544, $4545, $4546, $4547, $4548, $4549, $4550, $4551, $4552, $4553, $4554, $4555, $4556, $4557, $4558, VersionRange($4559, $4560)), ($4561, $4562, $4563, $4564, $4565, $4566, $4567, $4568, $4569, $4570, $4571, $4572, $4573, $4574, $4575, $4576, $4577, $4578, $4579, $4580, $4581, $4582, $4583, $4584, $4585, $4586, $4587, $4588, VersionRange($4589, $4590)), ($4591, $4592, $4593, $4594, $4595, $4596, $4597, $4598, $4599, $4600, $4601, $4602, $4603, $4604, $4605, $4606, $4607, $4608, $4609, $4610, $4611, $4612, $4613, $4614, $4615, $4616, $4617, $4618, VersionRange($4619, $4620)), ($4621, $4622, $4623, $4624, $4625, $4626, $4627, $4628, $4629, $4630, $4631, $4632, $4633, $4634, $4635, $4636, $4637, $4638, $4639, $4640, $4641, $4642, $4643, $4644, $4645, $4646, $4647, $4648, VersionRange($4649, $4650)), ($4651, $4652, $4653, $4654, $4655, $4656, $4657, $4658, $4659, $4660, $4661, $4662, $4663, $4664, $4665, $4666, $4667, $4668, $4669, $4670, $4671, $4672, $4673, $4674, $4675, $4676, $4677, $4678, VersionRange($4679, $4680)), ($4681, $4682, $4683, $4684, $4685, $4686, $4687, $4688, $4689, $4690, $4691, $4692, $4693, $4694, $4695, $4696, $4697, $4698, $4699, $4700, $4701, $4702, $4703, $4704, $4705, $4706, $4707, $4708, VersionRange($4709, $4710)), ($4711, $4712, $4713, $4714, $4715, $4716, $4717, $4718, $4719, $4720, $4721, $4722, $4723, $4724, $4725, $4726, $4727, $4728, $4729, $4730, $4731, $4732, $4733, $4734, $4735, $4736, $4737, $4738, VersionRange($4739, $4740)), ($4741, $4742, $4743, $4744, $4745, $4746, $4747, $4748, $4749, $4750, $4751, $4752, $4753, $4754, $4755, $4756, $4757, $4758, $4759, $4760, $4761, $4762, $4763, $4764, $4765, $4766, $4767, $4768, VersionRange($4769, $4770)), ($4771, $4772, $4773, $4774, $4775, $4776, $4777, $4778, $4779, $4780, $4781, $4782, $4783, $4784, $4785, $4786, $4787, $4788, $4789, $4790, $4791, $4792, $4793, $4794, $4795, $4796, $4797, $4798, VersionRange($4799, $4800)), ($4801, $4802, $4803, $4804, $4805, $4806, $4807, $4808, $4809, $4810, $4811, $4812, $4813, $4814, $4815, $4816, $4817, $4818, $4819, $4820, $4821, $4822, $4823, $4824, $4825, $4826, $4827, $4828, VersionRange($4829, $4830)), ($4831, $4832, $4833, $4834, $4835, $4836, $4837, $4838, $4839, $4840, $4841, $4842, $4843, $4844, $4845, $4846, $4847, $4848, $4849, $4850, $4851, $4852, $4853, $4854, $4855, $4856, $4857, $4858, VersionRange($4859, $4860)), ($4861, $4862, $4863, $4864, $4865, $4866, $4867, $4868, $4869, $4870, $4871, $4872, $4873, $4874, $4875, $4876, $4877, $4878, $4879, $4880, $4881, $4882, $4883, $4884, $4885, $4886, $4887, $4888, VersionRange($4889, $4890)), ($4891, $4892, $4893, $4894, $4895, $4896, $4897, $4898, $4899, $4900, $4901, $4902, $4903, $4904, $4905, $4906, $4907, $4908, $4909, $4910, $4911, $4912, $4913, $4914, $4915, $4916, $4917, $4918, VersionRange($4919, $4920)), ($4921, $4922, $4923, $4924, $4925, $4926, $4927, $4928, $4929, $4930, $4931, $4932, $4933, $4934, $4935, $4936, $4937, $4938, $4939, $4940, $4941, $4942, $4943, $4944, $4945, $4946, $4947, $4948, VersionRange($4949, $4950)), ($4951, $4952, $4953, $4954, $4955, $4956, $4957, $4958, $4959, $4960, $4961, $4962, $4963, $4964, $4965, $4966, $4967, $4968, $4969, $4970, $4971, $4972, $4973, $4974, $4975, $4976, $4977, $4978, VersionRange($4979, $4980)), ($4981, $4982, $4983, $4984, $4985, $4986, $4987, $4988, $4989, $4990, $4991, $4992, $4993, $4994, $4995, $4996, $4997, $4998, $4999, $5000, $5001, $5002, $5003, $5004, $5005, $5006, $5007, $5008, VersionRange($5009, $5010)), ($5011, $5012, $5013, $5014, $5015, $5016, $5017, $5018, $5019, $5020, $5021, $5022, $5023, $5024, $5025, $5026, $5027, $5028, $5029, $5030, $5031, $5032, $5033, $5034, $5035, $5036, $5037, $5038, VersionRange($5039, $5040)), ($5041, $5042, $5043, $5044, $5045, $5046, $5047, $5048, $5049, $5050, $5051, $5052, $5053, $5054, $5055, $5056, $5057, $5058, $5059, $5060, $5061, $5062, $5063, $5064, $5065, $5066, $5067, $5068, VersionRange($5069, $5070)), ($5071, $5072, $5073, $5074, $5075, $5076, $5077, $5078, $5079, $5080, $5081, $5082, $5083, $5084, $5085, $5086, $5087, $5088, $5089, $5090, $5091, $5092, $5093, $5094, $5095, $5096, $5097, $5098, VersionRange($5099, $5100)), ($5101, $5102, $5103, $5104, $5105, $5106, $5107, $5108, $5109, $5110, $5111, $5112, $5113, $5114, $5115, $5116, $5117, $5118, $5119, $5120, $5121, $5122, $5123, $5124, $5125, $5126, $5127, $5128, VersionRange($5129, $5130)), ($5131, $5132, $5133, $5134, $5135, $5136, $5137, $5138, $5139, $5140, $5141, $5142, $5143, $5144, $5145, $5146, $5147, $5148, $5149, $5150, $5151, $5152, $5153, $5154, $5155, $5156, $5157, $5158, VersionRange($5159, $5160)), ($5161, $5162, $5163, $5164, $5165, $5166, $5167, $5168, $5169, $5170, $5171, $5172, $5173, $5174, $5175, $5176, $5177, $5178, $5179, $5180, $5181, $5182, $5183, $5184, $5185, $5186, $5187, $5188, VersionRange($5189, $5190)), ($5191, $5192, $5193, $5194, $5195, $5196, $5197, $5198, $5199, $5200, $5201, $5202, $5203, $5204, $5205, $5206, $5207, $5208, $5209, $5210, $5211, $5212, $5213, $5214, $5215, $5216, $5217, $5218, VersionRange($5219, $5220)), ($5221, $5222, $5223, $5224, $5225, $5226, $5227, $5228, $5229, $5230, $5231, $5232, $5233, $5234, $5235, $5236, $5237, $5238, $5239, $5240, $5241, $5242, $5243, $5244, $5245, $5246, $5247, $5248, VersionRange($5249, $5250)), ($5251, $5252, $5253, $5254, $5255, $5256, $5257, $5258, $5259, $5260, $5261, $5262, $5263, $5264, $5265, $5266, $5267, $5268, $5269, $5270, $5271, $5272, $5273, $5274, $5275, $5276, $5277, $5278, VersionRange($5279, $5280)), ($5281, $5282, $5283, $5284, $5285, $5286, $5287, $5288, $5289, $5290, $5291, $5292, $5293, $5294, $5295, $5296, $5297, $5298, $5299, $5300, $5301, $5302, $5303, $5304, $5305, $5306, $5307, $5308, VersionRange($5309, $5310)), ($5311, $5312, $5313, $5314, $5315, $5316, $5317, $5318, $5319, $5320, $5321, $5322, $5323, $5324, $5325, $5326, $5327, $5328, $5329, $5330, $5331, $5332, $5333, $5334, $5335, $5336, $5337, $5338, VersionRange($5339, $5340)), ($5341, $5342, $5343, $5344, $5345, $5346, $5347, $5348, $5349, $5350, $5351, $5352, $5353, $5354, $5355, $5356, $5357, $5358, $5359, $5360, $5361, $5362, $5363, $5364, $5365, $5366, $5367, $5368, VersionRange($5369, $5370)), ($5371, $5372, $5373, $5374, $5375, $5376, $5377, $5378, $5379, $5380, $5381, $5382, $5383, $5384, $5385, $5386, $5387, $5388, $5389, $5390, $5391, $5392, $5393, $5394, $5395, $5396, $5397, $5398, VersionRange($5399, $5400)), ($5401, $5402, $5403, $5404, $5405, $5406, $5407, $5408, $5409, $5410, $5411, $5412, $5413, $5414, $5415, $5416, $5417, $5418, $5419, $5420, $5421, $5422, $5423, $5424, $5425, $5426, $5427, $5428, VersionRange($5429, $5430)), ($5431, $5432, $5433, $5434, $5435, $5436, $5437, $5438, $5439, $5440, $5441, $5442, $5443, $5444, $5445, $5446, $5447, $5448, $5449, $5450, $5451, $5452, $5453, $5454, $5455, $5456, $5457, $5458, VersionRange($5459, $5460)), ($5461, $5462, $5463, $5464, $5465, $5466, $5467, $5468, $5469, $5470, $5471, $5472, $5473, $5474, $5475, $5476, $5477, $5478, $5479, $5480, $5481, $5482, $5483, $5484, $5485, $5486, $5487, $5488, VersionRange($5489, $5490)), ($5491, $5492, $5493, $5494, $5495, $5496, $5497, $5498, $5499, $5500, $5501, $5502, $5503, $5504, $5505, $5506, $5507, $5508, $5509, $5510, $5511, $5512, $5513, $5514, $5515, $5516, $5517, $5518, VersionRange($5519, $5520)), ($5521, $5522, $5523, $5524, $5525, $5526, $5527, $5528, $5529, $5530, $5531, $5532, $5533, $5534, $5535, $5536, $5537, $5538, $5539, $5540, $5541, $5542, $5543, $5544, $5545, $5546, $5547, $5548, VersionRange($5549, $5550)), ($5551, $5552, $5553, $5554, $5555, $5556, $5557, $5558, $5559, $5560, $5561, $5562, $5563, $5564, $5565, $5566, $5567, $5568, $5569, $5570, $5571, $5572, $5573, $5574, $5575, $5576, $5577, $5578, VersionRange($5579, $5580)), ($5581, $5582, $5583, $5584, $5585, $5586, $5587, $5588, $5589, $5590, $5591, $5592, $5593, $5594, $5595, $5596, $5597, $5598, $5599, $5600, $5601, $5602, $5603, $5604, $5605, $5606, $5607, $5608, VersionRange($5609, $5610)), ($5611, $5612, $5613, $5614, $5615, $5616, $5617, $5618, $5619, $5620, $5621, $5622, $5623, $5624, $5625, $5626, $5627, $5628, $5629, $5630, $5631, $5632, $5633, $5634, $5635, $5636, $5637, $5638, VersionRange($5639, $5640)), ($5641, $5642, $5643, $5644, $5645, $5646, $5647, $5648, $5649, $5650, $5651, $5652, $5653, $5654, $5655, $5656, $5657, $5658, $5659, $5660, $5661, $5662, $5663, $5664, $5665, $5666, $5667, $5668, VersionRange($5669, $5670)), ($5671, $5672, $5673, $5674, $5675, $5676, $5677, $5678, $5679, $5680, $5681, $5682, $5683, $5684, $5685, $5686, $5687, $5688, $5689, $5690, $5691, $5692, $5693, $5694, $5695, $5696, $5697, $5698, VersionRange($5699, $5700)), ($5701, $5702, $5703, $5704, $5705, $5706, $5707, $5708, $5709, $5710, $5711, $5712, $5713, $5714, $5715, $5716, $5717, $5718, $5719, $5720, $5721, $5722, $5723, $5724, $5725, $5726, $5727, $5728, VersionRange($5729, $5730)), ($5731, $5732, $5733, $5734, $5735, $5736, $5737, $5738, $5739, $5740, $5741, $5742, $5743, $5744, $5745, $5746, $5747, $5748, $5749, $5750, $5751, $5752, $5753, $5754, $5755, $5756, $5757, $5758, VersionRange($5759, $5760)), ($5761, $5762, $5763, $5764, $5765, $5766, $5767, $5768, $5769, $5770, $5771, $5772, $5773, $5774, $5775, $5776, $5777, $5778, $5779, $5780, $5781, $5782, $5783, $5784, $5785, $5786, $5787, $5788, VersionRange($5789, $5790)), ($5791, $5792, $5793, $5794, $5795, $5796, $5797, $5798, $5799, $5800, $5801, $5802, $5803, $5804, $5805, $5806, $5807, $5808, $5809, $5810, $5811, $5812, $5813, $5814, $5815, $5816, $5817, $5818, VersionRange($5819, $5820)), ($5821, $5822, $5823, $5824, $5825, $5826, $5827, $5828, $5829, $5830, $5831, $5832, $5833, $5834, $5835, $5836, $5837, $5838, $5839, $5840, $5841, $5842, $5843, $5844, $5845, $5846, $5847, $5848, VersionRange($5849, $5850)), ($5851, $5852, $5853, $5854, $5855, $5856, $5857, $5858, $5859, $5860, $5861, $5862, $5863, $5864, $5865, $5866, $5867, $5868, $5869, $5870, $5871, $5872, $5873, $5874, $5875, $5876, $5877, $5878, VersionRange($5879, $5880)), ($5881, $5882, $5883, $5884, $5885, $5886, $5887, $5888, $5889, $5890, $5891, $5892, $5893, $5894, $5895, $5896, $5897, $5898, $5899, $5900, $5901, $5902, $5903, $5904, $5905, $5906, $5907, $5908, VersionRange($5909, $5910)), ($5911, $5912, $5913, $5914, $5915, $5916, $5917, $5918, $5919, $5920, $5921, $5922, $5923, $5924, $5925, $5926, $5927, $5928, $5929, $5930, $5931, $5932, $5933, $5934, $5935, $5936, $5937, $5938, VersionRange($5939, $5940)), ($5941, $5942, $5943, $5944, $5945, $5946, $5947, $5948, $5949, $5950, $5951, $5952, $5953, $5954, $5955, $5956, $5957, $5958, $5959, $5960, $5961, $5962, $5963, $5964, $5965, $5966, $5967, $5968, VersionRange($5969, $5970)), ($5971, $5972, $5973, $5974, $5975, $5976, $5977, $5978, $5979, $5980, $5981, $5982, $5983, $5984, $5985, $5986, $5987, $5988, $5989, $5990, $5991, $5992, $5993, $5994, $5995, $5996, $5997, $5998, VersionRange($5999, $6000)), ($6001, $6002, $6003, $6004, $6005, $6006, $6007, $6008, $6009, $6010, $6011, $6012, $6013, $6014, $6015, $6016, $6017, $6018, $6019, $6020, $6021, $6022, $6023, $6024, $6025, $6026, $6027, $6028, VersionRange($6029, $6030)), ($6031, $6032, $6033, $6034, $6035, $6036, $6037, $6038, $6039, $6040, $6041, $6042, $6043, $6044, $6045, $6046, $6047, $6048, $6049, $6050, $6051, $6052, $6053, $6054, $6055, $6056, $6057, $6058, VersionRange($6059, $6060)), ($6061, $6062, $6063, $6064, $6065, $6066, $6067, $6068, $6069, $6070, $6071, $6072, $6073, $6074, $6075, $6076, $6077, $6078, $6079, $6080, $6081, $6082, $6083, $6084, $6085, $6086, $6087, $6088, VersionRange($6089, $6090)), ($6091, $6092, $6093, $6094, $6095, $6096, $6097, $6098, $6099, $6100, $6101, $6102, $6103, $6104, $6105, $6106, $6107, $6108, $6109, $6110, $6111, $6112, $6113, $6114, $6115, $6116, $6117, $6118, VersionRange($6119, $6120)), ($6121, $6122, $6123, $6124, $6125, $6126, $6127, $6128, $6129, $6130, $6131, $6132, $6133, $6134, $6135, $6136, $6137, $6138, $6139, $6140, $6141, $6142, $6143, $6144, $6145, $6146, $6147, $6148, VersionRange($6149, $6150)), ($6151, $6152, $6153, $6154, $6155, $6156, $6157, $6158, $6159, $6160, $6161, $6162, $6163, $6164, $6165, $6166, $6167, $6168, $6169, $6170, $6171, $6172, $6173, $6174, $6175, $6176, $6177, $6178, VersionRange($6179, $6180)), ($6181, $6182, $6183, $6184, $6185, $6186, $6187, $6188, $6189, $6190, $6191, $6192, $6193, $6194, $6195, $6196, $6197, $6198, $6199, $6200, $6201, $6202, $6203, $6204, $6205, $6206, $6207, $6208, VersionRange($6209, $6210)), ($6211, $6212, $6213, $6214, $6215, $6216, $6217, $6218, $6219, $6220, $6221, $6222, $6223, $6224, $6225, $6226, $6227, $6228, $6229, $6230, $6231, $6232, $6233, $6234, $6235, $6236, $6237, $6238, VersionRange($6239, $6240)), ($6241, $6242, $6243, $6244, $6245, $6246, $6247, $6248, $6249, $6250, $6251, $6252, $6253, $6254, $6255, $6256, $6257, $6258, $6259, $6260, $6261, $6262, $6263, $6264, $6265, $6266, $6267, $6268, VersionRange($6269, $6270)), ($6271, $6272, $6273, $6274, $6275, $6276, $6277, $6278, $6279, $6280, $6281, $6282, $6283, $6284, $6285, $6286, $6287, $6288, $6289, $6290, $6291, $6292, $6293, $6294, $6295, $6296, $6297, $6298, VersionRange($6299, $6300)), ($6301, $6302, $6303, $6304, $6305, $6306, $6307, $6308, $6309, $6310, $6311, $6312, $6313, $6314, $6315, $6316, $6317, $6318, $6319, $6320, $6321, $6322, $6323, $6324, $6325, $6326, $6327, $6328, VersionRange($6329, $6330)), ($6331, $6332, $6333, $6334, $6335, $6336, $6337, $6338, $6339, $6340, $6341, $6342, $6343, $6344, $6345, $6346, $6347, $6348, $6349, $6350, $6351, $6352, $6353, $6354, $6355, $6356, $6357, $6358, VersionRange($6359, $6360)), ($6361, $6362, $6363, $6364, $6365, $6366, $6367, $6368, $6369, $6370, $6371, $6372, $6373, $6374, $6375, $6376, $6377, $6378, $6379, $6380, $6381, $6382, $6383, $6384, $6385, $6386, $6387, $6388, VersionRange($6389, $6390)), ($6391, $6392, $6393, $6394, $6395, $6396, $6397, $6398, $6399, $6400, $6401, $6402, $6403, $6404, $6405, $6406, $6407, $6408, $6409, $6410, $6411, $6412, $6413, $6414, $6415, $6416, $6417, $6418, VersionRange($6419, $6420)), ($6421, $6422, $6423, $6424, $6425, $6426, $6427, $6428, $6429, $6430, $6431, $6432, $6433, $6434, $6435, $6436, $6437, $6438, $6439, $6440, $6441, $6442, $6443, $6444, $6445, $6446, $6447, $6448, VersionRange($6449, $6450)), ($6451, $6452, $6453, $6454, $6455, $6456, $6457, $6458, $6459, $6460, $6461, $6462, $6463, $6464, $6465, $6466, $6467, $6468, $6469, $6470, $6471, $6472, $6473, $6474, $6475, $6476, $6477, $6478, VersionRange($6479, $6480)), ($6481, $6482, $6483, $6484, $6485, $6486, $6487, $6488, $6489, $6490, $6491, $6492, $6493, $6494, $6495, $6496, $6497, $6498, $6499, $6500, $6501, $6502, $6503, $6504, $6505, $6506, $6507, $6508, VersionRange($6509, $6510)), ($6511, $6512, $6513, $6514, $6515, $6516, $6517, $6518, $6519, $6520, $6521, $6522, $6523, $6524, $6525, $6526, $6527, $6528, $6529, $6530, $6531, $6532, $6533, $6534, $6535, $6536, $6537, $6538, VersionRange($6539, $6540)), ($6541, $6542, $6543, $6544, $6545, $6546, $6547, $6548, $6549, $6550, $6551, $6552, $6553, $6554, $6555, $6556, $6557, $6558, $6559, $6560, $6561, $6562, $6563, $6564, $6565, $6566, $6567, $6568, VersionRange($6569, $6570)), ($6571, $6572, $6573, $6574, $6575, $6576, $6577, $6578, $6579, $6580, $6581, $6582, $6583, $6584, $6585, $6586, $6587, $6588, $6589, $6590, $6591, $6592, $6593, $6594, $6595, $6596, $6597, $6598, VersionRange($6599, $6600)), ($6601, $6602, $6603, $6604, $6605, $6606, $6607, $6608, $6609, $6610, $6611, $6612, $6613, $6614, $6615, $6616, $6617, $6618, $6619, $6620, $6621, $6622, $6623, $6624, $6625, $6626, $6627, $6628, VersionRange($6629, $6630)), ($6631, $6632, $6633, $6634, $6635, $6636, $6637, $6638, $6639, $6640, $6641, $6642, $6643, $6644, $6645, $6646, $6647, $6648, $6649, $6650, $6651, $6652, $6653, $6654, $6655, $6656, $6657, $6658, VersionRange($6659, $6660)), ($6661, $6662, $6663, $6664, $6665, $6666, $6667, $6668, $6669, $6670, $6671, $6672, $6673, $6674, $6675, $6676, $6677, $6678, $6679, $6680, $6681, $6682, $6683, $6684, $6685, $6686, $6687, $6688, VersionRange($6689, $6690)), ($6691, $6692, $6693, $6694, $6695, $6696, $6697, $6698, $6699, $6700, $6701, $6702, $6703, $6704, $6705, $6706, $6707, $6708, $6709, $6710, $6711, $6712, $6713, $6714, $6715, $6716, $6717, $6718, VersionRange($6719, $6720)), ($6721, $6722, $6723, $6724, $6725, $6726, $6727, $6728, $6729, $6730, $6731, $6732, $6733, $6734, $6735, $6736, $6737, $6738, $6739, $6740, $6741, $6742, $6743, $6744, $6745, $6746, $6747, $6748, VersionRange($6749, $6750)), ($6751, $6752, $6753, $6754, $6755, $6756, $6757, $6758, $6759, $6760, $6761, $6762, $6763, $6764, $6765, $6766, $6767, $6768, $6769, $6770, $6771, $6772, $6773, $6774, $6775, $6776, $6777, $6778, VersionRange($6779, $6780)), ($6781, $6782, $6783, $6784, $6785, $6786, $6787, $6788, $6789, $6790, $6791, $6792, $6793, $6794, $6795, $6796, $6797, $6798, $6799, $6800, $6801, $6802, $6803, $6804, $6805, $6806, $6807, $6808, VersionRange($6809, $6810)), ($6811, $6812, $6813, $6814, $6815, $6816, $6817, $6818, $6819, $6820, $6821, $6822, $6823, $6824, $6825, $6826, $6827, $6828, $6829, $6830, $6831, $6832, $6833, $6834, $6835, $6836, $6837, $6838, VersionRange($6839, $6840)), ($6841, $6842, $6843, $6844, $6845, $6846, $6847, $6848, $6849, $6850, $6851, $6852, $6853, $6854, $6855, $6856, $6857, $6858, $6859, $6860, $6861, $6862, $6863, $6864, $6865, $6866, $6867, $6868, VersionRange($6869, $6870)), ($6871, $6872, $6873, $6874, $6875, $6876, $6877, $6878, $6879, $6880, $6881, $6882, $6883, $6884, $6885, $6886, $6887, $6888, $6889, $6890, $6891, $6892, $6893, $6894, $6895, $6896, $6897, $6898, VersionRange($6899, $6900)), ($6901, $6902, $6903, $6904, $6905, $6906, $6907, $6908, $6909, $6910, $6911, $6912, $6913, $6914, $6915, $6916, $6917, $6918, $6919, $6920, $6921, $6922, $6923, $6924, $6925, $6926, $6927, $6928, VersionRange($6929, $6930)), ($6931, $6932, $6933, $6934, $6935, $6936, $6937, $6938, $6939, $6940, $6941, $6942, $6943, $6944, $6945, $6946, $6947, $6948, $6949, $6950, $6951, $6952, $6953, $6954, $6955, $6956, $6957, $6958, VersionRange($6959, $6960)), ($6961, $6962, $6963, $6964, $6965, $6966, $6967, $6968, $6969, $6970, $6971, $6972, $6973, $6974, $6975, $6976, $6977, $6978, $6979, $6980, $6981, $6982, $6983, $6984, $6985, $6986, $6987, $6988, VersionRange($6989, $6990)), ($6991, $6992, $6993, $6994, $6995, $6996, $6997, $6998, $6999, $7000, $7001, $7002, $7003, $7004, $7005, $7006, $7007, $7008, $7009, $7010, $7011, $7012, $7013, $7014, $7015, $7016, $7017, $7018, VersionRange($7019, $7020)), ($7021, $7022, $7023, $7024, $7025, $7026, $7027, $7028, $7029, $7030, $7031, $7032, $7033, $7034, $7035, $7036, $7037, $7038, $7039, $7040, $7041, $7042, $7043, $7044, $7045, $7046, $7047, $7048, VersionRange($7049, $7050)), ($7051, $7052, $7053, $7054, $7055, $7056, $7057, $7058, $7059, $7060, $7061, $7062, $7063, $7064, $7065, $7066, $7067, $7068, $7069, $7070, $7071, $7072, $7073, $7074, $7075, $7076, $7077, $7078, VersionRange($7079, $7080)), ($7081, $7082, $7083, $7084, $7085, $7086, $7087, $7088, $7089, $7090, $7091, $7092, $7093, $7094, $7095, $7096, $7097, $7098, $7099, $7100, $7101, $7102, $7103, $7104, $7105, $7106, $7107, $7108, VersionRange($7109, $7110)), ($7111, $7112, $7113, $7114, $7115, $7116, $7117, $7118, $7119, $7120, $7121, $7122, $7123, $7124, $7125, $7126, $7127, $7128, $7129, $7130, $7131, $7132, $7133, $7134, $7135, $7136, $7137, $7138, VersionRange($7139, $7140)), ($7141, $7142, $7143, $7144, $7145, $7146, $7147, $7148, $7149, $7150, $7151, $7152, $7153, $7154, $7155, $7156, $7157, $7158, $7159, $7160, $7161, $7162, $7163, $7164, $7165, $7166, $7167, $7168, VersionRange($7169, $7170)), ($7171, $7172, $7173, $7174, $7175, $7176, $7177, $7178, $7179, $7180, $7181, $7182, $7183, $7184, $7185, $7186, $7187, $7188, $7189, $7190, $7191, $7192, $7193, $7194, $7195, $7196, $7197, $7198, VersionRange($7199, $7200)), ($7201, $7202, $7203, $7204, $7205, $7206, $7207, $7208, $7209, $7210, $7211, $7212, $7213, $7214, $7215, $7216, $7217, $7218, $7219, $7220, $7221, $7222, $7223, $7224, $7225, $7226, $7227, $7228, VersionRange($7229, $7230)), ($7231, $7232, $7233, $7234, $7235, $7236, $7237, $7238, $7239, $7240, $7241, $7242, $7243, $7244, $7245, $7246, $7247, $7248, $7249, $7250, $7251, $7252, $7253, $7254, $7255, $7256, $7257, $7258, VersionRange($7259, $7260)), ($7261, $7262, $7263, $7264, $7265, $7266, $7267, $7268, $7269, $7270, $7271, $7272, $7273, $7274, $7275, $7276, $7277, $7278, $7279, $7280, $7281, $7282, $7283, $7284, $7285, $7286, $7287, $7288, VersionRange($7289, $7290)), ($7291, $7292, $7293, $7294, $7295, $7296, $7297, $7298, $7299, $7300, $7301, $7302, $7303, $7304, $7305, $7306, $7307, $7308, $7309, $7310, $7311, $7312, $7313, $7314, $7315, $7316, $7317, $7318, VersionRange($7319, $7320)), ($7321, $7322, $7323, $7324, $7325, $7326, $7327, $7328, $7329, $7330, $7331, $7332, $7333, $7334, $7335, $7336, $7337, $7338, $7339, $7340, $7341, $7342, $7343, $7344, $7345, $7346, $7347, $7348, VersionRange($7349, $7350)), ($7351, $7352, $7353, $7354, $7355, $7356, $7357, $7358, $7359, $7360, $7361, $7362, $7363, $7364, $7365, $7366, $7367, $7368, $7369, $7370, $7371, $7372, $7373, $7374, $7375, $7376, $7377, $7378, VersionRange($7379, $7380)), ($7381, $7382, $7383, $7384, $7385, $7386, $7387, $7388, $7389, $7390, $7391, $7392, $7393, $7394, $7395, $7396, $7397, $7398, $7399, $7400, $7401, $7402, $7403, $7404, $7405, $7406, $7407, $7408, VersionRange($7409, $7410)), ($7411, $7412, $7413, $7414, $7415, $7416, $7417, $7418, $7419, $7420, $7421, $7422, $7423, $7424, $7425, $7426, $7427, $7428, $7429, $7430, $7431, $7432, $7433, $7434, $7435, $7436, $7437, $7438, VersionRange($7439, $7440)), ($7441, $7442, $7443, $7444, $7445, $7446, $7447, $7448, $7449, $7450, $7451, $7452, $7453, $7454, $7455, $7456, $7457, $7458, $7459, $7460, $7461, $7462, $7463, $7464, $7465, $7466, $7467, $7468, VersionRange($7469, $7470)), ($7471, $7472, $7473, $7474, $7475, $7476, $7477, $7478, $7479, $7480, $7481, $7482, $7483, $7484, $7485, $7486, $7487, $7488, $7489, $7490, $7491, $7492, $7493, $7494, $7495, $7496, $7497, $7498, VersionRange($7499, $7500)), ($7501, $7502, $7503, $7504, $7505, $7506, $7507, $7508, $7509, $7510, $7511, $7512, $7513, $7514, $7515, $7516, $7517, $7518, $7519, $7520, $7521, $7522, $7523, $7524, $7525, $7526, $7527, $7528, VersionRange($7529, $7530)), ($7531, $7532, $7533, $7534, $7535, $7536, $7537, $7538, $7539, $7540, $7541, $7542, $7543, $7544, $7545, $7546, $7547, $7548, $7549, $7550, $7551, $7552, $7553, $7554, $7555, $7556, $7557, $7558, VersionRange($7559, $7560)), ($7561, $7562, $7563, $7564, $7565, $7566, $7567, $7568, $7569, $7570, $7571, $7572, $7573, $7574, $7575, $7576, $7577, $7578, $7579, $7580, $7581, $7582, $7583, $7584, $7585, $7586, $7587, $7588, VersionRange($7589, $7590)), ($7591, $7592, $7593, $7594, $7595, $7596, $7597, $7598, $7599, $7600, $7601, $7602, $7603, $7604, $7605, $7606, $7607, $7608, $7609, $7610, $7611, $7612, $7613, $7614, $7615, $7616, $7617, $7618, VersionRange($7619, $7620)), ($7621, $7622, $7623, $7624, $7625, $7626, $7627, $7628, $7629, $7630, $7631, $7632, $7633, $7634, $7635, $7636, $7637, $7638, $7639, $7640, $7641, $7642, $7643, $7644, $7645, $7646, $7647, $7648, VersionRange($7649, $7650)), ($7651, $7652, $7653, $7654, $7655, $7656, $7657, $7658, $7659, $7660, $7661, $7662, $7663, $7664, $7665, $7666, $7667, $7668, $7669, $7670, $7671, $7672, $7673, $7674, $7675, $7676, $7677, $7678, VersionRange($7679, $7680)), ($7681, $7682, $7683, $7684, $7685, $7686, $7687, $7688, $7689, $7690, $7691, $7692, $7693, $7694, $7695, $7696, $7697, $7698, $7699, $7700, $7701, $7702, $7703, $7704, $7705, $7706, $7707, $7708, VersionRange($7709, $7710)), ($7711, $7712, $7713, $7714, $7715, $7716, $7717, $7718, $7719, $7720, $7721, $7722, $7723, $7724, $7725, $7726, $7727, $7728, $7729, $7730, $7731, $7732, $7733, $7734, $7735, $7736, $7737, $7738, VersionRange($7739, $7740)), ($7741, $7742, $7743, $7744, $7745, $7746, $7747, $7748, $7749, $7750, $7751, $7752, $7753, $7754, $7755, $7756, $7757, $7758, $7759, $7760, $7761, $7762, $7763, $7764, $7765, $7766, $7767, $7768, VersionRange($7769, $7770)), ($7771, $7772, $7773, $7774, $7775, $7776, $7777, $7778, $7779, $7780, $7781, $7782, $7783, $7784, $7785, $7786, $7787, $7788, $7789, $7790, $7791, $7792, $7793, $7794, $7795, $7796, $7797, $7798, VersionRange($7799, $7800)), ($7801, $7802, $7803, $7804, $7805, $7806, $7807, $7808, $7809, $7810, $7811, $7812, $7813, $7814, $7815, $7816, $7817, $7818, $7819, $7820, $7821, $7822, $7823, $7824, $7825, $7826, $7827, $7828, VersionRange($7829, $7830)), ($7831, $7832, $7833, $7834, $7835, $7836, $7837, $7838, $7839, $7840, $7841, $7842, $7843, $7844, $7845, $7846, $7847, $7848, $7849, $7850, $7851, $7852, $7853, $7854, $7855, $7856, $7857, $7858, VersionRange($7859, $7860)), ($7861, $7862, $7863, $7864, $7865, $7866, $7867, $7868, $7869, $7870, $7871, $7872, $7873, $7874, $7875, $7876, $7877, $7878, $7879, $7880, $7881, $7882, $7883, $7884, $7885, $7886, $7887, $7888, VersionRange($7889, $7890)), ($7891, $7892, $7893, $7894, $7895, $7896, $7897, $7898, $7899, $7900, $7901, $7902, $7903, $7904, $7905, $7906, $7907, $7908, $7909, $7910, $7911, $7912, $7913, $7914, $7915, $7916, $7917, $7918, VersionRange($7919, $7920)), ($7921, $7922, $7923, $7924, $7925, $7926, $7927, $7928, $7929, $7930, $7931, $7932, $7933, $7934, $7935, $7936, $7937, $7938, $7939, $7940, $7941, $7942, $7943, $7944, $7945, $7946, $7947, $7948, VersionRange($7949, $7950)), ($7951, $7952, $7953, $7954, $7955, $7956, $7957, $7958, $7959, $7960, $7961, $7962, $7963, $7964, $7965, $7966, $7967, $7968, $7969, $7970, $7971, $7972, $7973, $7974, $7975, $7976, $7977, $7978, VersionRange($7979, $7980)), ($7981, $7982, $7983, $7984, $7985, $7986, $7987, $7988, $7989, $7990, $7991, $7992, $7993, $7994, $7995, $7996, $7997, $7998, $7999, $8000, $8001, $8002, $8003, $8004, $8005, $8006, $8007, $8008, VersionRange($8009, $8010)), ($8011, $8012, $8013, $8014, $8015, $8016, $8017, $8018, $8019, $8020, $8021, $8022, $8023, $8024, $8025, $8026, $8027, $8028, $8029, $8030, $8031, $8032, $8033, $8034, $8035, $8036, $8037, $8038, VersionRange($8039, $8040)), ($8041, $8042, $8043, $8044, $8045, $8046, $8047, $8048, $8049, $8050, $8051, $8052, $8053, $8054, $8055, $8056, $8057, $8058, $8059, $8060, $8061, $8062, $8063, $8064, $8065, $8066, $8067, $8068, VersionRange($8069, $8070)), ($8071, $8072, $8073, $8074, $8075, $8076, $8077, $8078, $8079, $8080, $8081, $8082, $8083, $8084, $8085, $8086, $8087, $8088, $8089, $8090, $8091, $8092, $8093, $8094, $8095, $8096, $8097, $8098, VersionRange($8099, $8100)), ($8101, $8102, $8103, $8104, $8105, $8106, $8107, $8108, $8109, $8110, $8111, $8112, $8113, $8114, $8115, $8116, $8117, $8118, $8119, $8120, $8121, $8122, $8123, $8124, $8125, $8126, $8127, $8128, VersionRange($8129, $8130)), ($8131, $8132, $8133, $8134, $8135, $8136, $8137, $8138, $8139, $8140, $8141, $8142, $8143, $8144, $8145, $8146, $8147, $8148, $8149, $8150, $8151, $8152, $8153, $8154, $8155, $8156, $8157, $8158, VersionRange($8159, $8160)), ($8161, $8162, $8163, $8164, $8165, $8166, $8167, $8168, $8169, $8170, $8171, $8172, $8173, $8174, $8175, $8176, $8177, $8178, $8179, $8180, $8181, $8182, $8183, $8184, $8185, $8186, $8187, $8188, VersionRange($8189, $8190)), ($8191, $8192, $8193, $8194, $8195, $8196, $8197, $8198, $8199, $8200, $8201, $8202, $8203, $8204, $8205, $8206, $8207, $8208, $8209, $8210, $8211, $8212, $8213, $8214, $8215, $8216, $8217, $8218, VersionRange($8219, $8220)), ($8221, $8222, $8223, $8224, $8225, $8226, $8227, $8228, $8229, $8230, $8231, $8232, $8233, $8234, $8235, $8236, $8237, $8238, $8239, $8240, $8241, $8242, $8243, $8244, $8245, $8246, $8247, $8248, VersionRange($8249, $8250)), ($8251, $8252, $8253, $8254, $8255, $8256, $8257, $8258, $8259, $8260, $8261, $8262, $8263, $8264, $8265, $8266, $8267, $8268, $8269, $8270, $8271, $8272, $8273, $8274, $8275, $8276, $8277, $8278, VersionRange($8279, $8280)), ($8281, $8282, $8283, $8284, $8285, $8286, $8287, $8288, $8289, $8290, $8291, $8292, $8293, $8294, $8295, $8296, $8297, $8298, $8299, $8300, $8301, $8302, $8303, $8304, $8305, $8306, $8307, $8308, VersionRange($8309, $8310)), ($8311, $8312, $8313, $8314, $8315, $8316, $8317, $8318, $8319, $8320, $8321, $8322, $8323, $8324, $8325, $8326, $8327, $8328, $8329, $8330, $8331, $8332, $8333, $8334, $8335, $8336, $8337, $8338, VersionRange($8339, $8340)), ($8341, $8342, $8343, $8344, $8345, $8346, $8347, $8348, $8349, $8350, $8351, $8352, $8353, $8354, $8355, $8356, $8357, $8358, $8359, $8360, $8361, $8362, $8363, $8364, $8365, $8366, $8367, $8368, VersionRange($8369, $8370)), ($8371, $8372, $8373, $8374, $8375, $8376, $8377, $8378, $8379, $8380, $8381, $8382, $8383, $8384, $8385, $8386, $8387, $8388, $8389, $8390, $8391, $8392, $8393, $8394, $8395, $8396, $8397, $8398, VersionRange($8399, $8400)), ($8401, $8402, $8403, $8404, $8405, $8406, $8407, $8408, $8409, $8410, $8411, $8412, $8413, $8414, $8415, $8416, $8417, $8418, $8419, $8420, $8421, $8422, $8423, $8424, $8425, $8426, $8427, $8428, VersionRange($8429, $8430)), ($8431, $8432, $8433, $8434, $8435, $8436, $8437, $8438, $8439, $8440, $8441, $8442, $8443, $8444, $8445, $8446, $8447, $8448, $8449, $8450, $8451, $8452, $8453, $8454, $8455, $8456, $8457, $8458, VersionRange($8459, $8460)), ($8461, $8462, $8463, $8464, $8465, $8466, $8467, $8468, $8469, $8470, $8471, $8472, $8473, $8474, $8475, $8476, $8477, $8478, $8479, $8480, $8481, $8482, $8483, $8484, $8485, $8486, $8487, $8488, VersionRange($8489, $8490)), ($8491, $8492, $8493, $8494, $8495, $8496, $8497, $8498, $8499, $8500, $8501, $8502, $8503, $8504, $8505, $8506, $8507, $8508, $8509, $8510, $8511, $8512, $8513, $8514, $8515, $8516, $8517, $8518, VersionRange($8519, $8520)), ($8521, $8522, $8523, $8524, $8525, $8526, $8527, $8528, $8529, $8530, $8531, $8532, $8533, $8534, $8535, $8536, $8537, $8538, $8539, $8540, $8541, $8542, $8543, $8544, $8545, $8546, $8547, $8548, VersionRange($8549, $8550)), ($8551, $8552, $8553, $8554, $8555, $8556, $8557, $8558, $8559, $8560, $8561, $8562, $8563, $8564, $8565, $8566, $8567, $8568, $8569, $8570, $8571, $8572, $8573, $8574, $8575, $8576, $8577, $8578, VersionRange($8579, $8580)), ($8581, $8582, $8583, $8584, $8585, $8586, $8587, $8588, $8589, $8590, $8591, $8592, $8593, $8594, $8595, $8596, $8597, $8598, $8599, $8600, $8601, $8602, $8603, $8604, $8605, $8606, $8607, $8608, VersionRange($8609, $8610)), ($8611, $8612, $8613, $8614, $8615, $8616, $8617, $8618, $8619, $8620, $8621, $8622, $8623, $8624, $8625, $8626, $8627, $8628, $8629, $8630, $8631, $8632, $8633, $8634, $8635, $8636, $8637, $8638, VersionRange($8639, $8640)), ($8641, $8642, $8643, $8644, $8645, $8646, $8647, $8648, $8649, $8650, $8651, $8652, $8653, $8654, $8655, $8656, $8657, $8658, $8659, $8660, $8661, $8662, $8663, $8664, $8665, $8666, $8667, $8668, VersionRange($8669, $8670)), ($8671, $8672, $8673, $8674, $8675, $8676, $8677, $8678, $8679, $8680, $8681, $8682, $8683, $8684, $8685, $8686, $8687, $8688, $8689, $8690, $8691, $8692, $8693, $8694, $8695, $8696, $8697, $8698, VersionRange($8699, $8700)), ($8701, $8702, $8703, $8704, $8705, $8706, $8707, $8708, $8709, $8710, $8711, $8712, $8713, $8714, $8715, $8716, $8717, $8718, $8719, $8720, $8721, $8722, $8723, $8724, $8725, $8726, $8727, $8728, VersionRange($8729, $8730)), ($8731, $8732, $8733, $8734, $8735, $8736, $8737, $8738, $8739, $8740, $8741, $8742, $8743, $8744, $8745, $8746, $8747, $8748, $8749, $8750, $8751, $8752, $8753, $8754, $8755, $8756, $8757, $8758, VersionRange($8759, $8760)), ($8761, $8762, $8763, $8764, $8765, $8766, $8767, $8768, $8769, $8770, $8771, $8772, $8773, $8774, $8775, $8776, $8777, $8778, $8779, $8780, $8781, $8782, $8783, $8784, $8785, $8786, $8787, $8788, VersionRange($8789, $8790)), ($8791, $8792, $8793, $8794, $8795, $8796, $8797, $8798, $8799, $8800, $8801, $8802, $8803, $8804, $8805, $8806, $8807, $8808, $8809, $8810, $8811, $8812, $8813, $8814, $8815, $8816, $8817, $8818, VersionRange($8819, $8820)), ($8821, $8822, $8823, $8824, $8825, $8826, $8827, $8828, $8829, $8830, $8831, $8832, $8833, $8834, $8835, $8836, $8837, $8838, $8839, $8840, $8841, $8842, $8843, $8844, $8845, $8846, $8847, $8848, VersionRange($8849, $8850)), ($8851, $8852, $8853, $8854, $8855, $8856, $8857, $8858, $8859, $8860, $8861, $8862, $8863, $8864, $8865, $8866, $8867, $8868, $8869, $8870, $8871, $8872, $8873, $8874, $8875, $8876, $8877, $8878, VersionRange($8879, $8880)), ($8881, $8882, $8883, $8884, $8885, $8886, $8887, $8888, $8889, $8890, $8891, $8892, $8893, $8894, $8895, $8896, $8897, $8898, $8899, $8900, $8901, $8902, $8903, $8904, $8905, $8906, $8907, $8908, VersionRange($8909, $8910)), ($8911, $8912, $8913, $8914, $8915, $8916, $8917, $8918, $8919, $8920, $8921, $8922, $8923, $8924, $8925, $8926, $8927, $8928, $8929, $8930, $8931, $8932, $8933, $8934, $8935, $8936, $8937, $8938, VersionRange($8939, $8940)), ($8941, $8942, $8943, $8944, $8945, $8946, $8947, $8948, $8949, $8950, $8951, $8952, $8953, $8954, $8955, $8956, $8957, $8958, $8959, $8960, $8961, $8962, $8963, $8964, $8965, $8966, $8967, $8968, VersionRange($8969, $8970)), ($8971, $8972, $8973, $8974, $8975, $8976, $8977, $8978, $8979, $8980, $8981, $8982, $8983, $8984, $8985, $8986, $8987, $8988, $8989, $8990, $8991, $8992, $8993, $8994, $8995, $8996, $8997, $8998, VersionRange($8999, $9000)), ($9001, $9002, $9003, $9004, $9005, $9006, $9007, $9008, $9009, $9010, $9011, $9012, $9013, $9014, $9015, $9016, $9017, $9018, $9019, $9020, $9021, $9022, $9023, $9024, $9025, $9026, $9027, $9028, VersionRange($9029, $9030)), ($9031, $9032, $9033, $9034, $9035, $9036, $9037, $9038, $9039, $9040, $9041, $9042, $9043, $9044, $9045, $9046, $9047, $9048, $9049, $9050, $9051, $9052, $9053, $9054, $9055, $9056, $9057, $9058, VersionRange($9059, $9060)), ($9061, $9062, $9063, $9064, $9065, $9066, $9067, $9068, $9069, $9070, $9071, $9072, $9073, $9074, $9075, $9076, $9077, $9078, $9079, $9080, $9081, $9082, $9083, $9084, $9085, $9086, $9087, $9088, VersionRange($9089, $9090)), ($9091, $9092, $9093, $9094, $9095, $9096, $9097, $9098, $9099, $9100, $9101, $9102, $9103, $9104, $9105, $9106, $9107, $9108, $9109, $9110, $9111, $9112, $9113, $9114, $9115, $9116, $9117, $9118, VersionRange($9119, $9120)), ($9121, $9122, $9123, $9124, $9125, $9126, $9127, $9128, $9129, $9130, $9131, $9132, $9133, $9134, $9135, $9136, $9137, $9138, $9139, $9140, $9141, $9142, $9143, $9144, $9145, $9146, $9147, $9148, VersionRange($9149, $9150)), ($9151, $9152, $9153, $9154, $9155, $9156, $9157, $9158, $9159, $9160, $9161, $9162, $9163, $9164, $9165, $9166, $9167, $9168, $9169, $9170, $9171, $9172, $9173, $9174, $9175, $9176, $9177, $9178, VersionRange($9179, $9180)), ($9181, $9182, $9183, $9184, $9185, $9186, $9187, $9188, $9189, $9190, $9191, $9192, $9193, $9194, $9195, $9196, $9197, $9198, $9199, $9200, $9201, $9202, $9203, $9204, $9205, $9206, $9207, $9208, VersionRange($9209, $9210)), ($9211, $9212, $9213, $9214, $9215, $9216, $9217, $9218, $9219, $9220, $9221, $9222, $9223, $9224, $9225, $9226, $9227, $9228, $9229, $9230, $9231, $9232, $9233, $9234, $9235, $9236, $9237, $9238, VersionRange($9239, $9240)), ($9241, $9242, $9243, $9244, $9245, $9246, $9247, $9248, $9249, $9250, $9251, $9252, $9253, $9254, $9255, $9256, $9257, $9258, $9259, $9260, $9261, $9262, $9263, $9264, $9265, $9266, $9267, $9268, VersionRange($9269, $9270)), ($9271, $9272, $9273, $9274, $9275, $9276, $9277, $9278, $9279, $9280, $9281, $9282, $9283, $9284, $9285, $9286, $9287, $9288, $9289, $9290, $9291, $9292, $9293, $9294, $9295, $9296, $9297, $9298, VersionRange($9299, $9300)), ($9301, $9302, $9303, $9304, $9305, $9306, $9307, $9308, $9309, $9310, $9311, $9312, $9313, $9314, $9315, $9316, $9317, $9318, $9319, $9320, $9321, $9322, $9323, $9324, $9325, $9326, $9327, $9328, VersionRange($9329, $9330)), ($9331, $9332, $9333, $9334, $9335, $9336, $9337, $9338, $9339, $9340, $9341, $9342, $9343, $9344, $9345, $9346, $9347, $9348, $9349, $9350, $9351, $9352, $9353, $9354, $9355, $9356, $9357, $9358, VersionRange($9359, $9360)), ($9361, $9362, $9363, $9364, $9365, $9366, $9367, $9368, $9369, $9370, $9371, $9372, $9373, $9374, $9375, $9376, $9377, $9378, $9379, $9380, $9381, $9382, $9383, $9384, $9385, $9386, $9387, $9388, VersionRange($9389, $9390)), ($9391, $9392, $9393, $9394, $9395, $9396, $9397, $9398, $9399, $9400, $9401, $9402, $9403, $9404, $9405, $9406, $9407, $9408, $9409, $9410, $9411, $9412, $9413, $9414, $9415, $9416, $9417, $9418, VersionRange($9419, $9420)), ($9421, $9422, $9423, $9424, $9425, $9426, $9427, $9428, $9429, $9430, $9431, $9432, $9433, $9434, $9435, $9436, $9437, $9438, $9439, $9440, $9441, $9442, $9443, $9444, $9445, $9446, $9447, $9448, VersionRange($9449, $9450)), ($9451, $9452, $9453, $9454, $9455, $9456, $9457, $9458, $9459, $9460, $9461, $9462, $9463, $9464, $9465, $9466, $9467, $9468, $9469, $9470, $9471, $9472, $9473, $9474, $9475, $9476, $9477, $9478, VersionRange($9479, $9480)), ($9481, $9482, $9483, $9484, $9485, $9486, $9487, $9488, $9489, $9490, $9491, $9492, $9493, $9494, $9495, $9496, $9497, $9498, $9499, $9500, $9501, $9502, $9503, $9504, $9505, $9506, $9507, $9508, VersionRange($9509, $9510)), ($9511, $9512, $9513, $9514, $9515, $9516, $9517, $9518, $9519, $9520, $9521, $9522, $9523, $9524, $9525, $9526, $9527, $9528, $9529, $9530, $9531, $9532, $9533, $9534, $9535, $9536, $9537, $9538, VersionRange($9539, $9540)), ($9541, $9542, $9543, $9544, $9545, $9546, $9547, $9548, $9549, $9550, $9551, $9552, $9553, $9554, $9555, $9556, $9557, $9558, $9559, $9560, $9561, $9562, $9563, $9564, $9565, $9566, $9567, $9568, VersionRange($9569, $9570)), ($9571, $9572, $9573, $9574, $9575, $9576, $9577, $9578, $9579, $9580, $9581, $9582, $9583, $9584, $9585, $9586, $9587, $9588, $9589, $9590, $9591, $9592, $9593, $9594, $9595, $9596, $9597, $9598, VersionRange($9599, $9600)), ($9601, $9602, $9603, $9604, $9605, $9606, $9607, $9608, $9609, $9610, $9611, $9612, $9613, $9614, $9615, $9616, $9617, $9618, $9619, $9620, $9621, $9622, $9623, $9624, $9625, $9626, $9627, $9628, VersionRange($9629, $9630)), ($9631, $9632, $9633, $9634, $9635, $9636, $9637, $9638, $9639, $9640, $9641, $9642, $9643, $9644, $9645, $9646, $9647, $9648, $9649, $9650, $9651, $9652, $9653, $9654, $9655, $9656, $9657, $9658, VersionRange($9659, $9660)), ($9661, $9662, $9663, $9664, $9665, $9666, $9667, $9668, $9669, $9670, $9671, $9672, $9673, $9674, $9675, $9676, $9677, $9678, $9679, $9680, $9681, $9682, $9683, $9684, $9685, $9686, $9687, $9688, VersionRange($9689, $9690)), ($9691, $9692, $9693, $9694, $9695, $9696, $9697, $9698, $9699, $9700, $9701, $9702, $9703, $9704, $9705, $9706, $9707, $9708, $9709, $9710, $9711, $9712, $9713, $9714, $9715, $9716, $9717, $9718, VersionRange($9719, $9720)), ($9721, $9722, $9723, $9724, $9725, $9726, $9727, $9728, $9729, $9730, $9731, $9732, $9733, $9734, $9735, $9736, $9737, $9738, $9739, $9740, $9741, $9742, $9743, $9744, $9745, $9746, $9747, $9748, VersionRange($9749, $9750)), ($9751, $9752, $9753, $9754, $9755, $9756, $9757, $9758, $9759, $9760, $9761, $9762, $9763, $9764, $9765, $9766, $9767, $9768, $9769, $9770, $9771, $9772, $9773, $9774, $9775, $9776, $9777, $9778, VersionRange($9779, $9780)), ($9781, $9782, $9783, $9784, $9785, $9786, $9787, $9788, $9789, $9790, $9791, $9792, $9793, $9794, $9795, $9796, $9797, $9798, $9799, $9800, $9801, $9802, $9803, $9804, $9805, $9806, $9807, $9808, VersionRange($9809, $9810)), ($9811, $9812, $9813, $9814, $9815, $9816, $9817, $9818, $9819, $9820, $9821, $9822, $9823, $9824, $9825, $9826, $9827, $9828, $9829, $9830, $9831, $9832, $9833, $9834, $9835, $9836, $9837, $9838, VersionRange($9839, $9840)), ($9841, $9842, $9843, $9844, $9845, $9846, $9847, $9848, $9849, $9850, $9851, $9852, $9853, $9854, $9855, $9856, $9857, $9858, $9859, $9860, $9861, $9862, $9863, $9864, $9865, $9866, $9867, $9868, VersionRange($9869, $9870)), ($9871, $9872, $9873, $9874, $9875, $9876, $9877, $9878, $9879, $9880, $9881, $9882, $9883, $9884, $9885, $9886, $9887, $9888, $9889, $9890, $9891, $9892, $9893, $9894, $9895, $9896, $9897, $9898, VersionRange($9899, $9900)), ($9901, $9902, $9903, $9904, $9905, $9906, $9907, $9908, $9909, $9910, $9911, $9912, $9913, $9914, $9915, $9916, $9917, $9918, $9919, $9920, $9921, $9922, $9923, $9924, $9925, $9926, $9927, $9928, VersionRange($9929, $9930)), ($9931, $9932, $9933, $9934, $9935, $9936, $9937, $9938, $9939, $9940, $9941, $9942, $9943, $9944, $9945, $9946, $9947, $9948, $9949, $9950, $9951, $9952, $9953, $9954, $9955, $9956, $9957, $9958, VersionRange($9959, $9960)), ($9961, $9962, $9963, $9964, $9965, $9966, $9967, $9968, $9969, $9970, $9971, $9972, $9973, $9974, $9975, $9976, $9977, $9978, $9979, $9980, $9981, $9982, $9983, $9984, $9985, $9986, $9987, $9988, VersionRange($9989, $9990)), ($9991, $9992, $9993, $9994, $9995, $9996, $9997, $9998, $9999, $10000, $10001, $10002, $10003, $10004, $10005, $10006, $10007, $10008, $10009, $10010, $10011, $10012, $10013, $10014, $10015, $10016, $10017, $10018, VersionRange($10019, $10020)), ($10021, $10022, $10023, $10024, $10025, $10026, $10027, $10028, $10029, $10030, $10031, $10032, $10033, $10034, $10035, $10036, $10037, $10038, $10039, $10040, $10041, $10042, $10043, $10044, $10045, $10046, $10047, $10048, VersionRange($10049, $10050)), ($10051, $10052, $10053, $10054, $10055, $10056, $10057, $10058, $10059, $10060, $10061, $10062, $10063, $10064, $10065, $10066, $10067, $10068, $10069, $10070, $10071, $10072, $10073, $10074, $10075, $10076, $10077, $10078, VersionRange($10079, $10080)), ($10081, $10082, $10083, $10084, $10085, $10086, $10087, $10088, $10089, $10090, $10091, $10092, $10093, $10094, $10095, $10096, $10097, $10098, $10099, $10100, $10101, $10102, $10103, $10104, $10105, $10106, $10107, $10108, VersionRange($10109, $10110)), ($10111, $10112, $10113, $10114, $10115, $10116, $10117, $10118, $10119, $10120, $10121, $10122, $10123, $10124, $10125, $10126, $10127, $10128, $10129, $10130, $10131, $10132, $10133, $10134, $10135, $10136, $10137, $10138, VersionRange($10139, $10140)), ($10141, $10142, $10143, $10144, $10145, $10146, $10147, $10148, $10149, $10150, $10151, $10152, $10153, $10154, $10155, $10156, $10157, $10158, $10159, $10160, $10161, $10162, $10163, $10164, $10165, $10166, $10167, $10168, VersionRange($10169, $10170)), ($10171, $10172, $10173, $10174, $10175, $10176, $10177, $10178, $10179, $10180, $10181, $10182, $10183, $10184, $10185, $10186, $10187, $10188, $10189, $10190, $10191, $10192, $10193, $10194, $10195, $10196, $10197, $10198, VersionRange($10199, $10200)), ($10201, $10202, $10203, $10204, $10205, $10206, $10207, $10208, $10209, $10210, $10211, $10212, $10213, $10214, $10215, $10216, $10217, $10218, $10219, $10220, $10221, $10222, $10223, $10224, $10225, $10226, $10227, $10228, VersionRange($10229, $10230)), ($10231, $10232, $10233, $10234, $10235, $10236, $10237, $10238, $10239, $10240, $10241, $10242, $10243, $10244, $10245, $10246, $10247, $10248, $10249, $10250, $10251, $10252, $10253, $10254, $10255, $10256, $10257, $10258, VersionRange($10259, $10260)), ($10261, $10262, $10263, $10264, $10265, $10266, $10267, $10268, $10269, $10270, $10271, $10272, $10273, $10274, $10275, $10276, $10277, $10278, $10279, $10280, $10281, $10282, $10283, $10284, $10285, $10286, $10287, $10288, VersionRange($10289, $10290)), ($10291, $10292, $10293, $10294, $10295, $10296, $10297, $10298, $10299, $10300, $10301, $10302, $10303, $10304, $10305, $10306, $10307, $10308, $10309, $10310, $10311, $10312, $10313, $10314, $10315, $10316, $10317, $10318, VersionRange($10319, $10320)), ($10321, $10322, $10323, $10324, $10325, $10326, $10327, $10328, $10329, $10330, $10331, $10332, $10333, $10334, $10335, $10336, $10337, $10338, $10339, $10340, $10341, $10342, $10343, $10344, $10345, $10346, $10347, $10348, VersionRange($10349, $10350)), ($10351, $10352, $10353, $10354, $10355, $10356, $10357, $10358, $10359, $10360, $10361, $10362, $10363, $10364, $10365, $10366, $10367, $10368, $10369, $10370, $10371, $10372, $10373, $10374, $10375, $10376, $10377, $10378, VersionRange($10379, $10380)), ($10381, $10382, $10383, $10384, $10385, $10386, $10387, $10388, $10389, $10390, $10391, $10392, $10393, $10394, $10395, $10396, $10397, $10398, $10399, $10400, $10401, $10402, $10403, $10404, $10405, $10406, $10407, $10408, VersionRange($10409, $10410)), ($10411, $10412, $10413, $10414, $10415, $10416, $10417, $10418, $10419, $10420, $10421, $10422, $10423, $10424, $10425, $10426, $10427, $10428, $10429, $10430, $10431, $10432, $10433, $10434, $10435, $10436, $10437, $10438, VersionRange($10439, $10440)), ($10441, $10442, $10443, $10444, $10445, $10446, $10447, $10448, $10449, $10450, $10451, $10452, $10453, $10454, $10455, $10456, $10457, $10458, $10459, $10460, $10461, $10462, $10463, $10464, $10465, $10466, $10467, $10468, VersionRange($10469, $10470)), ($10471, $10472, $10473, $10474, $10475, $10476, $10477, $10478, $10479, $10480, $10481, $10482, $10483, $10484, $10485, $10486, $10487, $10488, $10489, $10490, $10491, $10492, $10493, $10494, $10495, $10496, $10497, $10498, VersionRange($10499, $10500)), ($10501, $10502, $10503, $10504, $10505, $10506, $10507, $10508, $10509, $10510, $10511, $10512, $10513, $10514, $10515, $10516, $10517, $10518, $10519, $10520, $10521, $10522, $10523, $10524, $10525, $10526, $10527, $10528, VersionRange($10529, $10530)), ($10531, $10532, $10533, $10534, $10535, $10536, $10537, $10538, $10539, $10540, $10541, $10542, $10543, $10544, $10545, $10546, $10547, $10548, $10549, $10550, $10551, $10552, $10553, $10554, $10555, $10556, $10557, $10558, VersionRange($10559, $10560)), ($10561, $10562, $10563, $10564, $10565, $10566, $10567, $10568, $10569, $10570, $10571, $10572, $10573, $10574, $10575, $10576, $10577, $10578, $10579, $10580, $10581, $10582, $10583, $10584, $10585, $10586, $10587, $10588, VersionRange($10589, $10590)), ($10591, $10592, $10593, $10594, $10595, $10596, $10597, $10598, $10599, $10600, $10601, $10602, $10603, $10604, $10605, $10606, $10607, $10608, $10609, $10610, $10611, $10612, $10613, $10614, $10615, $10616, $10617, $10618, VersionRange($10619, $10620)), ($10621, $10622, $10623, $10624, $10625, $10626, $10627, $10628, $10629, $10630, $10631, $10632, $10633, $10634, $10635, $10636, $10637, $10638, $10639, $10640, $10641, $10642, $10643, $10644, $10645, $10646, $10647, $10648, VersionRange($10649, $10650)), ($10651, $10652, $10653, $10654, $10655, $10656, $10657, $10658, $10659, $10660, $10661, $10662, $10663, $10664, $10665, $10666, $10667, $10668, $10669, $10670, $10671, $10672, $10673, $10674, $10675, $10676, $10677, $10678, VersionRange($10679, $10680)), ($10681, $10682, $10683, $10684, $10685, $10686, $10687, $10688, $10689, $10690, $10691, $10692, $10693, $10694, $10695, $10696, $10697, $10698, $10699, $10700, $10701, $10702, $10703, $10704, $10705, $10706, $10707, $10708, VersionRange($10709, $10710)), ($10711, $10712, $10713, $10714, $10715, $10716, $10717, $10718, $10719, $10720, $10721, $10722, $10723, $10724, $10725, $10726, $10727, $10728, $10729, $10730, $10731, $10732, $10733, $10734, $10735, $10736, $10737, $10738, VersionRange($10739, $10740)), ($10741, $10742, $10743, $10744, $10745, $10746, $10747, $10748, $10749, $10750, $10751, $10752, $10753, $10754, $10755, $10756, $10757, $10758, $10759, $10760, $10761, $10762, $10763, $10764, $10765, $10766, $10767, $10768, VersionRange($10769, $10770)), ($10771, $10772, $10773, $10774, $10775, $10776, $10777, $10778, $10779, $10780, $10781, $10782, $10783, $10784, $10785, $10786, $10787, $10788, $10789, $10790, $10791, $10792, $10793, $10794, $10795, $10796, $10797, $10798, VersionRange($10799, $10800)), ($10801, $10802, $10803, $10804, $10805, $10806, $10807, $10808, $10809, $10810, $10811, $10812, $10813, $10814, $10815, $10816, $10817, $10818, $10819, $10820, $10821, $10822, $10823, $10824, $10825, $10826, $10827, $10828, VersionRange($10829, $10830)), ($10831, $10832, $10833, $10834, $10835, $10836, $10837, $10838, $10839, $10840, $10841, $10842, $10843, $10844, $10845, $10846, $10847, $10848, $10849, $10850, $10851, $10852, $10853, $10854, $10855, $10856, $10857, $10858, VersionRange($10859, $10860)), ($10861, $10862, $10863, $10864, $10865, $10866, $10867, $10868, $10869, $10870, $10871, $10872, $10873, $10874, $10875, $10876, $10877, $10878, $10879, $10880, $10881, $10882, $10883, $10884, $10885, $10886, $10887, $10888, VersionRange($10889, $10890)), ($10891, $10892, $10893, $10894, $10895, $10896, $10897, $10898, $10899, $10900, $10901, $10902, $10903, $10904, $10905, $10906, $10907, $10908, $10909, $10910, $10911, $10912, $10913, $10914, $10915, $10916, $10917, $10918, VersionRange($10919, $10920)), ($10921, $10922, $10923, $10924, $10925, $10926, $10927, $10928, $10929, $10930, $10931, $10932, $10933, $10934, $10935, $10936, $10937, $10938, $10939, $10940, $10941, $10942, $10943, $10944, $10945, $10946, $10947, $10948, VersionRange($10949, $10950)), ($10951, $10952, $10953, $10954, $10955, $10956, $10957, $10958, $10959, $10960, $10961, $10962, $10963, $10964, $10965, $10966, $10967, $10968, $10969, $10970, $10971, $10972, $10973, $10974, $10975, $10976, $10977, $10978, VersionRange($10979, $10980)), ($10981, $10982, $10983, $10984, $10985, $10986, $10987, $10988, $10989, $10990, $10991, $10992, $10993, $10994, $10995, $10996, $10997, $10998, $10999, $11000, $11001, $11002, $11003, $11004, $11005, $11006, $11007, $11008, VersionRange($11009, $11010)), ($11011, $11012, $11013, $11014, $11015, $11016, $11017, $11018, $11019, $11020, $11021, $11022, $11023, $11024, $11025, $11026, $11027, $11028, $11029, $11030, $11031, $11032, $11033, $11034, $11035, $11036, $11037, $11038, VersionRange($11039, $11040)), ($11041, $11042, $11043, $11044, $11045, $11046, $11047, $11048, $11049, $11050, $11051, $11052, $11053, $11054, $11055, $11056, $11057, $11058, $11059, $11060, $11061, $11062, $11063, $11064, $11065, $11066, $11067, $11068, VersionRange($11069, $11070)), ($11071, $11072, $11073, $11074, $11075, $11076, $11077, $11078, $11079, $11080, $11081, $11082, $11083, $11084, $11085, $11086, $11087, $11088, $11089, $11090, $11091, $11092, $11093, $11094, $11095, $11096, $11097, $11098, VersionRange($11099, $11100)), ($11101, $11102, $11103, $11104, $11105, $11106, $11107, $11108, $11109, $11110, $11111, $11112, $11113, $11114, $11115, $11116, $11117, $11118, $11119, $11120, $11121, $11122, $11123, $11124, $11125, $11126, $11127, $11128, VersionRange($11129, $11130)), ($11131, $11132, $11133, $11134, $11135, $11136, $11137, $11138, $11139, $11140, $11141, $11142, $11143, $11144, $11145, $11146, $11147, $11148, $11149, $11150, $11151, $11152, $11153, $11154, $11155, $11156, $11157, $11158, VersionRange($11159, $11160)), ($11161, $11162, $11163, $11164, $11165, $11166, $11167, $11168, $11169, $11170, $11171, $11172, $11173, $11174, $11175, $11176, $11177, $11178, $11179, $11180, $11181, $11182, $11183, $11184, $11185, $11186, $11187, $11188, VersionRange($11189, $11190)), ($11191, $11192, $11193, $11194, $11195, $11196, $11197, $11198, $11199, $11200, $11201, $11202, $11203, $11204, $11205, $11206, $11207, $11208, $11209, $11210, $11211, $11212, $11213, $11214, $11215, $11216, $11217, $11218, VersionRange($11219, $11220)), ($11221, $11222, $11223, $11224, $11225, $11226, $11227, $11228, $11229, $11230, $11231, $11232, $11233, $11234, $11235, $11236, $11237, $11238, $11239, $11240, $11241, $11242, $11243, $11244, $11245, $11246, $11247, $11248, VersionRange($11249, $11250)), ($11251, $11252, $11253, $11254, $11255, $11256, $11257, $11258, $11259, $11260, $11261, $11262, $11263, $11264, $11265, $11266, $11267, $11268, $11269, $11270, $11271, $11272, $11273, $11274, $11275, $11276, $11277, $11278, VersionRange($11279, $11280)), ($11281, $11282, $11283, $11284, $11285, $11286, $11287, $11288, $11289, $11290, $11291, $11292, $11293, $11294, $11295, $11296, $11297, $11298, $11299, $11300, $11301, $11302, $11303, $11304, $11305, $11306, $11307, $11308, VersionRange($11309, $11310)), ($11311, $11312, $11313, $11314, $11315, $11316, $11317, $11318, $11319, $11320, $11321, $11322, $11323, $11324, $11325, $11326, $11327, $11328, $11329, $11330, $11331, $11332, $11333, $11334, $11335, $11336, $11337, $11338, VersionRange($11339, $11340)), ($11341, $11342, $11343, $11344, $11345, $11346, $11347, $11348, $11349, $11350, $11351, $11352, $11353, $11354, $11355, $11356, $11357, $11358, $11359, $11360, $11361, $11362, $11363, $11364, $11365, $11366, $11367, $11368, VersionRange($11369, $11370)), ($11371, $11372, $11373, $11374, $11375, $11376, $11377, $11378, $11379, $11380, $11381, $11382, $11383, $11384, $11385, $11386, $11387, $11388, $11389, $11390, $11391, $11392, $11393, $11394, $11395, $11396, $11397, $11398, VersionRange($11399, $11400)), ($11401, $11402, $11403, $11404, $11405, $11406, $11407, $11408, $11409, $11410, $11411, $11412, $11413, $11414, $11415, $11416, $11417, $11418, $11419, $11420, $11421, $11422, $11423, $11424, $11425, $11426, $11427, $11428, VersionRange($11429, $11430)), ($11431, $11432, $11433, $11434, $11435, $11436, $11437, $11438, $11439, $11440, $11441, $11442, $11443, $11444, $11445, $11446, $11447, $11448, $11449, $11450, $11451, $11452, $11453, $11454, $11455, $11456, $11457, $11458, VersionRange($11459, $11460)), ($11461, $11462, $11463, $11464, $11465, $11466, $11467, $11468, $11469, $11470, $11471, $11472, $11473, $11474, $11475, $11476, $11477, $11478, $11479, $11480, $11481, $11482, $11483, $11484, $11485, $11486, $11487, $11488, VersionRange($11489, $11490)), ($11491, $11492, $11493, $11494, $11495, $11496, $11497, $11498, $11499, $11500, $11501, $11502, $11503, $11504, $11505, $11506, $11507, $11508, $11509, $11510, $11511, $11512, $11513, $11514, $11515, $11516, $11517, $11518, VersionRange($11519, $11520)), ($11521, $11522, $11523, $11524, $11525, $11526, $11527, $11528, $11529, $11530, $11531, $11532, $11533, $11534, $11535, $11536, $11537, $11538, $11539, $11540, $11541, $11542, $11543, $11544, $11545, $11546, $11547, $11548, VersionRange($11549, $11550)), ($11551, $11552, $11553, $11554, $11555, $11556, $11557, $11558, $11559, $11560, $11561, $11562, $11563, $11564, $11565, $11566, $11567, $11568, $11569, $11570, $11571, $11572, $11573, $11574, $11575, $11576, $11577, $11578, VersionRange($11579, $11580)), ($11581, $11582, $11583, $11584, $11585, $11586, $11587, $11588, $11589, $11590, $11591, $11592, $11593, $11594, $11595, $11596, $11597, $11598, $11599, $11600, $11601, $11602, $11603, $11604, $11605, $11606, $11607, $11608, VersionRange($11609, $11610)), ($11611, $11612, $11613, $11614, $11615, $11616, $11617, $11618, $11619, $11620, $11621, $11622, $11623, $11624, $11625, $11626, $11627, $11628, $11629, $11630, $11631, $11632, $11633, $11634, $11635, $11636, $11637, $11638, VersionRange($11639, $11640)), ($11641, $11642, $11643, $11644, $11645, $11646, $11647, $11648, $11649, $11650, $11651, $11652, $11653, $11654, $11655, $11656, $11657, $11658, $11659, $11660, $11661, $11662, $11663, $11664, $11665, $11666, $11667, $11668, VersionRange($11669, $11670)), ($11671, $11672, $11673, $11674, $11675, $11676, $11677, $11678, $11679, $11680, $11681, $11682, $11683, $11684, $11685, $11686, $11687, $11688, $11689, $11690, $11691, $11692, $11693, $11694, $11695, $11696, $11697, $11698, VersionRange($11699, $11700)), ($11701, $11702, $11703, $11704, $11705, $11706, $11707, $11708, $11709, $11710, $11711, $11712, $11713, $11714, $11715, $11716, $11717, $11718, $11719, $11720, $11721, $11722, $11723, $11724, $11725, $11726, $11727, $11728, VersionRange($11729, $11730)), ($11731, $11732, $11733, $11734, $11735, $11736, $11737, $11738, $11739, $11740, $11741, $11742, $11743, $11744, $11745, $11746, $11747, $11748, $11749, $11750, $11751, $11752, $11753, $11754, $11755, $11756, $11757, $11758, VersionRange($11759, $11760)), ($11761, $11762, $11763, $11764, $11765, $11766, $11767, $11768, $11769, $11770, $11771, $11772, $11773, $11774, $11775, $11776, $11777, $11778, $11779, $11780, $11781, $11782, $11783, $11784, $11785, $11786, $11787, $11788, VersionRange($11789, $11790)), ($11791, $11792, $11793, $11794, $11795, $11796, $11797, $11798, $11799, $11800, $11801, $11802, $11803, $11804, $11805, $11806, $11807, $11808, $11809, $11810, $11811, $11812, $11813, $11814, $11815, $11816, $11817, $11818, VersionRange($11819, $11820)), ($11821, $11822, $11823, $11824, $11825, $11826, $11827, $11828, $11829, $11830, $11831, $11832, $11833, $11834, $11835, $11836, $11837, $11838, $11839, $11840, $11841, $11842, $11843, $11844, $11845, $11846, $11847, $11848, VersionRange($11849, $11850)), ($11851, $11852, $11853, $11854, $11855, $11856, $11857, $11858, $11859, $11860, $11861, $11862, $11863, $11864, $11865, $11866, $11867, $11868, $11869, $11870, $11871, $11872, $11873, $11874, $11875, $11876, $11877, $11878, VersionRange($11879, $11880)), ($11881, $11882, $11883, $11884, $11885, $11886, $11887, $11888, $11889, $11890, $11891, $11892, $11893, $11894, $11895, $11896, $11897, $11898, $11899, $11900, $11901, $11902, $11903, $11904, $11905, $11906, $11907, $11908, VersionRange($11909, $11910)), ($11911, $11912, $11913, $11914, $11915, $11916, $11917, $11918, $11919, $11920, $11921, $11922, $11923, $11924, $11925, $11926, $11927, $11928, $11929, $11930, $11931, $11932, $11933, $11934, $11935, $11936, $11937, $11938, VersionRange($11939, $11940)), ($11941, $11942, $11943, $11944, $11945, $11946, $11947, $11948, $11949, $11950, $11951, $11952, $11953, $11954, $11955, $11956, $11957, $11958, $11959, $11960, $11961, $11962, $11963, $11964, $11965, $11966, $11967, $11968, VersionRange($11969, $11970)), ($11971, $11972, $11973, $11974, $11975, $11976, $11977, $11978, $11979, $11980, $11981, $11982, $11983, $11984, $11985, $11986, $11987, $11988, $11989, $11990, $11991, $11992, $11993, $11994, $11995, $11996, $11997, $11998, VersionRange($11999, $12000)), ($12001, $12002, $12003, $12004, $12005, $12006, $12007, $12008, $12009, $12010, $12011, $12012, $12013, $12014, $12015, $12016, $12017, $12018, $12019, $12020, $12021, $12022, $12023, $12024, $12025, $12026, $12027, $12028, VersionRange($12029, $12030)), ($12031, $12032, $12033, $12034, $12035, $12036, $12037, $12038, $12039, $12040, $12041, $12042, $12043, $12044, $12045, $12046, $12047, $12048, $12049, $12050, $12051, $12052, $12053, $12054, $12055, $12056, $12057, $12058, VersionRange($12059, $12060)), ($12061, $12062, $12063, $12064, $12065, $12066, $12067, $12068, $12069, $12070, $12071, $12072, $12073, $12074, $12075, $12076, $12077, $12078, $12079, $12080, $12081, $12082, $12083, $12084, $12085, $12086, $12087, $12088, VersionRange($12089, $12090)), ($12091, $12092, $12093, $12094, $12095, $12096, $12097, $12098, $12099, $12100, $12101, $12102, $12103, $12104, $12105, $12106, $12107, $12108, $12109, $12110, $12111, $12112, $12113, $12114, $12115, $12116, $12117, $12118, VersionRange($12119, $12120)), ($12121, $12122, $12123, $12124, $12125, $12126, $12127, $12128, $12129, $12130, $12131, $12132, $12133, $12134, $12135, $12136, $12137, $12138, $12139, $12140, $12141, $12142, $12143, $12144, $12145, $12146, $12147, $12148, VersionRange($12149, $12150)), ($12151, $12152, $12153, $12154, $12155, $12156, $12157, $12158, $12159, $12160, $12161, $12162, $12163, $12164, $12165, $12166, $12167, $12168, $12169, $12170, $12171, $12172, $12173, $12174, $12175, $12176, $12177, $12178, VersionRange($12179, $12180)), ($12181, $12182, $12183, $12184, $12185, $12186, $12187, $12188, $12189, $12190, $12191, $12192, $12193, $12194, $12195, $12196, $12197, $12198, $12199, $12200, $12201, $12202, $12203, $12204, $12205, $12206, $12207, $12208, VersionRange($12209, $12210)), ($12211, $12212, $12213, $12214, $12215, $12216, $12217, $12218, $12219, $12220, $12221, $12222, $12223, $12224, $12225, $12226, $12227, $12228, $12229, $12230, $12231, $12232, $12233, $12234, $12235, $12236, $12237, $12238, VersionRange($12239, $12240)), ($12241, $12242, $12243, $12244, $12245, $12246, $12247, $12248, $12249, $12250, $12251, $12252, $12253, $12254, $12255, $12256, $12257, $12258, $12259, $12260, $12261, $12262, $12263, $12264, $12265, $12266, $12267, $12268, VersionRange($12269, $12270)), ($12271, $12272, $12273, $12274, $12275, $12276, $12277, $12278, $12279, $12280, $12281, $12282, $12283, $12284, $12285, $12286, $12287, $12288, $12289, $12290, $12291, $12292, $12293, $12294, $12295, $12296, $12297, $12298, VersionRange($12299, $12300)), ($12301, $12302, $12303, $12304, $12305, $12306, $12307, $12308, $12309, $12310, $12311, $12312, $12313, $12314, $12315, $12316, $12317, $12318, $12319, $12320, $12321, $12322, $12323, $12324, $12325, $12326, $12327, $12328, VersionRange($12329, $12330)), ($12331, $12332, $12333, $12334, $12335, $12336, $12337, $12338, $12339, $12340, $12341, $12342, $12343, $12344, $12345, $12346, $12347, $12348, $12349, $12350, $12351, $12352, $12353, $12354, $12355, $12356, $12357, $12358, VersionRange($12359, $12360)), ($12361, $12362, $12363, $12364, $12365, $12366, $12367, $12368, $12369, $12370, $12371, $12372, $12373, $12374, $12375, $12376, $12377, $12378, $12379, $12380, $12381, $12382, $12383, $12384, $12385, $12386, $12387, $12388, VersionRange($12389, $12390)), ($12391, $12392, $12393, $12394, $12395, $12396, $12397, $12398, $12399, $12400, $12401, $12402, $12403, $12404, $12405, $12406, $12407, $12408, $12409, $12410, $12411, $12412, $12413, $12414, $12415, $12416, $12417, $12418, VersionRange($12419, $12420)), ($12421, $12422, $12423, $12424, $12425, $12426, $12427, $12428, $12429, $12430, $12431, $12432, $12433, $12434, $12435, $12436, $12437, $12438, $12439, $12440, $12441, $12442, $12443, $12444, $12445, $12446, $12447, $12448, VersionRange($12449, $12450)), ($12451, $12452, $12453, $12454, $12455, $12456, $12457, $12458, $12459, $12460, $12461, $12462, $12463, $12464, $12465, $12466, $12467, $12468, $12469, $12470, $12471, $12472, $12473, $12474, $12475, $12476, $12477, $12478, VersionRange($12479, $12480)), ($12481, $12482, $12483, $12484, $12485, $12486, $12487, $12488, $12489, $12490, $12491, $12492, $12493, $12494, $12495, $12496, $12497, $12498, $12499, $12500, $12501, $12502, $12503, $12504, $12505, $12506, $12507, $12508, VersionRange($12509, $12510)), ($12511, $12512, $12513, $12514, $12515, $12516, $12517, $12518, $12519, $12520, $12521, $12522, $12523, $12524, $12525, $12526, $12527, $12528, $12529, $12530, $12531, $12532, $12533, $12534, $12535, $12536, $12537, $12538, VersionRange($12539, $12540)), ($12541, $12542, $12543, $12544, $12545, $12546, $12547, $12548, $12549, $12550, $12551, $12552, $12553, $12554, $12555, $12556, $12557, $12558, $12559, $12560, $12561, $12562, $12563, $12564, $12565, $12566, $12567, $12568, VersionRange($12569, $12570)), ($12571, $12572, $12573, $12574, $12575, $12576, $12577, $12578, $12579, $12580, $12581, $12582, $12583, $12584, $12585, $12586, $12587, $12588, $12589, $12590, $12591, $12592, $12593, $12594, $12595, $12596, $12597, $12598, VersionRange($12599, $12600)), ($12601, $12602, $12603, $12604, $12605, $12606, $12607, $12608, $12609, $12610, $12611, $12612, $12613, $12614, $12615, $12616, $12617, $12618, $12619, $12620, $12621, $12622, $12623, $12624, $12625, $12626, $12627, $12628, VersionRange($12629, $12630)), ($12631, $12632, $12633, $12634, $12635, $12636, $12637, $12638, $12639, $12640, $12641, $12642, $12643, $12644, $12645, $12646, $12647, $12648, $12649, $12650, $12651, $12652, $12653, $12654, $12655, $12656, $12657, $12658, VersionRange($12659, $12660)), ($12661, $12662, $12663, $12664, $12665, $12666, $12667, $12668, $12669, $12670, $12671, $12672, $12673, $12674, $12675, $12676, $12677, $12678, $12679, $12680, $12681, $12682, $12683, $12684, $12685, $12686, $12687, $12688, VersionRange($12689, $12690)), ($12691, $12692, $12693, $12694, $12695, $12696, $12697, $12698, $12699, $12700, $12701, $12702, $12703, $12704, $12705, $12706, $12707, $12708, $12709, $12710, $12711, $12712, $12713, $12714, $12715, $12716, $12717, $12718, VersionRange($12719, $12720)), ($12721, $12722, $12723, $12724, $12725, $12726, $12727, $12728, $12729, $12730, $12731, $12732, $12733, $12734, $12735, $12736, $12737, $12738, $12739, $12740, $12741, $12742, $12743, $12744, $12745, $12746, $12747, $12748, VersionRange($12749, $12750)), ($12751, $12752, $12753, $12754, $12755, $12756, $12757, $12758, $12759, $12760, $12761, $12762, $12763, $12764, $12765, $12766, $12767, $12768, $12769, $12770, $12771, $12772, $12773, $12774, $12775, $12776, $12777, $12778, VersionRange($12779, $12780)), ($12781, $12782, $12783, $12784, $12785, $12786, $12787, $12788, $12789, $12790, $12791, $12792, $12793, $12794, $12795, $12796, $12797, $12798, $12799, $12800, $12801, $12802, $12803, $12804, $12805, $12806, $12807, $12808, VersionRange($12809, $12810)), ($12811, $12812, $12813, $12814, $12815, $12816, $12817, $12818, $12819, $12820, $12821, $12822, $12823, $12824, $12825, $12826, $12827, $12828, $12829, $12830, $12831, $12832, $12833, $12834, $12835, $12836, $12837, $12838, VersionRange($12839, $12840)), ($12841, $12842, $12843, $12844, $12845, $12846, $12847, $12848, $12849, $12850, $12851, $12852, $12853, $12854, $12855, $12856, $12857, $12858, $12859, $12860, $12861, $12862, $12863, $12864, $12865, $12866, $12867, $12868, VersionRange($12869, $12870)), ($12871, $12872, $12873, $12874, $12875, $12876, $12877, $12878, $12879, $12880, $12881, $12882, $12883, $12884, $12885, $12886, $12887, $12888, $12889, $12890, $12891, $12892, $12893, $12894, $12895, $12896, $12897, $12898, VersionRange($12899, $12900)), ($12901, $12902, $12903, $12904, $12905, $12906, $12907, $12908, $12909, $12910, $12911, $12912, $12913, $12914, $12915, $12916, $12917, $12918, $12919, $12920, $12921, $12922, $12923, $12924, $12925, $12926, $12927, $12928, VersionRange($12929, $12930)), ($12931, $12932, $12933, $12934, $12935, $12936, $12937, $12938, $12939, $12940, $12941, $12942, $12943, $12944, $12945, $12946, $12947, $12948, $12949, $12950, $12951, $12952, $12953, $12954, $12955, $12956, $12957, $12958, VersionRange($12959, $12960)), ($12961, $12962, $12963, $12964, $12965, $12966, $12967, $12968, $12969, $12970[...][ Date: 2023-07-04 18:40:15 ]
12 3s866ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30)), ($31, $32, $33, $34, $35, $36, $37, $38, $39, $40, $41, $42, $43, $44, $45, $46, $47, $48, $49, $50, $51, $52, $53, $54, $55, $56, $57, $58, VersionRange($59, $60)), ($61, $62, $63, $64, $65, $66, $67, $68, $69, $70, $71, $72, $73, $74, $75, $76, $77, $78, $79, $80, $81, $82, $83, $84, $85, $86, $87, $88, VersionRange($89, $90)), ($91, $92, $93, $94, $95, $96, $97, $98, $99, $100, $101, $102, $103, $104, $105, $106, $107, $108, $109, $110, $111, $112, $113, $114, $115, $116, $117, $118, VersionRange($119, $120)), ($121, $122, $123, $124, $125, $126, $127, $128, $129, $130, $131, $132, $133, $134, $135, $136, $137, $138, $139, $140, $141, $142, $143, $144, $145, $146, $147, $148, VersionRange($149, $150)), ($151, $152, $153, $154, $155, $156, $157, $158, $159, $160, $161, $162, $163, $164, $165, $166, $167, $168, $169, $170, $171, $172, $173, $174, $175, $176, $177, $178, VersionRange($179, $180)), ($181, $182, $183, $184, $185, $186, $187, $188, $189, $190, $191, $192, $193, $194, $195, $196, $197, $198, $199, $200, $201, $202, $203, $204, $205, $206, $207, $208, VersionRange($209, $210)), ($211, $212, $213, $214, $215, $216, $217, $218, $219, $220, $221, $222, $223, $224, $225, $226, $227, $228, $229, $230, $231, $232, $233, $234, $235, $236, $237, $238, VersionRange($239, $240)), ($241, $242, $243, $244, $245, $246, $247, $248, $249, $250, $251, $252, $253, $254, $255, $256, $257, $258, $259, $260, $261, $262, $263, $264, $265, $266, $267, $268, VersionRange($269, $270)), ($271, $272, $273, $274, $275, $276, $277, $278, $279, $280, $281, $282, $283, $284, $285, $286, $287, $288, $289, $290, $291, $292, $293, $294, $295, $296, $297, $298, VersionRange($299, $300)), ($301, $302, $303, $304, $305, $306, $307, $308, $309, $310, $311, $312, $313, $314, $315, $316, $317, $318, $319, $320, $321, $322, $323, $324, $325, $326, $327, $328, VersionRange($329, $330)), ($331, $332, $333, $334, $335, $336, $337, $338, $339, $340, $341, $342, $343, $344, $345, $346, $347, $348, $349, $350, $351, $352, $353, $354, $355, $356, $357, $358, VersionRange($359, $360)), ($361, $362, $363, $364, $365, $366, $367, $368, $369, $370, $371, $372, $373, $374, $375, $376, $377, $378, $379, $380, $381, $382, $383, $384, $385, $386, $387, $388, VersionRange($389, $390)), ($391, $392, $393, $394, $395, $396, $397, $398, $399, $400, $401, $402, $403, $404, $405, $406, $407, $408, $409, $410, $411, $412, $413, $414, $415, $416, $417, $418, VersionRange($419, $420)), ($421, $422, $423, $424, $425, $426, $427, $428, $429, $430, $431, $432, $433, $434, $435, $436, $437, $438, $439, $440, $441, $442, $443, $444, $445, $446, $447, $448, VersionRange($449, $450)), ($451, $452, $453, $454, $455, $456, $457, $458, $459, $460, $461, $462, $463, $464, $465, $466, $467, $468, $469, $470, $471, $472, $473, $474, $475, $476, $477, $478, VersionRange($479, $480)), ($481, $482, $483, $484, $485, $486, $487, $488, $489, $490, $491, $492, $493, $494, $495, $496, $497, $498, $499, $500, $501, $502, $503, $504, $505, $506, $507, $508, VersionRange($509, $510)), ($511, $512, $513, $514, $515, $516, $517, $518, $519, $520, $521, $522, $523, $524, $525, $526, $527, $528, $529, $530, $531, $532, $533, $534, $535, $536, $537, $538, VersionRange($539, $540)), ($541, $542, $543, $544, $545, $546, $547, $548, $549, $550, $551, $552, $553, $554, $555, $556, $557, $558, $559, $560, $561, $562, $563, $564, $565, $566, $567, $568, VersionRange($569, $570)), ($571, $572, $573, $574, $575, $576, $577, $578, $579, $580, $581, $582, $583, $584, $585, $586, $587, $588, $589, $590, $591, $592, $593, $594, $595, $596, $597, $598, VersionRange($599, $600)), ($601, $602, $603, $604, $605, $606, $607, $608, $609, $610, $611, $612, $613, $614, $615, $616, $617, $618, $619, $620, $621, $622, $623, $624, $625, $626, $627, $628, VersionRange($629, $630)), ($631, $632, $633, $634, $635, $636, $637, $638, $639, $640, $641, $642, $643, $644, $645, $646, $647, $648, $649, $650, $651, $652, $653, $654, $655, $656, $657, $658, VersionRange($659, $660)), ($661, $662, $663, $664, $665, $666, $667, $668, $669, $670, $671, $672, $673, $674, $675, $676, $677, $678, $679, $680, $681, $682, $683, $684, $685, $686, $687, $688, VersionRange($689, $690)), ($691, $692, $693, $694, $695, $696, $697, $698, $699, $700, $701, $702, $703, $704, $705, $706, $707, $708, $709, $710, $711, $712, $713, $714, $715, $716, $717, $718, VersionRange($719, $720)), ($721, $722, $723, $724, $725, $726, $727, $728, $729, $730, $731, $732, $733, $734, $735, $736, $737, $738, $739, $740, $741, $742, $743, $744, $745, $746, $747, $748, VersionRange($749, $750)), ($751, $752, $753, $754, $755, $756, $757, $758, $759, $760, $761, $762, $763, $764, $765, $766, $767, $768, $769, $770, $771, $772, $773, $774, $775, $776, $777, $778, VersionRange($779, $780)), ($781, $782, $783, $784, $785, $786, $787, $788, $789, $790, $791, $792, $793, $794, $795, $796, $797, $798, $799, $800, $801, $802, $803, $804, $805, $806, $807, $808, VersionRange($809, $810)), ($811, $812, $813, $814, $815, $816, $817, $818, $819, $820, $821, $822, $823, $824, $825, $826, $827, $828, $829, $830, $831, $832, $833, $834, $835, $836, $837, $838, VersionRange($839, $840)), ($841, $842, $843, $844, $845, $846, $847, $848, $849, $850, $851, $852, $853, $854, $855, $856, $857, $858, $859, $860, $861, $862, $863, $864, $865, $866, $867, $868, VersionRange($869, $870)), ($871, $872, $873, $874, $875, $876, $877, $878, $879, $880, $881, $882, $883, $884, $885, $886, $887, $888, $889, $890, $891, $892, $893, $894, $895, $896, $897, $898, VersionRange($899, $900)), ($901, $902, $903, $904, $905, $906, $907, $908, $909, $910, $911, $912, $913, $914, $915, $916, $917, $918, $919, $920, $921, $922, $923, $924, $925, $926, $927, $928, VersionRange($929, $930)), ($931, $932, $933, $934, $935, $936, $937, $938, $939, $940, $941, $942, $943, $944, $945, $946, $947, $948, $949, $950, $951, $952, $953, $954, $955, $956, $957, $958, VersionRange($959, $960)), ($961, $962, $963, $964, $965, $966, $967, $968, $969, $970, $971, $972, $973, $974, $975, $976, $977, $978, $979, $980, $981, $982, $983, $984, $985, $986, $987, $988, VersionRange($989, $990)), ($991, $992, $993, $994, $995, $996, $997, $998, $999, $1000, $1001, $1002, $1003, $1004, $1005, $1006, $1007, $1008, $1009, $1010, $1011, $1012, $1013, $1014, $1015, $1016, $1017, $1018, VersionRange($1019, $1020)), ($1021, $1022, $1023, $1024, $1025, $1026, $1027, $1028, $1029, $1030, $1031, $1032, $1033, $1034, $1035, $1036, $1037, $1038, $1039, $1040, $1041, $1042, $1043, $1044, $1045, $1046, $1047, $1048, VersionRange($1049, $1050)), ($1051, $1052, $1053, $1054, $1055, $1056, $1057, $1058, $1059, $1060, $1061, $1062, $1063, $1064, $1065, $1066, $1067, $1068, $1069, $1070, $1071, $1072, $1073, $1074, $1075, $1076, $1077, $1078, VersionRange($1079, $1080)), ($1081, $1082, $1083, $1084, $1085, $1086, $1087, $1088, $1089, $1090, $1091, $1092, $1093, $1094, $1095, $1096, $1097, $1098, $1099, $1100, $1101, $1102, $1103, $1104, $1105, $1106, $1107, $1108, VersionRange($1109, $1110)), ($1111, $1112, $1113, $1114, $1115, $1116, $1117, $1118, $1119, $1120, $1121, $1122, $1123, $1124, $1125, $1126, $1127, $1128, $1129, $1130, $1131, $1132, $1133, $1134, $1135, $1136, $1137, $1138, VersionRange($1139, $1140)), ($1141, $1142, $1143, $1144, $1145, $1146, $1147, $1148, $1149, $1150, $1151, $1152, $1153, $1154, $1155, $1156, $1157, $1158, $1159, $1160, $1161, $1162, $1163, $1164, $1165, $1166, $1167, $1168, VersionRange($1169, $1170)), ($1171, $1172, $1173, $1174, $1175, $1176, $1177, $1178, $1179, $1180, $1181, $1182, $1183, $1184, $1185, $1186, $1187, $1188, $1189, $1190, $1191, $1192, $1193, $1194, $1195, $1196, $1197, $1198, VersionRange($1199, $1200)), ($1201, $1202, $1203, $1204, $1205, $1206, $1207, $1208, $1209, $1210, $1211, $1212, $1213, $1214, $1215, $1216, $1217, $1218, $1219, $1220, $1221, $1222, $1223, $1224, $1225, $1226, $1227, $1228, VersionRange($1229, $1230)), ($1231, $1232, $1233, $1234, $1235, $1236, $1237, $1238, $1239, $1240, $1241, $1242, $1243, $1244, $1245, $1246, $1247, $1248, $1249, $1250, $1251, $1252, $1253, $1254, $1255, $1256, $1257, $1258, VersionRange($1259, $1260)), ($1261, $1262, $1263, $1264, $1265, $1266, $1267, $1268, $1269, $1270, $1271, $1272, $1273, $1274, $1275, $1276, $1277, $1278, $1279, $1280, $1281, $1282, $1283, $1284, $1285, $1286, $1287, $1288, VersionRange($1289, $1290)), ($1291, $1292, $1293, $1294, $1295, $1296, $1297, $1298, $1299, $1300, $1301, $1302, $1303, $1304, $1305, $1306, $1307, $1308, $1309, $1310, $1311, $1312, $1313, $1314, $1315, $1316, $1317, $1318, VersionRange($1319, $1320)), ($1321, $1322, $1323, $1324, $1325, $1326, $1327, $1328, $1329, $1330, $1331, $1332, $1333, $1334, $1335, $1336, $1337, $1338, $1339, $1340, $1341, $1342, $1343, $1344, $1345, $1346, $1347, $1348, VersionRange($1349, $1350)), ($1351, $1352, $1353, $1354, $1355, $1356, $1357, $1358, $1359, $1360, $1361, $1362, $1363, $1364, $1365, $1366, $1367, $1368, $1369, $1370, $1371, $1372, $1373, $1374, $1375, $1376, $1377, $1378, VersionRange($1379, $1380)), ($1381, $1382, $1383, $1384, $1385, $1386, $1387, $1388, $1389, $1390, $1391, $1392, $1393, $1394, $1395, $1396, $1397, $1398, $1399, $1400, $1401, $1402, $1403, $1404, $1405, $1406, $1407, $1408, VersionRange($1409, $1410)), ($1411, $1412, $1413, $1414, $1415, $1416, $1417, $1418, $1419, $1420, $1421, $1422, $1423, $1424, $1425, $1426, $1427, $1428, $1429, $1430, $1431, $1432, $1433, $1434, $1435, $1436, $1437, $1438, VersionRange($1439, $1440)), ($1441, $1442, $1443, $1444, $1445, $1446, $1447, $1448, $1449, $1450, $1451, $1452, $1453, $1454, $1455, $1456, $1457, $1458, $1459, $1460, $1461, $1462, $1463, $1464, $1465, $1466, $1467, $1468, VersionRange($1469, $1470)), ($1471, $1472, $1473, $1474, $1475, $1476, $1477, $1478, $1479, $1480, $1481, $1482, $1483, $1484, $1485, $1486, $1487, $1488, $1489, $1490, $1491, $1492, $1493, $1494, $1495, $1496, $1497, $1498, VersionRange($1499, $1500)), ($1501, $1502, $1503, $1504, $1505, $1506, $1507, $1508, $1509, $1510, $1511, $1512, $1513, $1514, $1515, $1516, $1517, $1518, $1519, $1520, $1521, $1522, $1523, $1524, $1525, $1526, $1527, $1528, VersionRange($1529, $1530)), ($1531, $1532, $1533, $1534, $1535, $1536, $1537, $1538, $1539, $1540, $1541, $1542, $1543, $1544, $1545, $1546, $1547, $1548, $1549, $1550, $1551, $1552, $1553, $1554, $1555, $1556, $1557, $1558, VersionRange($1559, $1560)), ($1561, $1562, $1563, $1564, $1565, $1566, $1567, $1568, $1569, $1570, $1571, $1572, $1573, $1574, $1575, $1576, $1577, $1578, $1579, $1580, $1581, $1582, $1583, $1584, $1585, $1586, $1587, $1588, VersionRange($1589, $1590)), ($1591, $1592, $1593, $1594, $1595, $1596, $1597, $1598, $1599, $1600, $1601, $1602, $1603, $1604, $1605, $1606, $1607, $1608, $1609, $1610, $1611, $1612, $1613, $1614, $1615, $1616, $1617, $1618, VersionRange($1619, $1620)), ($1621, $1622, $1623, $1624, $1625, $1626, $1627, $1628, $1629, $1630, $1631, $1632, $1633, $1634, $1635, $1636, $1637, $1638, $1639, $1640, $1641, $1642, $1643, $1644, $1645, $1646, $1647, $1648, VersionRange($1649, $1650)), ($1651, $1652, $1653, $1654, $1655, $1656, $1657, $1658, $1659, $1660, $1661, $1662, $1663, $1664, $1665, $1666, $1667, $1668, $1669, $1670, $1671, $1672, $1673, $1674, $1675, $1676, $1677, $1678, VersionRange($1679, $1680)), ($1681, $1682, $1683, $1684, $1685, $1686, $1687, $1688, $1689, $1690, $1691, $1692, $1693, $1694, $1695, $1696, $1697, $1698, $1699, $1700, $1701, $1702, $1703, $1704, $1705, $1706, $1707, $1708, VersionRange($1709, $1710)), ($1711, $1712, $1713, $1714, $1715, $1716, $1717, $1718, $1719, $1720, $1721, $1722, $1723, $1724, $1725, $1726, $1727, $1728, $1729, $1730, $1731, $1732, $1733, $1734, $1735, $1736, $1737, $1738, VersionRange($1739, $1740)), ($1741, $1742, $1743, $1744, $1745, $1746, $1747, $1748, $1749, $1750, $1751, $1752, $1753, $1754, $1755, $1756, $1757, $1758, $1759, $1760, $1761, $1762, $1763, $1764, $1765, $1766, $1767, $1768, VersionRange($1769, $1770)), ($1771, $1772, $1773, $1774, $1775, $1776, $1777, $1778, $1779, $1780, $1781, $1782, $1783, $1784, $1785, $1786, $1787, $1788, $1789, $1790, $1791, $1792, $1793, $1794, $1795, $1796, $1797, $1798, VersionRange($1799, $1800)), ($1801, $1802, $1803, $1804, $1805, $1806, $1807, $1808, $1809, $1810, $1811, $1812, $1813, $1814, $1815, $1816, $1817, $1818, $1819, $1820, $1821, $1822, $1823, $1824, $1825, $1826, $1827, $1828, VersionRange($1829, $1830)), ($1831, $1832, $1833, $1834, $1835, $1836, $1837, $1838, $1839, $1840, $1841, $1842, $1843, $1844, $1845, $1846, $1847, $1848, $1849, $1850, $1851, $1852, $1853, $1854, $1855, $1856, $1857, $1858, VersionRange($1859, $1860)), ($1861, $1862, $1863, $1864, $1865, $1866, $1867, $1868, $1869, $1870, $1871, $1872, $1873, $1874, $1875, $1876, $1877, $1878, $1879, $1880, $1881, $1882, $1883, $1884, $1885, $1886, $1887, $1888, VersionRange($1889, $1890)), ($1891, $1892, $1893, $1894, $1895, $1896, $1897, $1898, $1899, $1900, $1901, $1902, $1903, $1904, $1905, $1906, $1907, $1908, $1909, $1910, $1911, $1912, $1913, $1914, $1915, $1916, $1917, $1918, VersionRange($1919, $1920)), ($1921, $1922, $1923, $1924, $1925, $1926, $1927, $1928, $1929, $1930, $1931, $1932, $1933, $1934, $1935, $1936, $1937, $1938, $1939, $1940, $1941, $1942, $1943, $1944, $1945, $1946, $1947, $1948, VersionRange($1949, $1950)), ($1951, $1952, $1953, $1954, $1955, $1956, $1957, $1958, $1959, $1960, $1961, $1962, $1963, $1964, $1965, $1966, $1967, $1968, $1969, $1970, $1971, $1972, $1973, $1974, $1975, $1976, $1977, $1978, VersionRange($1979, $1980)), ($1981, $1982, $1983, $1984, $1985, $1986, $1987, $1988, $1989, $1990, $1991, $1992, $1993, $1994, $1995, $1996, $1997, $1998, $1999, $2000, $2001, $2002, $2003, $2004, $2005, $2006, $2007, $2008, VersionRange($2009, $2010)), ($2011, $2012, $2013, $2014, $2015, $2016, $2017, $2018, $2019, $2020, $2021, $2022, $2023, $2024, $2025, $2026, $2027, $2028, $2029, $2030, $2031, $2032, $2033, $2034, $2035, $2036, $2037, $2038, VersionRange($2039, $2040)), ($2041, $2042, $2043, $2044, $2045, $2046, $2047, $2048, $2049, $2050, $2051, $2052, $2053, $2054, $2055, $2056, $2057, $2058, $2059, $2060, $2061, $2062, $2063, $2064, $2065, $2066, $2067, $2068, VersionRange($2069, $2070)), ($2071, $2072, $2073, $2074, $2075, $2076, $2077, $2078, $2079, $2080, $2081, $2082, $2083, $2084, $2085, $2086, $2087, $2088, $2089, $2090, $2091, $2092, $2093, $2094, $2095, $2096, $2097, $2098, VersionRange($2099, $2100)), ($2101, $2102, $2103, $2104, $2105, $2106, $2107, $2108, $2109, $2110, $2111, $2112, $2113, $2114, $2115, $2116, $2117, $2118, $2119, $2120, $2121, $2122, $2123, $2124, $2125, $2126, $2127, $2128, VersionRange($2129, $2130)), ($2131, $2132, $2133, $2134, $2135, $2136, $2137, $2138, $2139, $2140, $2141, $2142, $2143, $2144, $2145, $2146, $2147, $2148, $2149, $2150, $2151, $2152, $2153, $2154, $2155, $2156, $2157, $2158, VersionRange($2159, $2160)), ($2161, $2162, $2163, $2164, $2165, $2166, $2167, $2168, $2169, $2170, $2171, $2172, $2173, $2174, $2175, $2176, $2177, $2178, $2179, $2180, $2181, $2182, $2183, $2184, $2185, $2186, $2187, $2188, VersionRange($2189, $2190)), ($2191, $2192, $2193, $2194, $2195, $2196, $2197, $2198, $2199, $2200, $2201, $2202, $2203, $2204, $2205, $2206, $2207, $2208, $2209, $2210, $2211, $2212, $2213, $2214, $2215, $2216, $2217, $2218, VersionRange($2219, $2220)), ($2221, $2222, $2223, $2224, $2225, $2226, $2227, $2228, $2229, $2230, $2231, $2232, $2233, $2234, $2235, $2236, $2237, $2238, $2239, $2240, $2241, $2242, $2243, $2244, $2245, $2246, $2247, $2248, VersionRange($2249, $2250)), ($2251, $2252, $2253, $2254, $2255, $2256, $2257, $2258, $2259, $2260, $2261, $2262, $2263, $2264, $2265, $2266, $2267, $2268, $2269, $2270, $2271, $2272, $2273, $2274, $2275, $2276, $2277, $2278, VersionRange($2279, $2280)), ($2281, $2282, $2283, $2284, $2285, $2286, $2287, $2288, $2289, $2290, $2291, $2292, $2293, $2294, $2295, $2296, $2297, $2298, $2299, $2300, $2301, $2302, $2303, $2304, $2305, $2306, $2307, $2308, VersionRange($2309, $2310)), ($2311, $2312, $2313, $2314, $2315, $2316, $2317, $2318, $2319, $2320, $2321, $2322, $2323, $2324, $2325, $2326, $2327, $2328, $2329, $2330, $2331, $2332, $2333, $2334, $2335, $2336, $2337, $2338, VersionRange($2339, $2340)), ($2341, $2342, $2343, $2344, $2345, $2346, $2347, $2348, $2349, $2350, $2351, $2352, $2353, $2354, $2355, $2356, $2357, $2358, $2359, $2360, $2361, $2362, $2363, $2364, $2365, $2366, $2367, $2368, VersionRange($2369, $2370)), ($2371, $2372, $2373, $2374, $2375, $2376, $2377, $2378, $2379, $2380, $2381, $2382, $2383, $2384, $2385, $2386, $2387, $2388, $2389, $2390, $2391, $2392, $2393, $2394, $2395, $2396, $2397, $2398, VersionRange($2399, $2400)), ($2401, $2402, $2403, $2404, $2405, $2406, $2407, $2408, $2409, $2410, $2411, $2412, $2413, $2414, $2415, $2416, $2417, $2418, $2419, $2420, $2421, $2422, $2423, $2424, $2425, $2426, $2427, $2428, VersionRange($2429, $2430)), ($2431, $2432, $2433, $2434, $2435, $2436, $2437, $2438, $2439, $2440, $2441, $2442, $2443, $2444, $2445, $2446, $2447, $2448, $2449, $2450, $2451, $2452, $2453, $2454, $2455, $2456, $2457, $2458, VersionRange($2459, $2460)), ($2461, $2462, $2463, $2464, $2465, $2466, $2467, $2468, $2469, $2470, $2471, $2472, $2473, $2474, $2475, $2476, $2477, $2478, $2479, $2480, $2481, $2482, $2483, $2484, $2485, $2486, $2487, $2488, VersionRange($2489, $2490)), ($2491, $2492, $2493, $2494, $2495, $2496, $2497, $2498, $2499, $2500, $2501, $2502, $2503, $2504, $2505, $2506, $2507, $2508, $2509, $2510, $2511, $2512, $2513, $2514, $2515, $2516, $2517, $2518, VersionRange($2519, $2520)), ($2521, $2522, $2523, $2524, $2525, $2526, $2527, $2528, $2529, $2530, $2531, $2532, $2533, $2534, $2535, $2536, $2537, $2538, $2539, $2540, $2541, $2542, $2543, $2544, $2545, $2546, $2547, $2548, VersionRange($2549, $2550)), ($2551, $2552, $2553, $2554, $2555, $2556, $2557, $2558, $2559, $2560, $2561, $2562, $2563, $2564, $2565, $2566, $2567, $2568, $2569, $2570, $2571, $2572, $2573, $2574, $2575, $2576, $2577, $2578, VersionRange($2579, $2580)), ($2581, $2582, $2583, $2584, $2585, $2586, $2587, $2588, $2589, $2590, $2591, $2592, $2593, $2594, $2595, $2596, $2597, $2598, $2599, $2600, $2601, $2602, $2603, $2604, $2605, $2606, $2607, $2608, VersionRange($2609, $2610)), ($2611, $2612, $2613, $2614, $2615, $2616, $2617, $2618, $2619, $2620, $2621, $2622, $2623, $2624, $2625, $2626, $2627, $2628, $2629, $2630, $2631, $2632, $2633, $2634, $2635, $2636, $2637, $2638, VersionRange($2639, $2640)), ($2641, $2642, $2643, $2644, $2645, $2646, $2647, $2648, $2649, $2650, $2651, $2652, $2653, $2654, $2655, $2656, $2657, $2658, $2659, $2660, $2661, $2662, $2663, $2664, $2665, $2666, $2667, $2668, VersionRange($2669, $2670)), ($2671, $2672, $2673, $2674, $2675, $2676, $2677, $2678, $2679, $2680, $2681, $2682, $2683, $2684, $2685, $2686, $2687, $2688, $2689, $2690, $2691, $2692, $2693, $2694, $2695, $2696, $2697, $2698, VersionRange($2699, $2700)), ($2701, $2702, $2703, $2704, $2705, $2706, $2707, $2708, $2709, $2710, $2711, $2712, $2713, $2714, $2715, $2716, $2717, $2718, $2719, $2720, $2721, $2722, $2723, $2724, $2725, $2726, $2727, $2728, VersionRange($2729, $2730)), ($2731, $2732, $2733, $2734, $2735, $2736, $2737, $2738, $2739, $2740, $2741, $2742, $2743, $2744, $2745, $2746, $2747, $2748, $2749, $2750, $2751, $2752, $2753, $2754, $2755, $2756, $2757, $2758, VersionRange($2759, $2760)), ($2761, $2762, $2763, $2764, $2765, $2766, $2767, $2768, $2769, $2770, $2771, $2772, $2773, $2774, $2775, $2776, $2777, $2778, $2779, $2780, $2781, $2782, $2783, $2784, $2785, $2786, $2787, $2788, VersionRange($2789, $2790)), ($2791, $2792, $2793, $2794, $2795, $2796, $2797, $2798, $2799, $2800, $2801, $2802, $2803, $2804, $2805, $2806, $2807, $2808, $2809, $2810, $2811, $2812, $2813, $2814, $2815, $2816, $2817, $2818, VersionRange($2819, $2820)), ($2821, $2822, $2823, $2824, $2825, $2826, $2827, $2828, $2829, $2830, $2831, $2832, $2833, $2834, $2835, $2836, $2837, $2838, $2839, $2840, $2841, $2842, $2843, $2844, $2845, $2846, $2847, $2848, VersionRange($2849, $2850)), ($2851, $2852, $2853, $2854, $2855, $2856, $2857, $2858, $2859, $2860, $2861, $2862, $2863, $2864, $2865, $2866, $2867, $2868, $2869, $2870, $2871, $2872, $2873, $2874, $2875, $2876, $2877, $2878, VersionRange($2879, $2880)), ($2881, $2882, $2883, $2884, $2885, $2886, $2887, $2888, $2889, $2890, $2891, $2892, $2893, $2894, $2895, $2896, $2897, $2898, $2899, $2900, $2901, $2902, $2903, $2904, $2905, $2906, $2907, $2908, VersionRange($2909, $2910)), ($2911, $2912, $2913, $2914, $2915, $2916, $2917, $2918, $2919, $2920, $2921, $2922, $2923, $2924, $2925, $2926, $2927, $2928, $2929, $2930, $2931, $2932, $2933, $2934, $2935, $2936, $2937, $2938, VersionRange($2939, $2940)), ($2941, $2942, $2943, $2944, $2945, $2946, $2947, $2948, $2949, $2950, $2951, $2952, $2953, $2954, $2955, $2956, $2957, $2958, $2959, $2960, $2961, $2962, $2963, $2964, $2965, $2966, $2967, $2968, VersionRange($2969, $2970)), ($2971, $2972, $2973, $2974, $2975, $2976, $2977, $2978, $2979, $2980, $2981, $2982, $2983, $2984, $2985, $2986, $2987, $2988, $2989, $2990, $2991, $2992, $2993, $2994, $2995, $2996, $2997, $2998, VersionRange($2999, $3000)), ($3001, $3002, $3003, $3004, $3005, $3006, $3007, $3008, $3009, $3010, $3011, $3012, $3013, $3014, $3015, $3016, $3017, $3018, $3019, $3020, $3021, $3022, $3023, $3024, $3025, $3026, $3027, $3028, VersionRange($3029, $3030)), ($3031, $3032, $3033, $3034, $3035, $3036, $3037, $3038, $3039, $3040, $3041, $3042, $3043, $3044, $3045, $3046, $3047, $3048, $3049, $3050, $3051, $3052, $3053, $3054, $3055, $3056, $3057, $3058, VersionRange($3059, $3060)), ($3061, $3062, $3063, $3064, $3065, $3066, $3067, $3068, $3069, $3070, $3071, $3072, $3073, $3074, $3075, $3076, $3077, $3078, $3079, $3080, $3081, $3082, $3083, $3084, $3085, $3086, $3087, $3088, VersionRange($3089, $3090)), ($3091, $3092, $3093, $3094, $3095, $3096, $3097, $3098, $3099, $3100, $3101, $3102, $3103, $3104, $3105, $3106, $3107, $3108, $3109, $3110, $3111, $3112, $3113, $3114, $3115, $3116, $3117, $3118, VersionRange($3119, $3120)), ($3121, $3122, $3123, $3124, $3125, $3126, $3127, $3128, $3129, $3130, $3131, $3132, $3133, $3134, $3135, $3136, $3137, $3138, $3139, $3140, $3141, $3142, $3143, $3144, $3145, $3146, $3147, $3148, VersionRange($3149, $3150)), ($3151, $3152, $3153, $3154, $3155, $3156, $3157, $3158, $3159, $3160, $3161, $3162, $3163, $3164, $3165, $3166, $3167, $3168, $3169, $3170, $3171, $3172, $3173, $3174, $3175, $3176, $3177, $3178, VersionRange($3179, $3180)), ($3181, $3182, $3183, $3184, $3185, $3186, $3187, $3188, $3189, $3190, $3191, $3192, $3193, $3194, $3195, $3196, $3197, $3198, $3199, $3200, $3201, $3202, $3203, $3204, $3205, $3206, $3207, $3208, VersionRange($3209, $3210)), ($3211, $3212, $3213, $3214, $3215, $3216, $3217, $3218, $3219, $3220, $3221, $3222, $3223, $3224, $3225, $3226, $3227, $3228, $3229, $3230, $3231, $3232, $3233, $3234, $3235, $3236, $3237, $3238, VersionRange($3239, $3240)), ($3241, $3242, $3243, $3244, $3245, $3246, $3247, $3248, $3249, $3250, $3251, $3252, $3253, $3254, $3255, $3256, $3257, $3258, $3259, $3260, $3261, $3262, $3263, $3264, $3265, $3266, $3267, $3268, VersionRange($3269, $3270)), ($3271, $3272, $3273, $3274, $3275, $3276, $3277, $3278, $3279, $3280, $3281, $3282, $3283, $3284, $3285, $3286, $3287, $3288, $3289, $3290, $3291, $3292, $3293, $3294, $3295, $3296, $3297, $3298, VersionRange($3299, $3300)), ($3301, $3302, $3303, $3304, $3305, $3306, $3307, $3308, $3309, $3310, $3311, $3312, $3313, $3314, $3315, $3316, $3317, $3318, $3319, $3320, $3321, $3322, $3323, $3324, $3325, $3326, $3327, $3328, VersionRange($3329, $3330)), ($3331, $3332, $3333, $3334, $3335, $3336, $3337, $3338, $3339, $3340, $3341, $3342, $3343, $3344, $3345, $3346, $3347, $3348, $3349, $3350, $3351, $3352, $3353, $3354, $3355, $3356, $3357, $3358, VersionRange($3359, $3360)), ($3361, $3362, $3363, $3364, $3365, $3366, $3367, $3368, $3369, $3370, $3371, $3372, $3373, $3374, $3375, $3376, $3377, $3378, $3379, $3380, $3381, $3382, $3383, $3384, $3385, $3386, $3387, $3388, VersionRange($3389, $3390)), ($3391, $3392, $3393, $3394, $3395, $3396, $3397, $3398, $3399, $3400, $3401, $3402, $3403, $3404, $3405, $3406, $3407, $3408, $3409, $3410, $3411, $3412, $3413, $3414, $3415, $3416, $3417, $3418, VersionRange($3419, $3420)), ($3421, $3422, $3423, $3424, $3425, $3426, $3427, $3428, $3429, $3430, $3431, $3432, $3433, $3434, $3435, $3436, $3437, $3438, $3439, $3440, $3441, $3442, $3443, $3444, $3445, $3446, $3447, $3448, VersionRange($3449, $3450)), ($3451, $3452, $3453, $3454, $3455, $3456, $3457, $3458, $3459, $3460, $3461, $3462, $3463, $3464, $3465, $3466, $3467, $3468, $3469, $3470, $3471, $3472, $3473, $3474, $3475, $3476, $3477, $3478, VersionRange($3479, $3480)), ($3481, $3482, $3483, $3484, $3485, $3486, $3487, $3488, $3489, $3490, $3491, $3492, $3493, $3494, $3495, $3496, $3497, $3498, $3499, $3500, $3501, $3502, $3503, $3504, $3505, $3506, $3507, $3508, VersionRange($3509, $3510)), ($3511, $3512, $3513, $3514, $3515, $3516, $3517, $3518, $3519, $3520, $3521, $3522, $3523, $3524, $3525, $3526, $3527, $3528, $3529, $3530, $3531, $3532, $3533, $3534, $3535, $3536, $3537, $3538, VersionRange($3539, $3540)), ($3541, $3542, $3543, $3544, $3545, $3546, $3547, $3548, $3549, $3550, $3551, $3552, $3553, $3554, $3555, $3556, $3557, $3558, $3559, $3560, $3561, $3562, $3563, $3564, $3565, $3566, $3567, $3568, VersionRange($3569, $3570)), ($3571, $3572, $3573, $3574, $3575, $3576, $3577, $3578, $3579, $3580, $3581, $3582, $3583, $3584, $3585, $3586, $3587, $3588, $3589, $3590, $3591, $3592, $3593, $3594, $3595, $3596, $3597, $3598, VersionRange($3599, $3600)), ($3601, $3602, $3603, $3604, $3605, $3606, $3607, $3608, $3609, $3610, $3611, $3612, $3613, $3614, $3615, $3616, $3617, $3618, $3619, $3620, $3621, $3622, $3623, $3624, $3625, $3626, $3627, $3628, VersionRange($3629, $3630)), ($3631, $3632, $3633, $3634, $3635, $3636, $3637, $3638, $3639, $3640, $3641, $3642, $3643, $3644, $3645, $3646, $3647, $3648, $3649, $3650, $3651, $3652, $3653, $3654, $3655, $3656, $3657, $3658, VersionRange($3659, $3660)), ($3661, $3662, $3663, $3664, $3665, $3666, $3667, $3668, $3669, $3670, $3671, $3672, $3673, $3674, $3675, $3676, $3677, $3678, $3679, $3680, $3681, $3682, $3683, $3684, $3685, $3686, $3687, $3688, VersionRange($3689, $3690)), ($3691, $3692, $3693, $3694, $3695, $3696, $3697, $3698, $3699, $3700, $3701, $3702, $3703, $3704, $3705, $3706, $3707, $3708, $3709, $3710, $3711, $3712, $3713, $3714, $3715, $3716, $3717, $3718, VersionRange($3719, $3720)), ($3721, $3722, $3723, $3724, $3725, $3726, $3727, $3728, $3729, $3730, $3731, $3732, $3733, $3734, $3735, $3736, $3737, $3738, $3739, $3740, $3741, $3742, $3743, $3744, $3745, $3746, $3747, $3748, VersionRange($3749, $3750)), ($3751, $3752, $3753, $3754, $3755, $3756, $3757, $3758, $3759, $3760, $3761, $3762, $3763, $3764, $3765, $3766, $3767, $3768, $3769, $3770, $3771, $3772, $3773, $3774, $3775, $3776, $3777, $3778, VersionRange($3779, $3780)), ($3781, $3782, $3783, $3784, $3785, $3786, $3787, $3788, $3789, $3790, $3791, $3792, $3793, $3794, $3795, $3796, $3797, $3798, $3799, $3800, $3801, $3802, $3803, $3804, $3805, $3806, $3807, $3808, VersionRange($3809, $3810)), ($3811, $3812, $3813, $3814, $3815, $3816, $3817, $3818, $3819, $3820, $3821, $3822, $3823, $3824, $3825, $3826, $3827, $3828, $3829, $3830, $3831, $3832, $3833, $3834, $3835, $3836, $3837, $3838, VersionRange($3839, $3840)), ($3841, $3842, $3843, $3844, $3845, $3846, $3847, $3848, $3849, $3850, $3851, $3852, $3853, $3854, $3855, $3856, $3857, $3858, $3859, $3860, $3861, $3862, $3863, $3864, $3865, $3866, $3867, $3868, VersionRange($3869, $3870)), ($3871, $3872, $3873, $3874, $3875, $3876, $3877, $3878, $3879, $3880, $3881, $3882, $3883, $3884, $3885, $3886, $3887, $3888, $3889, $3890, $3891, $3892, $3893, $3894, $3895, $3896, $3897, $3898, VersionRange($3899, $3900)), ($3901, $3902, $3903, $3904, $3905, $3906, $3907, $3908, $3909, $3910, $3911, $3912, $3913, $3914, $3915, $3916, $3917, $3918, $3919, $3920, $3921, $3922, $3923, $3924, $3925, $3926, $3927, $3928, VersionRange($3929, $3930)), ($3931, $3932, $3933, $3934, $3935, $3936, $3937, $3938, $3939, $3940, $3941, $3942, $3943, $3944, $3945, $3946, $3947, $3948, $3949, $3950, $3951, $3952, $3953, $3954, $3955, $3956, $3957, $3958, VersionRange($3959, $3960)), ($3961, $3962, $3963, $3964, $3965, $3966, $3967, $3968, $3969, $3970, $3971, $3972, $3973, $3974, $3975, $3976, $3977, $3978, $3979, $3980, $3981, $3982, $3983, $3984, $3985, $3986, $3987, $3988, VersionRange($3989, $3990)), ($3991, $3992, $3993, $3994, $3995, $3996, $3997, $3998, $3999, $4000, $4001, $4002, $4003, $4004, $4005, $4006, $4007, $4008, $4009, $4010, $4011, $4012, $4013, $4014, $4015, $4016, $4017, $4018, VersionRange($4019, $4020)), ($4021, $4022, $4023, $4024, $4025, $4026, $4027, $4028, $4029, $4030, $4031, $4032, $4033, $4034, $4035, $4036, $4037, $4038, $4039, $4040, $4041, $4042, $4043, $4044, $4045, $4046, $4047, $4048, VersionRange($4049, $4050)), ($4051, $4052, $4053, $4054, $4055, $4056, $4057, $4058, $4059, $4060, $4061, $4062, $4063, $4064, $4065, $4066, $4067, $4068, $4069, $4070, $4071, $4072, $4073, $4074, $4075, $4076, $4077, $4078, VersionRange($4079, $4080)), ($4081, $4082, $4083, $4084, $4085, $4086, $4087, $4088, $4089, $4090, $4091, $4092, $4093, $4094, $4095, $4096, $4097, $4098, $4099, $4100, $4101, $4102, $4103, $4104, $4105, $4106, $4107, $4108, VersionRange($4109, $4110)), ($4111, $4112, $4113, $4114, $4115, $4116, $4117, $4118, $4119, $4120, $4121, $4122, $4123, $4124, $4125, $4126, $4127, $4128, $4129, $4130, $4131, $4132, $4133, $4134, $4135, $4136, $4137, $4138, VersionRange($4139, $4140)), ($4141, $4142, $4143, $4144, $4145, $4146, $4147, $4148, $4149, $4150, $4151, $4152, $4153, $4154, $4155, $4156, $4157, $4158, $4159, $4160, $4161, $4162, $4163, $4164, $4165, $4166, $4167, $4168, VersionRange($4169, $4170)), ($4171, $4172, $4173, $4174, $4175, $4176, $4177, $4178, $4179, $4180, $4181, $4182, $4183, $4184, $4185, $4186, $4187, $4188, $4189, $4190, $4191, $4192, $4193, $4194, $4195, $4196, $4197, $4198, VersionRange($4199, $4200)), ($4201, $4202, $4203, $4204, $4205, $4206, $4207, $4208, $4209, $4210, $4211, $4212, $4213, $4214, $4215, $4216, $4217, $4218, $4219, $4220, $4221, $4222, $4223, $4224, $4225, $4226, $4227, $4228, VersionRange($4229, $4230)), ($4231, $4232, $4233, $4234, $4235, $4236, $4237, $4238, $4239, $4240, $4241, $4242, $4243, $4244, $4245, $4246, $4247, $4248, $4249, $4250, $4251, $4252, $4253, $4254, $4255, $4256, $4257, $4258, VersionRange($4259, $4260)), ($4261, $4262, $4263, $4264, $4265, $4266, $4267, $4268, $4269, $4270, $4271, $4272, $4273, $4274, $4275, $4276, $4277, $4278, $4279, $4280, $4281, $4282, $4283, $4284, $4285, $4286, $4287, $4288, VersionRange($4289, $4290)), ($4291, $4292, $4293, $4294, $4295, $4296, $4297, $4298, $4299, $4300, $4301, $4302, $4303, $4304, $4305, $4306, $4307, $4308, $4309, $4310, $4311, $4312, $4313, $4314, $4315, $4316, $4317, $4318, VersionRange($4319, $4320)), ($4321, $4322, $4323, $4324, $4325, $4326, $4327, $4328, $4329, $4330, $4331, $4332, $4333, $4334, $4335, $4336, $4337, $4338, $4339, $4340, $4341, $4342, $4343, $4344, $4345, $4346, $4347, $4348, VersionRange($4349, $4350)), ($4351, $4352, $4353, $4354, $4355, $4356, $4357, $4358, $4359, $4360, $4361, $4362, $4363, $4364, $4365, $4366, $4367, $4368, $4369, $4370, $4371, $4372, $4373, $4374, $4375, $4376, $4377, $4378, VersionRange($4379, $4380)), ($4381, $4382, $4383, $4384, $4385, $4386, $4387, $4388, $4389, $4390, $4391, $4392, $4393, $4394, $4395, $4396, $4397, $4398, $4399, $4400, $4401, $4402, $4403, $4404, $4405, $4406, $4407, $4408, VersionRange($4409, $4410)), ($4411, $4412, $4413, $4414, $4415, $4416, $4417, $4418, $4419, $4420, $4421, $4422, $4423, $4424, $4425, $4426, $4427, $4428, $4429, $4430, $4431, $4432, $4433, $4434, $4435, $4436, $4437, $4438, VersionRange($4439, $4440)), ($4441, $4442, $4443, $4444, $4445, $4446, $4447, $4448, $4449, $4450, $4451, $4452, $4453, $4454, $4455, $4456, $4457, $4458, $4459, $4460, $4461, $4462, $4463, $4464, $4465, $4466, $4467, $4468, VersionRange($4469, $4470)), ($4471, $4472, $4473, $4474, $4475, $4476, $4477, $4478, $4479, $4480, $4481, $4482, $4483, $4484, $4485, $4486, $4487, $4488, $4489, $4490, $4491, $4492, $4493, $4494, $4495, $4496, $4497, $4498, VersionRange($4499, $4500)), ($4501, $4502, $4503, $4504, $4505, $4506, $4507, $4508, $4509, $4510, $4511, $4512, $4513, $4514, $4515, $4516, $4517, $4518, $4519, $4520, $4521, $4522, $4523, $4524, $4525, $4526, $4527, $4528, VersionRange($4529, $4530)), ($4531, $4532, $4533, $4534, $4535, $4536, $4537, $4538, $4539, $4540, $4541, $4542, $4543, $4544, $4545, $4546, $4547, $4548, $4549, $4550, $4551, $4552, $4553, $4554, $4555, $4556, $4557, $4558, VersionRange($4559, $4560)), ($4561, $4562, $4563, $4564, $4565, $4566, $4567, $4568, $4569, $4570, $4571, $4572, $4573, $4574, $4575, $4576, $4577, $4578, $4579, $4580, $4581, $4582, $4583, $4584, $4585, $4586, $4587, $4588, VersionRange($4589, $4590)), ($4591, $4592, $4593, $4594, $4595, $4596, $4597, $4598, $4599, $4600, $4601, $4602, $4603, $4604, $4605, $4606, $4607, $4608, $4609, $4610, $4611, $4612, $4613, $4614, $4615, $4616, $4617, $4618, VersionRange($4619, $4620)), ($4621, $4622, $4623, $4624, $4625, $4626, $4627, $4628, $4629, $4630, $4631, $4632, $4633, $4634, $4635, $4636, $4637, $4638, $4639, $4640, $4641, $4642, $4643, $4644, $4645, $4646, $4647, $4648, VersionRange($4649, $4650)), ($4651, $4652, $4653, $4654, $4655, $4656, $4657, $4658, $4659, $4660, $4661, $4662, $4663, $4664, $4665, $4666, $4667, $4668, $4669, $4670, $4671, $4672, $4673, $4674, $4675, $4676, $4677, $4678, VersionRange($4679, $4680)), ($4681, $4682, $4683, $4684, $4685, $4686, $4687, $4688, $4689, $4690, $4691, $4692, $4693, $4694, $4695, $4696, $4697, $4698, $4699, $4700, $4701, $4702, $4703, $4704, $4705, $4706, $4707, $4708, VersionRange($4709, $4710)), ($4711, $4712, $4713, $4714, $4715, $4716, $4717, $4718, $4719, $4720, $4721, $4722, $4723, $4724, $4725, $4726, $4727, $4728, $4729, $4730, $4731, $4732, $4733, $4734, $4735, $4736, $4737, $4738, VersionRange($4739, $4740)), ($4741, $4742, $4743, $4744, $4745, $4746, $4747, $4748, $4749, $4750, $4751, $4752, $4753, $4754, $4755, $4756, $4757, $4758, $4759, $4760, $4761, $4762, $4763, $4764, $4765, $4766, $4767, $4768, VersionRange($4769, $4770)), ($4771, $4772, $4773, $4774, $4775, $4776, $4777, $4778, $4779, $4780, $4781, $4782, $4783, $4784, $4785, $4786, $4787, $4788, $4789, $4790, $4791, $4792, $4793, $4794, $4795, $4796, $4797, $4798, VersionRange($4799, $4800)), ($4801, $4802, $4803, $4804, $4805, $4806, $4807, $4808, $4809, $4810, $4811, $4812, $4813, $4814, $4815, $4816, $4817, $4818, $4819, $4820, $4821, $4822, $4823, $4824, $4825, $4826, $4827, $4828, VersionRange($4829, $4830)), ($4831, $4832, $4833, $4834, $4835, $4836, $4837, $4838, $4839, $4840, $4841, $4842, $4843, $4844, $4845, $4846, $4847, $4848, $4849, $4850, $4851, $4852, $4853, $4854, $4855, $4856, $4857, $4858, VersionRange($4859, $4860)), ($4861, $4862, $4863, $4864, $4865, $4866, $4867, $4868, $4869, $4870, $4871, $4872, $4873, $4874, $4875, $4876, $4877, $4878, $4879, $4880, $4881, $4882, $4883, $4884, $4885, $4886, $4887, $4888, VersionRange($4889, $4890)), ($4891, $4892, $4893, $4894, $4895, $4896, $4897, $4898, $4899, $4900, $4901, $4902, $4903, $4904, $4905, $4906, $4907, $4908, $4909, $4910, $4911, $4912, $4913, $4914, $4915, $4916, $4917, $4918, VersionRange($4919, $4920)), ($4921, $4922, $4923, $4924, $4925, $4926, $4927, $4928, $4929, $4930, $4931, $4932, $4933, $4934, $4935, $4936, $4937, $4938, $4939, $4940, $4941, $4942, $4943, $4944, $4945, $4946, $4947, $4948, VersionRange($4949, $4950)), ($4951, $4952, $4953, $4954, $4955, $4956, $4957, $4958, $4959, $4960, $4961, $4962, $4963, $4964, $4965, $4966, $4967, $4968, $4969, $4970, $4971, $4972, $4973, $4974, $4975, $4976, $4977, $4978, VersionRange($4979, $4980)), ($4981, $4982, $4983, $4984, $4985, $4986, $4987, $4988, $4989, $4990, $4991, $4992, $4993, $4994, $4995, $4996, $4997, $4998, $4999, $5000, $5001, $5002, $5003, $5004, $5005, $5006, $5007, $5008, VersionRange($5009, $5010)), ($5011, $5012, $5013, $5014, $5015, $5016, $5017, $5018, $5019, $5020, $5021, $5022, $5023, $5024, $5025, $5026, $5027, $5028, $5029, $5030, $5031, $5032, $5033, $5034, $5035, $5036, $5037, $5038, VersionRange($5039, $5040)), ($5041, $5042, $5043, $5044, $5045, $5046, $5047, $5048, $5049, $5050, $5051, $5052, $5053, $5054, $5055, $5056, $5057, $5058, $5059, $5060, $5061, $5062, $5063, $5064, $5065, $5066, $5067, $5068, VersionRange($5069, $5070)), ($5071, $5072, $5073, $5074, $5075, $5076, $5077, $5078, $5079, $5080, $5081, $5082, $5083, $5084, $5085, $5086, $5087, $5088, $5089, $5090, $5091, $5092, $5093, $5094, $5095, $5096, $5097, $5098, VersionRange($5099, $5100)), ($5101, $5102, $5103, $5104, $5105, $5106, $5107, $5108, $5109, $5110, $5111, $5112, $5113, $5114, $5115, $5116, $5117, $5118, $5119, $5120, $5121, $5122, $5123, $5124, $5125, $5126, $5127, $5128, VersionRange($5129, $5130)), ($5131, $5132, $5133, $5134, $5135, $5136, $5137, $5138, $5139, $5140, $5141, $5142, $5143, $5144, $5145, $5146, $5147, $5148, $5149, $5150, $5151, $5152, $5153, $5154, $5155, $5156, $5157, $5158, VersionRange($5159, $5160)), ($5161, $5162, $5163, $5164, $5165, $5166, $5167, $5168, $5169, $5170, $5171, $5172, $5173, $5174, $5175, $5176, $5177, $5178, $5179, $5180, $5181, $5182, $5183, $5184, $5185, $5186, $5187, $5188, VersionRange($5189, $5190)), ($5191, $5192, $5193, $5194, $5195, $5196, $5197, $5198, $5199, $5200, $5201, $5202, $5203, $5204, $5205, $5206, $5207, $5208, $5209, $5210, $5211, $5212, $5213, $5214, $5215, $5216, $5217, $5218, VersionRange($5219, $5220)), ($5221, $5222, $5223, $5224, $5225, $5226, $5227, $5228, $5229, $5230, $5231, $5232, $5233, $5234, $5235, $5236, $5237, $5238, $5239, $5240, $5241, $5242, $5243, $5244, $5245, $5246, $5247, $5248, VersionRange($5249, $5250)), ($5251, $5252, $5253, $5254, $5255, $5256, $5257, $5258, $5259, $5260, $5261, $5262, $5263, $5264, $5265, $5266, $5267, $5268, $5269, $5270, $5271, $5272, $5273, $5274, $5275, $5276, $5277, $5278, VersionRange($5279, $5280)), ($5281, $5282, $5283, $5284, $5285, $5286, $5287, $5288, $5289, $5290, $5291, $5292, $5293, $5294, $5295, $5296, $5297, $5298, $5299, $5300, $5301, $5302, $5303, $5304, $5305, $5306, $5307, $5308, VersionRange($5309, $5310)), ($5311, $5312, $5313, $5314, $5315, $5316, $5317, $5318, $5319, $5320, $5321, $5322, $5323, $5324, $5325, $5326, $5327, $5328, $5329, $5330, $5331, $5332, $5333, $5334, $5335, $5336, $5337, $5338, VersionRange($5339, $5340)), ($5341, $5342, $5343, $5344, $5345, $5346, $5347, $5348, $5349, $5350, $5351, $5352, $5353, $5354, $5355, $5356, $5357, $5358, $5359, $5360, $5361, $5362, $5363, $5364, $5365, $5366, $5367, $5368, VersionRange($5369, $5370)), ($5371, $5372, $5373, $5374, $5375, $5376, $5377, $5378, $5379, $5380, $5381, $5382, $5383, $5384, $5385, $5386, $5387, $5388, $5389, $5390, $5391, $5392, $5393, $5394, $5395, $5396, $5397, $5398, VersionRange($5399, $5400)), ($5401, $5402, $5403, $5404, $5405, $5406, $5407, $5408, $5409, $5410, $5411, $5412, $5413, $5414, $5415, $5416, $5417, $5418, $5419, $5420, $5421, $5422, $5423, $5424, $5425, $5426, $5427, $5428, VersionRange($5429, $5430)), ($5431, $5432, $5433, $5434, $5435, $5436, $5437, $5438, $5439, $5440, $5441, $5442, $5443, $5444, $5445, $5446, $5447, $5448, $5449, $5450, $5451, $5452, $5453, $5454, $5455, $5456, $5457, $5458, VersionRange($5459, $5460)), ($5461, $5462, $5463, $5464, $5465, $5466, $5467, $5468, $5469, $5470, $5471, $5472, $5473, $5474, $5475, $5476, $5477, $5478, $5479, $5480, $5481, $5482, $5483, $5484, $5485, $5486, $5487, $5488, VersionRange($5489, $5490)), ($5491, $5492, $5493, $5494, $5495, $5496, $5497, $5498, $5499, $5500, $5501, $5502, $5503, $5504, $5505, $5506, $5507, $5508, $5509, $5510, $5511, $5512, $5513, $5514, $5515, $5516, $5517, $5518, VersionRange($5519, $5520)), ($5521, $5522, $5523, $5524, $5525, $5526, $5527, $5528, $5529, $5530, $5531, $5532, $5533, $5534, $5535, $5536, $5537, $5538, $5539, $5540, $5541, $5542, $5543, $5544, $5545, $5546, $5547, $5548, VersionRange($5549, $5550)), ($5551, $5552, $5553, $5554, $5555, $5556, $5557, $5558, $5559, $5560, $5561, $5562, $5563, $5564, $5565, $5566, $5567, $5568, $5569, $5570, $5571, $5572, $5573, $5574, $5575, $5576, $5577, $5578, VersionRange($5579, $5580)), ($5581, $5582, $5583, $5584, $5585, $5586, $5587, $5588, $5589, $5590, $5591, $5592, $5593, $5594, $5595, $5596, $5597, $5598, $5599, $5600, $5601, $5602, $5603, $5604, $5605, $5606, $5607, $5608, VersionRange($5609, $5610)), ($5611, $5612, $5613, $5614, $5615, $5616, $5617, $5618, $5619, $5620, $5621, $5622, $5623, $5624, $5625, $5626, $5627, $5628, $5629, $5630, $5631, $5632, $5633, $5634, $5635, $5636, $5637, $5638, VersionRange($5639, $5640)), ($5641, $5642, $5643, $5644, $5645, $5646, $5647, $5648, $5649, $5650, $5651, $5652, $5653, $5654, $5655, $5656, $5657, $5658, $5659, $5660, $5661, $5662, $5663, $5664, $5665, $5666, $5667, $5668, VersionRange($5669, $5670)), ($5671, $5672, $5673, $5674, $5675, $5676, $5677, $5678, $5679, $5680, $5681, $5682, $5683, $5684, $5685, $5686, $5687, $5688, $5689, $5690, $5691, $5692, $5693, $5694, $5695, $5696, $5697, $5698, VersionRange($5699, $5700)), ($5701, $5702, $5703, $5704, $5705, $5706, $5707, $5708, $5709, $5710, $5711, $5712, $5713, $5714, $5715, $5716, $5717, $5718, $5719, $5720, $5721, $5722, $5723, $5724, $5725, $5726, $5727, $5728, VersionRange($5729, $5730)), ($5731, $5732, $5733, $5734, $5735, $5736, $5737, $5738, $5739, $5740, $5741, $5742, $5743, $5744, $5745, $5746, $5747, $5748, $5749, $5750, $5751, $5752, $5753, $5754, $5755, $5756, $5757, $5758, VersionRange($5759, $5760)), ($5761, $5762, $5763, $5764, $5765, $5766, $5767, $5768, $5769, $5770, $5771, $5772, $5773, $5774, $5775, $5776, $5777, $5778, $5779, $5780, $5781, $5782, $5783, $5784, $5785, $5786, $5787, $5788, VersionRange($5789, $5790)), ($5791, $5792, $5793, $5794, $5795, $5796, $5797, $5798, $5799, $5800, $5801, $5802, $5803, $5804, $5805, $5806, $5807, $5808, $5809, $5810, $5811, $5812, $5813, $5814, $5815, $5816, $5817, $5818, VersionRange($5819, $5820)), ($5821, $5822, $5823, $5824, $5825, $5826, $5827, $5828, $5829, $5830, $5831, $5832, $5833, $5834, $5835, $5836, $5837, $5838, $5839, $5840, $5841, $5842, $5843, $5844, $5845, $5846, $5847, $5848, VersionRange($5849, $5850)), ($5851, $5852, $5853, $5854, $5855, $5856, $5857, $5858, $5859, $5860, $5861, $5862, $5863, $5864, $5865, $5866, $5867, $5868, $5869, $5870, $5871, $5872, $5873, $5874, $5875, $5876, $5877, $5878, VersionRange($5879, $5880)), ($5881, $5882, $5883, $5884, $5885, $5886, $5887, $5888, $5889, $5890, $5891, $5892, $5893, $5894, $5895, $5896, $5897, $5898, $5899, $5900, $5901, $5902, $5903, $5904, $5905, $5906, $5907, $5908, VersionRange($5909, $5910)), ($5911, $5912, $5913, $5914, $5915, $5916, $5917, $5918, $5919, $5920, $5921, $5922, $5923, $5924, $5925, $5926, $5927, $5928, $5929, $5930, $5931, $5932, $5933, $5934, $5935, $5936, $5937, $5938, VersionRange($5939, $5940)), ($5941, $5942, $5943, $5944, $5945, $5946, $5947, $5948, $5949, $5950, $5951, $5952, $5953, $5954, $5955, $5956, $5957, $5958, $5959, $5960, $5961, $5962, $5963, $5964, $5965, $5966, $5967, $5968, VersionRange($5969, $5970)), ($5971, $5972, $5973, $5974, $5975, $5976, $5977, $5978, $5979, $5980, $5981, $5982, $5983, $5984, $5985, $5986, $5987, $5988, $5989, $5990, $5991, $5992, $5993, $5994, $5995, $5996, $5997, $5998, VersionRange($5999, $6000)), ($6001, $6002, $6003, $6004, $6005, $6006, $6007, $6008, $6009, $6010, $6011, $6012, $6013, $6014, $6015, $6016, $6017, $6018, $6019, $6020, $6021, $6022, $6023, $6024, $6025, $6026, $6027, $6028, VersionRange($6029, $6030)), ($6031, $6032, $6033, $6034, $6035, $6036, $6037, $6038, $6039, $6040, $6041, $6042, $6043, $6044, $6045, $6046, $6047, $6048, $6049, $6050, $6051, $6052, $6053, $6054, $6055, $6056, $6057, $6058, VersionRange($6059, $6060)), ($6061, $6062, $6063, $6064, $6065, $6066, $6067, $6068, $6069, $6070, $6071, $6072, $6073, $6074, $6075, $6076, $6077, $6078, $6079, $6080, $6081, $6082, $6083, $6084, $6085, $6086, $6087, $6088, VersionRange($6089, $6090)), ($6091, $6092, $6093, $6094, $6095, $6096, $6097, $6098, $6099, $6100, $6101, $6102, $6103, $6104, $6105, $6106, $6107, $6108, $6109, $6110, $6111, $6112, $6113, $6114, $6115, $6116, $6117, $6118, VersionRange($6119, $6120)), ($6121, $6122, $6123, $6124, $6125, $6126, $6127, $6128, $6129, $6130, $6131, $6132, $6133, $6134, $6135, $6136, $6137, $6138, $6139, $6140, $6141, $6142, $6143, $6144, $6145, $6146, $6147, $6148, VersionRange($6149, $6150)), ($6151, $6152, $6153, $6154, $6155, $6156, $6157, $6158, $6159, $6160, $6161, $6162, $6163, $6164, $6165, $6166, $6167, $6168, $6169, $6170, $6171, $6172, $6173, $6174, $6175, $6176, $6177, $6178, VersionRange($6179, $6180)), ($6181, $6182, $6183, $6184, $6185, $6186, $6187, $6188, $6189, $6190, $6191, $6192, $6193, $6194, $6195, $6196, $6197, $6198, $6199, $6200, $6201, $6202, $6203, $6204, $6205, $6206, $6207, $6208, VersionRange($6209, $6210)), ($6211, $6212, $6213, $6214, $6215, $6216, $6217, $6218, $6219, $6220, $6221, $6222, $6223, $6224, $6225, $6226, $6227, $6228, $6229, $6230, $6231, $6232, $6233, $6234, $6235, $6236, $6237, $6238, VersionRange($6239, $6240)), ($6241, $6242, $6243, $6244, $6245, $6246, $6247, $6248, $6249, $6250, $6251, $6252, $6253, $6254, $6255, $6256, $6257, $6258, $6259, $6260, $6261, $6262, $6263, $6264, $6265, $6266, $6267, $6268, VersionRange($6269, $6270)), ($6271, $6272, $6273, $6274, $6275, $6276, $6277, $6278, $6279, $6280, $6281, $6282, $6283, $6284, $6285, $6286, $6287, $6288, $6289, $6290, $6291, $6292, $6293, $6294, $6295, $6296, $6297, $6298, VersionRange($6299, $6300)), ($6301, $6302, $6303, $6304, $6305, $6306, $6307, $6308, $6309, $6310, $6311, $6312, $6313, $6314, $6315, $6316, $6317, $6318, $6319, $6320, $6321, $6322, $6323, $6324, $6325, $6326, $6327, $6328, VersionRange($6329, $6330)), ($6331, $6332, $6333, $6334, $6335, $6336, $6337, $6338, $6339, $6340, $6341, $6342, $6343, $6344, $6345, $6346, $6347, $6348, $6349, $6350, $6351, $6352, $6353, $6354, $6355, $6356, $6357, $6358, VersionRange($6359, $6360)), ($6361, $6362, $6363, $6364, $6365, $6366, $6367, $6368, $6369, $6370, $6371, $6372, $6373, $6374, $6375, $6376, $6377, $6378, $6379, $6380, $6381, $6382, $6383, $6384, $6385, $6386, $6387, $6388, VersionRange($6389, $6390)), ($6391, $6392, $6393, $6394, $6395, $6396, $6397, $6398, $6399, $6400, $6401, $6402, $6403, $6404, $6405, $6406, $6407, $6408, $6409, $6410, $6411, $6412, $6413, $6414, $6415, $6416, $6417, $6418, VersionRange($6419, $6420)), ($6421, $6422, $6423, $6424, $6425, $6426, $6427, $6428, $6429, $6430, $6431, $6432, $6433, $6434, $6435, $6436, $6437, $6438, $6439, $6440, $6441, $6442, $6443, $6444, $6445, $6446, $6447, $6448, VersionRange($6449, $6450)), ($6451, $6452, $6453, $6454, $6455, $6456, $6457, $6458, $6459, $6460, $6461, $6462, $6463, $6464, $6465, $6466, $6467, $6468, $6469, $6470, $6471, $6472, $6473, $6474, $6475, $6476, $6477, $6478, VersionRange($6479, $6480)), ($6481, $6482, $6483, $6484, $6485, $6486, $6487, $6488, $6489, $6490, $6491, $6492, $6493, $6494, $6495, $6496, $6497, $6498, $6499, $6500, $6501, $6502, $6503, $6504, $6505, $6506, $6507, $6508, VersionRange($6509, $6510)), ($6511, $6512, $6513, $6514, $6515, $6516, $6517, $6518, $6519, $6520, $6521, $6522, $6523, $6524, $6525, $6526, $6527, $6528, $6529, $6530, $6531, $6532, $6533, $6534, $6535, $6536, $6537, $6538, VersionRange($6539, $6540)), ($6541, $6542, $6543, $6544, $6545, $6546, $6547, $6548, $6549, $6550, $6551, $6552, $6553, $6554, $6555, $6556, $6557, $6558, $6559, $6560, $6561, $6562, $6563, $6564, $6565, $6566, $6567, $6568, VersionRange($6569, $6570)), ($6571, $6572, $6573, $6574, $6575, $6576, $6577, $6578, $6579, $6580, $6581, $6582, $6583, $6584, $6585, $6586, $6587, $6588, $6589, $6590, $6591, $6592, $6593, $6594, $6595, $6596, $6597, $6598, VersionRange($6599, $6600)), ($6601, $6602, $6603, $6604, $6605, $6606, $6607, $6608, $6609, $6610, $6611, $6612, $6613, $6614, $6615, $6616, $6617, $6618, $6619, $6620, $6621, $6622, $6623, $6624, $6625, $6626, $6627, $6628, VersionRange($6629, $6630)), ($6631, $6632, $6633, $6634, $6635, $6636, $6637, $6638, $6639, $6640, $6641, $6642, $6643, $6644, $6645, $6646, $6647, $6648, $6649, $6650, $6651, $6652, $6653, $6654, $6655, $6656, $6657, $6658, VersionRange($6659, $6660)), ($6661, $6662, $6663, $6664, $6665, $6666, $6667, $6668, $6669, $6670, $6671, $6672, $6673, $6674, $6675, $6676, $6677, $6678, $6679, $6680, $6681, $6682, $6683, $6684, $6685, $6686, $6687, $6688, VersionRange($6689, $6690)), ($6691, $6692, $6693, $6694, $6695, $6696, $6697, $6698, $6699, $6700, $6701, $6702, $6703, $6704, $6705, $6706, $6707, $6708, $6709, $6710, $6711, $6712, $6713, $6714, $6715, $6716, $6717, $6718, VersionRange($6719, $6720)), ($6721, $6722, $6723, $6724, $6725, $6726, $6727, $6728, $6729, $6730, $6731, $6732, $6733, $6734, $6735, $6736, $6737, $6738, $6739, $6740, $6741, $6742, $6743, $6744, $6745, $6746, $6747, $6748, VersionRange($6749, $6750)), ($6751, $6752, $6753, $6754, $6755, $6756, $6757, $6758, $6759, $6760, $6761, $6762, $6763, $6764, $6765, $6766, $6767, $6768, $6769, $6770, $6771, $6772, $6773, $6774, $6775, $6776, $6777, $6778, VersionRange($6779, $6780)), ($6781, $6782, $6783, $6784, $6785, $6786, $6787, $6788, $6789, $6790, $6791, $6792, $6793, $6794, $6795, $6796, $6797, $6798, $6799, $6800, $6801, $6802, $6803, $6804, $6805, $6806, $6807, $6808, VersionRange($6809, $6810)), ($6811, $6812, $6813, $6814, $6815, $6816, $6817, $6818, $6819, $6820, $6821, $6822, $6823, $6824, $6825, $6826, $6827, $6828, $6829, $6830, $6831, $6832, $6833, $6834, $6835, $6836, $6837, $6838, VersionRange($6839, $6840)), ($6841, $6842, $6843, $6844, $6845, $6846, $6847, $6848, $6849, $6850, $6851, $6852, $6853, $6854, $6855, $6856, $6857, $6858, $6859, $6860, $6861, $6862, $6863, $6864, $6865, $6866, $6867, $6868, VersionRange($6869, $6870)), ($6871, $6872, $6873, $6874, $6875, $6876, $6877, $6878, $6879, $6880, $6881, $6882, $6883, $6884, $6885, $6886, $6887, $6888, $6889, $6890, $6891, $6892, $6893, $6894, $6895, $6896, $6897, $6898, VersionRange($6899, $6900)), ($6901, $6902, $6903, $6904, $6905, $6906, $6907, $6908, $6909, $6910, $6911, $6912, $6913, $6914, $6915, $6916, $6917, $6918, $6919, $6920, $6921, $6922, $6923, $6924, $6925, $6926, $6927, $6928, VersionRange($6929, $6930)), ($6931, $6932, $6933, $6934, $6935, $6936, $6937, $6938, $6939, $6940, $6941, $6942, $6943, $6944, $6945, $6946, $6947, $6948, $6949, $6950, $6951, $6952, $6953, $6954, $6955, $6956, $6957, $6958, VersionRange($6959, $6960)), ($6961, $6962, $6963, $6964, $6965, $6966, $6967, $6968, $6969, $6970, $6971, $6972, $6973, $6974, $6975, $6976, $6977, $6978, $6979, $6980, $6981, $6982, $6983, $6984, $6985, $6986, $6987, $6988, VersionRange($6989, $6990)), ($6991, $6992, $6993, $6994, $6995, $6996, $6997, $6998, $6999, $7000, $7001, $7002, $7003, $7004, $7005, $7006, $7007, $7008, $7009, $7010, $7011, $7012, $7013, $7014, $7015, $7016, $7017, $7018, VersionRange($7019, $7020)), ($7021, $7022, $7023, $7024, $7025, $7026, $7027, $7028, $7029, $7030, $7031, $7032, $7033, $7034, $7035, $7036, $7037, $7038, $7039, $7040, $7041, $7042, $7043, $7044, $7045, $7046, $7047, $7048, VersionRange($7049, $7050)), ($7051, $7052, $7053, $7054, $7055, $7056, $7057, $7058, $7059, $7060, $7061, $7062, $7063, $7064, $7065, $7066, $7067, $7068, $7069, $7070, $7071, $7072, $7073, $7074, $7075, $7076, $7077, $7078, VersionRange($7079, $7080)), ($7081, $7082, $7083, $7084, $7085, $7086, $7087, $7088, $7089, $7090, $7091, $7092, $7093, $7094, $7095, $7096, $7097, $7098, $7099, $7100, $7101, $7102, $7103, $7104, $7105, $7106, $7107, $7108, VersionRange($7109, $7110)), ($7111, $7112, $7113, $7114, $7115, $7116, $7117, $7118, $7119, $7120, $7121, $7122, $7123, $7124, $7125, $7126, $7127, $7128, $7129, $7130, $7131, $7132, $7133, $7134, $7135, $7136, $7137, $7138, VersionRange($7139, $7140)), ($7141, $7142, $7143, $7144, $7145, $7146, $7147, $7148, $7149, $7150, $7151, $7152, $7153, $7154, $7155, $7156, $7157, $7158, $7159, $7160, $7161, $7162, $7163, $7164, $7165, $7166, $7167, $7168, VersionRange($7169, $7170)), ($7171, $7172, $7173, $7174, $7175, $7176, $7177, $7178, $7179, $7180, $7181, $7182, $7183, $7184, $7185, $7186, $7187, $7188, $7189, $7190, $7191, $7192, $7193, $7194, $7195, $7196, $7197, $7198, VersionRange($7199, $7200)), ($7201, $7202, $7203, $7204, $7205, $7206, $7207, $7208, $7209, $7210, $7211, $7212, $7213, $7214, $7215, $7216, $7217, $7218, $7219, $7220, $7221, $7222, $7223, $7224, $7225, $7226, $7227, $7228, VersionRange($7229, $7230)), ($7231, $7232, $7233, $7234, $7235, $7236, $7237, $7238, $7239, $7240, $7241, $7242, $7243, $7244, $7245, $7246, $7247, $7248, $7249, $7250, $7251, $7252, $7253, $7254, $7255, $7256, $7257, $7258, VersionRange($7259, $7260)), ($7261, $7262, $7263, $7264, $7265, $7266, $7267, $7268, $7269, $7270, $7271, $7272, $7273, $7274, $7275, $7276, $7277, $7278, $7279, $7280, $7281, $7282, $7283, $7284, $7285, $7286, $7287, $7288, VersionRange($7289, $7290)), ($7291, $7292, $7293, $7294, $7295, $7296, $7297, $7298, $7299, $7300, $7301, $7302, $7303, $7304, $7305, $7306, $7307, $7308, $7309, $7310, $7311, $7312, $7313, $7314, $7315, $7316, $7317, $7318, VersionRange($7319, $7320)), ($7321, $7322, $7323, $7324, $7325, $7326, $7327, $7328, $7329, $7330, $7331, $7332, $7333, $7334, $7335, $7336, $7337, $7338, $7339, $7340, $7341, $7342, $7343, $7344, $7345, $7346, $7347, $7348, VersionRange($7349, $7350)), ($7351, $7352, $7353, $7354, $7355, $7356, $7357, $7358, $7359, $7360, $7361, $7362, $7363, $7364, $7365, $7366, $7367, $7368, $7369, $7370, $7371, $7372, $7373, $7374, $7375, $7376, $7377, $7378, VersionRange($7379, $7380)), ($7381, $7382, $7383, $7384, $7385, $7386, $7387, $7388, $7389, $7390, $7391, $7392, $7393, $7394, $7395, $7396, $7397, $7398, $7399, $7400, $7401, $7402, $7403, $7404, $7405, $7406, $7407, $7408, VersionRange($7409, $7410)), ($7411, $7412, $7413, $7414, $7415, $7416, $7417, $7418, $7419, $7420, $7421, $7422, $7423, $7424, $7425, $7426, $7427, $7428, $7429, $7430, $7431, $7432, $7433, $7434, $7435, $7436, $7437, $7438, VersionRange($7439, $7440)), ($7441, $7442, $7443, $7444, $7445, $7446, $7447, $7448, $7449, $7450, $7451, $7452, $7453, $7454, $7455, $7456, $7457, $7458, $7459, $7460, $7461, $7462, $7463, $7464, $7465, $7466, $7467, $7468, VersionRange($7469, $7470)), ($7471, $7472, $7473, $7474, $7475, $7476, $7477, $7478, $7479, $7480, $7481, $7482, $7483, $7484, $7485, $7486, $7487, $7488, $7489, $7490, $7491, $7492, $7493, $7494, $7495, $7496, $7497, $7498, VersionRange($7499, $7500)), ($7501, $7502, $7503, $7504, $7505, $7506, $7507, $7508, $7509, $7510, $7511, $7512, $7513, $7514, $7515, $7516, $7517, $7518, $7519, $7520, $7521, $7522, $7523, $7524, $7525, $7526, $7527, $7528, VersionRange($7529, $7530)), ($7531, $7532, $7533, $7534, $7535, $7536, $7537, $7538, $7539, $7540, $7541, $7542, $7543, $7544, $7545, $7546, $7547, $7548, $7549, $7550, $7551, $7552, $7553, $7554, $7555, $7556, $7557, $7558, VersionRange($7559, $7560)), ($7561, $7562, $7563, $7564, $7565, $7566, $7567, $7568, $7569, $7570, $7571, $7572, $7573, $7574, $7575, $7576, $7577, $7578, $7579, $7580, $7581, $7582, $7583, $7584, $7585, $7586, $7587, $7588, VersionRange($7589, $7590)), ($7591, $7592, $7593, $7594, $7595, $7596, $7597, $7598, $7599, $7600, $7601, $7602, $7603, $7604, $7605, $7606, $7607, $7608, $7609, $7610, $7611, $7612, $7613, $7614, $7615, $7616, $7617, $7618, VersionRange($7619, $7620)), ($7621, $7622, $7623, $7624, $7625, $7626, $7627, $7628, $7629, $7630, $7631, $7632, $7633, $7634, $7635, $7636, $7637, $7638, $7639, $7640, $7641, $7642, $7643, $7644, $7645, $7646, $7647, $7648, VersionRange($7649, $7650)), ($7651, $7652, $7653, $7654, $7655, $7656, $7657, $7658, $7659, $7660, $7661, $7662, $7663, $7664, $7665, $7666, $7667, $7668, $7669, $7670, $7671, $7672, $7673, $7674, $7675, $7676, $7677, $7678, VersionRange($7679, $7680)), ($7681, $7682, $7683, $7684, $7685, $7686, $7687, $7688, $7689, $7690, $7691, $7692, $7693, $7694, $7695, $7696, $7697, $7698, $7699, $7700, $7701, $7702, $7703, $7704, $7705, $7706, $7707, $7708, VersionRange($7709, $7710)), ($7711, $7712, $7713, $7714, $7715, $7716, $7717, $7718, $7719, $7720, $7721, $7722, $7723, $7724, $7725, $7726, $7727, $7728, $7729, $7730, $7731, $7732, $7733, $7734, $7735, $7736, $7737, $7738, VersionRange($7739, $7740)), ($7741, $7742, $7743, $7744, $7745, $7746, $7747, $7748, $7749, $7750, $7751, $7752, $7753, $7754, $7755, $7756, $7757, $7758, $7759, $7760, $7761, $7762, $7763, $7764, $7765, $7766, $7767, $7768, VersionRange($7769, $7770)), ($7771, $7772, $7773, $7774, $7775, $7776, $7777, $7778, $7779, $7780, $7781, $7782, $7783, $7784, $7785, $7786, $7787, $7788, $7789, $7790, $7791, $7792, $7793, $7794, $7795, $7796, $7797, $7798, VersionRange($7799, $7800)), ($7801, $7802, $7803, $7804, $7805, $7806, $7807, $7808, $7809, $7810, $7811, $7812, $7813, $7814, $7815, $7816, $7817, $7818, $7819, $7820, $7821, $7822, $7823, $7824, $7825, $7826, $7827, $7828, VersionRange($7829, $7830)), ($7831, $7832, $7833, $7834, $7835, $7836, $7837, $7838, $7839, $7840, $7841, $7842, $7843, $7844, $7845, $7846, $7847, $7848, $7849, $7850, $7851, $7852, $7853, $7854, $7855, $7856, $7857, $7858, VersionRange($7859, $7860)), ($7861, $7862, $7863, $7864, $7865, $7866, $7867, $7868, $7869, $7870, $7871, $7872, $7873, $7874, $7875, $7876, $7877, $7878, $7879, $7880, $7881, $7882, $7883, $7884, $7885, $7886, $7887, $7888, VersionRange($7889, $7890)), ($7891, $7892, $7893, $7894, $7895, $7896, $7897, $7898, $7899, $7900, $7901, $7902, $7903, $7904, $7905, $7906, $7907, $7908, $7909, $7910, $7911, $7912, $7913, $7914, $7915, $7916, $7917, $7918, VersionRange($7919, $7920)), ($7921, $7922, $7923, $7924, $7925, $7926, $7927, $7928, $7929, $7930, $7931, $7932, $7933, $7934, $7935, $7936, $7937, $7938, $7939, $7940, $7941, $7942, $7943, $7944, $7945, $7946, $7947, $7948, VersionRange($7949, $7950)), ($7951, $7952, $7953, $7954, $7955, $7956, $7957, $7958, $7959, $7960, $7961, $7962, $7963, $7964, $7965, $7966, $7967, $7968, $7969, $7970, $7971, $7972, $7973, $7974, $7975, $7976, $7977, $7978, VersionRange($7979, $7980)), ($7981, $7982, $7983, $7984, $7985, $7986, $7987, $7988, $7989, $7990, $7991, $7992, $7993, $7994, $7995, $7996, $7997, $7998, $7999, $8000, $8001, $8002, $8003, $8004, $8005, $8006, $8007, $8008, VersionRange($8009, $8010)), ($8011, $8012, $8013, $8014, $8015, $8016, $8017, $8018, $8019, $8020, $8021, $8022, $8023, $8024, $8025, $8026, $8027, $8028, $8029, $8030, $8031, $8032, $8033, $8034, $8035, $8036, $8037, $8038, VersionRange($8039, $8040)), ($8041, $8042, $8043, $8044, $8045, $8046, $8047, $8048, $8049, $8050, $8051, $8052, $8053, $8054, $8055, $8056, $8057, $8058, $8059, $8060, $8061, $8062, $8063, $8064, $8065, $8066, $8067, $8068, VersionRange($8069, $8070)), ($8071, $8072, $8073, $8074, $8075, $8076, $8077, $8078, $8079, $8080, $8081, $8082, $8083, $8084, $8085, $8086, $8087, $8088, $8089, $8090, $8091, $8092, $8093, $8094, $8095, $8096, $8097, $8098, VersionRange($8099, $8100)), ($8101, $8102, $8103, $8104, $8105, $8106, $8107, $8108, $8109, $8110, $8111, $8112, $8113, $8114, $8115, $8116, $8117, $8118, $8119, $8120, $8121, $8122, $8123, $8124, $8125, $8126, $8127, $8128, VersionRange($8129, $8130)), ($8131, $8132, $8133, $8134, $8135, $8136, $8137, $8138, $8139, $8140, $8141, $8142, $8143, $8144, $8145, $8146, $8147, $8148, $8149, $8150, $8151, $8152, $8153, $8154, $8155, $8156, $8157, $8158, VersionRange($8159, $8160)), ($8161, $8162, $8163, $8164, $8165, $8166, $8167, $8168, $8169, $8170, $8171, $8172, $8173, $8174, $8175, $8176, $8177, $8178, $8179, $8180, $8181, $8182, $8183, $8184, $8185, $8186, $8187, $8188, VersionRange($8189, $8190)), ($8191, $8192, $8193, $8194, $8195, $8196, $8197, $8198, $8199, $8200, $8201, $8202, $8203, $8204, $8205, $8206, $8207, $8208, $8209, $8210, $8211, $8212, $8213, $8214, $8215, $8216, $8217, $8218, VersionRange($8219, $8220)), ($8221, $8222, $8223, $8224, $8225, $8226, $8227, $8228, $8229, $8230, $8231, $8232, $8233, $8234, $8235, $8236, $8237, $8238, $8239, $8240, $8241, $8242, $8243, $8244, $8245, $8246, $8247, $8248, VersionRange($8249, $8250)), ($8251, $8252, $8253, $8254, $8255, $8256, $8257, $8258, $8259, $8260, $8261, $8262, $8263, $8264, $8265, $8266, $8267, $8268, $8269, $8270, $8271, $8272, $8273, $8274, $8275, $8276, $8277, $8278, VersionRange($8279, $8280)), ($8281, $8282, $8283, $8284, $8285, $8286, $8287, $8288, $8289, $8290, $8291, $8292, $8293, $8294, $8295, $8296, $8297, $8298, $8299, $8300, $8301, $8302, $8303, $8304, $8305, $8306, $8307, $8308, VersionRange($8309, $8310)), ($8311, $8312, $8313, $8314, $8315, $8316, $8317, $8318, $8319, $8320, $8321, $8322, $8323, $8324, $8325, $8326, $8327, $8328, $8329, $8330, $8331, $8332, $8333, $8334, $8335, $8336, $8337, $8338, VersionRange($8339, $8340)), ($8341, $8342, $8343, $8344, $8345, $8346, $8347, $8348, $8349, $8350, $8351, $8352, $8353, $8354, $8355, $8356, $8357, $8358, $8359, $8360, $8361, $8362, $8363, $8364, $8365, $8366, $8367, $8368, VersionRange($8369, $8370)), ($8371, $8372, $8373, $8374, $8375, $8376, $8377, $8378, $8379, $8380, $8381, $8382, $8383, $8384, $8385, $8386, $8387, $8388, $8389, $8390, $8391, $8392, $8393, $8394, $8395, $8396, $8397, $8398, VersionRange($8399, $8400)), ($8401, $8402, $8403, $8404, $8405, $8406, $8407, $8408, $8409, $8410, $8411, $8412, $8413, $8414, $8415, $8416, $8417, $8418, $8419, $8420, $8421, $8422, $8423, $8424, $8425, $8426, $8427, $8428, VersionRange($8429, $8430)), ($8431, $8432, $8433, $8434, $8435, $8436, $8437, $8438, $8439, $8440, $8441, $8442, $8443, $8444, $8445, $8446, $8447, $8448, $8449, $8450, $8451, $8452, $8453, $8454, $8455, $8456, $8457, $8458, VersionRange($8459, $8460)), ($8461, $8462, $8463, $8464, $8465, $8466, $8467, $8468, $8469, $8470, $8471, $8472, $8473, $8474, $8475, $8476, $8477, $8478, $8479, $8480, $8481, $8482, $8483, $8484, $8485, $8486, $8487, $8488, VersionRange($8489, $8490)), ($8491, $8492, $8493, $8494, $8495, $8496, $8497, $8498, $8499, $8500, $8501, $8502, $8503, $8504, $8505, $8506, $8507, $8508, $8509, $8510, $8511, $8512, $8513, $8514, $8515, $8516, $8517, $8518, VersionRange($8519, $8520)), ($8521, $8522, $8523, $8524, $8525, $8526, $8527, $8528, $8529, $8530, $8531, $8532, $8533, $8534, $8535, $8536, $8537, $8538, $8539, $8540, $8541, $8542, $8543, $8544, $8545, $8546, $8547, $8548, VersionRange($8549, $8550)), ($8551, $8552, $8553, $8554, $8555, $8556, $8557, $8558, $8559, $8560, $8561, $8562, $8563, $8564, $8565, $8566, $8567, $8568, $8569, $8570, $8571, $8572, $8573, $8574, $8575, $8576, $8577, $8578, VersionRange($8579, $8580)), ($8581, $8582, $8583, $8584, $8585, $8586, $8587, $8588, $8589, $8590, $8591, $8592, $8593, $8594, $8595, $8596, $8597, $8598, $8599, $8600, $8601, $8602, $8603, $8604, $8605, $8606, $8607, $8608, VersionRange($8609, $8610)), ($8611, $8612, $8613, $8614, $8615, $8616, $8617, $8618, $8619, $8620, $8621, $8622, $8623, $8624, $8625, $8626, $8627, $8628, $8629, $8630, $8631, $8632, $8633, $8634, $8635, $8636, $8637, $8638, VersionRange($8639, $8640)), ($8641, $8642, $8643, $8644, $8645, $8646, $8647, $8648, $8649, $8650, $8651, $8652, $8653, $8654, $8655, $8656, $8657, $8658, $8659, $8660, $8661, $8662, $8663, $8664, $8665, $8666, $8667, $8668, VersionRange($8669, $8670)), ($8671, $8672, $8673, $8674, $8675, $8676, $8677, $8678, $8679, $8680, $8681, $8682, $8683, $8684, $8685, $8686, $8687, $8688, $8689, $8690, $8691, $8692, $8693, $8694, $8695, $8696, $8697, $8698, VersionRange($8699, $8700)), ($8701, $8702, $8703, $8704, $8705, $8706, $8707, $8708, $8709, $8710, $8711, $8712, $8713, $8714, $8715, $8716, $8717, $8718, $8719, $8720, $8721, $8722, $8723, $8724, $8725, $8726, $8727, $8728, VersionRange($8729, $8730)), ($8731, $8732, $8733, $8734, $8735, $8736, $8737, $8738, $8739, $8740, $8741, $8742, $8743, $8744, $8745, $8746, $8747, $8748, $8749, $8750, $8751, $8752, $8753, $8754, $8755, $8756, $8757, $8758, VersionRange($8759, $8760)), ($8761, $8762, $8763, $8764, $8765, $8766, $8767, $8768, $8769, $8770, $8771, $8772, $8773, $8774, $8775, $8776, $8777, $8778, $8779, $8780, $8781, $8782, $8783, $8784, $8785, $8786, $8787, $8788, VersionRange($8789, $8790)), ($8791, $8792, $8793, $8794, $8795, $8796, $8797, $8798, $8799, $8800, $8801, $8802, $8803, $8804, $8805, $8806, $8807, $8808, $8809, $8810, $8811, $8812, $8813, $8814, $8815, $8816, $8817, $8818, VersionRange($8819, $8820)), ($8821, $8822, $8823, $8824, $8825, $8826, $8827, $8828, $8829, $8830, $8831, $8832, $8833, $8834, $8835, $8836, $8837, $8838, $8839, $8840, $8841, $8842, $8843, $8844, $8845, $8846, $8847, $8848, VersionRange($8849, $8850)), ($8851, $8852, $8853, $8854, $8855, $8856, $8857, $8858, $8859, $8860, $8861, $8862, $8863, $8864, $8865, $8866, $8867, $8868, $8869, $8870, $8871, $8872, $8873, $8874, $8875, $8876, $8877, $8878, VersionRange($8879, $8880)), ($8881, $8882, $8883, $8884, $8885, $8886, $8887, $8888, $8889, $8890, $8891, $8892, $8893, $8894, $8895, $8896, $8897, $8898, $8899, $8900, $8901, $8902, $8903, $8904, $8905, $8906, $8907, $8908, VersionRange($8909, $8910)), ($8911, $8912, $8913, $8914, $8915, $8916, $8917, $8918, $8919, $8920, $8921, $8922, $8923, $8924, $8925, $8926, $8927, $8928, $8929, $8930, $8931, $8932, $8933, $8934, $8935, $8936, $8937, $8938, VersionRange($8939, $8940)), ($8941, $8942, $8943, $8944, $8945, $8946, $8947, $8948, $8949, $8950, $8951, $8952, $8953, $8954, $8955, $8956, $8957, $8958, $8959, $8960, $8961, $8962, $8963, $8964, $8965, $8966, $8967, $8968, VersionRange($8969, $8970)), ($8971, $8972, $8973, $8974, $8975, $8976, $8977, $8978, $8979, $8980, $8981, $8982, $8983, $8984, $8985, $8986, $8987, $8988, $8989, $8990, $8991, $8992, $8993, $8994, $8995, $8996, $8997, $8998, VersionRange($8999, $9000)), ($9001, $9002, $9003, $9004, $9005, $9006, $9007, $9008, $9009, $9010, $9011, $9012, $9013, $9014, $9015, $9016, $9017, $9018, $9019, $9020, $9021, $9022, $9023, $9024, $9025, $9026, $9027, $9028, VersionRange($9029, $9030)), ($9031, $9032, $9033, $9034, $9035, $9036, $9037, $9038, $9039, $9040, $9041, $9042, $9043, $9044, $9045, $9046, $9047, $9048, $9049, $9050, $9051, $9052, $9053, $9054, $9055, $9056, $9057, $9058, VersionRange($9059, $9060)), ($9061, $9062, $9063, $9064, $9065, $9066, $9067, $9068, $9069, $9070, $9071, $9072, $9073, $9074, $9075, $9076, $9077, $9078, $9079, $9080, $9081, $9082, $9083, $9084, $9085, $9086, $9087, $9088, VersionRange($9089, $9090)), ($9091, $9092, $9093, $9094, $9095, $9096, $9097, $9098, $9099, $9100, $9101, $9102, $9103, $9104, $9105, $9106, $9107, $9108, $9109, $9110, $9111, $9112, $9113, $9114, $9115, $9116, $9117, $9118, VersionRange($9119, $9120)), ($9121, $9122, $9123, $9124, $9125, $9126, $9127, $9128, $9129, $9130, $9131, $9132, $9133, $9134, $9135, $9136, $9137, $9138, $9139, $9140, $9141, $9142, $9143, $9144, $9145, $9146, $9147, $9148, VersionRange($9149, $9150)), ($9151, $9152, $9153, $9154, $9155, $9156, $9157, $9158, $9159, $9160, $9161, $9162, $9163, $9164, $9165, $9166, $9167, $9168, $9169, $9170, $9171, $9172, $9173, $9174, $9175, $9176, $9177, $9178, VersionRange($9179, $9180)), ($9181, $9182, $9183, $9184, $9185, $9186, $9187, $9188, $9189, $9190, $9191, $9192, $9193, $9194, $9195, $9196, $9197, $9198, $9199, $9200, $9201, $9202, $9203, $9204, $9205, $9206, $9207, $9208, VersionRange($9209, $9210)), ($9211, $9212, $9213, $9214, $9215, $9216, $9217, $9218, $9219, $9220, $9221, $9222, $9223, $9224, $9225, $9226, $9227, $9228, $9229, $9230, $9231, $9232, $9233, $9234, $9235, $9236, $9237, $9238, VersionRange($9239, $9240)), ($9241, $9242, $9243, $9244, $9245, $9246, $9247, $9248, $9249, $9250, $9251, $9252, $9253, $9254, $9255, $9256, $9257, $9258, $9259, $9260, $9261, $9262, $9263, $9264, $9265, $9266, $9267, $9268, VersionRange($9269, $9270)), ($9271, $9272, $9273, $9274, $9275, $9276, $9277, $9278, $9279, $9280, $9281, $9282, $9283, $9284, $9285, $9286, $9287, $9288, $9289, $9290, $9291, $9292, $9293, $9294, $9295, $9296, $9297, $9298, VersionRange($9299, $9300)), ($9301, $9302, $9303, $9304, $9305, $9306, $9307, $9308, $9309, $9310, $9311, $9312, $9313, $9314, $9315, $9316, $9317, $9318, $9319, $9320, $9321, $9322, $9323, $9324, $9325, $9326, $9327, $9328, VersionRange($9329, $9330)), ($9331, $9332, $9333, $9334, $9335, $9336, $9337, $9338, $9339, $9340, $9341, $9342, $9343, $9344, $9345, $9346, $9347, $9348, $9349, $9350, $9351, $9352, $9353, $9354, $9355, $9356, $9357, $9358, VersionRange($9359, $9360)), ($9361, $9362, $9363, $9364, $9365, $9366, $9367, $9368, $9369, $9370, $9371, $9372, $9373, $9374, $9375, $9376, $9377, $9378, $9379, $9380, $9381, $9382, $9383, $9384, $9385, $9386, $9387, $9388, VersionRange($9389, $9390)), ($9391, $9392, $9393, $9394, $9395, $9396, $9397, $9398, $9399, $9400, $9401, $9402, $9403, $9404, $9405, $9406, $9407, $9408, $9409, $9410, $9411, $9412, $9413, $9414, $9415, $9416, $9417, $9418, VersionRange($9419, $9420)), ($9421, $9422, $9423, $9424, $9425, $9426, $9427, $9428, $9429, $9430, $9431, $9432, $9433, $9434, $9435, $9436, $9437, $9438, $9439, $9440, $9441, $9442, $9443, $9444, $9445, $9446, $9447, $9448, VersionRange($9449, $9450)), ($9451, $9452, $9453, $9454, $9455, $9456, $9457, $9458, $9459, $9460, $9461, $9462, $9463, $9464, $9465, $9466, $9467, $9468, $9469, $9470, $9471, $9472, $9473, $9474, $9475, $9476, $9477, $9478, VersionRange($9479, $9480)), ($9481, $9482, $9483, $9484, $9485, $9486, $9487, $9488, $9489, $9490, $9491, $9492, $9493, $9494, $9495, $9496, $9497, $9498, $9499, $9500, $9501, $9502, $9503, $9504, $9505, $9506, $9507, $9508, VersionRange($9509, $9510)), ($9511, $9512, $9513, $9514, $9515, $9516, $9517, $9518, $9519, $9520, $9521, $9522, $9523, $9524, $9525, $9526, $9527, $9528, $9529, $9530, $9531, $9532, $9533, $9534, $9535, $9536, $9537, $9538, VersionRange($9539, $9540)), ($9541, $9542, $9543, $9544, $9545, $9546, $9547, $9548, $9549, $9550, $9551, $9552, $9553, $9554, $9555, $9556, $9557, $9558, $9559, $9560, $9561, $9562, $9563, $9564, $9565, $9566, $9567, $9568, VersionRange($9569, $9570)), ($9571, $9572, $9573, $9574, $9575, $9576, $9577, $9578, $9579, $9580, $9581, $9582, $9583, $9584, $9585, $9586, $9587, $9588, $9589, $9590, $9591, $9592, $9593, $9594, $9595, $9596, $9597, $9598, VersionRange($9599, $9600)), ($9601, $9602, $9603, $9604, $9605, $9606, $9607, $9608, $9609, $9610, $9611, $9612, $9613, $9614, $9615, $9616, $9617, $9618, $9619, $9620, $9621, $9622, $9623, $9624, $9625, $9626, $9627, $9628, VersionRange($9629, $9630)), ($9631, $9632, $9633, $9634, $9635, $9636, $9637, $9638, $9639, $9640, $9641, $9642, $9643, $9644, $9645, $9646, $9647, $9648, $9649, $9650, $9651, $9652, $9653, $9654, $9655, $9656, $9657, $9658, VersionRange($9659, $9660)), ($9661, $9662, $9663, $9664, $9665, $9666, $9667, $9668, $9669, $9670, $9671, $9672, $9673, $9674, $9675, $9676, $9677, $9678, $9679, $9680, $9681, $9682, $9683, $9684, $9685, $9686, $9687, $9688, VersionRange($9689, $9690)), ($9691, $9692, $9693, $9694, $9695, $9696, $9697, $9698, $9699, $9700, $9701, $9702, $9703, $9704, $9705, $9706, $9707, $9708, $9709, $9710, $9711, $9712, $9713, $9714, $9715, $9716, $9717, $9718, VersionRange($9719, $9720)), ($9721, $9722, $9723, $9724, $9725, $9726, $9727, $9728, $9729, $9730, $9731, $9732, $9733, $9734, $9735, $9736, $9737, $9738, $9739, $9740, $9741, $9742, $9743, $9744, $9745, $9746, $9747, $9748, VersionRange($9749, $9750)), ($9751, $9752, $9753, $9754, $9755, $9756, $9757, $9758, $9759, $9760, $9761, $9762, $9763, $9764, $9765, $9766, $9767, $9768, $9769, $9770, $9771, $9772, $9773, $9774, $9775, $9776, $9777, $9778, VersionRange($9779, $9780)), ($9781, $9782, $9783, $9784, $9785, $9786, $9787, $9788, $9789, $9790, $9791, $9792, $9793, $9794, $9795, $9796, $9797, $9798, $9799, $9800, $9801, $9802, $9803, $9804, $9805, $9806, $9807, $9808, VersionRange($9809, $9810)), ($9811, $9812, $9813, $9814, $9815, $9816, $9817, $9818, $9819, $9820, $9821, $9822, $9823, $9824, $9825, $9826, $9827, $9828, $9829, $9830, $9831, $9832, $9833, $9834, $9835, $9836, $9837, $9838, VersionRange($9839, $9840)), ($9841, $9842, $9843, $9844, $9845, $9846, $9847, $9848, $9849, $9850, $9851, $9852, $9853, $9854, $9855, $9856, $9857, $9858, $9859, $9860, $9861, $9862, $9863, $9864, $9865, $9866, $9867, $9868, VersionRange($9869, $9870)), ($9871, $9872, $9873, $9874, $9875, $9876, $9877, $9878, $9879, $9880, $9881, $9882, $9883, $9884, $9885, $9886, $9887, $9888, $9889, $9890, $9891, $9892, $9893, $9894, $9895, $9896, $9897, $9898, VersionRange($9899, $9900)), ($9901, $9902, $9903, $9904, $9905, $9906, $9907, $9908, $9909, $9910, $9911, $9912, $9913, $9914, $9915, $9916, $9917, $9918, $9919, $9920, $9921, $9922, $9923, $9924, $9925, $9926, $9927, $9928, VersionRange($9929, $9930)), ($9931, $9932, $9933, $9934, $9935, $9936, $9937, $9938, $9939, $9940, $9941, $9942, $9943, $9944, $9945, $9946, $9947, $9948, $9949, $9950, $9951, $9952, $9953, $9954, $9955, $9956, $9957, $9958, VersionRange($9959, $9960)), ($9961, $9962, $9963, $9964, $9965, $9966, $9967, $9968, $9969, $9970, $9971, $9972, $9973, $9974, $9975, $9976, $9977, $9978, $9979, $9980, $9981, $9982, $9983, $9984, $9985, $9986, $9987, $9988, VersionRange($9989, $9990)), ($9991, $9992, $9993, $9994, $9995, $9996, $9997, $9998, $9999, $10000, $10001, $10002, $10003, $10004, $10005, $10006, $10007, $10008, $10009, $10010, $10011, $10012, $10013, $10014, $10015, $10016, $10017, $10018, VersionRange($10019, $10020)), ($10021, $10022, $10023, $10024, $10025, $10026, $10027, $10028, $10029, $10030, $10031, $10032, $10033, $10034, $10035, $10036, $10037, $10038, $10039, $10040, $10041, $10042, $10043, $10044, $10045, $10046, $10047, $10048, VersionRange($10049, $10050)), ($10051, $10052, $10053, $10054, $10055, $10056, $10057, $10058, $10059, $10060, $10061, $10062, $10063, $10064, $10065, $10066, $10067, $10068, $10069, $10070, $10071, $10072, $10073, $10074, $10075, $10076, $10077, $10078, VersionRange($10079, $10080)), ($10081, $10082, $10083, $10084, $10085, $10086, $10087, $10088, $10089, $10090, $10091, $10092, $10093, $10094, $10095, $10096, $10097, $10098, $10099, $10100, $10101, $10102, $10103, $10104, $10105, $10106, $10107, $10108, VersionRange($10109, $10110)), ($10111, $10112, $10113, $10114, $10115, $10116, $10117, $10118, $10119, $10120, $10121, $10122, $10123, $10124, $10125, $10126, $10127, $10128, $10129, $10130, $10131, $10132, $10133, $10134, $10135, $10136, $10137, $10138, VersionRange($10139, $10140)), ($10141, $10142, $10143, $10144, $10145, $10146, $10147, $10148, $10149, $10150, $10151, $10152, $10153, $10154, $10155, $10156, $10157, $10158, $10159, $10160, $10161, $10162, $10163, $10164, $10165, $10166, $10167, $10168, VersionRange($10169, $10170)), ($10171, $10172, $10173, $10174, $10175, $10176, $10177, $10178, $10179, $10180, $10181, $10182, $10183, $10184, $10185, $10186, $10187, $10188, $10189, $10190, $10191, $10192, $10193, $10194, $10195, $10196, $10197, $10198, VersionRange($10199, $10200)), ($10201, $10202, $10203, $10204, $10205, $10206, $10207, $10208, $10209, $10210, $10211, $10212, $10213, $10214, $10215, $10216, $10217, $10218, $10219, $10220, $10221, $10222, $10223, $10224, $10225, $10226, $10227, $10228, VersionRange($10229, $10230)), ($10231, $10232, $10233, $10234, $10235, $10236, $10237, $10238, $10239, $10240, $10241, $10242, $10243, $10244, $10245, $10246, $10247, $10248, $10249, $10250, $10251, $10252, $10253, $10254, $10255, $10256, $10257, $10258, VersionRange($10259, $10260)), ($10261, $10262, $10263, $10264, $10265, $10266, $10267, $10268, $10269, $10270, $10271, $10272, $10273, $10274, $10275, $10276, $10277, $10278, $10279, $10280, $10281, $10282, $10283, $10284, $10285, $10286, $10287, $10288, VersionRange($10289, $10290)), ($10291, $10292, $10293, $10294, $10295, $10296, $10297, $10298, $10299, $10300, $10301, $10302, $10303, $10304, $10305, $10306, $10307, $10308, $10309, $10310, $10311, $10312, $10313, $10314, $10315, $10316, $10317, $10318, VersionRange($10319, $10320)), ($10321, $10322, $10323, $10324, $10325, $10326, $10327, $10328, $10329, $10330, $10331, $10332, $10333, $10334, $10335, $10336, $10337, $10338, $10339, $10340, $10341, $10342, $10343, $10344, $10345, $10346, $10347, $10348, VersionRange($10349, $10350)), ($10351, $10352, $10353, $10354, $10355, $10356, $10357, $10358, $10359, $10360, $10361, $10362, $10363, $10364, $10365, $10366, $10367, $10368, $10369, $10370, $10371, $10372, $10373, $10374, $10375, $10376, $10377, $10378, VersionRange($10379, $10380)), ($10381, $10382, $10383, $10384, $10385, $10386, $10387, $10388, $10389, $10390, $10391, $10392, $10393, $10394, $10395, $10396, $10397, $10398, $10399, $10400, $10401, $10402, $10403, $10404, $10405, $10406, $10407, $10408, VersionRange($10409, $10410)), ($10411, $10412, $10413, $10414, $10415, $10416, $10417, $10418, $10419, $10420, $10421, $10422, $10423, $10424, $10425, $10426, $10427, $10428, $10429, $10430, $10431, $10432, $10433, $10434, $10435, $10436, $10437, $10438, VersionRange($10439, $10440)), ($10441, $10442, $10443, $10444, $10445, $10446, $10447, $10448, $10449, $10450, $10451, $10452, $10453, $10454, $10455, $10456, $10457, $10458, $10459, $10460, $10461, $10462, $10463, $10464, $10465, $10466, $10467, $10468, VersionRange($10469, $10470)), ($10471, $10472, $10473, $10474, $10475, $10476, $10477, $10478, $10479, $10480, $10481, $10482, $10483, $10484, $10485, $10486, $10487, $10488, $10489, $10490, $10491, $10492, $10493, $10494, $10495, $10496, $10497, $10498, VersionRange($10499, $10500)), ($10501, $10502, $10503, $10504, $10505, $10506, $10507, $10508, $10509, $10510, $10511, $10512, $10513, $10514, $10515, $10516, $10517, $10518, $10519, $10520, $10521, $10522, $10523, $10524, $10525, $10526, $10527, $10528, VersionRange($10529, $10530)), ($10531, $10532, $10533, $10534, $10535, $10536, $10537, $10538, $10539, $10540, $10541, $10542, $10543, $10544, $10545, $10546, $10547, $10548, $10549, $10550, $10551, $10552, $10553, $10554, $10555, $10556, $10557, $10558, VersionRange($10559, $10560)), ($10561, $10562, $10563, $10564, $10565, $10566, $10567, $10568, $10569, $10570, $10571, $10572, $10573, $10574, $10575, $10576, $10577, $10578, $10579, $10580, $10581, $10582, $10583, $10584, $10585, $10586, $10587, $10588, VersionRange($10589, $10590)), ($10591, $10592, $10593, $10594, $10595, $10596, $10597, $10598, $10599, $10600, $10601, $10602, $10603, $10604, $10605, $10606, $10607, $10608, $10609, $10610, $10611, $10612, $10613, $10614, $10615, $10616, $10617, $10618, VersionRange($10619, $10620)), ($10621, $10622, $10623, $10624, $10625, $10626, $10627, $10628, $10629, $10630, $10631, $10632, $10633, $10634, $10635, $10636, $10637, $10638, $10639, $10640, $10641, $10642, $10643, $10644, $10645, $10646, $10647, $10648, VersionRange($10649, $10650)), ($10651, $10652, $10653, $10654, $10655, $10656, $10657, $10658, $10659, $10660, $10661, $10662, $10663, $10664, $10665, $10666, $10667, $10668, $10669, $10670, $10671, $10672, $10673, $10674, $10675, $10676, $10677, $10678, VersionRange($10679, $10680)), ($10681, $10682, $10683, $10684, $10685, $10686, $10687, $10688, $10689, $10690, $10691, $10692, $10693, $10694, $10695, $10696, $10697, $10698, $10699, $10700, $10701, $10702, $10703, $10704, $10705, $10706, $10707, $10708, VersionRange($10709, $10710)), ($10711, $10712, $10713, $10714, $10715, $10716, $10717, $10718, $10719, $10720, $10721, $10722, $10723, $10724, $10725, $10726, $10727, $10728, $10729, $10730, $10731, $10732, $10733, $10734, $10735, $10736, $10737, $10738, VersionRange($10739, $10740)), ($10741, $10742, $10743, $10744, $10745, $10746, $10747, $10748, $10749, $10750, $10751, $10752, $10753, $10754, $10755, $10756, $10757, $10758, $10759, $10760, $10761, $10762, $10763, $10764, $10765, $10766, $10767, $10768, VersionRange($10769, $10770)), ($10771, $10772, $10773, $10774, $10775, $10776, $10777, $10778, $10779, $10780, $10781, $10782, $10783, $10784, $10785, $10786, $10787, $10788, $10789, $10790, $10791, $10792, $10793, $10794, $10795, $10796, $10797, $10798, VersionRange($10799, $10800)), ($10801, $10802, $10803, $10804, $10805, $10806, $10807, $10808, $10809, $10810, $10811, $10812, $10813, $10814, $10815, $10816, $10817, $10818, $10819, $10820, $10821, $10822, $10823, $10824, $10825, $10826, $10827, $10828, VersionRange($10829, $10830)), ($10831, $10832, $10833, $10834, $10835, $10836, $10837, $10838, $10839, $10840, $10841, $10842, $10843, $10844, $10845, $10846, $10847, $10848, $10849, $10850, $10851, $10852, $10853, $10854, $10855, $10856, $10857, $10858, VersionRange($10859, $10860)), ($10861, $10862, $10863, $10864, $10865, $10866, $10867, $10868, $10869, $10870, $10871, $10872, $10873, $10874, $10875, $10876, $10877, $10878, $10879, $10880, $10881, $10882, $10883, $10884, $10885, $10886, $10887, $10888, VersionRange($10889, $10890)), ($10891, $10892, $10893, $10894, $10895, $10896, $10897, $10898, $10899, $10900, $10901, $10902, $10903, $10904, $10905, $10906, $10907, $10908, $10909, $10910, $10911, $10912, $10913, $10914, $10915, $10916, $10917, $10918, VersionRange($10919, $10920)), ($10921, $10922, $10923, $10924, $10925, $10926, $10927, $10928, $10929, $10930, $10931, $10932, $10933, $10934, $10935, $10936, $10937, $10938, $10939, $10940, $10941, $10942, $10943, $10944, $10945, $10946, $10947, $10948, VersionRange($10949, $10950)), ($10951, $10952, $10953, $10954, $10955, $10956, $10957, $10958, $10959, $10960, $10961, $10962, $10963, $10964, $10965, $10966, $10967, $10968, $10969, $10970, $10971, $10972, $10973, $10974, $10975, $10976, $10977, $10978, VersionRange($10979, $10980)), ($10981, $10982, $10983, $10984, $10985, $10986, $10987, $10988, $10989, $10990, $10991, $10992, $10993, $10994, $10995, $10996, $10997, $10998, $10999, $11000, $11001, $11002, $11003, $11004, $11005, $11006, $11007, $11008, VersionRange($11009, $11010)), ($11011, $11012, $11013, $11014, $11015, $11016, $11017, $11018, $11019, $11020, $11021, $11022, $11023, $11024, $11025, $11026, $11027, $11028, $11029, $11030, $11031, $11032, $11033, $11034, $11035, $11036, $11037, $11038, VersionRange($11039, $11040)), ($11041, $11042, $11043, $11044, $11045, $11046, $11047, $11048, $11049, $11050, $11051, $11052, $11053, $11054, $11055, $11056, $11057, $11058, $11059, $11060, $11061, $11062, $11063, $11064, $11065, $11066, $11067, $11068, VersionRange($11069, $11070)), ($11071, $11072, $11073, $11074, $11075, $11076, $11077, $11078, $11079, $11080, $11081, $11082, $11083, $11084, $11085, $11086, $11087, $11088, $11089, $11090, $11091, $11092, $11093, $11094, $11095, $11096, $11097, $11098, VersionRange($11099, $11100)), ($11101, $11102, $11103, $11104, $11105, $11106, $11107, $11108, $11109, $11110, $11111, $11112, $11113, $11114, $11115, $11116, $11117, $11118, $11119, $11120, $11121, $11122, $11123, $11124, $11125, $11126, $11127, $11128, VersionRange($11129, $11130)), ($11131, $11132, $11133, $11134, $11135, $11136, $11137, $11138, $11139, $11140, $11141, $11142, $11143, $11144, $11145, $11146, $11147, $11148, $11149, $11150, $11151, $11152, $11153, $11154, $11155, $11156, $11157, $11158, VersionRange($11159, $11160)), ($11161, $11162, $11163, $11164, $11165, $11166, $11167, $11168, $11169, $11170, $11171, $11172, $11173, $11174, $11175, $11176, $11177, $11178, $11179, $11180, $11181, $11182, $11183, $11184, $11185, $11186, $11187, $11188, VersionRange($11189, $11190)), ($11191, $11192, $11193, $11194, $11195, $11196, $11197, $11198, $11199, $11200, $11201, $11202, $11203, $11204, $11205, $11206, $11207, $11208, $11209, $11210, $11211, $11212, $11213, $11214, $11215, $11216, $11217, $11218, VersionRange($11219, $11220)), ($11221, $11222, $11223, $11224, $11225, $11226, $11227, $11228, $11229, $11230, $11231, $11232, $11233, $11234, $11235, $11236, $11237, $11238, $11239, $11240, $11241, $11242, $11243, $11244, $11245, $11246, $11247, $11248, VersionRange($11249, $11250)), ($11251, $11252, $11253, $11254, $11255, $11256, $11257, $11258, $11259, $11260, $11261, $11262, $11263, $11264, $11265, $11266, $11267, $11268, $11269, $11270, $11271, $11272, $11273, $11274, $11275, $11276, $11277, $11278, VersionRange($11279, $11280)), ($11281, $11282, $11283, $11284, $11285, $11286, $11287, $11288, $11289, $11290, $11291, $11292, $11293, $11294, $11295, $11296, $11297, $11298, $11299, $11300, $11301, $11302, $11303, $11304, $11305, $11306, $11307, $11308, VersionRange($11309, $11310)), ($11311, $11312, $11313, $11314, $11315, $11316, $11317, $11318, $11319, $11320, $11321, $11322, $11323, $11324, $11325, $11326, $11327, $11328, $11329, $11330, $11331, $11332, $11333, $11334, $11335, $11336, $11337, $11338, VersionRange($11339, $11340)), ($11341, $11342, $11343, $11344, $11345, $11346, $11347, $11348, $11349, $11350, $11351, $11352, $11353, $11354, $11355, $11356, $11357, $11358, $11359, $11360, $11361, $11362, $11363, $11364, $11365, $11366, $11367, $11368, VersionRange($11369, $11370)), ($11371, $11372, $11373, $11374, $11375, $11376, $11377, $11378, $11379, $11380, $11381, $11382, $11383, $11384, $11385, $11386, $11387, $11388, $11389, $11390, $11391, $11392, $11393, $11394, $11395, $11396, $11397, $11398, VersionRange($11399, $11400)), ($11401, $11402, $11403, $11404, $11405, $11406, $11407, $11408, $11409, $11410, $11411, $11412, $11413, $11414, $11415, $11416, $11417, $11418, $11419, $11420, $11421, $11422, $11423, $11424, $11425, $11426, $11427, $11428, VersionRange($11429, $11430)), ($11431, $11432, $11433, $11434, $11435, $11436, $11437, $11438, $11439, $11440, $11441, $11442, $11443, $11444, $11445, $11446, $11447, $11448, $11449, $11450, $11451, $11452, $11453, $11454, $11455, $11456, $11457, $11458, VersionRange($11459, $11460)), ($11461, $11462, $11463, $11464, $11465, $11466, $11467, $11468, $11469, $11470, $11471, $11472, $11473, $11474, $11475, $11476, $11477, $11478, $11479, $11480, $11481, $11482, $11483, $11484, $11485, $11486, $11487, $11488, VersionRange($11489, $11490)), ($11491, $11492, $11493, $11494, $11495, $11496, $11497, $11498, $11499, $11500, $11501, $11502, $11503, $11504, $11505, $11506, $11507, $11508, $11509, $11510, $11511, $11512, $11513, $11514, $11515, $11516, $11517, $11518, VersionRange($11519, $11520)), ($11521, $11522, $11523, $11524, $11525, $11526, $11527, $11528, $11529, $11530, $11531, $11532, $11533, $11534, $11535, $11536, $11537, $11538, $11539, $11540, $11541, $11542, $11543, $11544, $11545, $11546, $11547, $11548, VersionRange($11549, $11550)), ($11551, $11552, $11553, $11554, $11555, $11556, $11557, $11558, $11559, $11560, $11561, $11562, $11563, $11564, $11565, $11566, $11567, $11568, $11569, $11570, $11571, $11572, $11573, $11574, $11575, $11576, $11577, $11578, VersionRange($11579, $11580)), ($11581, $11582, $11583, $11584, $11585, $11586, $11587, $11588, $11589, $11590, $11591, $11592, $11593, $11594, $11595, $11596, $11597, $11598, $11599, $11600, $11601, $11602, $11603, $11604, $11605, $11606, $11607, $11608, VersionRange($11609, $11610)), ($11611, $11612, $11613, $11614, $11615, $11616, $11617, $11618, $11619, $11620, $11621, $11622, $11623, $11624, $11625, $11626, $11627, $11628, $11629, $11630, $11631, $11632, $11633, $11634, $11635, $11636, $11637, $11638, VersionRange($11639, $11640)), ($11641, $11642, $11643, $11644, $11645, $11646, $11647, $11648, $11649, $11650, $11651, $11652, $11653, $11654, $11655, $11656, $11657, $11658, $11659, $11660, $11661, $11662, $11663, $11664, $11665, $11666, $11667, $11668, VersionRange($11669, $11670)), ($11671, $11672, $11673, $11674, $11675, $11676, $11677, $11678, $11679, $11680, $11681, $11682, $11683, $11684, $11685, $11686, $11687, $11688, $11689, $11690, $11691, $11692, $11693, $11694, $11695, $11696, $11697, $11698, VersionRange($11699, $11700)), ($11701, $11702, $11703, $11704, $11705, $11706, $11707, $11708, $11709, $11710, $11711, $11712, $11713, $11714, $11715, $11716, $11717, $11718, $11719, $11720, $11721, $11722, $11723, $11724, $11725, $11726, $11727, $11728, VersionRange($11729, $11730)), ($11731, $11732, $11733, $11734, $11735, $11736, $11737, $11738, $11739, $11740, $11741, $11742, $11743, $11744, $11745, $11746, $11747, $11748, $11749, $11750, $11751, $11752, $11753, $11754, $11755, $11756, $11757, $11758, VersionRange($11759, $11760)), ($11761, $11762, $11763, $11764, $11765, $11766, $11767, $11768, $11769, $11770, $11771, $11772, $11773, $11774, $11775, $11776, $11777, $11778, $11779, $11780, $11781, $11782, $11783, $11784, $11785, $11786, $11787, $11788, VersionRange($11789, $11790)), ($11791, $11792, $11793, $11794, $11795, $11796, $11797, $11798, $11799, $11800, $11801, $11802, $11803, $11804, $11805, $11806, $11807, $11808, $11809, $11810, $11811, $11812, $11813, $11814, $11815, $11816, $11817, $11818, VersionRange($11819, $11820)), ($11821, $11822, $11823, $11824, $11825, $11826, $11827, $11828, $11829, $11830, $11831, $11832, $11833, $11834, $11835, $11836, $11837, $11838, $11839, $11840, $11841, $11842, $11843, $11844, $11845, $11846, $11847, $11848, VersionRange($11849, $11850)), ($11851, $11852, $11853, $11854, $11855, $11856, $11857, $11858, $11859, $11860, $11861, $11862, $11863, $11864, $11865, $11866, $11867, $11868, $11869, $11870, $11871, $11872, $11873, $11874, $11875, $11876, $11877, $11878, VersionRange($11879, $11880)), ($11881, $11882, $11883, $11884, $11885, $11886, $11887, $11888, $11889, $11890, $11891, $11892, $11893, $11894, $11895, $11896, $11897, $11898, $11899, $11900, $11901, $11902, $11903, $11904, $11905, $11906, $11907, $11908, VersionRange($11909, $11910)), ($11911, $11912, $11913, $11914, $11915, $11916, $11917, $11918, $11919, $11920, $11921, $11922, $11923, $11924, $11925, $11926, $11927, $11928, $11929, $11930, $11931, $11932, $11933, $11934, $11935, $11936, $11937, $11938, VersionRange($11939, $11940)), ($11941, $11942, $11943, $11944, $11945, $11946, $11947, $11948, $11949, $11950, $11951, $11952, $11953, $11954, $11955, $11956, $11957, $11958, $11959, $11960, $11961, $11962, $11963, $11964, $11965, $11966, $11967, $11968, VersionRange($11969, $11970)), ($11971, $11972, $11973, $11974, $11975, $11976, $11977, $11978, $11979, $11980, $11981, $11982, $11983, $11984, $11985, $11986, $11987, $11988, $11989, $11990, $11991, $11992, $11993, $11994, $11995, $11996, $11997, $11998, VersionRange($11999, $12000)), ($12001, $12002, $12003, $12004, $12005, $12006, $12007, $12008, $12009, $12010, $12011, $12012, $12013, $12014, $12015, $12016, $12017, $12018, $12019, $12020, $12021, $12022, $12023, $12024, $12025, $12026, $12027, $12028, VersionRange($12029, $12030)), ($12031, $12032, $12033, $12034, $12035, $12036, $12037, $12038, $12039, $12040, $12041, $12042, $12043, $12044, $12045, $12046, $12047, $12048, $12049, $12050, $12051, $12052, $12053, $12054, $12055, $12056, $12057, $12058, VersionRange($12059, $12060)), ($12061, $12062, $12063, $12064, $12065, $12066, $12067, $12068, $12069, $12070, $12071, $12072, $12073, $12074, $12075, $12076, $12077, $12078, $12079, $12080, $12081, $12082, $12083, $12084, $12085, $12086, $12087, $12088, VersionRange($12089, $12090)), ($12091, $12092, $12093, $12094, $12095, $12096, $12097, $12098, $12099, $12100, $12101, $12102, $12103, $12104, $12105, $12106, $12107, $12108, $12109, $12110, $12111, $12112, $12113, $12114, $12115, $12116, $12117, $12118, VersionRange($12119, $12120)), ($12121, $12122, $12123, $12124, $12125, $12126, $12127, $12128, $12129, $12130, $12131, $12132, $12133, $12134, $12135, $12136, $12137, $12138, $12139, $12140, $12141, $12142, $12143, $12144, $12145, $12146, $12147, $12148, VersionRange($12149, $12150)), ($12151, $12152, $12153, $12154, $12155, $12156, $12157, $12158, $12159, $12160, $12161, $12162, $12163, $12164, $12165, $12166, $12167, $12168, $12169, $12170, $12171, $12172, $12173, $12174, $12175, $12176, $12177, $12178, VersionRange($12179, $12180)), ($12181, $12182, $12183, $12184, $12185, $12186, $12187, $12188, $12189, $12190, $12191, $12192, $12193, $12194, $12195, $12196, $12197, $12198, $12199, $12200, $12201, $12202, $12203, $12204, $12205, $12206, $12207, $12208, VersionRange($12209, $12210)), ($12211, $12212, $12213, $12214, $12215, $12216, $12217, $12218, $12219, $12220, $12221, $12222, $12223, $12224, $12225, $12226, $12227, $12228, $12229, $12230, $12231, $12232, $12233, $12234, $12235, $12236, $12237, $12238, VersionRange($12239, $12240)), ($12241, $12242, $12243, $12244, $12245, $12246, $12247, $12248, $12249, $12250, $12251, $12252, $12253, $12254, $12255, $12256, $12257, $12258, $12259, $12260, $12261, $12262, $12263, $12264, $12265, $12266, $12267, $12268, VersionRange($12269, $12270)), ($12271, $12272, $12273, $12274, $12275, $12276, $12277, $12278, $12279, $12280, $12281, $12282, $12283, $12284, $12285, $12286, $12287, $12288, $12289, $12290, $12291, $12292, $12293, $12294, $12295, $12296, $12297, $12298, VersionRange($12299, $12300)), ($12301, $12302, $12303, $12304, $12305, $12306, $12307, $12308, $12309, $12310, $12311, $12312, $12313, $12314, $12315, $12316, $12317, $12318, $12319, $12320, $12321, $12322, $12323, $12324, $12325, $12326, $12327, $12328, VersionRange($12329, $12330)), ($12331, $12332, $12333, $12334, $12335, $12336, $12337, $12338, $12339, $12340, $12341, $12342, $12343, $12344, $12345, $12346, $12347, $12348, $12349, $12350, $12351, $12352, $12353, $12354, $12355, $12356, $12357, $12358, VersionRange($12359, $12360)), ($12361, $12362, $12363, $12364, $12365, $12366, $12367, $12368, $12369, $12370, $12371, $12372, $12373, $12374, $12375, $12376, $12377, $12378, $12379, $12380, $12381, $12382, $12383, $12384, $12385, $12386, $12387, $12388, VersionRange($12389, $12390)), ($12391, $12392, $12393, $12394, $12395, $12396, $12397, $12398, $12399, $12400, $12401, $12402, $12403, $12404, $12405, $12406, $12407, $12408, $12409, $12410, $12411, $12412, $12413, $12414, $12415, $12416, $12417, $12418, VersionRange($12419, $12420)), ($12421, $12422, $12423, $12424, $12425, $12426, $12427, $12428, $12429, $12430, $12431, $12432, $12433, $12434, $12435, $12436, $12437, $12438, $12439, $12440, $12441, $12442, $12443, $12444, $12445, $12446, $12447, $12448, VersionRange($12449, $12450)), ($12451, $12452, $12453, $12454, $12455, $12456, $12457, $12458, $12459, $12460, $12461, $12462, $12463, $12464, $12465, $12466, $12467, $12468, $12469, $12470, $12471, $12472, $12473, $12474, $12475, $12476, $12477, $12478, VersionRange($12479, $12480)), ($12481, $12482, $12483, $12484, $12485, $12486, $12487, $12488, $12489, $12490, $12491, $12492, $12493, $12494, $12495, $12496, $12497, $12498, $12499, $12500, $12501, $12502, $12503, $12504, $12505, $12506, $12507, $12508, VersionRange($12509, $12510)), ($12511, $12512, $12513, $12514, $12515, $12516, $12517, $12518, $12519, $12520, $12521, $12522, $12523, $12524, $12525, $12526, $12527, $12528, $12529, $12530, $12531, $12532, $12533, $12534, $12535, $12536, $12537, $12538, VersionRange($12539, $12540)), ($12541, $12542, $12543, $12544, $12545, $12546, $12547, $12548, $12549, $12550, $12551, $12552, $12553, $12554, $12555, $12556, $12557, $12558, $12559, $12560, $12561, $12562, $12563, $12564, $12565, $12566, $12567, $12568, VersionRange($12569, $12570)), ($12571, $12572, $12573, $12574, $12575, $12576, $12577, $12578, $12579, $12580, $12581, $12582, $12583, $12584, $12585, $12586, $12587, $12588, $12589, $12590, $12591, $12592, $12593, $12594, $12595, $12596, $12597, $12598, VersionRange($12599, $12600)), ($12601, $12602, $12603, $12604, $12605, $12606, $12607, $12608, $12609, $12610, $12611, $12612, $12613, $12614, $12615, $12616, $12617, $12618, $12619, $12620, $12621, $12622, $12623, $12624, $12625, $12626, $12627, $12628, VersionRange($12629, $12630)), ($12631, $12632, $12633, $12634, $12635, $12636, $12637, $12638, $12639, $12640, $12641, $12642, $12643, $12644, $12645, $12646, $12647, $12648, $12649, $12650, $12651, $12652, $12653, $12654, $12655, $12656, $12657, $12658, VersionRange($12659, $12660)), ($12661, $12662, $12663, $12664, $12665, $12666, $12667, $12668, $12669, $12670, $12671, $12672, $12673, $12674, $12675, $12676, $12677, $12678, $12679, $12680, $12681, $12682, $12683, $12684, $12685, $12686, $12687, $12688, VersionRange($12689, $12690)), ($12691, $12692, $12693, $12694, $12695, $12696, $12697, $12698, $12699, $12700, $12701, $12702, $12703, $12704, $12705, $12706, $12707, $12708, $12709, $12710, $12711, $12712, $12713, $12714, $12715, $12716, $12717, $12718, VersionRange($12719, $12720)), ($12721, $12722, $12723, $12724, $12725, $12726, $12727, $12728, $12729, $12730, $12731, $12732, $12733, $12734, $12735, $12736, $12737, $12738, $12739, $12740, $12741, $12742, $12743, $12744, $12745, $12746, $12747, $12748, VersionRange($12749, $12750)), ($12751, $12752, $12753, $12754, $12755, $12756, $12757, $12758, $12759, $12760, $12761, $12762, $12763, $12764, $12765, $12766, $12767, $12768, $12769, $12770, $12771, $12772, $12773, $12774, $12775, $12776, $12777, $12778, VersionRange($12779, $12780)), ($12781, $12782, $12783, $12784, $12785, $12786, $12787, $12788, $12789, $12790, $12791, $12792, $12793, $12794, $12795, $12796, $12797, $12798, $12799, $12800, $12801, $12802, $12803, $12804, $12805, $12806, $12807, $12808, VersionRange($12809, $12810)), ($12811, $12812, $12813, $12814, $12815, $12816, $12817, $12818, $12819, $12820, $12821, $12822, $12823, $12824, $12825, $12826, $12827, $12828, $12829, $12830, $12831, $12832, $12833, $12834, $12835, $12836, $12837, $12838, VersionRange($12839, $12840)), ($12841, $12842, $12843, $12844, $12845, $12846, $12847, $12848, $12849, $12850, $12851, $12852, $12853, $12854, $12855, $12856, $12857, $12858, $12859, $12860, $12861, $12862, $12863, $12864, $12865, $12866, $12867, $12868, VersionRange($12869, $12870)), ($12871, $12872, $12873, $12874, $12875, $12876, $12877, $12878, $12879, $12880, $12881, $12882, $12883, $12884, $12885, $12886, $12887, $12888, $12889, $12890, $12891, $12892, $12893, $12894, $12895, $12896, $12897, $12898, VersionRange($12899, $12900)), ($12901, $12902, $12903, $12904, $12905, $12906, $12907, $12908, $12909, $12910, $12911, $12912, $12913, $12914, $12915, $12916, $12917, $12918, $12919, $12920, $12921, $12922, $12923, $12924, $12925, $12926, $12927, $12928, VersionRange($12929, $12930)), ($12931, $12932, $12933, $12934, $12935, $12936, $12937, $12938, $12939, $12940, $12941, $12942, $12943, $12944, $12945, $12946, $12947, $12948, $12949, $12950, $12951, $12952, $12953, $12954, $12955, $12956, $12957, $12958, VersionRange($12959, $12960)), ($12961, $12962, $12963, $12964, $12965, $12966, $12967, $12968, $12969, $12970[...][ Date: 2023-07-04 18:41:24 ]
13 3s855ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30)), ($31, $32, $33, $34, $35, $36, $37, $38, $39, $40, $41, $42, $43, $44, $45, $46, $47, $48, $49, $50, $51, $52, $53, $54, $55, $56, $57, $58, VersionRange($59, $60)), ($61, $62, $63, $64, $65, $66, $67, $68, $69, $70, $71, $72, $73, $74, $75, $76, $77, $78, $79, $80, $81, $82, $83, $84, $85, $86, $87, $88, VersionRange($89, $90)), ($91, $92, $93, $94, $95, $96, $97, $98, $99, $100, $101, $102, $103, $104, $105, $106, $107, $108, $109, $110, $111, $112, $113, $114, $115, $116, $117, $118, VersionRange($119, $120)), ($121, $122, $123, $124, $125, $126, $127, $128, $129, $130, $131, $132, $133, $134, $135, $136, $137, $138, $139, $140, $141, $142, $143, $144, $145, $146, $147, $148, VersionRange($149, $150)), ($151, $152, $153, $154, $155, $156, $157, $158, $159, $160, $161, $162, $163, $164, $165, $166, $167, $168, $169, $170, $171, $172, $173, $174, $175, $176, $177, $178, VersionRange($179, $180)), ($181, $182, $183, $184, $185, $186, $187, $188, $189, $190, $191, $192, $193, $194, $195, $196, $197, $198, $199, $200, $201, $202, $203, $204, $205, $206, $207, $208, VersionRange($209, $210)), ($211, $212, $213, $214, $215, $216, $217, $218, $219, $220, $221, $222, $223, $224, $225, $226, $227, $228, $229, $230, $231, $232, $233, $234, $235, $236, $237, $238, VersionRange($239, $240)), ($241, $242, $243, $244, $245, $246, $247, $248, $249, $250, $251, $252, $253, $254, $255, $256, $257, $258, $259, $260, $261, $262, $263, $264, $265, $266, $267, $268, VersionRange($269, $270)), ($271, $272, $273, $274, $275, $276, $277, $278, $279, $280, $281, $282, $283, $284, $285, $286, $287, $288, $289, $290, $291, $292, $293, $294, $295, $296, $297, $298, VersionRange($299, $300)), ($301, $302, $303, $304, $305, $306, $307, $308, $309, $310, $311, $312, $313, $314, $315, $316, $317, $318, $319, $320, $321, $322, $323, $324, $325, $326, $327, $328, VersionRange($329, $330)), ($331, $332, $333, $334, $335, $336, $337, $338, $339, $340, $341, $342, $343, $344, $345, $346, $347, $348, $349, $350, $351, $352, $353, $354, $355, $356, $357, $358, VersionRange($359, $360)), ($361, $362, $363, $364, $365, $366, $367, $368, $369, $370, $371, $372, $373, $374, $375, $376, $377, $378, $379, $380, $381, $382, $383, $384, $385, $386, $387, $388, VersionRange($389, $390)), ($391, $392, $393, $394, $395, $396, $397, $398, $399, $400, $401, $402, $403, $404, $405, $406, $407, $408, $409, $410, $411, $412, $413, $414, $415, $416, $417, $418, VersionRange($419, $420)), ($421, $422, $423, $424, $425, $426, $427, $428, $429, $430, $431, $432, $433, $434, $435, $436, $437, $438, $439, $440, $441, $442, $443, $444, $445, $446, $447, $448, VersionRange($449, $450)), ($451, $452, $453, $454, $455, $456, $457, $458, $459, $460, $461, $462, $463, $464, $465, $466, $467, $468, $469, $470, $471, $472, $473, $474, $475, $476, $477, $478, VersionRange($479, $480)), ($481, $482, $483, $484, $485, $486, $487, $488, $489, $490, $491, $492, $493, $494, $495, $496, $497, $498, $499, $500, $501, $502, $503, $504, $505, $506, $507, $508, VersionRange($509, $510)), ($511, $512, $513, $514, $515, $516, $517, $518, $519, $520, $521, $522, $523, $524, $525, $526, $527, $528, $529, $530, $531, $532, $533, $534, $535, $536, $537, $538, VersionRange($539, $540)), ($541, $542, $543, $544, $545, $546, $547, $548, $549, $550, $551, $552, $553, $554, $555, $556, $557, $558, $559, $560, $561, $562, $563, $564, $565, $566, $567, $568, VersionRange($569, $570)), ($571, $572, $573, $574, $575, $576, $577, $578, $579, $580, $581, $582, $583, $584, $585, $586, $587, $588, $589, $590, $591, $592, $593, $594, $595, $596, $597, $598, VersionRange($599, $600)), ($601, $602, $603, $604, $605, $606, $607, $608, $609, $610, $611, $612, $613, $614, $615, $616, $617, $618, $619, $620, $621, $622, $623, $624, $625, $626, $627, $628, VersionRange($629, $630)), ($631, $632, $633, $634, $635, $636, $637, $638, $639, $640, $641, $642, $643, $644, $645, $646, $647, $648, $649, $650, $651, $652, $653, $654, $655, $656, $657, $658, VersionRange($659, $660)), ($661, $662, $663, $664, $665, $666, $667, $668, $669, $670, $671, $672, $673, $674, $675, $676, $677, $678, $679, $680, $681, $682, $683, $684, $685, $686, $687, $688, VersionRange($689, $690)), ($691, $692, $693, $694, $695, $696, $697, $698, $699, $700, $701, $702, $703, $704, $705, $706, $707, $708, $709, $710, $711, $712, $713, $714, $715, $716, $717, $718, VersionRange($719, $720)), ($721, $722, $723, $724, $725, $726, $727, $728, $729, $730, $731, $732, $733, $734, $735, $736, $737, $738, $739, $740, $741, $742, $743, $744, $745, $746, $747, $748, VersionRange($749, $750)), ($751, $752, $753, $754, $755, $756, $757, $758, $759, $760, $761, $762, $763, $764, $765, $766, $767, $768, $769, $770, $771, $772, $773, $774, $775, $776, $777, $778, VersionRange($779, $780)), ($781, $782, $783, $784, $785, $786, $787, $788, $789, $790, $791, $792, $793, $794, $795, $796, $797, $798, $799, $800, $801, $802, $803, $804, $805, $806, $807, $808, VersionRange($809, $810)), ($811, $812, $813, $814, $815, $816, $817, $818, $819, $820, $821, $822, $823, $824, $825, $826, $827, $828, $829, $830, $831, $832, $833, $834, $835, $836, $837, $838, VersionRange($839, $840)), ($841, $842, $843, $844, $845, $846, $847, $848, $849, $850, $851, $852, $853, $854, $855, $856, $857, $858, $859, $860, $861, $862, $863, $864, $865, $866, $867, $868, VersionRange($869, $870)), ($871, $872, $873, $874, $875, $876, $877, $878, $879, $880, $881, $882, $883, $884, $885, $886, $887, $888, $889, $890, $891, $892, $893, $894, $895, $896, $897, $898, VersionRange($899, $900)), ($901, $902, $903, $904, $905, $906, $907, $908, $909, $910, $911, $912, $913, $914, $915, $916, $917, $918, $919, $920, $921, $922, $923, $924, $925, $926, $927, $928, VersionRange($929, $930)), ($931, $932, $933, $934, $935, $936, $937, $938, $939, $940, $941, $942, $943, $944, $945, $946, $947, $948, $949, $950, $951, $952, $953, $954, $955, $956, $957, $958, VersionRange($959, $960)), ($961, $962, $963, $964, $965, $966, $967, $968, $969, $970, $971, $972, $973, $974, $975, $976, $977, $978, $979, $980, $981, $982, $983, $984, $985, $986, $987, $988, VersionRange($989, $990)), ($991, $992, $993, $994, $995, $996, $997, $998, $999, $1000, $1001, $1002, $1003, $1004, $1005, $1006, $1007, $1008, $1009, $1010, $1011, $1012, $1013, $1014, $1015, $1016, $1017, $1018, VersionRange($1019, $1020)), ($1021, $1022, $1023, $1024, $1025, $1026, $1027, $1028, $1029, $1030, $1031, $1032, $1033, $1034, $1035, $1036, $1037, $1038, $1039, $1040, $1041, $1042, $1043, $1044, $1045, $1046, $1047, $1048, VersionRange($1049, $1050)), ($1051, $1052, $1053, $1054, $1055, $1056, $1057, $1058, $1059, $1060, $1061, $1062, $1063, $1064, $1065, $1066, $1067, $1068, $1069, $1070, $1071, $1072, $1073, $1074, $1075, $1076, $1077, $1078, VersionRange($1079, $1080)), ($1081, $1082, $1083, $1084, $1085, $1086, $1087, $1088, $1089, $1090, $1091, $1092, $1093, $1094, $1095, $1096, $1097, $1098, $1099, $1100, $1101, $1102, $1103, $1104, $1105, $1106, $1107, $1108, VersionRange($1109, $1110)), ($1111, $1112, $1113, $1114, $1115, $1116, $1117, $1118, $1119, $1120, $1121, $1122, $1123, $1124, $1125, $1126, $1127, $1128, $1129, $1130, $1131, $1132, $1133, $1134, $1135, $1136, $1137, $1138, VersionRange($1139, $1140)), ($1141, $1142, $1143, $1144, $1145, $1146, $1147, $1148, $1149, $1150, $1151, $1152, $1153, $1154, $1155, $1156, $1157, $1158, $1159, $1160, $1161, $1162, $1163, $1164, $1165, $1166, $1167, $1168, VersionRange($1169, $1170)), ($1171, $1172, $1173, $1174, $1175, $1176, $1177, $1178, $1179, $1180, $1181, $1182, $1183, $1184, $1185, $1186, $1187, $1188, $1189, $1190, $1191, $1192, $1193, $1194, $1195, $1196, $1197, $1198, VersionRange($1199, $1200)), ($1201, $1202, $1203, $1204, $1205, $1206, $1207, $1208, $1209, $1210, $1211, $1212, $1213, $1214, $1215, $1216, $1217, $1218, $1219, $1220, $1221, $1222, $1223, $1224, $1225, $1226, $1227, $1228, VersionRange($1229, $1230)), ($1231, $1232, $1233, $1234, $1235, $1236, $1237, $1238, $1239, $1240, $1241, $1242, $1243, $1244, $1245, $1246, $1247, $1248, $1249, $1250, $1251, $1252, $1253, $1254, $1255, $1256, $1257, $1258, VersionRange($1259, $1260)), ($1261, $1262, $1263, $1264, $1265, $1266, $1267, $1268, $1269, $1270, $1271, $1272, $1273, $1274, $1275, $1276, $1277, $1278, $1279, $1280, $1281, $1282, $1283, $1284, $1285, $1286, $1287, $1288, VersionRange($1289, $1290)), ($1291, $1292, $1293, $1294, $1295, $1296, $1297, $1298, $1299, $1300, $1301, $1302, $1303, $1304, $1305, $1306, $1307, $1308, $1309, $1310, $1311, $1312, $1313, $1314, $1315, $1316, $1317, $1318, VersionRange($1319, $1320)), ($1321, $1322, $1323, $1324, $1325, $1326, $1327, $1328, $1329, $1330, $1331, $1332, $1333, $1334, $1335, $1336, $1337, $1338, $1339, $1340, $1341, $1342, $1343, $1344, $1345, $1346, $1347, $1348, VersionRange($1349, $1350)), ($1351, $1352, $1353, $1354, $1355, $1356, $1357, $1358, $1359, $1360, $1361, $1362, $1363, $1364, $1365, $1366, $1367, $1368, $1369, $1370, $1371, $1372, $1373, $1374, $1375, $1376, $1377, $1378, VersionRange($1379, $1380)), ($1381, $1382, $1383, $1384, $1385, $1386, $1387, $1388, $1389, $1390, $1391, $1392, $1393, $1394, $1395, $1396, $1397, $1398, $1399, $1400, $1401, $1402, $1403, $1404, $1405, $1406, $1407, $1408, VersionRange($1409, $1410)), ($1411, $1412, $1413, $1414, $1415, $1416, $1417, $1418, $1419, $1420, $1421, $1422, $1423, $1424, $1425, $1426, $1427, $1428, $1429, $1430, $1431, $1432, $1433, $1434, $1435, $1436, $1437, $1438, VersionRange($1439, $1440)), ($1441, $1442, $1443, $1444, $1445, $1446, $1447, $1448, $1449, $1450, $1451, $1452, $1453, $1454, $1455, $1456, $1457, $1458, $1459, $1460, $1461, $1462, $1463, $1464, $1465, $1466, $1467, $1468, VersionRange($1469, $1470)), ($1471, $1472, $1473, $1474, $1475, $1476, $1477, $1478, $1479, $1480, $1481, $1482, $1483, $1484, $1485, $1486, $1487, $1488, $1489, $1490, $1491, $1492, $1493, $1494, $1495, $1496, $1497, $1498, VersionRange($1499, $1500)), ($1501, $1502, $1503, $1504, $1505, $1506, $1507, $1508, $1509, $1510, $1511, $1512, $1513, $1514, $1515, $1516, $1517, $1518, $1519, $1520, $1521, $1522, $1523, $1524, $1525, $1526, $1527, $1528, VersionRange($1529, $1530)), ($1531, $1532, $1533, $1534, $1535, $1536, $1537, $1538, $1539, $1540, $1541, $1542, $1543, $1544, $1545, $1546, $1547, $1548, $1549, $1550, $1551, $1552, $1553, $1554, $1555, $1556, $1557, $1558, VersionRange($1559, $1560)), ($1561, $1562, $1563, $1564, $1565, $1566, $1567, $1568, $1569, $1570, $1571, $1572, $1573, $1574, $1575, $1576, $1577, $1578, $1579, $1580, $1581, $1582, $1583, $1584, $1585, $1586, $1587, $1588, VersionRange($1589, $1590)), ($1591, $1592, $1593, $1594, $1595, $1596, $1597, $1598, $1599, $1600, $1601, $1602, $1603, $1604, $1605, $1606, $1607, $1608, $1609, $1610, $1611, $1612, $1613, $1614, $1615, $1616, $1617, $1618, VersionRange($1619, $1620)), ($1621, $1622, $1623, $1624, $1625, $1626, $1627, $1628, $1629, $1630, $1631, $1632, $1633, $1634, $1635, $1636, $1637, $1638, $1639, $1640, $1641, $1642, $1643, $1644, $1645, $1646, $1647, $1648, VersionRange($1649, $1650)), ($1651, $1652, $1653, $1654, $1655, $1656, $1657, $1658, $1659, $1660, $1661, $1662, $1663, $1664, $1665, $1666, $1667, $1668, $1669, $1670, $1671, $1672, $1673, $1674, $1675, $1676, $1677, $1678, VersionRange($1679, $1680)), ($1681, $1682, $1683, $1684, $1685, $1686, $1687, $1688, $1689, $1690, $1691, $1692, $1693, $1694, $1695, $1696, $1697, $1698, $1699, $1700, $1701, $1702, $1703, $1704, $1705, $1706, $1707, $1708, VersionRange($1709, $1710)), ($1711, $1712, $1713, $1714, $1715, $1716, $1717, $1718, $1719, $1720, $1721, $1722, $1723, $1724, $1725, $1726, $1727, $1728, $1729, $1730, $1731, $1732, $1733, $1734, $1735, $1736, $1737, $1738, VersionRange($1739, $1740)), ($1741, $1742, $1743, $1744, $1745, $1746, $1747, $1748, $1749, $1750, $1751, $1752, $1753, $1754, $1755, $1756, $1757, $1758, $1759, $1760, $1761, $1762, $1763, $1764, $1765, $1766, $1767, $1768, VersionRange($1769, $1770)), ($1771, $1772, $1773, $1774, $1775, $1776, $1777, $1778, $1779, $1780, $1781, $1782, $1783, $1784, $1785, $1786, $1787, $1788, $1789, $1790, $1791, $1792, $1793, $1794, $1795, $1796, $1797, $1798, VersionRange($1799, $1800)), ($1801, $1802, $1803, $1804, $1805, $1806, $1807, $1808, $1809, $1810, $1811, $1812, $1813, $1814, $1815, $1816, $1817, $1818, $1819, $1820, $1821, $1822, $1823, $1824, $1825, $1826, $1827, $1828, VersionRange($1829, $1830)), ($1831, $1832, $1833, $1834, $1835, $1836, $1837, $1838, $1839, $1840, $1841, $1842, $1843, $1844, $1845, $1846, $1847, $1848, $1849, $1850, $1851, $1852, $1853, $1854, $1855, $1856, $1857, $1858, VersionRange($1859, $1860)), ($1861, $1862, $1863, $1864, $1865, $1866, $1867, $1868, $1869, $1870, $1871, $1872, $1873, $1874, $1875, $1876, $1877, $1878, $1879, $1880, $1881, $1882, $1883, $1884, $1885, $1886, $1887, $1888, VersionRange($1889, $1890)), ($1891, $1892, $1893, $1894, $1895, $1896, $1897, $1898, $1899, $1900, $1901, $1902, $1903, $1904, $1905, $1906, $1907, $1908, $1909, $1910, $1911, $1912, $1913, $1914, $1915, $1916, $1917, $1918, VersionRange($1919, $1920)), ($1921, $1922, $1923, $1924, $1925, $1926, $1927, $1928, $1929, $1930, $1931, $1932, $1933, $1934, $1935, $1936, $1937, $1938, $1939, $1940, $1941, $1942, $1943, $1944, $1945, $1946, $1947, $1948, VersionRange($1949, $1950)), ($1951, $1952, $1953, $1954, $1955, $1956, $1957, $1958, $1959, $1960, $1961, $1962, $1963, $1964, $1965, $1966, $1967, $1968, $1969, $1970, $1971, $1972, $1973, $1974, $1975, $1976, $1977, $1978, VersionRange($1979, $1980)), ($1981, $1982, $1983, $1984, $1985, $1986, $1987, $1988, $1989, $1990, $1991, $1992, $1993, $1994, $1995, $1996, $1997, $1998, $1999, $2000, $2001, $2002, $2003, $2004, $2005, $2006, $2007, $2008, VersionRange($2009, $2010)), ($2011, $2012, $2013, $2014, $2015, $2016, $2017, $2018, $2019, $2020, $2021, $2022, $2023, $2024, $2025, $2026, $2027, $2028, $2029, $2030, $2031, $2032, $2033, $2034, $2035, $2036, $2037, $2038, VersionRange($2039, $2040)), ($2041, $2042, $2043, $2044, $2045, $2046, $2047, $2048, $2049, $2050, $2051, $2052, $2053, $2054, $2055, $2056, $2057, $2058, $2059, $2060, $2061, $2062, $2063, $2064, $2065, $2066, $2067, $2068, VersionRange($2069, $2070)), ($2071, $2072, $2073, $2074, $2075, $2076, $2077, $2078, $2079, $2080, $2081, $2082, $2083, $2084, $2085, $2086, $2087, $2088, $2089, $2090, $2091, $2092, $2093, $2094, $2095, $2096, $2097, $2098, VersionRange($2099, $2100)), ($2101, $2102, $2103, $2104, $2105, $2106, $2107, $2108, $2109, $2110, $2111, $2112, $2113, $2114, $2115, $2116, $2117, $2118, $2119, $2120, $2121, $2122, $2123, $2124, $2125, $2126, $2127, $2128, VersionRange($2129, $2130)), ($2131, $2132, $2133, $2134, $2135, $2136, $2137, $2138, $2139, $2140, $2141, $2142, $2143, $2144, $2145, $2146, $2147, $2148, $2149, $2150, $2151, $2152, $2153, $2154, $2155, $2156, $2157, $2158, VersionRange($2159, $2160)), ($2161, $2162, $2163, $2164, $2165, $2166, $2167, $2168, $2169, $2170, $2171, $2172, $2173, $2174, $2175, $2176, $2177, $2178, $2179, $2180, $2181, $2182, $2183, $2184, $2185, $2186, $2187, $2188, VersionRange($2189, $2190)), ($2191, $2192, $2193, $2194, $2195, $2196, $2197, $2198, $2199, $2200, $2201, $2202, $2203, $2204, $2205, $2206, $2207, $2208, $2209, $2210, $2211, $2212, $2213, $2214, $2215, $2216, $2217, $2218, VersionRange($2219, $2220)), ($2221, $2222, $2223, $2224, $2225, $2226, $2227, $2228, $2229, $2230, $2231, $2232, $2233, $2234, $2235, $2236, $2237, $2238, $2239, $2240, $2241, $2242, $2243, $2244, $2245, $2246, $2247, $2248, VersionRange($2249, $2250)), ($2251, $2252, $2253, $2254, $2255, $2256, $2257, $2258, $2259, $2260, $2261, $2262, $2263, $2264, $2265, $2266, $2267, $2268, $2269, $2270, $2271, $2272, $2273, $2274, $2275, $2276, $2277, $2278, VersionRange($2279, $2280)), ($2281, $2282, $2283, $2284, $2285, $2286, $2287, $2288, $2289, $2290, $2291, $2292, $2293, $2294, $2295, $2296, $2297, $2298, $2299, $2300, $2301, $2302, $2303, $2304, $2305, $2306, $2307, $2308, VersionRange($2309, $2310)), ($2311, $2312, $2313, $2314, $2315, $2316, $2317, $2318, $2319, $2320, $2321, $2322, $2323, $2324, $2325, $2326, $2327, $2328, $2329, $2330, $2331, $2332, $2333, $2334, $2335, $2336, $2337, $2338, VersionRange($2339, $2340)), ($2341, $2342, $2343, $2344, $2345, $2346, $2347, $2348, $2349, $2350, $2351, $2352, $2353, $2354, $2355, $2356, $2357, $2358, $2359, $2360, $2361, $2362, $2363, $2364, $2365, $2366, $2367, $2368, VersionRange($2369, $2370)), ($2371, $2372, $2373, $2374, $2375, $2376, $2377, $2378, $2379, $2380, $2381, $2382, $2383, $2384, $2385, $2386, $2387, $2388, $2389, $2390, $2391, $2392, $2393, $2394, $2395, $2396, $2397, $2398, VersionRange($2399, $2400)), ($2401, $2402, $2403, $2404, $2405, $2406, $2407, $2408, $2409, $2410, $2411, $2412, $2413, $2414, $2415, $2416, $2417, $2418, $2419, $2420, $2421, $2422, $2423, $2424, $2425, $2426, $2427, $2428, VersionRange($2429, $2430)), ($2431, $2432, $2433, $2434, $2435, $2436, $2437, $2438, $2439, $2440, $2441, $2442, $2443, $2444, $2445, $2446, $2447, $2448, $2449, $2450, $2451, $2452, $2453, $2454, $2455, $2456, $2457, $2458, VersionRange($2459, $2460)), ($2461, $2462, $2463, $2464, $2465, $2466, $2467, $2468, $2469, $2470, $2471, $2472, $2473, $2474, $2475, $2476, $2477, $2478, $2479, $2480, $2481, $2482, $2483, $2484, $2485, $2486, $2487, $2488, VersionRange($2489, $2490)), ($2491, $2492, $2493, $2494, $2495, $2496, $2497, $2498, $2499, $2500, $2501, $2502, $2503, $2504, $2505, $2506, $2507, $2508, $2509, $2510, $2511, $2512, $2513, $2514, $2515, $2516, $2517, $2518, VersionRange($2519, $2520)), ($2521, $2522, $2523, $2524, $2525, $2526, $2527, $2528, $2529, $2530, $2531, $2532, $2533, $2534, $2535, $2536, $2537, $2538, $2539, $2540, $2541, $2542, $2543, $2544, $2545, $2546, $2547, $2548, VersionRange($2549, $2550)), ($2551, $2552, $2553, $2554, $2555, $2556, $2557, $2558, $2559, $2560, $2561, $2562, $2563, $2564, $2565, $2566, $2567, $2568, $2569, $2570, $2571, $2572, $2573, $2574, $2575, $2576, $2577, $2578, VersionRange($2579, $2580)), ($2581, $2582, $2583, $2584, $2585, $2586, $2587, $2588, $2589, $2590, $2591, $2592, $2593, $2594, $2595, $2596, $2597, $2598, $2599, $2600, $2601, $2602, $2603, $2604, $2605, $2606, $2607, $2608, VersionRange($2609, $2610)), ($2611, $2612, $2613, $2614, $2615, $2616, $2617, $2618, $2619, $2620, $2621, $2622, $2623, $2624, $2625, $2626, $2627, $2628, $2629, $2630, $2631, $2632, $2633, $2634, $2635, $2636, $2637, $2638, VersionRange($2639, $2640)), ($2641, $2642, $2643, $2644, $2645, $2646, $2647, $2648, $2649, $2650, $2651, $2652, $2653, $2654, $2655, $2656, $2657, $2658, $2659, $2660, $2661, $2662, $2663, $2664, $2665, $2666, $2667, $2668, VersionRange($2669, $2670)), ($2671, $2672, $2673, $2674, $2675, $2676, $2677, $2678, $2679, $2680, $2681, $2682, $2683, $2684, $2685, $2686, $2687, $2688, $2689, $2690, $2691, $2692, $2693, $2694, $2695, $2696, $2697, $2698, VersionRange($2699, $2700)), ($2701, $2702, $2703, $2704, $2705, $2706, $2707, $2708, $2709, $2710, $2711, $2712, $2713, $2714, $2715, $2716, $2717, $2718, $2719, $2720, $2721, $2722, $2723, $2724, $2725, $2726, $2727, $2728, VersionRange($2729, $2730)), ($2731, $2732, $2733, $2734, $2735, $2736, $2737, $2738, $2739, $2740, $2741, $2742, $2743, $2744, $2745, $2746, $2747, $2748, $2749, $2750, $2751, $2752, $2753, $2754, $2755, $2756, $2757, $2758, VersionRange($2759, $2760)), ($2761, $2762, $2763, $2764, $2765, $2766, $2767, $2768, $2769, $2770, $2771, $2772, $2773, $2774, $2775, $2776, $2777, $2778, $2779, $2780, $2781, $2782, $2783, $2784, $2785, $2786, $2787, $2788, VersionRange($2789, $2790)), ($2791, $2792, $2793, $2794, $2795, $2796, $2797, $2798, $2799, $2800, $2801, $2802, $2803, $2804, $2805, $2806, $2807, $2808, $2809, $2810, $2811, $2812, $2813, $2814, $2815, $2816, $2817, $2818, VersionRange($2819, $2820)), ($2821, $2822, $2823, $2824, $2825, $2826, $2827, $2828, $2829, $2830, $2831, $2832, $2833, $2834, $2835, $2836, $2837, $2838, $2839, $2840, $2841, $2842, $2843, $2844, $2845, $2846, $2847, $2848, VersionRange($2849, $2850)), ($2851, $2852, $2853, $2854, $2855, $2856, $2857, $2858, $2859, $2860, $2861, $2862, $2863, $2864, $2865, $2866, $2867, $2868, $2869, $2870, $2871, $2872, $2873, $2874, $2875, $2876, $2877, $2878, VersionRange($2879, $2880)), ($2881, $2882, $2883, $2884, $2885, $2886, $2887, $2888, $2889, $2890, $2891, $2892, $2893, $2894, $2895, $2896, $2897, $2898, $2899, $2900, $2901, $2902, $2903, $2904, $2905, $2906, $2907, $2908, VersionRange($2909, $2910)), ($2911, $2912, $2913, $2914, $2915, $2916, $2917, $2918, $2919, $2920, $2921, $2922, $2923, $2924, $2925, $2926, $2927, $2928, $2929, $2930, $2931, $2932, $2933, $2934, $2935, $2936, $2937, $2938, VersionRange($2939, $2940)), ($2941, $2942, $2943, $2944, $2945, $2946, $2947, $2948, $2949, $2950, $2951, $2952, $2953, $2954, $2955, $2956, $2957, $2958, $2959, $2960, $2961, $2962, $2963, $2964, $2965, $2966, $2967, $2968, VersionRange($2969, $2970)), ($2971, $2972, $2973, $2974, $2975, $2976, $2977, $2978, $2979, $2980, $2981, $2982, $2983, $2984, $2985, $2986, $2987, $2988, $2989, $2990, $2991, $2992, $2993, $2994, $2995, $2996, $2997, $2998, VersionRange($2999, $3000)), ($3001, $3002, $3003, $3004, $3005, $3006, $3007, $3008, $3009, $3010, $3011, $3012, $3013, $3014, $3015, $3016, $3017, $3018, $3019, $3020, $3021, $3022, $3023, $3024, $3025, $3026, $3027, $3028, VersionRange($3029, $3030)), ($3031, $3032, $3033, $3034, $3035, $3036, $3037, $3038, $3039, $3040, $3041, $3042, $3043, $3044, $3045, $3046, $3047, $3048, $3049, $3050, $3051, $3052, $3053, $3054, $3055, $3056, $3057, $3058, VersionRange($3059, $3060)), ($3061, $3062, $3063, $3064, $3065, $3066, $3067, $3068, $3069, $3070, $3071, $3072, $3073, $3074, $3075, $3076, $3077, $3078, $3079, $3080, $3081, $3082, $3083, $3084, $3085, $3086, $3087, $3088, VersionRange($3089, $3090)), ($3091, $3092, $3093, $3094, $3095, $3096, $3097, $3098, $3099, $3100, $3101, $3102, $3103, $3104, $3105, $3106, $3107, $3108, $3109, $3110, $3111, $3112, $3113, $3114, $3115, $3116, $3117, $3118, VersionRange($3119, $3120)), ($3121, $3122, $3123, $3124, $3125, $3126, $3127, $3128, $3129, $3130, $3131, $3132, $3133, $3134, $3135, $3136, $3137, $3138, $3139, $3140, $3141, $3142, $3143, $3144, $3145, $3146, $3147, $3148, VersionRange($3149, $3150)), ($3151, $3152, $3153, $3154, $3155, $3156, $3157, $3158, $3159, $3160, $3161, $3162, $3163, $3164, $3165, $3166, $3167, $3168, $3169, $3170, $3171, $3172, $3173, $3174, $3175, $3176, $3177, $3178, VersionRange($3179, $3180)), ($3181, $3182, $3183, $3184, $3185, $3186, $3187, $3188, $3189, $3190, $3191, $3192, $3193, $3194, $3195, $3196, $3197, $3198, $3199, $3200, $3201, $3202, $3203, $3204, $3205, $3206, $3207, $3208, VersionRange($3209, $3210)), ($3211, $3212, $3213, $3214, $3215, $3216, $3217, $3218, $3219, $3220, $3221, $3222, $3223, $3224, $3225, $3226, $3227, $3228, $3229, $3230, $3231, $3232, $3233, $3234, $3235, $3236, $3237, $3238, VersionRange($3239, $3240)), ($3241, $3242, $3243, $3244, $3245, $3246, $3247, $3248, $3249, $3250, $3251, $3252, $3253, $3254, $3255, $3256, $3257, $3258, $3259, $3260, $3261, $3262, $3263, $3264, $3265, $3266, $3267, $3268, VersionRange($3269, $3270)), ($3271, $3272, $3273, $3274, $3275, $3276, $3277, $3278, $3279, $3280, $3281, $3282, $3283, $3284, $3285, $3286, $3287, $3288, $3289, $3290, $3291, $3292, $3293, $3294, $3295, $3296, $3297, $3298, VersionRange($3299, $3300)), ($3301, $3302, $3303, $3304, $3305, $3306, $3307, $3308, $3309, $3310, $3311, $3312, $3313, $3314, $3315, $3316, $3317, $3318, $3319, $3320, $3321, $3322, $3323, $3324, $3325, $3326, $3327, $3328, VersionRange($3329, $3330)), ($3331, $3332, $3333, $3334, $3335, $3336, $3337, $3338, $3339, $3340, $3341, $3342, $3343, $3344, $3345, $3346, $3347, $3348, $3349, $3350, $3351, $3352, $3353, $3354, $3355, $3356, $3357, $3358, VersionRange($3359, $3360)), ($3361, $3362, $3363, $3364, $3365, $3366, $3367, $3368, $3369, $3370, $3371, $3372, $3373, $3374, $3375, $3376, $3377, $3378, $3379, $3380, $3381, $3382, $3383, $3384, $3385, $3386, $3387, $3388, VersionRange($3389, $3390)), ($3391, $3392, $3393, $3394, $3395, $3396, $3397, $3398, $3399, $3400, $3401, $3402, $3403, $3404, $3405, $3406, $3407, $3408, $3409, $3410, $3411, $3412, $3413, $3414, $3415, $3416, $3417, $3418, VersionRange($3419, $3420)), ($3421, $3422, $3423, $3424, $3425, $3426, $3427, $3428, $3429, $3430, $3431, $3432, $3433, $3434, $3435, $3436, $3437, $3438, $3439, $3440, $3441, $3442, $3443, $3444, $3445, $3446, $3447, $3448, VersionRange($3449, $3450)), ($3451, $3452, $3453, $3454, $3455, $3456, $3457, $3458, $3459, $3460, $3461, $3462, $3463, $3464, $3465, $3466, $3467, $3468, $3469, $3470, $3471, $3472, $3473, $3474, $3475, $3476, $3477, $3478, VersionRange($3479, $3480)), ($3481, $3482, $3483, $3484, $3485, $3486, $3487, $3488, $3489, $3490, $3491, $3492, $3493, $3494, $3495, $3496, $3497, $3498, $3499, $3500, $3501, $3502, $3503, $3504, $3505, $3506, $3507, $3508, VersionRange($3509, $3510)), ($3511, $3512, $3513, $3514, $3515, $3516, $3517, $3518, $3519, $3520, $3521, $3522, $3523, $3524, $3525, $3526, $3527, $3528, $3529, $3530, $3531, $3532, $3533, $3534, $3535, $3536, $3537, $3538, VersionRange($3539, $3540)), ($3541, $3542, $3543, $3544, $3545, $3546, $3547, $3548, $3549, $3550, $3551, $3552, $3553, $3554, $3555, $3556, $3557, $3558, $3559, $3560, $3561, $3562, $3563, $3564, $3565, $3566, $3567, $3568, VersionRange($3569, $3570)), ($3571, $3572, $3573, $3574, $3575, $3576, $3577, $3578, $3579, $3580, $3581, $3582, $3583, $3584, $3585, $3586, $3587, $3588, $3589, $3590, $3591, $3592, $3593, $3594, $3595, $3596, $3597, $3598, VersionRange($3599, $3600)), ($3601, $3602, $3603, $3604, $3605, $3606, $3607, $3608, $3609, $3610, $3611, $3612, $3613, $3614, $3615, $3616, $3617, $3618, $3619, $3620, $3621, $3622, $3623, $3624, $3625, $3626, $3627, $3628, VersionRange($3629, $3630)), ($3631, $3632, $3633, $3634, $3635, $3636, $3637, $3638, $3639, $3640, $3641, $3642, $3643, $3644, $3645, $3646, $3647, $3648, $3649, $3650, $3651, $3652, $3653, $3654, $3655, $3656, $3657, $3658, VersionRange($3659, $3660)), ($3661, $3662, $3663, $3664, $3665, $3666, $3667, $3668, $3669, $3670, $3671, $3672, $3673, $3674, $3675, $3676, $3677, $3678, $3679, $3680, $3681, $3682, $3683, $3684, $3685, $3686, $3687, $3688, VersionRange($3689, $3690)), ($3691, $3692, $3693, $3694, $3695, $3696, $3697, $3698, $3699, $3700, $3701, $3702, $3703, $3704, $3705, $3706, $3707, $3708, $3709, $3710, $3711, $3712, $3713, $3714, $3715, $3716, $3717, $3718, VersionRange($3719, $3720)), ($3721, $3722, $3723, $3724, $3725, $3726, $3727, $3728, $3729, $3730, $3731, $3732, $3733, $3734, $3735, $3736, $3737, $3738, $3739, $3740, $3741, $3742, $3743, $3744, $3745, $3746, $3747, $3748, VersionRange($3749, $3750)), ($3751, $3752, $3753, $3754, $3755, $3756, $3757, $3758, $3759, $3760, $3761, $3762, $3763, $3764, $3765, $3766, $3767, $3768, $3769, $3770, $3771, $3772, $3773, $3774, $3775, $3776, $3777, $3778, VersionRange($3779, $3780)), ($3781, $3782, $3783, $3784, $3785, $3786, $3787, $3788, $3789, $3790, $3791, $3792, $3793, $3794, $3795, $3796, $3797, $3798, $3799, $3800, $3801, $3802, $3803, $3804, $3805, $3806, $3807, $3808, VersionRange($3809, $3810)), ($3811, $3812, $3813, $3814, $3815, $3816, $3817, $3818, $3819, $3820, $3821, $3822, $3823, $3824, $3825, $3826, $3827, $3828, $3829, $3830, $3831, $3832, $3833, $3834, $3835, $3836, $3837, $3838, VersionRange($3839, $3840)), ($3841, $3842, $3843, $3844, $3845, $3846, $3847, $3848, $3849, $3850, $3851, $3852, $3853, $3854, $3855, $3856, $3857, $3858, $3859, $3860, $3861, $3862, $3863, $3864, $3865, $3866, $3867, $3868, VersionRange($3869, $3870)), ($3871, $3872, $3873, $3874, $3875, $3876, $3877, $3878, $3879, $3880, $3881, $3882, $3883, $3884, $3885, $3886, $3887, $3888, $3889, $3890, $3891, $3892, $3893, $3894, $3895, $3896, $3897, $3898, VersionRange($3899, $3900)), ($3901, $3902, $3903, $3904, $3905, $3906, $3907, $3908, $3909, $3910, $3911, $3912, $3913, $3914, $3915, $3916, $3917, $3918, $3919, $3920, $3921, $3922, $3923, $3924, $3925, $3926, $3927, $3928, VersionRange($3929, $3930)), ($3931, $3932, $3933, $3934, $3935, $3936, $3937, $3938, $3939, $3940, $3941, $3942, $3943, $3944, $3945, $3946, $3947, $3948, $3949, $3950, $3951, $3952, $3953, $3954, $3955, $3956, $3957, $3958, VersionRange($3959, $3960)), ($3961, $3962, $3963, $3964, $3965, $3966, $3967, $3968, $3969, $3970, $3971, $3972, $3973, $3974, $3975, $3976, $3977, $3978, $3979, $3980, $3981, $3982, $3983, $3984, $3985, $3986, $3987, $3988, VersionRange($3989, $3990)), ($3991, $3992, $3993, $3994, $3995, $3996, $3997, $3998, $3999, $4000, $4001, $4002, $4003, $4004, $4005, $4006, $4007, $4008, $4009, $4010, $4011, $4012, $4013, $4014, $4015, $4016, $4017, $4018, VersionRange($4019, $4020)), ($4021, $4022, $4023, $4024, $4025, $4026, $4027, $4028, $4029, $4030, $4031, $4032, $4033, $4034, $4035, $4036, $4037, $4038, $4039, $4040, $4041, $4042, $4043, $4044, $4045, $4046, $4047, $4048, VersionRange($4049, $4050)), ($4051, $4052, $4053, $4054, $4055, $4056, $4057, $4058, $4059, $4060, $4061, $4062, $4063, $4064, $4065, $4066, $4067, $4068, $4069, $4070, $4071, $4072, $4073, $4074, $4075, $4076, $4077, $4078, VersionRange($4079, $4080)), ($4081, $4082, $4083, $4084, $4085, $4086, $4087, $4088, $4089, $4090, $4091, $4092, $4093, $4094, $4095, $4096, $4097, $4098, $4099, $4100, $4101, $4102, $4103, $4104, $4105, $4106, $4107, $4108, VersionRange($4109, $4110)), ($4111, $4112, $4113, $4114, $4115, $4116, $4117, $4118, $4119, $4120, $4121, $4122, $4123, $4124, $4125, $4126, $4127, $4128, $4129, $4130, $4131, $4132, $4133, $4134, $4135, $4136, $4137, $4138, VersionRange($4139, $4140)), ($4141, $4142, $4143, $4144, $4145, $4146, $4147, $4148, $4149, $4150, $4151, $4152, $4153, $4154, $4155, $4156, $4157, $4158, $4159, $4160, $4161, $4162, $4163, $4164, $4165, $4166, $4167, $4168, VersionRange($4169, $4170)), ($4171, $4172, $4173, $4174, $4175, $4176, $4177, $4178, $4179, $4180, $4181, $4182, $4183, $4184, $4185, $4186, $4187, $4188, $4189, $4190, $4191, $4192, $4193, $4194, $4195, $4196, $4197, $4198, VersionRange($4199, $4200)), ($4201, $4202, $4203, $4204, $4205, $4206, $4207, $4208, $4209, $4210, $4211, $4212, $4213, $4214, $4215, $4216, $4217, $4218, $4219, $4220, $4221, $4222, $4223, $4224, $4225, $4226, $4227, $4228, VersionRange($4229, $4230)), ($4231, $4232, $4233, $4234, $4235, $4236, $4237, $4238, $4239, $4240, $4241, $4242, $4243, $4244, $4245, $4246, $4247, $4248, $4249, $4250, $4251, $4252, $4253, $4254, $4255, $4256, $4257, $4258, VersionRange($4259, $4260)), ($4261, $4262, $4263, $4264, $4265, $4266, $4267, $4268, $4269, $4270, $4271, $4272, $4273, $4274, $4275, $4276, $4277, $4278, $4279, $4280, $4281, $4282, $4283, $4284, $4285, $4286, $4287, $4288, VersionRange($4289, $4290)), ($4291, $4292, $4293, $4294, $4295, $4296, $4297, $4298, $4299, $4300, $4301, $4302, $4303, $4304, $4305, $4306, $4307, $4308, $4309, $4310, $4311, $4312, $4313, $4314, $4315, $4316, $4317, $4318, VersionRange($4319, $4320)), ($4321, $4322, $4323, $4324, $4325, $4326, $4327, $4328, $4329, $4330, $4331, $4332, $4333, $4334, $4335, $4336, $4337, $4338, $4339, $4340, $4341, $4342, $4343, $4344, $4345, $4346, $4347, $4348, VersionRange($4349, $4350)), ($4351, $4352, $4353, $4354, $4355, $4356, $4357, $4358, $4359, $4360, $4361, $4362, $4363, $4364, $4365, $4366, $4367, $4368, $4369, $4370, $4371, $4372, $4373, $4374, $4375, $4376, $4377, $4378, VersionRange($4379, $4380)), ($4381, $4382, $4383, $4384, $4385, $4386, $4387, $4388, $4389, $4390, $4391, $4392, $4393, $4394, $4395, $4396, $4397, $4398, $4399, $4400, $4401, $4402, $4403, $4404, $4405, $4406, $4407, $4408, VersionRange($4409, $4410)), ($4411, $4412, $4413, $4414, $4415, $4416, $4417, $4418, $4419, $4420, $4421, $4422, $4423, $4424, $4425, $4426, $4427, $4428, $4429, $4430, $4431, $4432, $4433, $4434, $4435, $4436, $4437, $4438, VersionRange($4439, $4440)), ($4441, $4442, $4443, $4444, $4445, $4446, $4447, $4448, $4449, $4450, $4451, $4452, $4453, $4454, $4455, $4456, $4457, $4458, $4459, $4460, $4461, $4462, $4463, $4464, $4465, $4466, $4467, $4468, VersionRange($4469, $4470)), ($4471, $4472, $4473, $4474, $4475, $4476, $4477, $4478, $4479, $4480, $4481, $4482, $4483, $4484, $4485, $4486, $4487, $4488, $4489, $4490, $4491, $4492, $4493, $4494, $4495, $4496, $4497, $4498, VersionRange($4499, $4500)), ($4501, $4502, $4503, $4504, $4505, $4506, $4507, $4508, $4509, $4510, $4511, $4512, $4513, $4514, $4515, $4516, $4517, $4518, $4519, $4520, $4521, $4522, $4523, $4524, $4525, $4526, $4527, $4528, VersionRange($4529, $4530)), ($4531, $4532, $4533, $4534, $4535, $4536, $4537, $4538, $4539, $4540, $4541, $4542, $4543, $4544, $4545, $4546, $4547, $4548, $4549, $4550, $4551, $4552, $4553, $4554, $4555, $4556, $4557, $4558, VersionRange($4559, $4560)), ($4561, $4562, $4563, $4564, $4565, $4566, $4567, $4568, $4569, $4570, $4571, $4572, $4573, $4574, $4575, $4576, $4577, $4578, $4579, $4580, $4581, $4582, $4583, $4584, $4585, $4586, $4587, $4588, VersionRange($4589, $4590)), ($4591, $4592, $4593, $4594, $4595, $4596, $4597, $4598, $4599, $4600, $4601, $4602, $4603, $4604, $4605, $4606, $4607, $4608, $4609, $4610, $4611, $4612, $4613, $4614, $4615, $4616, $4617, $4618, VersionRange($4619, $4620)), ($4621, $4622, $4623, $4624, $4625, $4626, $4627, $4628, $4629, $4630, $4631, $4632, $4633, $4634, $4635, $4636, $4637, $4638, $4639, $4640, $4641, $4642, $4643, $4644, $4645, $4646, $4647, $4648, VersionRange($4649, $4650)), ($4651, $4652, $4653, $4654, $4655, $4656, $4657, $4658, $4659, $4660, $4661, $4662, $4663, $4664, $4665, $4666, $4667, $4668, $4669, $4670, $4671, $4672, $4673, $4674, $4675, $4676, $4677, $4678, VersionRange($4679, $4680)), ($4681, $4682, $4683, $4684, $4685, $4686, $4687, $4688, $4689, $4690, $4691, $4692, $4693, $4694, $4695, $4696, $4697, $4698, $4699, $4700, $4701, $4702, $4703, $4704, $4705, $4706, $4707, $4708, VersionRange($4709, $4710)), ($4711, $4712, $4713, $4714, $4715, $4716, $4717, $4718, $4719, $4720, $4721, $4722, $4723, $4724, $4725, $4726, $4727, $4728, $4729, $4730, $4731, $4732, $4733, $4734, $4735, $4736, $4737, $4738, VersionRange($4739, $4740)), ($4741, $4742, $4743, $4744, $4745, $4746, $4747, $4748, $4749, $4750, $4751, $4752, $4753, $4754, $4755, $4756, $4757, $4758, $4759, $4760, $4761, $4762, $4763, $4764, $4765, $4766, $4767, $4768, VersionRange($4769, $4770)), ($4771, $4772, $4773, $4774, $4775, $4776, $4777, $4778, $4779, $4780, $4781, $4782, $4783, $4784, $4785, $4786, $4787, $4788, $4789, $4790, $4791, $4792, $4793, $4794, $4795, $4796, $4797, $4798, VersionRange($4799, $4800)), ($4801, $4802, $4803, $4804, $4805, $4806, $4807, $4808, $4809, $4810, $4811, $4812, $4813, $4814, $4815, $4816, $4817, $4818, $4819, $4820, $4821, $4822, $4823, $4824, $4825, $4826, $4827, $4828, VersionRange($4829, $4830)), ($4831, $4832, $4833, $4834, $4835, $4836, $4837, $4838, $4839, $4840, $4841, $4842, $4843, $4844, $4845, $4846, $4847, $4848, $4849, $4850, $4851, $4852, $4853, $4854, $4855, $4856, $4857, $4858, VersionRange($4859, $4860)), ($4861, $4862, $4863, $4864, $4865, $4866, $4867, $4868, $4869, $4870, $4871, $4872, $4873, $4874, $4875, $4876, $4877, $4878, $4879, $4880, $4881, $4882, $4883, $4884, $4885, $4886, $4887, $4888, VersionRange($4889, $4890)), ($4891, $4892, $4893, $4894, $4895, $4896, $4897, $4898, $4899, $4900, $4901, $4902, $4903, $4904, $4905, $4906, $4907, $4908, $4909, $4910, $4911, $4912, $4913, $4914, $4915, $4916, $4917, $4918, VersionRange($4919, $4920)), ($4921, $4922, $4923, $4924, $4925, $4926, $4927, $4928, $4929, $4930, $4931, $4932, $4933, $4934, $4935, $4936, $4937, $4938, $4939, $4940, $4941, $4942, $4943, $4944, $4945, $4946, $4947, $4948, VersionRange($4949, $4950)), ($4951, $4952, $4953, $4954, $4955, $4956, $4957, $4958, $4959, $4960, $4961, $4962, $4963, $4964, $4965, $4966, $4967, $4968, $4969, $4970, $4971, $4972, $4973, $4974, $4975, $4976, $4977, $4978, VersionRange($4979, $4980)), ($4981, $4982, $4983, $4984, $4985, $4986, $4987, $4988, $4989, $4990, $4991, $4992, $4993, $4994, $4995, $4996, $4997, $4998, $4999, $5000, $5001, $5002, $5003, $5004, $5005, $5006, $5007, $5008, VersionRange($5009, $5010)), ($5011, $5012, $5013, $5014, $5015, $5016, $5017, $5018, $5019, $5020, $5021, $5022, $5023, $5024, $5025, $5026, $5027, $5028, $5029, $5030, $5031, $5032, $5033, $5034, $5035, $5036, $5037, $5038, VersionRange($5039, $5040)), ($5041, $5042, $5043, $5044, $5045, $5046, $5047, $5048, $5049, $5050, $5051, $5052, $5053, $5054, $5055, $5056, $5057, $5058, $5059, $5060, $5061, $5062, $5063, $5064, $5065, $5066, $5067, $5068, VersionRange($5069, $5070)), ($5071, $5072, $5073, $5074, $5075, $5076, $5077, $5078, $5079, $5080, $5081, $5082, $5083, $5084, $5085, $5086, $5087, $5088, $5089, $5090, $5091, $5092, $5093, $5094, $5095, $5096, $5097, $5098, VersionRange($5099, $5100)), ($5101, $5102, $5103, $5104, $5105, $5106, $5107, $5108, $5109, $5110, $5111, $5112, $5113, $5114, $5115, $5116, $5117, $5118, $5119, $5120, $5121, $5122, $5123, $5124, $5125, $5126, $5127, $5128, VersionRange($5129, $5130)), ($5131, $5132, $5133, $5134, $5135, $5136, $5137, $5138, $5139, $5140, $5141, $5142, $5143, $5144, $5145, $5146, $5147, $5148, $5149, $5150, $5151, $5152, $5153, $5154, $5155, $5156, $5157, $5158, VersionRange($5159, $5160)), ($5161, $5162, $5163, $5164, $5165, $5166, $5167, $5168, $5169, $5170, $5171, $5172, $5173, $5174, $5175, $5176, $5177, $5178, $5179, $5180, $5181, $5182, $5183, $5184, $5185, $5186, $5187, $5188, VersionRange($5189, $5190)), ($5191, $5192, $5193, $5194, $5195, $5196, $5197, $5198, $5199, $5200, $5201, $5202, $5203, $5204, $5205, $5206, $5207, $5208, $5209, $5210, $5211, $5212, $5213, $5214, $5215, $5216, $5217, $5218, VersionRange($5219, $5220)), ($5221, $5222, $5223, $5224, $5225, $5226, $5227, $5228, $5229, $5230, $5231, $5232, $5233, $5234, $5235, $5236, $5237, $5238, $5239, $5240, $5241, $5242, $5243, $5244, $5245, $5246, $5247, $5248, VersionRange($5249, $5250)), ($5251, $5252, $5253, $5254, $5255, $5256, $5257, $5258, $5259, $5260, $5261, $5262, $5263, $5264, $5265, $5266, $5267, $5268, $5269, $5270, $5271, $5272, $5273, $5274, $5275, $5276, $5277, $5278, VersionRange($5279, $5280)), ($5281, $5282, $5283, $5284, $5285, $5286, $5287, $5288, $5289, $5290, $5291, $5292, $5293, $5294, $5295, $5296, $5297, $5298, $5299, $5300, $5301, $5302, $5303, $5304, $5305, $5306, $5307, $5308, VersionRange($5309, $5310)), ($5311, $5312, $5313, $5314, $5315, $5316, $5317, $5318, $5319, $5320, $5321, $5322, $5323, $5324, $5325, $5326, $5327, $5328, $5329, $5330, $5331, $5332, $5333, $5334, $5335, $5336, $5337, $5338, VersionRange($5339, $5340)), ($5341, $5342, $5343, $5344, $5345, $5346, $5347, $5348, $5349, $5350, $5351, $5352, $5353, $5354, $5355, $5356, $5357, $5358, $5359, $5360, $5361, $5362, $5363, $5364, $5365, $5366, $5367, $5368, VersionRange($5369, $5370)), ($5371, $5372, $5373, $5374, $5375, $5376, $5377, $5378, $5379, $5380, $5381, $5382, $5383, $5384, $5385, $5386, $5387, $5388, $5389, $5390, $5391, $5392, $5393, $5394, $5395, $5396, $5397, $5398, VersionRange($5399, $5400)), ($5401, $5402, $5403, $5404, $5405, $5406, $5407, $5408, $5409, $5410, $5411, $5412, $5413, $5414, $5415, $5416, $5417, $5418, $5419, $5420, $5421, $5422, $5423, $5424, $5425, $5426, $5427, $5428, VersionRange($5429, $5430)), ($5431, $5432, $5433, $5434, $5435, $5436, $5437, $5438, $5439, $5440, $5441, $5442, $5443, $5444, $5445, $5446, $5447, $5448, $5449, $5450, $5451, $5452, $5453, $5454, $5455, $5456, $5457, $5458, VersionRange($5459, $5460)), ($5461, $5462, $5463, $5464, $5465, $5466, $5467, $5468, $5469, $5470, $5471, $5472, $5473, $5474, $5475, $5476, $5477, $5478, $5479, $5480, $5481, $5482, $5483, $5484, $5485, $5486, $5487, $5488, VersionRange($5489, $5490)), ($5491, $5492, $5493, $5494, $5495, $5496, $5497, $5498, $5499, $5500, $5501, $5502, $5503, $5504, $5505, $5506, $5507, $5508, $5509, $5510, $5511, $5512, $5513, $5514, $5515, $5516, $5517, $5518, VersionRange($5519, $5520)), ($5521, $5522, $5523, $5524, $5525, $5526, $5527, $5528, $5529, $5530, $5531, $5532, $5533, $5534, $5535, $5536, $5537, $5538, $5539, $5540, $5541, $5542, $5543, $5544, $5545, $5546, $5547, $5548, VersionRange($5549, $5550)), ($5551, $5552, $5553, $5554, $5555, $5556, $5557, $5558, $5559, $5560, $5561, $5562, $5563, $5564, $5565, $5566, $5567, $5568, $5569, $5570, $5571, $5572, $5573, $5574, $5575, $5576, $5577, $5578, VersionRange($5579, $5580)), ($5581, $5582, $5583, $5584, $5585, $5586, $5587, $5588, $5589, $5590, $5591, $5592, $5593, $5594, $5595, $5596, $5597, $5598, $5599, $5600, $5601, $5602, $5603, $5604, $5605, $5606, $5607, $5608, VersionRange($5609, $5610)), ($5611, $5612, $5613, $5614, $5615, $5616, $5617, $5618, $5619, $5620, $5621, $5622, $5623, $5624, $5625, $5626, $5627, $5628, $5629, $5630, $5631, $5632, $5633, $5634, $5635, $5636, $5637, $5638, VersionRange($5639, $5640)), ($5641, $5642, $5643, $5644, $5645, $5646, $5647, $5648, $5649, $5650, $5651, $5652, $5653, $5654, $5655, $5656, $5657, $5658, $5659, $5660, $5661, $5662, $5663, $5664, $5665, $5666, $5667, $5668, VersionRange($5669, $5670)), ($5671, $5672, $5673, $5674, $5675, $5676, $5677, $5678, $5679, $5680, $5681, $5682, $5683, $5684, $5685, $5686, $5687, $5688, $5689, $5690, $5691, $5692, $5693, $5694, $5695, $5696, $5697, $5698, VersionRange($5699, $5700)), ($5701, $5702, $5703, $5704, $5705, $5706, $5707, $5708, $5709, $5710, $5711, $5712, $5713, $5714, $5715, $5716, $5717, $5718, $5719, $5720, $5721, $5722, $5723, $5724, $5725, $5726, $5727, $5728, VersionRange($5729, $5730)), ($5731, $5732, $5733, $5734, $5735, $5736, $5737, $5738, $5739, $5740, $5741, $5742, $5743, $5744, $5745, $5746, $5747, $5748, $5749, $5750, $5751, $5752, $5753, $5754, $5755, $5756, $5757, $5758, VersionRange($5759, $5760)), ($5761, $5762, $5763, $5764, $5765, $5766, $5767, $5768, $5769, $5770, $5771, $5772, $5773, $5774, $5775, $5776, $5777, $5778, $5779, $5780, $5781, $5782, $5783, $5784, $5785, $5786, $5787, $5788, VersionRange($5789, $5790)), ($5791, $5792, $5793, $5794, $5795, $5796, $5797, $5798, $5799, $5800, $5801, $5802, $5803, $5804, $5805, $5806, $5807, $5808, $5809, $5810, $5811, $5812, $5813, $5814, $5815, $5816, $5817, $5818, VersionRange($5819, $5820)), ($5821, $5822, $5823, $5824, $5825, $5826, $5827, $5828, $5829, $5830, $5831, $5832, $5833, $5834, $5835, $5836, $5837, $5838, $5839, $5840, $5841, $5842, $5843, $5844, $5845, $5846, $5847, $5848, VersionRange($5849, $5850)), ($5851, $5852, $5853, $5854, $5855, $5856, $5857, $5858, $5859, $5860, $5861, $5862, $5863, $5864, $5865, $5866, $5867, $5868, $5869, $5870, $5871, $5872, $5873, $5874, $5875, $5876, $5877, $5878, VersionRange($5879, $5880)), ($5881, $5882, $5883, $5884, $5885, $5886, $5887, $5888, $5889, $5890, $5891, $5892, $5893, $5894, $5895, $5896, $5897, $5898, $5899, $5900, $5901, $5902, $5903, $5904, $5905, $5906, $5907, $5908, VersionRange($5909, $5910)), ($5911, $5912, $5913, $5914, $5915, $5916, $5917, $5918, $5919, $5920, $5921, $5922, $5923, $5924, $5925, $5926, $5927, $5928, $5929, $5930, $5931, $5932, $5933, $5934, $5935, $5936, $5937, $5938, VersionRange($5939, $5940)), ($5941, $5942, $5943, $5944, $5945, $5946, $5947, $5948, $5949, $5950, $5951, $5952, $5953, $5954, $5955, $5956, $5957, $5958, $5959, $5960, $5961, $5962, $5963, $5964, $5965, $5966, $5967, $5968, VersionRange($5969, $5970)), ($5971, $5972, $5973, $5974, $5975, $5976, $5977, $5978, $5979, $5980, $5981, $5982, $5983, $5984, $5985, $5986, $5987, $5988, $5989, $5990, $5991, $5992, $5993, $5994, $5995, $5996, $5997, $5998, VersionRange($5999, $6000)), ($6001, $6002, $6003, $6004, $6005, $6006, $6007, $6008, $6009, $6010, $6011, $6012, $6013, $6014, $6015, $6016, $6017, $6018, $6019, $6020, $6021, $6022, $6023, $6024, $6025, $6026, $6027, $6028, VersionRange($6029, $6030)), ($6031, $6032, $6033, $6034, $6035, $6036, $6037, $6038, $6039, $6040, $6041, $6042, $6043, $6044, $6045, $6046, $6047, $6048, $6049, $6050, $6051, $6052, $6053, $6054, $6055, $6056, $6057, $6058, VersionRange($6059, $6060)), ($6061, $6062, $6063, $6064, $6065, $6066, $6067, $6068, $6069, $6070, $6071, $6072, $6073, $6074, $6075, $6076, $6077, $6078, $6079, $6080, $6081, $6082, $6083, $6084, $6085, $6086, $6087, $6088, VersionRange($6089, $6090)), ($6091, $6092, $6093, $6094, $6095, $6096, $6097, $6098, $6099, $6100, $6101, $6102, $6103, $6104, $6105, $6106, $6107, $6108, $6109, $6110, $6111, $6112, $6113, $6114, $6115, $6116, $6117, $6118, VersionRange($6119, $6120)), ($6121, $6122, $6123, $6124, $6125, $6126, $6127, $6128, $6129, $6130, $6131, $6132, $6133, $6134, $6135, $6136, $6137, $6138, $6139, $6140, $6141, $6142, $6143, $6144, $6145, $6146, $6147, $6148, VersionRange($6149, $6150)), ($6151, $6152, $6153, $6154, $6155, $6156, $6157, $6158, $6159, $6160, $6161, $6162, $6163, $6164, $6165, $6166, $6167, $6168, $6169, $6170, $6171, $6172, $6173, $6174, $6175, $6176, $6177, $6178, VersionRange($6179, $6180)), ($6181, $6182, $6183, $6184, $6185, $6186, $6187, $6188, $6189, $6190, $6191, $6192, $6193, $6194, $6195, $6196, $6197, $6198, $6199, $6200, $6201, $6202, $6203, $6204, $6205, $6206, $6207, $6208, VersionRange($6209, $6210)), ($6211, $6212, $6213, $6214, $6215, $6216, $6217, $6218, $6219, $6220, $6221, $6222, $6223, $6224, $6225, $6226, $6227, $6228, $6229, $6230, $6231, $6232, $6233, $6234, $6235, $6236, $6237, $6238, VersionRange($6239, $6240)), ($6241, $6242, $6243, $6244, $6245, $6246, $6247, $6248, $6249, $6250, $6251, $6252, $6253, $6254, $6255, $6256, $6257, $6258, $6259, $6260, $6261, $6262, $6263, $6264, $6265, $6266, $6267, $6268, VersionRange($6269, $6270)), ($6271, $6272, $6273, $6274, $6275, $6276, $6277, $6278, $6279, $6280, $6281, $6282, $6283, $6284, $6285, $6286, $6287, $6288, $6289, $6290, $6291, $6292, $6293, $6294, $6295, $6296, $6297, $6298, VersionRange($6299, $6300)), ($6301, $6302, $6303, $6304, $6305, $6306, $6307, $6308, $6309, $6310, $6311, $6312, $6313, $6314, $6315, $6316, $6317, $6318, $6319, $6320, $6321, $6322, $6323, $6324, $6325, $6326, $6327, $6328, VersionRange($6329, $6330)), ($6331, $6332, $6333, $6334, $6335, $6336, $6337, $6338, $6339, $6340, $6341, $6342, $6343, $6344, $6345, $6346, $6347, $6348, $6349, $6350, $6351, $6352, $6353, $6354, $6355, $6356, $6357, $6358, VersionRange($6359, $6360)), ($6361, $6362, $6363, $6364, $6365, $6366, $6367, $6368, $6369, $6370, $6371, $6372, $6373, $6374, $6375, $6376, $6377, $6378, $6379, $6380, $6381, $6382, $6383, $6384, $6385, $6386, $6387, $6388, VersionRange($6389, $6390)), ($6391, $6392, $6393, $6394, $6395, $6396, $6397, $6398, $6399, $6400, $6401, $6402, $6403, $6404, $6405, $6406, $6407, $6408, $6409, $6410, $6411, $6412, $6413, $6414, $6415, $6416, $6417, $6418, VersionRange($6419, $6420)), ($6421, $6422, $6423, $6424, $6425, $6426, $6427, $6428, $6429, $6430, $6431, $6432, $6433, $6434, $6435, $6436, $6437, $6438, $6439, $6440, $6441, $6442, $6443, $6444, $6445, $6446, $6447, $6448, VersionRange($6449, $6450)), ($6451, $6452, $6453, $6454, $6455, $6456, $6457, $6458, $6459, $6460, $6461, $6462, $6463, $6464, $6465, $6466, $6467, $6468, $6469, $6470, $6471, $6472, $6473, $6474, $6475, $6476, $6477, $6478, VersionRange($6479, $6480)), ($6481, $6482, $6483, $6484, $6485, $6486, $6487, $6488, $6489, $6490, $6491, $6492, $6493, $6494, $6495, $6496, $6497, $6498, $6499, $6500, $6501, $6502, $6503, $6504, $6505, $6506, $6507, $6508, VersionRange($6509, $6510)), ($6511, $6512, $6513, $6514, $6515, $6516, $6517, $6518, $6519, $6520, $6521, $6522, $6523, $6524, $6525, $6526, $6527, $6528, $6529, $6530, $6531, $6532, $6533, $6534, $6535, $6536, $6537, $6538, VersionRange($6539, $6540)), ($6541, $6542, $6543, $6544, $6545, $6546, $6547, $6548, $6549, $6550, $6551, $6552, $6553, $6554, $6555, $6556, $6557, $6558, $6559, $6560, $6561, $6562, $6563, $6564, $6565, $6566, $6567, $6568, VersionRange($6569, $6570)), ($6571, $6572, $6573, $6574, $6575, $6576, $6577, $6578, $6579, $6580, $6581, $6582, $6583, $6584, $6585, $6586, $6587, $6588, $6589, $6590, $6591, $6592, $6593, $6594, $6595, $6596, $6597, $6598, VersionRange($6599, $6600)), ($6601, $6602, $6603, $6604, $6605, $6606, $6607, $6608, $6609, $6610, $6611, $6612, $6613, $6614, $6615, $6616, $6617, $6618, $6619, $6620, $6621, $6622, $6623, $6624, $6625, $6626, $6627, $6628, VersionRange($6629, $6630)), ($6631, $6632, $6633, $6634, $6635, $6636, $6637, $6638, $6639, $6640, $6641, $6642, $6643, $6644, $6645, $6646, $6647, $6648, $6649, $6650, $6651, $6652, $6653, $6654, $6655, $6656, $6657, $6658, VersionRange($6659, $6660)), ($6661, $6662, $6663, $6664, $6665, $6666, $6667, $6668, $6669, $6670, $6671, $6672, $6673, $6674, $6675, $6676, $6677, $6678, $6679, $6680, $6681, $6682, $6683, $6684, $6685, $6686, $6687, $6688, VersionRange($6689, $6690)), ($6691, $6692, $6693, $6694, $6695, $6696, $6697, $6698, $6699, $6700, $6701, $6702, $6703, $6704, $6705, $6706, $6707, $6708, $6709, $6710, $6711, $6712, $6713, $6714, $6715, $6716, $6717, $6718, VersionRange($6719, $6720)), ($6721, $6722, $6723, $6724, $6725, $6726, $6727, $6728, $6729, $6730, $6731, $6732, $6733, $6734, $6735, $6736, $6737, $6738, $6739, $6740, $6741, $6742, $6743, $6744, $6745, $6746, $6747, $6748, VersionRange($6749, $6750)), ($6751, $6752, $6753, $6754, $6755, $6756, $6757, $6758, $6759, $6760, $6761, $6762, $6763, $6764, $6765, $6766, $6767, $6768, $6769, $6770, $6771, $6772, $6773, $6774, $6775, $6776, $6777, $6778, VersionRange($6779, $6780)), ($6781, $6782, $6783, $6784, $6785, $6786, $6787, $6788, $6789, $6790, $6791, $6792, $6793, $6794, $6795, $6796, $6797, $6798, $6799, $6800, $6801, $6802, $6803, $6804, $6805, $6806, $6807, $6808, VersionRange($6809, $6810)), ($6811, $6812, $6813, $6814, $6815, $6816, $6817, $6818, $6819, $6820, $6821, $6822, $6823, $6824, $6825, $6826, $6827, $6828, $6829, $6830, $6831, $6832, $6833, $6834, $6835, $6836, $6837, $6838, VersionRange($6839, $6840)), ($6841, $6842, $6843, $6844, $6845, $6846, $6847, $6848, $6849, $6850, $6851, $6852, $6853, $6854, $6855, $6856, $6857, $6858, $6859, $6860, $6861, $6862, $6863, $6864, $6865, $6866, $6867, $6868, VersionRange($6869, $6870)), ($6871, $6872, $6873, $6874, $6875, $6876, $6877, $6878, $6879, $6880, $6881, $6882, $6883, $6884, $6885, $6886, $6887, $6888, $6889, $6890, $6891, $6892, $6893, $6894, $6895, $6896, $6897, $6898, VersionRange($6899, $6900)), ($6901, $6902, $6903, $6904, $6905, $6906, $6907, $6908, $6909, $6910, $6911, $6912, $6913, $6914, $6915, $6916, $6917, $6918, $6919, $6920, $6921, $6922, $6923, $6924, $6925, $6926, $6927, $6928, VersionRange($6929, $6930)), ($6931, $6932, $6933, $6934, $6935, $6936, $6937, $6938, $6939, $6940, $6941, $6942, $6943, $6944, $6945, $6946, $6947, $6948, $6949, $6950, $6951, $6952, $6953, $6954, $6955, $6956, $6957, $6958, VersionRange($6959, $6960)), ($6961, $6962, $6963, $6964, $6965, $6966, $6967, $6968, $6969, $6970, $6971, $6972, $6973, $6974, $6975, $6976, $6977, $6978, $6979, $6980, $6981, $6982, $6983, $6984, $6985, $6986, $6987, $6988, VersionRange($6989, $6990)), ($6991, $6992, $6993, $6994, $6995, $6996, $6997, $6998, $6999, $7000, $7001, $7002, $7003, $7004, $7005, $7006, $7007, $7008, $7009, $7010, $7011, $7012, $7013, $7014, $7015, $7016, $7017, $7018, VersionRange($7019, $7020)), ($7021, $7022, $7023, $7024, $7025, $7026, $7027, $7028, $7029, $7030, $7031, $7032, $7033, $7034, $7035, $7036, $7037, $7038, $7039, $7040, $7041, $7042, $7043, $7044, $7045, $7046, $7047, $7048, VersionRange($7049, $7050)), ($7051, $7052, $7053, $7054, $7055, $7056, $7057, $7058, $7059, $7060, $7061, $7062, $7063, $7064, $7065, $7066, $7067, $7068, $7069, $7070, $7071, $7072, $7073, $7074, $7075, $7076, $7077, $7078, VersionRange($7079, $7080)), ($7081, $7082, $7083, $7084, $7085, $7086, $7087, $7088, $7089, $7090, $7091, $7092, $7093, $7094, $7095, $7096, $7097, $7098, $7099, $7100, $7101, $7102, $7103, $7104, $7105, $7106, $7107, $7108, VersionRange($7109, $7110)), ($7111, $7112, $7113, $7114, $7115, $7116, $7117, $7118, $7119, $7120, $7121, $7122, $7123, $7124, $7125, $7126, $7127, $7128, $7129, $7130, $7131, $7132, $7133, $7134, $7135, $7136, $7137, $7138, VersionRange($7139, $7140)), ($7141, $7142, $7143, $7144, $7145, $7146, $7147, $7148, $7149, $7150, $7151, $7152, $7153, $7154, $7155, $7156, $7157, $7158, $7159, $7160, $7161, $7162, $7163, $7164, $7165, $7166, $7167, $7168, VersionRange($7169, $7170)), ($7171, $7172, $7173, $7174, $7175, $7176, $7177, $7178, $7179, $7180, $7181, $7182, $7183, $7184, $7185, $7186, $7187, $7188, $7189, $7190, $7191, $7192, $7193, $7194, $7195, $7196, $7197, $7198, VersionRange($7199, $7200)), ($7201, $7202, $7203, $7204, $7205, $7206, $7207, $7208, $7209, $7210, $7211, $7212, $7213, $7214, $7215, $7216, $7217, $7218, $7219, $7220, $7221, $7222, $7223, $7224, $7225, $7226, $7227, $7228, VersionRange($7229, $7230)), ($7231, $7232, $7233, $7234, $7235, $7236, $7237, $7238, $7239, $7240, $7241, $7242, $7243, $7244, $7245, $7246, $7247, $7248, $7249, $7250, $7251, $7252, $7253, $7254, $7255, $7256, $7257, $7258, VersionRange($7259, $7260)), ($7261, $7262, $7263, $7264, $7265, $7266, $7267, $7268, $7269, $7270, $7271, $7272, $7273, $7274, $7275, $7276, $7277, $7278, $7279, $7280, $7281, $7282, $7283, $7284, $7285, $7286, $7287, $7288, VersionRange($7289, $7290)), ($7291, $7292, $7293, $7294, $7295, $7296, $7297, $7298, $7299, $7300, $7301, $7302, $7303, $7304, $7305, $7306, $7307, $7308, $7309, $7310, $7311, $7312, $7313, $7314, $7315, $7316, $7317, $7318, VersionRange($7319, $7320)), ($7321, $7322, $7323, $7324, $7325, $7326, $7327, $7328, $7329, $7330, $7331, $7332, $7333, $7334, $7335, $7336, $7337, $7338, $7339, $7340, $7341, $7342, $7343, $7344, $7345, $7346, $7347, $7348, VersionRange($7349, $7350)), ($7351, $7352, $7353, $7354, $7355, $7356, $7357, $7358, $7359, $7360, $7361, $7362, $7363, $7364, $7365, $7366, $7367, $7368, $7369, $7370, $7371, $7372, $7373, $7374, $7375, $7376, $7377, $7378, VersionRange($7379, $7380)), ($7381, $7382, $7383, $7384, $7385, $7386, $7387, $7388, $7389, $7390, $7391, $7392, $7393, $7394, $7395, $7396, $7397, $7398, $7399, $7400, $7401, $7402, $7403, $7404, $7405, $7406, $7407, $7408, VersionRange($7409, $7410)), ($7411, $7412, $7413, $7414, $7415, $7416, $7417, $7418, $7419, $7420, $7421, $7422, $7423, $7424, $7425, $7426, $7427, $7428, $7429, $7430, $7431, $7432, $7433, $7434, $7435, $7436, $7437, $7438, VersionRange($7439, $7440)), ($7441, $7442, $7443, $7444, $7445, $7446, $7447, $7448, $7449, $7450, $7451, $7452, $7453, $7454, $7455, $7456, $7457, $7458, $7459, $7460, $7461, $7462, $7463, $7464, $7465, $7466, $7467, $7468, VersionRange($7469, $7470)), ($7471, $7472, $7473, $7474, $7475, $7476, $7477, $7478, $7479, $7480, $7481, $7482, $7483, $7484, $7485, $7486, $7487, $7488, $7489, $7490, $7491, $7492, $7493, $7494, $7495, $7496, $7497, $7498, VersionRange($7499, $7500)), ($7501, $7502, $7503, $7504, $7505, $7506, $7507, $7508, $7509, $7510, $7511, $7512, $7513, $7514, $7515, $7516, $7517, $7518, $7519, $7520, $7521, $7522, $7523, $7524, $7525, $7526, $7527, $7528, VersionRange($7529, $7530)), ($7531, $7532, $7533, $7534, $7535, $7536, $7537, $7538, $7539, $7540, $7541, $7542, $7543, $7544, $7545, $7546, $7547, $7548, $7549, $7550, $7551, $7552, $7553, $7554, $7555, $7556, $7557, $7558, VersionRange($7559, $7560)), ($7561, $7562, $7563, $7564, $7565, $7566, $7567, $7568, $7569, $7570, $7571, $7572, $7573, $7574, $7575, $7576, $7577, $7578, $7579, $7580, $7581, $7582, $7583, $7584, $7585, $7586, $7587, $7588, VersionRange($7589, $7590)), ($7591, $7592, $7593, $7594, $7595, $7596, $7597, $7598, $7599, $7600, $7601, $7602, $7603, $7604, $7605, $7606, $7607, $7608, $7609, $7610, $7611, $7612, $7613, $7614, $7615, $7616, $7617, $7618, VersionRange($7619, $7620)), ($7621, $7622, $7623, $7624, $7625, $7626, $7627, $7628, $7629, $7630, $7631, $7632, $7633, $7634, $7635, $7636, $7637, $7638, $7639, $7640, $7641, $7642, $7643, $7644, $7645, $7646, $7647, $7648, VersionRange($7649, $7650)), ($7651, $7652, $7653, $7654, $7655, $7656, $7657, $7658, $7659, $7660, $7661, $7662, $7663, $7664, $7665, $7666, $7667, $7668, $7669, $7670, $7671, $7672, $7673, $7674, $7675, $7676, $7677, $7678, VersionRange($7679, $7680)), ($7681, $7682, $7683, $7684, $7685, $7686, $7687, $7688, $7689, $7690, $7691, $7692, $7693, $7694, $7695, $7696, $7697, $7698, $7699, $7700, $7701, $7702, $7703, $7704, $7705, $7706, $7707, $7708, VersionRange($7709, $7710)), ($7711, $7712, $7713, $7714, $7715, $7716, $7717, $7718, $7719, $7720, $7721, $7722, $7723, $7724, $7725, $7726, $7727, $7728, $7729, $7730, $7731, $7732, $7733, $7734, $7735, $7736, $7737, $7738, VersionRange($7739, $7740)), ($7741, $7742, $7743, $7744, $7745, $7746, $7747, $7748, $7749, $7750, $7751, $7752, $7753, $7754, $7755, $7756, $7757, $7758, $7759, $7760, $7761, $7762, $7763, $7764, $7765, $7766, $7767, $7768, VersionRange($7769, $7770)), ($7771, $7772, $7773, $7774, $7775, $7776, $7777, $7778, $7779, $7780, $7781, $7782, $7783, $7784, $7785, $7786, $7787, $7788, $7789, $7790, $7791, $7792, $7793, $7794, $7795, $7796, $7797, $7798, VersionRange($7799, $7800)), ($7801, $7802, $7803, $7804, $7805, $7806, $7807, $7808, $7809, $7810, $7811, $7812, $7813, $7814, $7815, $7816, $7817, $7818, $7819, $7820, $7821, $7822, $7823, $7824, $7825, $7826, $7827, $7828, VersionRange($7829, $7830)), ($7831, $7832, $7833, $7834, $7835, $7836, $7837, $7838, $7839, $7840, $7841, $7842, $7843, $7844, $7845, $7846, $7847, $7848, $7849, $7850, $7851, $7852, $7853, $7854, $7855, $7856, $7857, $7858, VersionRange($7859, $7860)), ($7861, $7862, $7863, $7864, $7865, $7866, $7867, $7868, $7869, $7870, $7871, $7872, $7873, $7874, $7875, $7876, $7877, $7878, $7879, $7880, $7881, $7882, $7883, $7884, $7885, $7886, $7887, $7888, VersionRange($7889, $7890)), ($7891, $7892, $7893, $7894, $7895, $7896, $7897, $7898, $7899, $7900, $7901, $7902, $7903, $7904, $7905, $7906, $7907, $7908, $7909, $7910, $7911, $7912, $7913, $7914, $7915, $7916, $7917, $7918, VersionRange($7919, $7920)), ($7921, $7922, $7923, $7924, $7925, $7926, $7927, $7928, $7929, $7930, $7931, $7932, $7933, $7934, $7935, $7936, $7937, $7938, $7939, $7940, $7941, $7942, $7943, $7944, $7945, $7946, $7947, $7948, VersionRange($7949, $7950)), ($7951, $7952, $7953, $7954, $7955, $7956, $7957, $7958, $7959, $7960, $7961, $7962, $7963, $7964, $7965, $7966, $7967, $7968, $7969, $7970, $7971, $7972, $7973, $7974, $7975, $7976, $7977, $7978, VersionRange($7979, $7980)), ($7981, $7982, $7983, $7984, $7985, $7986, $7987, $7988, $7989, $7990, $7991, $7992, $7993, $7994, $7995, $7996, $7997, $7998, $7999, $8000, $8001, $8002, $8003, $8004, $8005, $8006, $8007, $8008, VersionRange($8009, $8010)), ($8011, $8012, $8013, $8014, $8015, $8016, $8017, $8018, $8019, $8020, $8021, $8022, $8023, $8024, $8025, $8026, $8027, $8028, $8029, $8030, $8031, $8032, $8033, $8034, $8035, $8036, $8037, $8038, VersionRange($8039, $8040)), ($8041, $8042, $8043, $8044, $8045, $8046, $8047, $8048, $8049, $8050, $8051, $8052, $8053, $8054, $8055, $8056, $8057, $8058, $8059, $8060, $8061, $8062, $8063, $8064, $8065, $8066, $8067, $8068, VersionRange($8069, $8070)), ($8071, $8072, $8073, $8074, $8075, $8076, $8077, $8078, $8079, $8080, $8081, $8082, $8083, $8084, $8085, $8086, $8087, $8088, $8089, $8090, $8091, $8092, $8093, $8094, $8095, $8096, $8097, $8098, VersionRange($8099, $8100)), ($8101, $8102, $8103, $8104, $8105, $8106, $8107, $8108, $8109, $8110, $8111, $8112, $8113, $8114, $8115, $8116, $8117, $8118, $8119, $8120, $8121, $8122, $8123, $8124, $8125, $8126, $8127, $8128, VersionRange($8129, $8130)), ($8131, $8132, $8133, $8134, $8135, $8136, $8137, $8138, $8139, $8140, $8141, $8142, $8143, $8144, $8145, $8146, $8147, $8148, $8149, $8150, $8151, $8152, $8153, $8154, $8155, $8156, $8157, $8158, VersionRange($8159, $8160)), ($8161, $8162, $8163, $8164, $8165, $8166, $8167, $8168, $8169, $8170, $8171, $8172, $8173, $8174, $8175, $8176, $8177, $8178, $8179, $8180, $8181, $8182, $8183, $8184, $8185, $8186, $8187, $8188, VersionRange($8189, $8190)), ($8191, $8192, $8193, $8194, $8195, $8196, $8197, $8198, $8199, $8200, $8201, $8202, $8203, $8204, $8205, $8206, $8207, $8208, $8209, $8210, $8211, $8212, $8213, $8214, $8215, $8216, $8217, $8218, VersionRange($8219, $8220)), ($8221, $8222, $8223, $8224, $8225, $8226, $8227, $8228, $8229, $8230, $8231, $8232, $8233, $8234, $8235, $8236, $8237, $8238, $8239, $8240, $8241, $8242, $8243, $8244, $8245, $8246, $8247, $8248, VersionRange($8249, $8250)), ($8251, $8252, $8253, $8254, $8255, $8256, $8257, $8258, $8259, $8260, $8261, $8262, $8263, $8264, $8265, $8266, $8267, $8268, $8269, $8270, $8271, $8272, $8273, $8274, $8275, $8276, $8277, $8278, VersionRange($8279, $8280)), ($8281, $8282, $8283, $8284, $8285, $8286, $8287, $8288, $8289, $8290, $8291, $8292, $8293, $8294, $8295, $8296, $8297, $8298, $8299, $8300, $8301, $8302, $8303, $8304, $8305, $8306, $8307, $8308, VersionRange($8309, $8310)), ($8311, $8312, $8313, $8314, $8315, $8316, $8317, $8318, $8319, $8320, $8321, $8322, $8323, $8324, $8325, $8326, $8327, $8328, $8329, $8330, $8331, $8332, $8333, $8334, $8335, $8336, $8337, $8338, VersionRange($8339, $8340)), ($8341, $8342, $8343, $8344, $8345, $8346, $8347, $8348, $8349, $8350, $8351, $8352, $8353, $8354, $8355, $8356, $8357, $8358, $8359, $8360, $8361, $8362, $8363, $8364, $8365, $8366, $8367, $8368, VersionRange($8369, $8370)), ($8371, $8372, $8373, $8374, $8375, $8376, $8377, $8378, $8379, $8380, $8381, $8382, $8383, $8384, $8385, $8386, $8387, $8388, $8389, $8390, $8391, $8392, $8393, $8394, $8395, $8396, $8397, $8398, VersionRange($8399, $8400)), ($8401, $8402, $8403, $8404, $8405, $8406, $8407, $8408, $8409, $8410, $8411, $8412, $8413, $8414, $8415, $8416, $8417, $8418, $8419, $8420, $8421, $8422, $8423, $8424, $8425, $8426, $8427, $8428, VersionRange($8429, $8430)), ($8431, $8432, $8433, $8434, $8435, $8436, $8437, $8438, $8439, $8440, $8441, $8442, $8443, $8444, $8445, $8446, $8447, $8448, $8449, $8450, $8451, $8452, $8453, $8454, $8455, $8456, $8457, $8458, VersionRange($8459, $8460)), ($8461, $8462, $8463, $8464, $8465, $8466, $8467, $8468, $8469, $8470, $8471, $8472, $8473, $8474, $8475, $8476, $8477, $8478, $8479, $8480, $8481, $8482, $8483, $8484, $8485, $8486, $8487, $8488, VersionRange($8489, $8490)), ($8491, $8492, $8493, $8494, $8495, $8496, $8497, $8498, $8499, $8500, $8501, $8502, $8503, $8504, $8505, $8506, $8507, $8508, $8509, $8510, $8511, $8512, $8513, $8514, $8515, $8516, $8517, $8518, VersionRange($8519, $8520)), ($8521, $8522, $8523, $8524, $8525, $8526, $8527, $8528, $8529, $8530, $8531, $8532, $8533, $8534, $8535, $8536, $8537, $8538, $8539, $8540, $8541, $8542, $8543, $8544, $8545, $8546, $8547, $8548, VersionRange($8549, $8550)), ($8551, $8552, $8553, $8554, $8555, $8556, $8557, $8558, $8559, $8560, $8561, $8562, $8563, $8564, $8565, $8566, $8567, $8568, $8569, $8570, $8571, $8572, $8573, $8574, $8575, $8576, $8577, $8578, VersionRange($8579, $8580)), ($8581, $8582, $8583, $8584, $8585, $8586, $8587, $8588, $8589, $8590, $8591, $8592, $8593, $8594, $8595, $8596, $8597, $8598, $8599, $8600, $8601, $8602, $8603, $8604, $8605, $8606, $8607, $8608, VersionRange($8609, $8610)), ($8611, $8612, $8613, $8614, $8615, $8616, $8617, $8618, $8619, $8620, $8621, $8622, $8623, $8624, $8625, $8626, $8627, $8628, $8629, $8630, $8631, $8632, $8633, $8634, $8635, $8636, $8637, $8638, VersionRange($8639, $8640)), ($8641, $8642, $8643, $8644, $8645, $8646, $8647, $8648, $8649, $8650, $8651, $8652, $8653, $8654, $8655, $8656, $8657, $8658, $8659, $8660, $8661, $8662, $8663, $8664, $8665, $8666, $8667, $8668, VersionRange($8669, $8670)), ($8671, $8672, $8673, $8674, $8675, $8676, $8677, $8678, $8679, $8680, $8681, $8682, $8683, $8684, $8685, $8686, $8687, $8688, $8689, $8690, $8691, $8692, $8693, $8694, $8695, $8696, $8697, $8698, VersionRange($8699, $8700)), ($8701, $8702, $8703, $8704, $8705, $8706, $8707, $8708, $8709, $8710, $8711, $8712, $8713, $8714, $8715, $8716, $8717, $8718, $8719, $8720, $8721, $8722, $8723, $8724, $8725, $8726, $8727, $8728, VersionRange($8729, $8730)), ($8731, $8732, $8733, $8734, $8735, $8736, $8737, $8738, $8739, $8740, $8741, $8742, $8743, $8744, $8745, $8746, $8747, $8748, $8749, $8750, $8751, $8752, $8753, $8754, $8755, $8756, $8757, $8758, VersionRange($8759, $8760)), ($8761, $8762, $8763, $8764, $8765, $8766, $8767, $8768, $8769, $8770, $8771, $8772, $8773, $8774, $8775, $8776, $8777, $8778, $8779, $8780, $8781, $8782, $8783, $8784, $8785, $8786, $8787, $8788, VersionRange($8789, $8790)), ($8791, $8792, $8793, $8794, $8795, $8796, $8797, $8798, $8799, $8800, $8801, $8802, $8803, $8804, $8805, $8806, $8807, $8808, $8809, $8810, $8811, $8812, $8813, $8814, $8815, $8816, $8817, $8818, VersionRange($8819, $8820)), ($8821, $8822, $8823, $8824, $8825, $8826, $8827, $8828, $8829, $8830, $8831, $8832, $8833, $8834, $8835, $8836, $8837, $8838, $8839, $8840, $8841, $8842, $8843, $8844, $8845, $8846, $8847, $8848, VersionRange($8849, $8850)), ($8851, $8852, $8853, $8854, $8855, $8856, $8857, $8858, $8859, $8860, $8861, $8862, $8863, $8864, $8865, $8866, $8867, $8868, $8869, $8870, $8871, $8872, $8873, $8874, $8875, $8876, $8877, $8878, VersionRange($8879, $8880)), ($8881, $8882, $8883, $8884, $8885, $8886, $8887, $8888, $8889, $8890, $8891, $8892, $8893, $8894, $8895, $8896, $8897, $8898, $8899, $8900, $8901, $8902, $8903, $8904, $8905, $8906, $8907, $8908, VersionRange($8909, $8910)), ($8911, $8912, $8913, $8914, $8915, $8916, $8917, $8918, $8919, $8920, $8921, $8922, $8923, $8924, $8925, $8926, $8927, $8928, $8929, $8930, $8931, $8932, $8933, $8934, $8935, $8936, $8937, $8938, VersionRange($8939, $8940)), ($8941, $8942, $8943, $8944, $8945, $8946, $8947, $8948, $8949, $8950, $8951, $8952, $8953, $8954, $8955, $8956, $8957, $8958, $8959, $8960, $8961, $8962, $8963, $8964, $8965, $8966, $8967, $8968, VersionRange($8969, $8970)), ($8971, $8972, $8973, $8974, $8975, $8976, $8977, $8978, $8979, $8980, $8981, $8982, $8983, $8984, $8985, $8986, $8987, $8988, $8989, $8990, $8991, $8992, $8993, $8994, $8995, $8996, $8997, $8998, VersionRange($8999, $9000)), ($9001, $9002, $9003, $9004, $9005, $9006, $9007, $9008, $9009, $9010, $9011, $9012, $9013, $9014, $9015, $9016, $9017, $9018, $9019, $9020, $9021, $9022, $9023, $9024, $9025, $9026, $9027, $9028, VersionRange($9029, $9030)), ($9031, $9032, $9033, $9034, $9035, $9036, $9037, $9038, $9039, $9040, $9041, $9042, $9043, $9044, $9045, $9046, $9047, $9048, $9049, $9050, $9051, $9052, $9053, $9054, $9055, $9056, $9057, $9058, VersionRange($9059, $9060)), ($9061, $9062, $9063, $9064, $9065, $9066, $9067, $9068, $9069, $9070, $9071, $9072, $9073, $9074, $9075, $9076, $9077, $9078, $9079, $9080, $9081, $9082, $9083, $9084, $9085, $9086, $9087, $9088, VersionRange($9089, $9090)), ($9091, $9092, $9093, $9094, $9095, $9096, $9097, $9098, $9099, $9100, $9101, $9102, $9103, $9104, $9105, $9106, $9107, $9108, $9109, $9110, $9111, $9112, $9113, $9114, $9115, $9116, $9117, $9118, VersionRange($9119, $9120)), ($9121, $9122, $9123, $9124, $9125, $9126, $9127, $9128, $9129, $9130, $9131, $9132, $9133, $9134, $9135, $9136, $9137, $9138, $9139, $9140, $9141, $9142, $9143, $9144, $9145, $9146, $9147, $9148, VersionRange($9149, $9150)), ($9151, $9152, $9153, $9154, $9155, $9156, $9157, $9158, $9159, $9160, $9161, $9162, $9163, $9164, $9165, $9166, $9167, $9168, $9169, $9170, $9171, $9172, $9173, $9174, $9175, $9176, $9177, $9178, VersionRange($9179, $9180)), ($9181, $9182, $9183, $9184, $9185, $9186, $9187, $9188, $9189, $9190, $9191, $9192, $9193, $9194, $9195, $9196, $9197, $9198, $9199, $9200, $9201, $9202, $9203, $9204, $9205, $9206, $9207, $9208, VersionRange($9209, $9210)), ($9211, $9212, $9213, $9214, $9215, $9216, $9217, $9218, $9219, $9220, $9221, $9222, $9223, $9224, $9225, $9226, $9227, $9228, $9229, $9230, $9231, $9232, $9233, $9234, $9235, $9236, $9237, $9238, VersionRange($9239, $9240)), ($9241, $9242, $9243, $9244, $9245, $9246, $9247, $9248, $9249, $9250, $9251, $9252, $9253, $9254, $9255, $9256, $9257, $9258, $9259, $9260, $9261, $9262, $9263, $9264, $9265, $9266, $9267, $9268, VersionRange($9269, $9270)), ($9271, $9272, $9273, $9274, $9275, $9276, $9277, $9278, $9279, $9280, $9281, $9282, $9283, $9284, $9285, $9286, $9287, $9288, $9289, $9290, $9291, $9292, $9293, $9294, $9295, $9296, $9297, $9298, VersionRange($9299, $9300)), ($9301, $9302, $9303, $9304, $9305, $9306, $9307, $9308, $9309, $9310, $9311, $9312, $9313, $9314, $9315, $9316, $9317, $9318, $9319, $9320, $9321, $9322, $9323, $9324, $9325, $9326, $9327, $9328, VersionRange($9329, $9330)), ($9331, $9332, $9333, $9334, $9335, $9336, $9337, $9338, $9339, $9340, $9341, $9342, $9343, $9344, $9345, $9346, $9347, $9348, $9349, $9350, $9351, $9352, $9353, $9354, $9355, $9356, $9357, $9358, VersionRange($9359, $9360)), ($9361, $9362, $9363, $9364, $9365, $9366, $9367, $9368, $9369, $9370, $9371, $9372, $9373, $9374, $9375, $9376, $9377, $9378, $9379, $9380, $9381, $9382, $9383, $9384, $9385, $9386, $9387, $9388, VersionRange($9389, $9390)), ($9391, $9392, $9393, $9394, $9395, $9396, $9397, $9398, $9399, $9400, $9401, $9402, $9403, $9404, $9405, $9406, $9407, $9408, $9409, $9410, $9411, $9412, $9413, $9414, $9415, $9416, $9417, $9418, VersionRange($9419, $9420)), ($9421, $9422, $9423, $9424, $9425, $9426, $9427, $9428, $9429, $9430, $9431, $9432, $9433, $9434, $9435, $9436, $9437, $9438, $9439, $9440, $9441, $9442, $9443, $9444, $9445, $9446, $9447, $9448, VersionRange($9449, $9450)), ($9451, $9452, $9453, $9454, $9455, $9456, $9457, $9458, $9459, $9460, $9461, $9462, $9463, $9464, $9465, $9466, $9467, $9468, $9469, $9470, $9471, $9472, $9473, $9474, $9475, $9476, $9477, $9478, VersionRange($9479, $9480)), ($9481, $9482, $9483, $9484, $9485, $9486, $9487, $9488, $9489, $9490, $9491, $9492, $9493, $9494, $9495, $9496, $9497, $9498, $9499, $9500, $9501, $9502, $9503, $9504, $9505, $9506, $9507, $9508, VersionRange($9509, $9510)), ($9511, $9512, $9513, $9514, $9515, $9516, $9517, $9518, $9519, $9520, $9521, $9522, $9523, $9524, $9525, $9526, $9527, $9528, $9529, $9530, $9531, $9532, $9533, $9534, $9535, $9536, $9537, $9538, VersionRange($9539, $9540)), ($9541, $9542, $9543, $9544, $9545, $9546, $9547, $9548, $9549, $9550, $9551, $9552, $9553, $9554, $9555, $9556, $9557, $9558, $9559, $9560, $9561, $9562, $9563, $9564, $9565, $9566, $9567, $9568, VersionRange($9569, $9570)), ($9571, $9572, $9573, $9574, $9575, $9576, $9577, $9578, $9579, $9580, $9581, $9582, $9583, $9584, $9585, $9586, $9587, $9588, $9589, $9590, $9591, $9592, $9593, $9594, $9595, $9596, $9597, $9598, VersionRange($9599, $9600)), ($9601, $9602, $9603, $9604, $9605, $9606, $9607, $9608, $9609, $9610, $9611, $9612, $9613, $9614, $9615, $9616, $9617, $9618, $9619, $9620, $9621, $9622, $9623, $9624, $9625, $9626, $9627, $9628, VersionRange($9629, $9630)), ($9631, $9632, $9633, $9634, $9635, $9636, $9637, $9638, $9639, $9640, $9641, $9642, $9643, $9644, $9645, $9646, $9647, $9648, $9649, $9650, $9651, $9652, $9653, $9654, $9655, $9656, $9657, $9658, VersionRange($9659, $9660)), ($9661, $9662, $9663, $9664, $9665, $9666, $9667, $9668, $9669, $9670, $9671, $9672, $9673, $9674, $9675, $9676, $9677, $9678, $9679, $9680, $9681, $9682, $9683, $9684, $9685, $9686, $9687, $9688, VersionRange($9689, $9690)), ($9691, $9692, $9693, $9694, $9695, $9696, $9697, $9698, $9699, $9700, $9701, $9702, $9703, $9704, $9705, $9706, $9707, $9708, $9709, $9710, $9711, $9712, $9713, $9714, $9715, $9716, $9717, $9718, VersionRange($9719, $9720)), ($9721, $9722, $9723, $9724, $9725, $9726, $9727, $9728, $9729, $9730, $9731, $9732, $9733, $9734, $9735, $9736, $9737, $9738, $9739, $9740, $9741, $9742, $9743, $9744, $9745, $9746, $9747, $9748, VersionRange($9749, $9750)), ($9751, $9752, $9753, $9754, $9755, $9756, $9757, $9758, $9759, $9760, $9761, $9762, $9763, $9764, $9765, $9766, $9767, $9768, $9769, $9770, $9771, $9772, $9773, $9774, $9775, $9776, $9777, $9778, VersionRange($9779, $9780)), ($9781, $9782, $9783, $9784, $9785, $9786, $9787, $9788, $9789, $9790, $9791, $9792, $9793, $9794, $9795, $9796, $9797, $9798, $9799, $9800, $9801, $9802, $9803, $9804, $9805, $9806, $9807, $9808, VersionRange($9809, $9810)), ($9811, $9812, $9813, $9814, $9815, $9816, $9817, $9818, $9819, $9820, $9821, $9822, $9823, $9824, $9825, $9826, $9827, $9828, $9829, $9830, $9831, $9832, $9833, $9834, $9835, $9836, $9837, $9838, VersionRange($9839, $9840)), ($9841, $9842, $9843, $9844, $9845, $9846, $9847, $9848, $9849, $9850, $9851, $9852, $9853, $9854, $9855, $9856, $9857, $9858, $9859, $9860, $9861, $9862, $9863, $9864, $9865, $9866, $9867, $9868, VersionRange($9869, $9870)), ($9871, $9872, $9873, $9874, $9875, $9876, $9877, $9878, $9879, $9880, $9881, $9882, $9883, $9884, $9885, $9886, $9887, $9888, $9889, $9890, $9891, $9892, $9893, $9894, $9895, $9896, $9897, $9898, VersionRange($9899, $9900)), ($9901, $9902, $9903, $9904, $9905, $9906, $9907, $9908, $9909, $9910, $9911, $9912, $9913, $9914, $9915, $9916, $9917, $9918, $9919, $9920, $9921, $9922, $9923, $9924, $9925, $9926, $9927, $9928, VersionRange($9929, $9930)), ($9931, $9932, $9933, $9934, $9935, $9936, $9937, $9938, $9939, $9940, $9941, $9942, $9943, $9944, $9945, $9946, $9947, $9948, $9949, $9950, $9951, $9952, $9953, $9954, $9955, $9956, $9957, $9958, VersionRange($9959, $9960)), ($9961, $9962, $9963, $9964, $9965, $9966, $9967, $9968, $9969, $9970, $9971, $9972, $9973, $9974, $9975, $9976, $9977, $9978, $9979, $9980, $9981, $9982, $9983, $9984, $9985, $9986, $9987, $9988, VersionRange($9989, $9990)), ($9991, $9992, $9993, $9994, $9995, $9996, $9997, $9998, $9999, $10000, $10001, $10002, $10003, $10004, $10005, $10006, $10007, $10008, $10009, $10010, $10011, $10012, $10013, $10014, $10015, $10016, $10017, $10018, VersionRange($10019, $10020)), ($10021, $10022, $10023, $10024, $10025, $10026, $10027, $10028, $10029, $10030, $10031, $10032, $10033, $10034, $10035, $10036, $10037, $10038, $10039, $10040, $10041, $10042, $10043, $10044, $10045, $10046, $10047, $10048, VersionRange($10049, $10050)), ($10051, $10052, $10053, $10054, $10055, $10056, $10057, $10058, $10059, $10060, $10061, $10062, $10063, $10064, $10065, $10066, $10067, $10068, $10069, $10070, $10071, $10072, $10073, $10074, $10075, $10076, $10077, $10078, VersionRange($10079, $10080)), ($10081, $10082, $10083, $10084, $10085, $10086, $10087, $10088, $10089, $10090, $10091, $10092, $10093, $10094, $10095, $10096, $10097, $10098, $10099, $10100, $10101, $10102, $10103, $10104, $10105, $10106, $10107, $10108, VersionRange($10109, $10110)), ($10111, $10112, $10113, $10114, $10115, $10116, $10117, $10118, $10119, $10120, $10121, $10122, $10123, $10124, $10125, $10126, $10127, $10128, $10129, $10130, $10131, $10132, $10133, $10134, $10135, $10136, $10137, $10138, VersionRange($10139, $10140)), ($10141, $10142, $10143, $10144, $10145, $10146, $10147, $10148, $10149, $10150, $10151, $10152, $10153, $10154, $10155, $10156, $10157, $10158, $10159, $10160, $10161, $10162, $10163, $10164, $10165, $10166, $10167, $10168, VersionRange($10169, $10170)), ($10171, $10172, $10173, $10174, $10175, $10176, $10177, $10178, $10179, $10180, $10181, $10182, $10183, $10184, $10185, $10186, $10187, $10188, $10189, $10190, $10191, $10192, $10193, $10194, $10195, $10196, $10197, $10198, VersionRange($10199, $10200)), ($10201, $10202, $10203, $10204, $10205, $10206, $10207, $10208, $10209, $10210, $10211, $10212, $10213, $10214, $10215, $10216, $10217, $10218, $10219, $10220, $10221, $10222, $10223, $10224, $10225, $10226, $10227, $10228, VersionRange($10229, $10230)), ($10231, $10232, $10233, $10234, $10235, $10236, $10237, $10238, $10239, $10240, $10241, $10242, $10243, $10244, $10245, $10246, $10247, $10248, $10249, $10250, $10251, $10252, $10253, $10254, $10255, $10256, $10257, $10258, VersionRange($10259, $10260)), ($10261, $10262, $10263, $10264, $10265, $10266, $10267, $10268, $10269, $10270, $10271, $10272, $10273, $10274, $10275, $10276, $10277, $10278, $10279, $10280, $10281, $10282, $10283, $10284, $10285, $10286, $10287, $10288, VersionRange($10289, $10290)), ($10291, $10292, $10293, $10294, $10295, $10296, $10297, $10298, $10299, $10300, $10301, $10302, $10303, $10304, $10305, $10306, $10307, $10308, $10309, $10310, $10311, $10312, $10313, $10314, $10315, $10316, $10317, $10318, VersionRange($10319, $10320)), ($10321, $10322, $10323, $10324, $10325, $10326, $10327, $10328, $10329, $10330, $10331, $10332, $10333, $10334, $10335, $10336, $10337, $10338, $10339, $10340, $10341, $10342, $10343, $10344, $10345, $10346, $10347, $10348, VersionRange($10349, $10350)), ($10351, $10352, $10353, $10354, $10355, $10356, $10357, $10358, $10359, $10360, $10361, $10362, $10363, $10364, $10365, $10366, $10367, $10368, $10369, $10370, $10371, $10372, $10373, $10374, $10375, $10376, $10377, $10378, VersionRange($10379, $10380)), ($10381, $10382, $10383, $10384, $10385, $10386, $10387, $10388, $10389, $10390, $10391, $10392, $10393, $10394, $10395, $10396, $10397, $10398, $10399, $10400, $10401, $10402, $10403, $10404, $10405, $10406, $10407, $10408, VersionRange($10409, $10410)), ($10411, $10412, $10413, $10414, $10415, $10416, $10417, $10418, $10419, $10420, $10421, $10422, $10423, $10424, $10425, $10426, $10427, $10428, $10429, $10430, $10431, $10432, $10433, $10434, $10435, $10436, $10437, $10438, VersionRange($10439, $10440)), ($10441, $10442, $10443, $10444, $10445, $10446, $10447, $10448, $10449, $10450, $10451, $10452, $10453, $10454, $10455, $10456, $10457, $10458, $10459, $10460, $10461, $10462, $10463, $10464, $10465, $10466, $10467, $10468, VersionRange($10469, $10470)), ($10471, $10472, $10473, $10474, $10475, $10476, $10477, $10478, $10479, $10480, $10481, $10482, $10483, $10484, $10485, $10486, $10487, $10488, $10489, $10490, $10491, $10492, $10493, $10494, $10495, $10496, $10497, $10498, VersionRange($10499, $10500)), ($10501, $10502, $10503, $10504, $10505, $10506, $10507, $10508, $10509, $10510, $10511, $10512, $10513, $10514, $10515, $10516, $10517, $10518, $10519, $10520, $10521, $10522, $10523, $10524, $10525, $10526, $10527, $10528, VersionRange($10529, $10530)), ($10531, $10532, $10533, $10534, $10535, $10536, $10537, $10538, $10539, $10540, $10541, $10542, $10543, $10544, $10545, $10546, $10547, $10548, $10549, $10550, $10551, $10552, $10553, $10554, $10555, $10556, $10557, $10558, VersionRange($10559, $10560)), ($10561, $10562, $10563, $10564, $10565, $10566, $10567, $10568, $10569, $10570, $10571, $10572, $10573, $10574, $10575, $10576, $10577, $10578, $10579, $10580, $10581, $10582, $10583, $10584, $10585, $10586, $10587, $10588, VersionRange($10589, $10590)), ($10591, $10592, $10593, $10594, $10595, $10596, $10597, $10598, $10599, $10600, $10601, $10602, $10603, $10604, $10605, $10606, $10607, $10608, $10609, $10610, $10611, $10612, $10613, $10614, $10615, $10616, $10617, $10618, VersionRange($10619, $10620)), ($10621, $10622, $10623, $10624, $10625, $10626, $10627, $10628, $10629, $10630, $10631, $10632, $10633, $10634, $10635, $10636, $10637, $10638, $10639, $10640, $10641, $10642, $10643, $10644, $10645, $10646, $10647, $10648, VersionRange($10649, $10650)), ($10651, $10652, $10653, $10654, $10655, $10656, $10657, $10658, $10659, $10660, $10661, $10662, $10663, $10664, $10665, $10666, $10667, $10668, $10669, $10670, $10671, $10672, $10673, $10674, $10675, $10676, $10677, $10678, VersionRange($10679, $10680)), ($10681, $10682, $10683, $10684, $10685, $10686, $10687, $10688, $10689, $10690, $10691, $10692, $10693, $10694, $10695, $10696, $10697, $10698, $10699, $10700, $10701, $10702, $10703, $10704, $10705, $10706, $10707, $10708, VersionRange($10709, $10710)), ($10711, $10712, $10713, $10714, $10715, $10716, $10717, $10718, $10719, $10720, $10721, $10722, $10723, $10724, $10725, $10726, $10727, $10728, $10729, $10730, $10731, $10732, $10733, $10734, $10735, $10736, $10737, $10738, VersionRange($10739, $10740)), ($10741, $10742, $10743, $10744, $10745, $10746, $10747, $10748, $10749, $10750, $10751, $10752, $10753, $10754, $10755, $10756, $10757, $10758, $10759, $10760, $10761, $10762, $10763, $10764, $10765, $10766, $10767, $10768, VersionRange($10769, $10770)), ($10771, $10772, $10773, $10774, $10775, $10776, $10777, $10778, $10779, $10780, $10781, $10782, $10783, $10784, $10785, $10786, $10787, $10788, $10789, $10790, $10791, $10792, $10793, $10794, $10795, $10796, $10797, $10798, VersionRange($10799, $10800)), ($10801, $10802, $10803, $10804, $10805, $10806, $10807, $10808, $10809, $10810, $10811, $10812, $10813, $10814, $10815, $10816, $10817, $10818, $10819, $10820, $10821, $10822, $10823, $10824, $10825, $10826, $10827, $10828, VersionRange($10829, $10830)), ($10831, $10832, $10833, $10834, $10835, $10836, $10837, $10838, $10839, $10840, $10841, $10842, $10843, $10844, $10845, $10846, $10847, $10848, $10849, $10850, $10851, $10852, $10853, $10854, $10855, $10856, $10857, $10858, VersionRange($10859, $10860)), ($10861, $10862, $10863, $10864, $10865, $10866, $10867, $10868, $10869, $10870, $10871, $10872, $10873, $10874, $10875, $10876, $10877, $10878, $10879, $10880, $10881, $10882, $10883, $10884, $10885, $10886, $10887, $10888, VersionRange($10889, $10890)), ($10891, $10892, $10893, $10894, $10895, $10896, $10897, $10898, $10899, $10900, $10901, $10902, $10903, $10904, $10905, $10906, $10907, $10908, $10909, $10910, $10911, $10912, $10913, $10914, $10915, $10916, $10917, $10918, VersionRange($10919, $10920)), ($10921, $10922, $10923, $10924, $10925, $10926, $10927, $10928, $10929, $10930, $10931, $10932, $10933, $10934, $10935, $10936, $10937, $10938, $10939, $10940, $10941, $10942, $10943, $10944, $10945, $10946, $10947, $10948, VersionRange($10949, $10950)), ($10951, $10952, $10953, $10954, $10955, $10956, $10957, $10958, $10959, $10960, $10961, $10962, $10963, $10964, $10965, $10966, $10967, $10968, $10969, $10970, $10971, $10972, $10973, $10974, $10975, $10976, $10977, $10978, VersionRange($10979, $10980)), ($10981, $10982, $10983, $10984, $10985, $10986, $10987, $10988, $10989, $10990, $10991, $10992, $10993, $10994, $10995, $10996, $10997, $10998, $10999, $11000, $11001, $11002, $11003, $11004, $11005, $11006, $11007, $11008, VersionRange($11009, $11010)), ($11011, $11012, $11013, $11014, $11015, $11016, $11017, $11018, $11019, $11020, $11021, $11022, $11023, $11024, $11025, $11026, $11027, $11028, $11029, $11030, $11031, $11032, $11033, $11034, $11035, $11036, $11037, $11038, VersionRange($11039, $11040)), ($11041, $11042, $11043, $11044, $11045, $11046, $11047, $11048, $11049, $11050, $11051, $11052, $11053, $11054, $11055, $11056, $11057, $11058, $11059, $11060, $11061, $11062, $11063, $11064, $11065, $11066, $11067, $11068, VersionRange($11069, $11070)), ($11071, $11072, $11073, $11074, $11075, $11076, $11077, $11078, $11079, $11080, $11081, $11082, $11083, $11084, $11085, $11086, $11087, $11088, $11089, $11090, $11091, $11092, $11093, $11094, $11095, $11096, $11097, $11098, VersionRange($11099, $11100)), ($11101, $11102, $11103, $11104, $11105, $11106, $11107, $11108, $11109, $11110, $11111, $11112, $11113, $11114, $11115, $11116, $11117, $11118, $11119, $11120, $11121, $11122, $11123, $11124, $11125, $11126, $11127, $11128, VersionRange($11129, $11130)), ($11131, $11132, $11133, $11134, $11135, $11136, $11137, $11138, $11139, $11140, $11141, $11142, $11143, $11144, $11145, $11146, $11147, $11148, $11149, $11150, $11151, $11152, $11153, $11154, $11155, $11156, $11157, $11158, VersionRange($11159, $11160)), ($11161, $11162, $11163, $11164, $11165, $11166, $11167, $11168, $11169, $11170, $11171, $11172, $11173, $11174, $11175, $11176, $11177, $11178, $11179, $11180, $11181, $11182, $11183, $11184, $11185, $11186, $11187, $11188, VersionRange($11189, $11190)), ($11191, $11192, $11193, $11194, $11195, $11196, $11197, $11198, $11199, $11200, $11201, $11202, $11203, $11204, $11205, $11206, $11207, $11208, $11209, $11210, $11211, $11212, $11213, $11214, $11215, $11216, $11217, $11218, VersionRange($11219, $11220)), ($11221, $11222, $11223, $11224, $11225, $11226, $11227, $11228, $11229, $11230, $11231, $11232, $11233, $11234, $11235, $11236, $11237, $11238, $11239, $11240, $11241, $11242, $11243, $11244, $11245, $11246, $11247, $11248, VersionRange($11249, $11250)), ($11251, $11252, $11253, $11254, $11255, $11256, $11257, $11258, $11259, $11260, $11261, $11262, $11263, $11264, $11265, $11266, $11267, $11268, $11269, $11270, $11271, $11272, $11273, $11274, $11275, $11276, $11277, $11278, VersionRange($11279, $11280)), ($11281, $11282, $11283, $11284, $11285, $11286, $11287, $11288, $11289, $11290, $11291, $11292, $11293, $11294, $11295, $11296, $11297, $11298, $11299, $11300, $11301, $11302, $11303, $11304, $11305, $11306, $11307, $11308, VersionRange($11309, $11310)), ($11311, $11312, $11313, $11314, $11315, $11316, $11317, $11318, $11319, $11320, $11321, $11322, $11323, $11324, $11325, $11326, $11327, $11328, $11329, $11330, $11331, $11332, $11333, $11334, $11335, $11336, $11337, $11338, VersionRange($11339, $11340)), ($11341, $11342, $11343, $11344, $11345, $11346, $11347, $11348, $11349, $11350, $11351, $11352, $11353, $11354, $11355, $11356, $11357, $11358, $11359, $11360, $11361, $11362, $11363, $11364, $11365, $11366, $11367, $11368, VersionRange($11369, $11370)), ($11371, $11372, $11373, $11374, $11375, $11376, $11377, $11378, $11379, $11380, $11381, $11382, $11383, $11384, $11385, $11386, $11387, $11388, $11389, $11390, $11391, $11392, $11393, $11394, $11395, $11396, $11397, $11398, VersionRange($11399, $11400)), ($11401, $11402, $11403, $11404, $11405, $11406, $11407, $11408, $11409, $11410, $11411, $11412, $11413, $11414, $11415, $11416, $11417, $11418, $11419, $11420, $11421, $11422, $11423, $11424, $11425, $11426, $11427, $11428, VersionRange($11429, $11430)), ($11431, $11432, $11433, $11434, $11435, $11436, $11437, $11438, $11439, $11440, $11441, $11442, $11443, $11444, $11445, $11446, $11447, $11448, $11449, $11450, $11451, $11452, $11453, $11454, $11455, $11456, $11457, $11458, VersionRange($11459, $11460)), ($11461, $11462, $11463, $11464, $11465, $11466, $11467, $11468, $11469, $11470, $11471, $11472, $11473, $11474, $11475, $11476, $11477, $11478, $11479, $11480, $11481, $11482, $11483, $11484, $11485, $11486, $11487, $11488, VersionRange($11489, $11490)), ($11491, $11492, $11493, $11494, $11495, $11496, $11497, $11498, $11499, $11500, $11501, $11502, $11503, $11504, $11505, $11506, $11507, $11508, $11509, $11510, $11511, $11512, $11513, $11514, $11515, $11516, $11517, $11518, VersionRange($11519, $11520)), ($11521, $11522, $11523, $11524, $11525, $11526, $11527, $11528, $11529, $11530, $11531, $11532, $11533, $11534, $11535, $11536, $11537, $11538, $11539, $11540, $11541, $11542, $11543, $11544, $11545, $11546, $11547, $11548, VersionRange($11549, $11550)), ($11551, $11552, $11553, $11554, $11555, $11556, $11557, $11558, $11559, $11560, $11561, $11562, $11563, $11564, $11565, $11566, $11567, $11568, $11569, $11570, $11571, $11572, $11573, $11574, $11575, $11576, $11577, $11578, VersionRange($11579, $11580)), ($11581, $11582, $11583, $11584, $11585, $11586, $11587, $11588, $11589, $11590, $11591, $11592, $11593, $11594, $11595, $11596, $11597, $11598, $11599, $11600, $11601, $11602, $11603, $11604, $11605, $11606, $11607, $11608, VersionRange($11609, $11610)), ($11611, $11612, $11613, $11614, $11615, $11616, $11617, $11618, $11619, $11620, $11621, $11622, $11623, $11624, $11625, $11626, $11627, $11628, $11629, $11630, $11631, $11632, $11633, $11634, $11635, $11636, $11637, $11638, VersionRange($11639, $11640)), ($11641, $11642, $11643, $11644, $11645, $11646, $11647, $11648, $11649, $11650, $11651, $11652, $11653, $11654, $11655, $11656, $11657, $11658, $11659, $11660, $11661, $11662, $11663, $11664, $11665, $11666, $11667, $11668, VersionRange($11669, $11670)), ($11671, $11672, $11673, $11674, $11675, $11676, $11677, $11678, $11679, $11680, $11681, $11682, $11683, $11684, $11685, $11686, $11687, $11688, $11689, $11690, $11691, $11692, $11693, $11694, $11695, $11696, $11697, $11698, VersionRange($11699, $11700)), ($11701, $11702, $11703, $11704, $11705, $11706, $11707, $11708, $11709, $11710, $11711, $11712, $11713, $11714, $11715, $11716, $11717, $11718, $11719, $11720, $11721, $11722, $11723, $11724, $11725, $11726, $11727, $11728, VersionRange($11729, $11730)), ($11731, $11732, $11733, $11734, $11735, $11736, $11737, $11738, $11739, $11740, $11741, $11742, $11743, $11744, $11745, $11746, $11747, $11748, $11749, $11750, $11751, $11752, $11753, $11754, $11755, $11756, $11757, $11758, VersionRange($11759, $11760)), ($11761, $11762, $11763, $11764, $11765, $11766, $11767, $11768, $11769, $11770, $11771, $11772, $11773, $11774, $11775, $11776, $11777, $11778, $11779, $11780, $11781, $11782, $11783, $11784, $11785, $11786, $11787, $11788, VersionRange($11789, $11790)), ($11791, $11792, $11793, $11794, $11795, $11796, $11797, $11798, $11799, $11800, $11801, $11802, $11803, $11804, $11805, $11806, $11807, $11808, $11809, $11810, $11811, $11812, $11813, $11814, $11815, $11816, $11817, $11818, VersionRange($11819, $11820)), ($11821, $11822, $11823, $11824, $11825, $11826, $11827, $11828, $11829, $11830, $11831, $11832, $11833, $11834, $11835, $11836, $11837, $11838, $11839, $11840, $11841, $11842, $11843, $11844, $11845, $11846, $11847, $11848, VersionRange($11849, $11850)), ($11851, $11852, $11853, $11854, $11855, $11856, $11857, $11858, $11859, $11860, $11861, $11862, $11863, $11864, $11865, $11866, $11867, $11868, $11869, $11870, $11871, $11872, $11873, $11874, $11875, $11876, $11877, $11878, VersionRange($11879, $11880)), ($11881, $11882, $11883, $11884, $11885, $11886, $11887, $11888, $11889, $11890, $11891, $11892, $11893, $11894, $11895, $11896, $11897, $11898, $11899, $11900, $11901, $11902, $11903, $11904, $11905, $11906, $11907, $11908, VersionRange($11909, $11910)), ($11911, $11912, $11913, $11914, $11915, $11916, $11917, $11918, $11919, $11920, $11921, $11922, $11923, $11924, $11925, $11926, $11927, $11928, $11929, $11930, $11931, $11932, $11933, $11934, $11935, $11936, $11937, $11938, VersionRange($11939, $11940)), ($11941, $11942, $11943, $11944, $11945, $11946, $11947, $11948, $11949, $11950, $11951, $11952, $11953, $11954, $11955, $11956, $11957, $11958, $11959, $11960, $11961, $11962, $11963, $11964, $11965, $11966, $11967, $11968, VersionRange($11969, $11970)), ($11971, $11972, $11973, $11974, $11975, $11976, $11977, $11978, $11979, $11980, $11981, $11982, $11983, $11984, $11985, $11986, $11987, $11988, $11989, $11990, $11991, $11992, $11993, $11994, $11995, $11996, $11997, $11998, VersionRange($11999, $12000)), ($12001, $12002, $12003, $12004, $12005, $12006, $12007, $12008, $12009, $12010, $12011, $12012, $12013, $12014, $12015, $12016, $12017, $12018, $12019, $12020, $12021, $12022, $12023, $12024, $12025, $12026, $12027, $12028, VersionRange($12029, $12030)), ($12031, $12032, $12033, $12034, $12035, $12036, $12037, $12038, $12039, $12040, $12041, $12042, $12043, $12044, $12045, $12046, $12047, $12048, $12049, $12050, $12051, $12052, $12053, $12054, $12055, $12056, $12057, $12058, VersionRange($12059, $12060)), ($12061, $12062, $12063, $12064, $12065, $12066, $12067, $12068, $12069, $12070, $12071, $12072, $12073, $12074, $12075, $12076, $12077, $12078, $12079, $12080, $12081, $12082, $12083, $12084, $12085, $12086, $12087, $12088, VersionRange($12089, $12090)), ($12091, $12092, $12093, $12094, $12095, $12096, $12097, $12098, $12099, $12100, $12101, $12102, $12103, $12104, $12105, $12106, $12107, $12108, $12109, $12110, $12111, $12112, $12113, $12114, $12115, $12116, $12117, $12118, VersionRange($12119, $12120)), ($12121, $12122, $12123, $12124, $12125, $12126, $12127, $12128, $12129, $12130, $12131, $12132, $12133, $12134, $12135, $12136, $12137, $12138, $12139, $12140, $12141, $12142, $12143, $12144, $12145, $12146, $12147, $12148, VersionRange($12149, $12150)), ($12151, $12152, $12153, $12154, $12155, $12156, $12157, $12158, $12159, $12160, $12161, $12162, $12163, $12164, $12165, $12166, $12167, $12168, $12169, $12170, $12171, $12172, $12173, $12174, $12175, $12176, $12177, $12178, VersionRange($12179, $12180)), ($12181, $12182, $12183, $12184, $12185, $12186, $12187, $12188, $12189, $12190, $12191, $12192, $12193, $12194, $12195, $12196, $12197, $12198, $12199, $12200, $12201, $12202, $12203, $12204, $12205, $12206, $12207, $12208, VersionRange($12209, $12210)), ($12211, $12212, $12213, $12214, $12215, $12216, $12217, $12218, $12219, $12220, $12221, $12222, $12223, $12224, $12225, $12226, $12227, $12228, $12229, $12230, $12231, $12232, $12233, $12234, $12235, $12236, $12237, $12238, VersionRange($12239, $12240)), ($12241, $12242, $12243, $12244, $12245, $12246, $12247, $12248, $12249, $12250, $12251, $12252, $12253, $12254, $12255, $12256, $12257, $12258, $12259, $12260, $12261, $12262, $12263, $12264, $12265, $12266, $12267, $12268, VersionRange($12269, $12270)), ($12271, $12272, $12273, $12274, $12275, $12276, $12277, $12278, $12279, $12280, $12281, $12282, $12283, $12284, $12285, $12286, $12287, $12288, $12289, $12290, $12291, $12292, $12293, $12294, $12295, $12296, $12297, $12298, VersionRange($12299, $12300)), ($12301, $12302, $12303, $12304, $12305, $12306, $12307, $12308, $12309, $12310, $12311, $12312, $12313, $12314, $12315, $12316, $12317, $12318, $12319, $12320, $12321, $12322, $12323, $12324, $12325, $12326, $12327, $12328, VersionRange($12329, $12330)), ($12331, $12332, $12333, $12334, $12335, $12336, $12337, $12338, $12339, $12340, $12341, $12342, $12343, $12344, $12345, $12346, $12347, $12348, $12349, $12350, $12351, $12352, $12353, $12354, $12355, $12356, $12357, $12358, VersionRange($12359, $12360)), ($12361, $12362, $12363, $12364, $12365, $12366, $12367, $12368, $12369, $12370, $12371, $12372, $12373, $12374, $12375, $12376, $12377, $12378, $12379, $12380, $12381, $12382, $12383, $12384, $12385, $12386, $12387, $12388, VersionRange($12389, $12390)), ($12391, $12392, $12393, $12394, $12395, $12396, $12397, $12398, $12399, $12400, $12401, $12402, $12403, $12404, $12405, $12406, $12407, $12408, $12409, $12410, $12411, $12412, $12413, $12414, $12415, $12416, $12417, $12418, VersionRange($12419, $12420)), ($12421, $12422, $12423, $12424, $12425, $12426, $12427, $12428, $12429, $12430, $12431, $12432, $12433, $12434, $12435, $12436, $12437, $12438, $12439, $12440, $12441, $12442, $12443, $12444, $12445, $12446, $12447, $12448, VersionRange($12449, $12450)), ($12451, $12452, $12453, $12454, $12455, $12456, $12457, $12458, $12459, $12460, $12461, $12462, $12463, $12464, $12465, $12466, $12467, $12468, $12469, $12470, $12471, $12472, $12473, $12474, $12475, $12476, $12477, $12478, VersionRange($12479, $12480)), ($12481, $12482, $12483, $12484, $12485, $12486, $12487, $12488, $12489, $12490, $12491, $12492, $12493, $12494, $12495, $12496, $12497, $12498, $12499, $12500, $12501, $12502, $12503, $12504, $12505, $12506, $12507, $12508, VersionRange($12509, $12510)), ($12511, $12512, $12513, $12514, $12515, $12516, $12517, $12518, $12519, $12520, $12521, $12522, $12523, $12524, $12525, $12526, $12527, $12528, $12529, $12530, $12531, $12532, $12533, $12534, $12535, $12536, $12537, $12538, VersionRange($12539, $12540)), ($12541, $12542, $12543, $12544, $12545, $12546, $12547, $12548, $12549, $12550, $12551, $12552, $12553, $12554, $12555, $12556, $12557, $12558, $12559, $12560, $12561, $12562, $12563, $12564, $12565, $12566, $12567, $12568, VersionRange($12569, $12570)), ($12571, $12572, $12573, $12574, $12575, $12576, $12577, $12578, $12579, $12580, $12581, $12582, $12583, $12584, $12585, $12586, $12587, $12588, $12589, $12590, $12591, $12592, $12593, $12594, $12595, $12596, $12597, $12598, VersionRange($12599, $12600)), ($12601, $12602, $12603, $12604, $12605, $12606, $12607, $12608, $12609, $12610, $12611, $12612, $12613, $12614, $12615, $12616, $12617, $12618, $12619, $12620, $12621, $12622, $12623, $12624, $12625, $12626, $12627, $12628, VersionRange($12629, $12630)), ($12631, $12632, $12633, $12634, $12635, $12636, $12637, $12638, $12639, $12640, $12641, $12642, $12643, $12644, $12645, $12646, $12647, $12648, $12649, $12650, $12651, $12652, $12653, $12654, $12655, $12656, $12657, $12658, VersionRange($12659, $12660)), ($12661, $12662, $12663, $12664, $12665, $12666, $12667, $12668, $12669, $12670, $12671, $12672, $12673, $12674, $12675, $12676, $12677, $12678, $12679, $12680, $12681, $12682, $12683, $12684, $12685, $12686, $12687, $12688, VersionRange($12689, $12690)), ($12691, $12692, $12693, $12694, $12695, $12696, $12697, $12698, $12699, $12700, $12701, $12702, $12703, $12704, $12705, $12706, $12707, $12708, $12709, $12710, $12711, $12712, $12713, $12714, $12715, $12716, $12717, $12718, VersionRange($12719, $12720)), ($12721, $12722, $12723, $12724, $12725, $12726, $12727, $12728, $12729, $12730, $12731, $12732, $12733, $12734, $12735, $12736, $12737, $12738, $12739, $12740, $12741, $12742, $12743, $12744, $12745, $12746, $12747, $12748, VersionRange($12749, $12750)), ($12751, $12752, $12753, $12754, $12755, $12756, $12757, $12758, $12759, $12760, $12761, $12762, $12763, $12764, $12765, $12766, $12767, $12768, $12769, $12770, $12771, $12772, $12773, $12774, $12775, $12776, $12777, $12778, VersionRange($12779, $12780)), ($12781, $12782, $12783, $12784, $12785, $12786, $12787, $12788, $12789, $12790, $12791, $12792, $12793, $12794, $12795, $12796, $12797, $12798, $12799, $12800, $12801, $12802, $12803, $12804, $12805, $12806, $12807, $12808, VersionRange($12809, $12810)), ($12811, $12812, $12813, $12814, $12815, $12816, $12817, $12818, $12819, $12820, $12821, $12822, $12823, $12824, $12825, $12826, $12827, $12828, $12829, $12830, $12831, $12832, $12833, $12834, $12835, $12836, $12837, $12838, VersionRange($12839, $12840)), ($12841, $12842, $12843, $12844, $12845, $12846, $12847, $12848, $12849, $12850, $12851, $12852, $12853, $12854, $12855, $12856, $12857, $12858, $12859, $12860, $12861, $12862, $12863, $12864, $12865, $12866, $12867, $12868, VersionRange($12869, $12870)), ($12871, $12872, $12873, $12874, $12875, $12876, $12877, $12878, $12879, $12880, $12881, $12882, $12883, $12884, $12885, $12886, $12887, $12888, $12889, $12890, $12891, $12892, $12893, $12894, $12895, $12896, $12897, $12898, VersionRange($12899, $12900)), ($12901, $12902, $12903, $12904, $12905, $12906, $12907, $12908, $12909, $12910, $12911, $12912, $12913, $12914, $12915, $12916, $12917, $12918, $12919, $12920, $12921, $12922, $12923, $12924, $12925, $12926, $12927, $12928, VersionRange($12929, $12930)), ($12931, $12932, $12933, $12934, $12935, $12936, $12937, $12938, $12939, $12940, $12941, $12942, $12943, $12944, $12945, $12946, $12947, $12948, $12949, $12950, $12951, $12952, $12953, $12954, $12955, $12956, $12957, $12958, VersionRange($12959, $12960)), ($12961, $12962, $12963, $12964, $12965, $12966, $12967, $12968, $12969, $12970[...][ Date: 2023-07-04 18:40:15 ]
14 3s803ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30)), ($31, $32, $33, $34, $35, $36, $37, $38, $39, $40, $41, $42, $43, $44, $45, $46, $47, $48, $49, $50, $51, $52, $53, $54, $55, $56, $57, $58, VersionRange($59, $60)), ($61, $62, $63, $64, $65, $66, $67, $68, $69, $70, $71, $72, $73, $74, $75, $76, $77, $78, $79, $80, $81, $82, $83, $84, $85, $86, $87, $88, VersionRange($89, $90)), ($91, $92, $93, $94, $95, $96, $97, $98, $99, $100, $101, $102, $103, $104, $105, $106, $107, $108, $109, $110, $111, $112, $113, $114, $115, $116, $117, $118, VersionRange($119, $120)), ($121, $122, $123, $124, $125, $126, $127, $128, $129, $130, $131, $132, $133, $134, $135, $136, $137, $138, $139, $140, $141, $142, $143, $144, $145, $146, $147, $148, VersionRange($149, $150)), ($151, $152, $153, $154, $155, $156, $157, $158, $159, $160, $161, $162, $163, $164, $165, $166, $167, $168, $169, $170, $171, $172, $173, $174, $175, $176, $177, $178, VersionRange($179, $180)), ($181, $182, $183, $184, $185, $186, $187, $188, $189, $190, $191, $192, $193, $194, $195, $196, $197, $198, $199, $200, $201, $202, $203, $204, $205, $206, $207, $208, VersionRange($209, $210)), ($211, $212, $213, $214, $215, $216, $217, $218, $219, $220, $221, $222, $223, $224, $225, $226, $227, $228, $229, $230, $231, $232, $233, $234, $235, $236, $237, $238, VersionRange($239, $240)), ($241, $242, $243, $244, $245, $246, $247, $248, $249, $250, $251, $252, $253, $254, $255, $256, $257, $258, $259, $260, $261, $262, $263, $264, $265, $266, $267, $268, VersionRange($269, $270)), ($271, $272, $273, $274, $275, $276, $277, $278, $279, $280, $281, $282, $283, $284, $285, $286, $287, $288, $289, $290, $291, $292, $293, $294, $295, $296, $297, $298, VersionRange($299, $300)), ($301, $302, $303, $304, $305, $306, $307, $308, $309, $310, $311, $312, $313, $314, $315, $316, $317, $318, $319, $320, $321, $322, $323, $324, $325, $326, $327, $328, VersionRange($329, $330)), ($331, $332, $333, $334, $335, $336, $337, $338, $339, $340, $341, $342, $343, $344, $345, $346, $347, $348, $349, $350, $351, $352, $353, $354, $355, $356, $357, $358, VersionRange($359, $360)), ($361, $362, $363, $364, $365, $366, $367, $368, $369, $370, $371, $372, $373, $374, $375, $376, $377, $378, $379, $380, $381, $382, $383, $384, $385, $386, $387, $388, VersionRange($389, $390)), ($391, $392, $393, $394, $395, $396, $397, $398, $399, $400, $401, $402, $403, $404, $405, $406, $407, $408, $409, $410, $411, $412, $413, $414, $415, $416, $417, $418, VersionRange($419, $420)), ($421, $422, $423, $424, $425, $426, $427, $428, $429, $430, $431, $432, $433, $434, $435, $436, $437, $438, $439, $440, $441, $442, $443, $444, $445, $446, $447, $448, VersionRange($449, $450)), ($451, $452, $453, $454, $455, $456, $457, $458, $459, $460, $461, $462, $463, $464, $465, $466, $467, $468, $469, $470, $471, $472, $473, $474, $475, $476, $477, $478, VersionRange($479, $480)), ($481, $482, $483, $484, $485, $486, $487, $488, $489, $490, $491, $492, $493, $494, $495, $496, $497, $498, $499, $500, $501, $502, $503, $504, $505, $506, $507, $508, VersionRange($509, $510)), ($511, $512, $513, $514, $515, $516, $517, $518, $519, $520, $521, $522, $523, $524, $525, $526, $527, $528, $529, $530, $531, $532, $533, $534, $535, $536, $537, $538, VersionRange($539, $540)), ($541, $542, $543, $544, $545, $546, $547, $548, $549, $550, $551, $552, $553, $554, $555, $556, $557, $558, $559, $560, $561, $562, $563, $564, $565, $566, $567, $568, VersionRange($569, $570)), ($571, $572, $573, $574, $575, $576, $577, $578, $579, $580, $581, $582, $583, $584, $585, $586, $587, $588, $589, $590, $591, $592, $593, $594, $595, $596, $597, $598, VersionRange($599, $600)), ($601, $602, $603, $604, $605, $606, $607, $608, $609, $610, $611, $612, $613, $614, $615, $616, $617, $618, $619, $620, $621, $622, $623, $624, $625, $626, $627, $628, VersionRange($629, $630)), ($631, $632, $633, $634, $635, $636, $637, $638, $639, $640, $641, $642, $643, $644, $645, $646, $647, $648, $649, $650, $651, $652, $653, $654, $655, $656, $657, $658, VersionRange($659, $660)), ($661, $662, $663, $664, $665, $666, $667, $668, $669, $670, $671, $672, $673, $674, $675, $676, $677, $678, $679, $680, $681, $682, $683, $684, $685, $686, $687, $688, VersionRange($689, $690)), ($691, $692, $693, $694, $695, $696, $697, $698, $699, $700, $701, $702, $703, $704, $705, $706, $707, $708, $709, $710, $711, $712, $713, $714, $715, $716, $717, $718, VersionRange($719, $720)), ($721, $722, $723, $724, $725, $726, $727, $728, $729, $730, $731, $732, $733, $734, $735, $736, $737, $738, $739, $740, $741, $742, $743, $744, $745, $746, $747, $748, VersionRange($749, $750)), ($751, $752, $753, $754, $755, $756, $757, $758, $759, $760, $761, $762, $763, $764, $765, $766, $767, $768, $769, $770, $771, $772, $773, $774, $775, $776, $777, $778, VersionRange($779, $780)), ($781, $782, $783, $784, $785, $786, $787, $788, $789, $790, $791, $792, $793, $794, $795, $796, $797, $798, $799, $800, $801, $802, $803, $804, $805, $806, $807, $808, VersionRange($809, $810)), ($811, $812, $813, $814, $815, $816, $817, $818, $819, $820, $821, $822, $823, $824, $825, $826, $827, $828, $829, $830, $831, $832, $833, $834, $835, $836, $837, $838, VersionRange($839, $840)), ($841, $842, $843, $844, $845, $846, $847, $848, $849, $850, $851, $852, $853, $854, $855, $856, $857, $858, $859, $860, $861, $862, $863, $864, $865, $866, $867, $868, VersionRange($869, $870)), ($871, $872, $873, $874, $875, $876, $877, $878, $879, $880, $881, $882, $883, $884, $885, $886, $887, $888, $889, $890, $891, $892, $893, $894, $895, $896, $897, $898, VersionRange($899, $900)), ($901, $902, $903, $904, $905, $906, $907, $908, $909, $910, $911, $912, $913, $914, $915, $916, $917, $918, $919, $920, $921, $922, $923, $924, $925, $926, $927, $928, VersionRange($929, $930)), ($931, $932, $933, $934, $935, $936, $937, $938, $939, $940, $941, $942, $943, $944, $945, $946, $947, $948, $949, $950, $951, $952, $953, $954, $955, $956, $957, $958, VersionRange($959, $960)), ($961, $962, $963, $964, $965, $966, $967, $968, $969, $970, $971, $972, $973, $974, $975, $976, $977, $978, $979, $980, $981, $982, $983, $984, $985, $986, $987, $988, VersionRange($989, $990)), ($991, $992, $993, $994, $995, $996, $997, $998, $999, $1000, $1001, $1002, $1003, $1004, $1005, $1006, $1007, $1008, $1009, $1010, $1011, $1012, $1013, $1014, $1015, $1016, $1017, $1018, VersionRange($1019, $1020)), ($1021, $1022, $1023, $1024, $1025, $1026, $1027, $1028, $1029, $1030, $1031, $1032, $1033, $1034, $1035, $1036, $1037, $1038, $1039, $1040, $1041, $1042, $1043, $1044, $1045, $1046, $1047, $1048, VersionRange($1049, $1050)), ($1051, $1052, $1053, $1054, $1055, $1056, $1057, $1058, $1059, $1060, $1061, $1062, $1063, $1064, $1065, $1066, $1067, $1068, $1069, $1070, $1071, $1072, $1073, $1074, $1075, $1076, $1077, $1078, VersionRange($1079, $1080)), ($1081, $1082, $1083, $1084, $1085, $1086, $1087, $1088, $1089, $1090, $1091, $1092, $1093, $1094, $1095, $1096, $1097, $1098, $1099, $1100, $1101, $1102, $1103, $1104, $1105, $1106, $1107, $1108, VersionRange($1109, $1110)), ($1111, $1112, $1113, $1114, $1115, $1116, $1117, $1118, $1119, $1120, $1121, $1122, $1123, $1124, $1125, $1126, $1127, $1128, $1129, $1130, $1131, $1132, $1133, $1134, $1135, $1136, $1137, $1138, VersionRange($1139, $1140)), ($1141, $1142, $1143, $1144, $1145, $1146, $1147, $1148, $1149, $1150, $1151, $1152, $1153, $1154, $1155, $1156, $1157, $1158, $1159, $1160, $1161, $1162, $1163, $1164, $1165, $1166, $1167, $1168, VersionRange($1169, $1170)), ($1171, $1172, $1173, $1174, $1175, $1176, $1177, $1178, $1179, $1180, $1181, $1182, $1183, $1184, $1185, $1186, $1187, $1188, $1189, $1190, $1191, $1192, $1193, $1194, $1195, $1196, $1197, $1198, VersionRange($1199, $1200)), ($1201, $1202, $1203, $1204, $1205, $1206, $1207, $1208, $1209, $1210, $1211, $1212, $1213, $1214, $1215, $1216, $1217, $1218, $1219, $1220, $1221, $1222, $1223, $1224, $1225, $1226, $1227, $1228, VersionRange($1229, $1230)), ($1231, $1232, $1233, $1234, $1235, $1236, $1237, $1238, $1239, $1240, $1241, $1242, $1243, $1244, $1245, $1246, $1247, $1248, $1249, $1250, $1251, $1252, $1253, $1254, $1255, $1256, $1257, $1258, VersionRange($1259, $1260)), ($1261, $1262, $1263, $1264, $1265, $1266, $1267, $1268, $1269, $1270, $1271, $1272, $1273, $1274, $1275, $1276, $1277, $1278, $1279, $1280, $1281, $1282, $1283, $1284, $1285, $1286, $1287, $1288, VersionRange($1289, $1290)), ($1291, $1292, $1293, $1294, $1295, $1296, $1297, $1298, $1299, $1300, $1301, $1302, $1303, $1304, $1305, $1306, $1307, $1308, $1309, $1310, $1311, $1312, $1313, $1314, $1315, $1316, $1317, $1318, VersionRange($1319, $1320)), ($1321, $1322, $1323, $1324, $1325, $1326, $1327, $1328, $1329, $1330, $1331, $1332, $1333, $1334, $1335, $1336, $1337, $1338, $1339, $1340, $1341, $1342, $1343, $1344, $1345, $1346, $1347, $1348, VersionRange($1349, $1350)), ($1351, $1352, $1353, $1354, $1355, $1356, $1357, $1358, $1359, $1360, $1361, $1362, $1363, $1364, $1365, $1366, $1367, $1368, $1369, $1370, $1371, $1372, $1373, $1374, $1375, $1376, $1377, $1378, VersionRange($1379, $1380)), ($1381, $1382, $1383, $1384, $1385, $1386, $1387, $1388, $1389, $1390, $1391, $1392, $1393, $1394, $1395, $1396, $1397, $1398, $1399, $1400, $1401, $1402, $1403, $1404, $1405, $1406, $1407, $1408, VersionRange($1409, $1410)), ($1411, $1412, $1413, $1414, $1415, $1416, $1417, $1418, $1419, $1420, $1421, $1422, $1423, $1424, $1425, $1426, $1427, $1428, $1429, $1430, $1431, $1432, $1433, $1434, $1435, $1436, $1437, $1438, VersionRange($1439, $1440)), ($1441, $1442, $1443, $1444, $1445, $1446, $1447, $1448, $1449, $1450, $1451, $1452, $1453, $1454, $1455, $1456, $1457, $1458, $1459, $1460, $1461, $1462, $1463, $1464, $1465, $1466, $1467, $1468, VersionRange($1469, $1470)), ($1471, $1472, $1473, $1474, $1475, $1476, $1477, $1478, $1479, $1480, $1481, $1482, $1483, $1484, $1485, $1486, $1487, $1488, $1489, $1490, $1491, $1492, $1493, $1494, $1495, $1496, $1497, $1498, VersionRange($1499, $1500)), ($1501, $1502, $1503, $1504, $1505, $1506, $1507, $1508, $1509, $1510, $1511, $1512, $1513, $1514, $1515, $1516, $1517, $1518, $1519, $1520, $1521, $1522, $1523, $1524, $1525, $1526, $1527, $1528, VersionRange($1529, $1530)), ($1531, $1532, $1533, $1534, $1535, $1536, $1537, $1538, $1539, $1540, $1541, $1542, $1543, $1544, $1545, $1546, $1547, $1548, $1549, $1550, $1551, $1552, $1553, $1554, $1555, $1556, $1557, $1558, VersionRange($1559, $1560)), ($1561, $1562, $1563, $1564, $1565, $1566, $1567, $1568, $1569, $1570, $1571, $1572, $1573, $1574, $1575, $1576, $1577, $1578, $1579, $1580, $1581, $1582, $1583, $1584, $1585, $1586, $1587, $1588, VersionRange($1589, $1590)), ($1591, $1592, $1593, $1594, $1595, $1596, $1597, $1598, $1599, $1600, $1601, $1602, $1603, $1604, $1605, $1606, $1607, $1608, $1609, $1610, $1611, $1612, $1613, $1614, $1615, $1616, $1617, $1618, VersionRange($1619, $1620)), ($1621, $1622, $1623, $1624, $1625, $1626, $1627, $1628, $1629, $1630, $1631, $1632, $1633, $1634, $1635, $1636, $1637, $1638, $1639, $1640, $1641, $1642, $1643, $1644, $1645, $1646, $1647, $1648, VersionRange($1649, $1650)), ($1651, $1652, $1653, $1654, $1655, $1656, $1657, $1658, $1659, $1660, $1661, $1662, $1663, $1664, $1665, $1666, $1667, $1668, $1669, $1670, $1671, $1672, $1673, $1674, $1675, $1676, $1677, $1678, VersionRange($1679, $1680)), ($1681, $1682, $1683, $1684, $1685, $1686, $1687, $1688, $1689, $1690, $1691, $1692, $1693, $1694, $1695, $1696, $1697, $1698, $1699, $1700, $1701, $1702, $1703, $1704, $1705, $1706, $1707, $1708, VersionRange($1709, $1710)), ($1711, $1712, $1713, $1714, $1715, $1716, $1717, $1718, $1719, $1720, $1721, $1722, $1723, $1724, $1725, $1726, $1727, $1728, $1729, $1730, $1731, $1732, $1733, $1734, $1735, $1736, $1737, $1738, VersionRange($1739, $1740)), ($1741, $1742, $1743, $1744, $1745, $1746, $1747, $1748, $1749, $1750, $1751, $1752, $1753, $1754, $1755, $1756, $1757, $1758, $1759, $1760, $1761, $1762, $1763, $1764, $1765, $1766, $1767, $1768, VersionRange($1769, $1770)), ($1771, $1772, $1773, $1774, $1775, $1776, $1777, $1778, $1779, $1780, $1781, $1782, $1783, $1784, $1785, $1786, $1787, $1788, $1789, $1790, $1791, $1792, $1793, $1794, $1795, $1796, $1797, $1798, VersionRange($1799, $1800)), ($1801, $1802, $1803, $1804, $1805, $1806, $1807, $1808, $1809, $1810, $1811, $1812, $1813, $1814, $1815, $1816, $1817, $1818, $1819, $1820, $1821, $1822, $1823, $1824, $1825, $1826, $1827, $1828, VersionRange($1829, $1830)), ($1831, $1832, $1833, $1834, $1835, $1836, $1837, $1838, $1839, $1840, $1841, $1842, $1843, $1844, $1845, $1846, $1847, $1848, $1849, $1850, $1851, $1852, $1853, $1854, $1855, $1856, $1857, $1858, VersionRange($1859, $1860)), ($1861, $1862, $1863, $1864, $1865, $1866, $1867, $1868, $1869, $1870, $1871, $1872, $1873, $1874, $1875, $1876, $1877, $1878, $1879, $1880, $1881, $1882, $1883, $1884, $1885, $1886, $1887, $1888, VersionRange($1889, $1890)), ($1891, $1892, $1893, $1894, $1895, $1896, $1897, $1898, $1899, $1900, $1901, $1902, $1903, $1904, $1905, $1906, $1907, $1908, $1909, $1910, $1911, $1912, $1913, $1914, $1915, $1916, $1917, $1918, VersionRange($1919, $1920)), ($1921, $1922, $1923, $1924, $1925, $1926, $1927, $1928, $1929, $1930, $1931, $1932, $1933, $1934, $1935, $1936, $1937, $1938, $1939, $1940, $1941, $1942, $1943, $1944, $1945, $1946, $1947, $1948, VersionRange($1949, $1950)), ($1951, $1952, $1953, $1954, $1955, $1956, $1957, $1958, $1959, $1960, $1961, $1962, $1963, $1964, $1965, $1966, $1967, $1968, $1969, $1970, $1971, $1972, $1973, $1974, $1975, $1976, $1977, $1978, VersionRange($1979, $1980)), ($1981, $1982, $1983, $1984, $1985, $1986, $1987, $1988, $1989, $1990, $1991, $1992, $1993, $1994, $1995, $1996, $1997, $1998, $1999, $2000, $2001, $2002, $2003, $2004, $2005, $2006, $2007, $2008, VersionRange($2009, $2010)), ($2011, $2012, $2013, $2014, $2015, $2016, $2017, $2018, $2019, $2020, $2021, $2022, $2023, $2024, $2025, $2026, $2027, $2028, $2029, $2030, $2031, $2032, $2033, $2034, $2035, $2036, $2037, $2038, VersionRange($2039, $2040)), ($2041, $2042, $2043, $2044, $2045, $2046, $2047, $2048, $2049, $2050, $2051, $2052, $2053, $2054, $2055, $2056, $2057, $2058, $2059, $2060, $2061, $2062, $2063, $2064, $2065, $2066, $2067, $2068, VersionRange($2069, $2070)), ($2071, $2072, $2073, $2074, $2075, $2076, $2077, $2078, $2079, $2080, $2081, $2082, $2083, $2084, $2085, $2086, $2087, $2088, $2089, $2090, $2091, $2092, $2093, $2094, $2095, $2096, $2097, $2098, VersionRange($2099, $2100)), ($2101, $2102, $2103, $2104, $2105, $2106, $2107, $2108, $2109, $2110, $2111, $2112, $2113, $2114, $2115, $2116, $2117, $2118, $2119, $2120, $2121, $2122, $2123, $2124, $2125, $2126, $2127, $2128, VersionRange($2129, $2130)), ($2131, $2132, $2133, $2134, $2135, $2136, $2137, $2138, $2139, $2140, $2141, $2142, $2143, $2144, $2145, $2146, $2147, $2148, $2149, $2150, $2151, $2152, $2153, $2154, $2155, $2156, $2157, $2158, VersionRange($2159, $2160)), ($2161, $2162, $2163, $2164, $2165, $2166, $2167, $2168, $2169, $2170, $2171, $2172, $2173, $2174, $2175, $2176, $2177, $2178, $2179, $2180, $2181, $2182, $2183, $2184, $2185, $2186, $2187, $2188, VersionRange($2189, $2190)), ($2191, $2192, $2193, $2194, $2195, $2196, $2197, $2198, $2199, $2200, $2201, $2202, $2203, $2204, $2205, $2206, $2207, $2208, $2209, $2210, $2211, $2212, $2213, $2214, $2215, $2216, $2217, $2218, VersionRange($2219, $2220)), ($2221, $2222, $2223, $2224, $2225, $2226, $2227, $2228, $2229, $2230, $2231, $2232, $2233, $2234, $2235, $2236, $2237, $2238, $2239, $2240, $2241, $2242, $2243, $2244, $2245, $2246, $2247, $2248, VersionRange($2249, $2250)), ($2251, $2252, $2253, $2254, $2255, $2256, $2257, $2258, $2259, $2260, $2261, $2262, $2263, $2264, $2265, $2266, $2267, $2268, $2269, $2270, $2271, $2272, $2273, $2274, $2275, $2276, $2277, $2278, VersionRange($2279, $2280)), ($2281, $2282, $2283, $2284, $2285, $2286, $2287, $2288, $2289, $2290, $2291, $2292, $2293, $2294, $2295, $2296, $2297, $2298, $2299, $2300, $2301, $2302, $2303, $2304, $2305, $2306, $2307, $2308, VersionRange($2309, $2310)), ($2311, $2312, $2313, $2314, $2315, $2316, $2317, $2318, $2319, $2320, $2321, $2322, $2323, $2324, $2325, $2326, $2327, $2328, $2329, $2330, $2331, $2332, $2333, $2334, $2335, $2336, $2337, $2338, VersionRange($2339, $2340)), ($2341, $2342, $2343, $2344, $2345, $2346, $2347, $2348, $2349, $2350, $2351, $2352, $2353, $2354, $2355, $2356, $2357, $2358, $2359, $2360, $2361, $2362, $2363, $2364, $2365, $2366, $2367, $2368, VersionRange($2369, $2370)), ($2371, $2372, $2373, $2374, $2375, $2376, $2377, $2378, $2379, $2380, $2381, $2382, $2383, $2384, $2385, $2386, $2387, $2388, $2389, $2390, $2391, $2392, $2393, $2394, $2395, $2396, $2397, $2398, VersionRange($2399, $2400)), ($2401, $2402, $2403, $2404, $2405, $2406, $2407, $2408, $2409, $2410, $2411, $2412, $2413, $2414, $2415, $2416, $2417, $2418, $2419, $2420, $2421, $2422, $2423, $2424, $2425, $2426, $2427, $2428, VersionRange($2429, $2430)), ($2431, $2432, $2433, $2434, $2435, $2436, $2437, $2438, $2439, $2440, $2441, $2442, $2443, $2444, $2445, $2446, $2447, $2448, $2449, $2450, $2451, $2452, $2453, $2454, $2455, $2456, $2457, $2458, VersionRange($2459, $2460)), ($2461, $2462, $2463, $2464, $2465, $2466, $2467, $2468, $2469, $2470, $2471, $2472, $2473, $2474, $2475, $2476, $2477, $2478, $2479, $2480, $2481, $2482, $2483, $2484, $2485, $2486, $2487, $2488, VersionRange($2489, $2490)), ($2491, $2492, $2493, $2494, $2495, $2496, $2497, $2498, $2499, $2500, $2501, $2502, $2503, $2504, $2505, $2506, $2507, $2508, $2509, $2510, $2511, $2512, $2513, $2514, $2515, $2516, $2517, $2518, VersionRange($2519, $2520)), ($2521, $2522, $2523, $2524, $2525, $2526, $2527, $2528, $2529, $2530, $2531, $2532, $2533, $2534, $2535, $2536, $2537, $2538, $2539, $2540, $2541, $2542, $2543, $2544, $2545, $2546, $2547, $2548, VersionRange($2549, $2550)), ($2551, $2552, $2553, $2554, $2555, $2556, $2557, $2558, $2559, $2560, $2561, $2562, $2563, $2564, $2565, $2566, $2567, $2568, $2569, $2570, $2571, $2572, $2573, $2574, $2575, $2576, $2577, $2578, VersionRange($2579, $2580)), ($2581, $2582, $2583, $2584, $2585, $2586, $2587, $2588, $2589, $2590, $2591, $2592, $2593, $2594, $2595, $2596, $2597, $2598, $2599, $2600, $2601, $2602, $2603, $2604, $2605, $2606, $2607, $2608, VersionRange($2609, $2610)), ($2611, $2612, $2613, $2614, $2615, $2616, $2617, $2618, $2619, $2620, $2621, $2622, $2623, $2624, $2625, $2626, $2627, $2628, $2629, $2630, $2631, $2632, $2633, $2634, $2635, $2636, $2637, $2638, VersionRange($2639, $2640)), ($2641, $2642, $2643, $2644, $2645, $2646, $2647, $2648, $2649, $2650, $2651, $2652, $2653, $2654, $2655, $2656, $2657, $2658, $2659, $2660, $2661, $2662, $2663, $2664, $2665, $2666, $2667, $2668, VersionRange($2669, $2670)), ($2671, $2672, $2673, $2674, $2675, $2676, $2677, $2678, $2679, $2680, $2681, $2682, $2683, $2684, $2685, $2686, $2687, $2688, $2689, $2690, $2691, $2692, $2693, $2694, $2695, $2696, $2697, $2698, VersionRange($2699, $2700)), ($2701, $2702, $2703, $2704, $2705, $2706, $2707, $2708, $2709, $2710, $2711, $2712, $2713, $2714, $2715, $2716, $2717, $2718, $2719, $2720, $2721, $2722, $2723, $2724, $2725, $2726, $2727, $2728, VersionRange($2729, $2730)), ($2731, $2732, $2733, $2734, $2735, $2736, $2737, $2738, $2739, $2740, $2741, $2742, $2743, $2744, $2745, $2746, $2747, $2748, $2749, $2750, $2751, $2752, $2753, $2754, $2755, $2756, $2757, $2758, VersionRange($2759, $2760)), ($2761, $2762, $2763, $2764, $2765, $2766, $2767, $2768, $2769, $2770, $2771, $2772, $2773, $2774, $2775, $2776, $2777, $2778, $2779, $2780, $2781, $2782, $2783, $2784, $2785, $2786, $2787, $2788, VersionRange($2789, $2790)), ($2791, $2792, $2793, $2794, $2795, $2796, $2797, $2798, $2799, $2800, $2801, $2802, $2803, $2804, $2805, $2806, $2807, $2808, $2809, $2810, $2811, $2812, $2813, $2814, $2815, $2816, $2817, $2818, VersionRange($2819, $2820)), ($2821, $2822, $2823, $2824, $2825, $2826, $2827, $2828, $2829, $2830, $2831, $2832, $2833, $2834, $2835, $2836, $2837, $2838, $2839, $2840, $2841, $2842, $2843, $2844, $2845, $2846, $2847, $2848, VersionRange($2849, $2850)), ($2851, $2852, $2853, $2854, $2855, $2856, $2857, $2858, $2859, $2860, $2861, $2862, $2863, $2864, $2865, $2866, $2867, $2868, $2869, $2870, $2871, $2872, $2873, $2874, $2875, $2876, $2877, $2878, VersionRange($2879, $2880)), ($2881, $2882, $2883, $2884, $2885, $2886, $2887, $2888, $2889, $2890, $2891, $2892, $2893, $2894, $2895, $2896, $2897, $2898, $2899, $2900, $2901, $2902, $2903, $2904, $2905, $2906, $2907, $2908, VersionRange($2909, $2910)), ($2911, $2912, $2913, $2914, $2915, $2916, $2917, $2918, $2919, $2920, $2921, $2922, $2923, $2924, $2925, $2926, $2927, $2928, $2929, $2930, $2931, $2932, $2933, $2934, $2935, $2936, $2937, $2938, VersionRange($2939, $2940)), ($2941, $2942, $2943, $2944, $2945, $2946, $2947, $2948, $2949, $2950, $2951, $2952, $2953, $2954, $2955, $2956, $2957, $2958, $2959, $2960, $2961, $2962, $2963, $2964, $2965, $2966, $2967, $2968, VersionRange($2969, $2970)), ($2971, $2972, $2973, $2974, $2975, $2976, $2977, $2978, $2979, $2980, $2981, $2982, $2983, $2984, $2985, $2986, $2987, $2988, $2989, $2990, $2991, $2992, $2993, $2994, $2995, $2996, $2997, $2998, VersionRange($2999, $3000)), ($3001, $3002, $3003, $3004, $3005, $3006, $3007, $3008, $3009, $3010, $3011, $3012, $3013, $3014, $3015, $3016, $3017, $3018, $3019, $3020, $3021, $3022, $3023, $3024, $3025, $3026, $3027, $3028, VersionRange($3029, $3030)), ($3031, $3032, $3033, $3034, $3035, $3036, $3037, $3038, $3039, $3040, $3041, $3042, $3043, $3044, $3045, $3046, $3047, $3048, $3049, $3050, $3051, $3052, $3053, $3054, $3055, $3056, $3057, $3058, VersionRange($3059, $3060)), ($3061, $3062, $3063, $3064, $3065, $3066, $3067, $3068, $3069, $3070, $3071, $3072, $3073, $3074, $3075, $3076, $3077, $3078, $3079, $3080, $3081, $3082, $3083, $3084, $3085, $3086, $3087, $3088, VersionRange($3089, $3090)), ($3091, $3092, $3093, $3094, $3095, $3096, $3097, $3098, $3099, $3100, $3101, $3102, $3103, $3104, $3105, $3106, $3107, $3108, $3109, $3110, $3111, $3112, $3113, $3114, $3115, $3116, $3117, $3118, VersionRange($3119, $3120)), ($3121, $3122, $3123, $3124, $3125, $3126, $3127, $3128, $3129, $3130, $3131, $3132, $3133, $3134, $3135, $3136, $3137, $3138, $3139, $3140, $3141, $3142, $3143, $3144, $3145, $3146, $3147, $3148, VersionRange($3149, $3150)), ($3151, $3152, $3153, $3154, $3155, $3156, $3157, $3158, $3159, $3160, $3161, $3162, $3163, $3164, $3165, $3166, $3167, $3168, $3169, $3170, $3171, $3172, $3173, $3174, $3175, $3176, $3177, $3178, VersionRange($3179, $3180)), ($3181, $3182, $3183, $3184, $3185, $3186, $3187, $3188, $3189, $3190, $3191, $3192, $3193, $3194, $3195, $3196, $3197, $3198, $3199, $3200, $3201, $3202, $3203, $3204, $3205, $3206, $3207, $3208, VersionRange($3209, $3210)), ($3211, $3212, $3213, $3214, $3215, $3216, $3217, $3218, $3219, $3220, $3221, $3222, $3223, $3224, $3225, $3226, $3227, $3228, $3229, $3230, $3231, $3232, $3233, $3234, $3235, $3236, $3237, $3238, VersionRange($3239, $3240)), ($3241, $3242, $3243, $3244, $3245, $3246, $3247, $3248, $3249, $3250, $3251, $3252, $3253, $3254, $3255, $3256, $3257, $3258, $3259, $3260, $3261, $3262, $3263, $3264, $3265, $3266, $3267, $3268, VersionRange($3269, $3270)), ($3271, $3272, $3273, $3274, $3275, $3276, $3277, $3278, $3279, $3280, $3281, $3282, $3283, $3284, $3285, $3286, $3287, $3288, $3289, $3290, $3291, $3292, $3293, $3294, $3295, $3296, $3297, $3298, VersionRange($3299, $3300)), ($3301, $3302, $3303, $3304, $3305, $3306, $3307, $3308, $3309, $3310, $3311, $3312, $3313, $3314, $3315, $3316, $3317, $3318, $3319, $3320, $3321, $3322, $3323, $3324, $3325, $3326, $3327, $3328, VersionRange($3329, $3330)), ($3331, $3332, $3333, $3334, $3335, $3336, $3337, $3338, $3339, $3340, $3341, $3342, $3343, $3344, $3345, $3346, $3347, $3348, $3349, $3350, $3351, $3352, $3353, $3354, $3355, $3356, $3357, $3358, VersionRange($3359, $3360)), ($3361, $3362, $3363, $3364, $3365, $3366, $3367, $3368, $3369, $3370, $3371, $3372, $3373, $3374, $3375, $3376, $3377, $3378, $3379, $3380, $3381, $3382, $3383, $3384, $3385, $3386, $3387, $3388, VersionRange($3389, $3390)), ($3391, $3392, $3393, $3394, $3395, $3396, $3397, $3398, $3399, $3400, $3401, $3402, $3403, $3404, $3405, $3406, $3407, $3408, $3409, $3410, $3411, $3412, $3413, $3414, $3415, $3416, $3417, $3418, VersionRange($3419, $3420)), ($3421, $3422, $3423, $3424, $3425, $3426, $3427, $3428, $3429, $3430, $3431, $3432, $3433, $3434, $3435, $3436, $3437, $3438, $3439, $3440, $3441, $3442, $3443, $3444, $3445, $3446, $3447, $3448, VersionRange($3449, $3450)), ($3451, $3452, $3453, $3454, $3455, $3456, $3457, $3458, $3459, $3460, $3461, $3462, $3463, $3464, $3465, $3466, $3467, $3468, $3469, $3470, $3471, $3472, $3473, $3474, $3475, $3476, $3477, $3478, VersionRange($3479, $3480)), ($3481, $3482, $3483, $3484, $3485, $3486, $3487, $3488, $3489, $3490, $3491, $3492, $3493, $3494, $3495, $3496, $3497, $3498, $3499, $3500, $3501, $3502, $3503, $3504, $3505, $3506, $3507, $3508, VersionRange($3509, $3510)), ($3511, $3512, $3513, $3514, $3515, $3516, $3517, $3518, $3519, $3520, $3521, $3522, $3523, $3524, $3525, $3526, $3527, $3528, $3529, $3530, $3531, $3532, $3533, $3534, $3535, $3536, $3537, $3538, VersionRange($3539, $3540)), ($3541, $3542, $3543, $3544, $3545, $3546, $3547, $3548, $3549, $3550, $3551, $3552, $3553, $3554, $3555, $3556, $3557, $3558, $3559, $3560, $3561, $3562, $3563, $3564, $3565, $3566, $3567, $3568, VersionRange($3569, $3570)), ($3571, $3572, $3573, $3574, $3575, $3576, $3577, $3578, $3579, $3580, $3581, $3582, $3583, $3584, $3585, $3586, $3587, $3588, $3589, $3590, $3591, $3592, $3593, $3594, $3595, $3596, $3597, $3598, VersionRange($3599, $3600)), ($3601, $3602, $3603, $3604, $3605, $3606, $3607, $3608, $3609, $3610, $3611, $3612, $3613, $3614, $3615, $3616, $3617, $3618, $3619, $3620, $3621, $3622, $3623, $3624, $3625, $3626, $3627, $3628, VersionRange($3629, $3630)), ($3631, $3632, $3633, $3634, $3635, $3636, $3637, $3638, $3639, $3640, $3641, $3642, $3643, $3644, $3645, $3646, $3647, $3648, $3649, $3650, $3651, $3652, $3653, $3654, $3655, $3656, $3657, $3658, VersionRange($3659, $3660)), ($3661, $3662, $3663, $3664, $3665, $3666, $3667, $3668, $3669, $3670, $3671, $3672, $3673, $3674, $3675, $3676, $3677, $3678, $3679, $3680, $3681, $3682, $3683, $3684, $3685, $3686, $3687, $3688, VersionRange($3689, $3690)), ($3691, $3692, $3693, $3694, $3695, $3696, $3697, $3698, $3699, $3700, $3701, $3702, $3703, $3704, $3705, $3706, $3707, $3708, $3709, $3710, $3711, $3712, $3713, $3714, $3715, $3716, $3717, $3718, VersionRange($3719, $3720)), ($3721, $3722, $3723, $3724, $3725, $3726, $3727, $3728, $3729, $3730, $3731, $3732, $3733, $3734, $3735, $3736, $3737, $3738, $3739, $3740, $3741, $3742, $3743, $3744, $3745, $3746, $3747, $3748, VersionRange($3749, $3750)), ($3751, $3752, $3753, $3754, $3755, $3756, $3757, $3758, $3759, $3760, $3761, $3762, $3763, $3764, $3765, $3766, $3767, $3768, $3769, $3770, $3771, $3772, $3773, $3774, $3775, $3776, $3777, $3778, VersionRange($3779, $3780)), ($3781, $3782, $3783, $3784, $3785, $3786, $3787, $3788, $3789, $3790, $3791, $3792, $3793, $3794, $3795, $3796, $3797, $3798, $3799, $3800, $3801, $3802, $3803, $3804, $3805, $3806, $3807, $3808, VersionRange($3809, $3810)), ($3811, $3812, $3813, $3814, $3815, $3816, $3817, $3818, $3819, $3820, $3821, $3822, $3823, $3824, $3825, $3826, $3827, $3828, $3829, $3830, $3831, $3832, $3833, $3834, $3835, $3836, $3837, $3838, VersionRange($3839, $3840)), ($3841, $3842, $3843, $3844, $3845, $3846, $3847, $3848, $3849, $3850, $3851, $3852, $3853, $3854, $3855, $3856, $3857, $3858, $3859, $3860, $3861, $3862, $3863, $3864, $3865, $3866, $3867, $3868, VersionRange($3869, $3870)), ($3871, $3872, $3873, $3874, $3875, $3876, $3877, $3878, $3879, $3880, $3881, $3882, $3883, $3884, $3885, $3886, $3887, $3888, $3889, $3890, $3891, $3892, $3893, $3894, $3895, $3896, $3897, $3898, VersionRange($3899, $3900)), ($3901, $3902, $3903, $3904, $3905, $3906, $3907, $3908, $3909, $3910, $3911, $3912, $3913, $3914, $3915, $3916, $3917, $3918, $3919, $3920, $3921, $3922, $3923, $3924, $3925, $3926, $3927, $3928, VersionRange($3929, $3930)), ($3931, $3932, $3933, $3934, $3935, $3936, $3937, $3938, $3939, $3940, $3941, $3942, $3943, $3944, $3945, $3946, $3947, $3948, $3949, $3950, $3951, $3952, $3953, $3954, $3955, $3956, $3957, $3958, VersionRange($3959, $3960)), ($3961, $3962, $3963, $3964, $3965, $3966, $3967, $3968, $3969, $3970, $3971, $3972, $3973, $3974, $3975, $3976, $3977, $3978, $3979, $3980, $3981, $3982, $3983, $3984, $3985, $3986, $3987, $3988, VersionRange($3989, $3990)), ($3991, $3992, $3993, $3994, $3995, $3996, $3997, $3998, $3999, $4000, $4001, $4002, $4003, $4004, $4005, $4006, $4007, $4008, $4009, $4010, $4011, $4012, $4013, $4014, $4015, $4016, $4017, $4018, VersionRange($4019, $4020)), ($4021, $4022, $4023, $4024, $4025, $4026, $4027, $4028, $4029, $4030, $4031, $4032, $4033, $4034, $4035, $4036, $4037, $4038, $4039, $4040, $4041, $4042, $4043, $4044, $4045, $4046, $4047, $4048, VersionRange($4049, $4050)), ($4051, $4052, $4053, $4054, $4055, $4056, $4057, $4058, $4059, $4060, $4061, $4062, $4063, $4064, $4065, $4066, $4067, $4068, $4069, $4070, $4071, $4072, $4073, $4074, $4075, $4076, $4077, $4078, VersionRange($4079, $4080)), ($4081, $4082, $4083, $4084, $4085, $4086, $4087, $4088, $4089, $4090, $4091, $4092, $4093, $4094, $4095, $4096, $4097, $4098, $4099, $4100, $4101, $4102, $4103, $4104, $4105, $4106, $4107, $4108, VersionRange($4109, $4110)), ($4111, $4112, $4113, $4114, $4115, $4116, $4117, $4118, $4119, $4120, $4121, $4122, $4123, $4124, $4125, $4126, $4127, $4128, $4129, $4130, $4131, $4132, $4133, $4134, $4135, $4136, $4137, $4138, VersionRange($4139, $4140)), ($4141, $4142, $4143, $4144, $4145, $4146, $4147, $4148, $4149, $4150, $4151, $4152, $4153, $4154, $4155, $4156, $4157, $4158, $4159, $4160, $4161, $4162, $4163, $4164, $4165, $4166, $4167, $4168, VersionRange($4169, $4170)), ($4171, $4172, $4173, $4174, $4175, $4176, $4177, $4178, $4179, $4180, $4181, $4182, $4183, $4184, $4185, $4186, $4187, $4188, $4189, $4190, $4191, $4192, $4193, $4194, $4195, $4196, $4197, $4198, VersionRange($4199, $4200)), ($4201, $4202, $4203, $4204, $4205, $4206, $4207, $4208, $4209, $4210, $4211, $4212, $4213, $4214, $4215, $4216, $4217, $4218, $4219, $4220, $4221, $4222, $4223, $4224, $4225, $4226, $4227, $4228, VersionRange($4229, $4230)), ($4231, $4232, $4233, $4234, $4235, $4236, $4237, $4238, $4239, $4240, $4241, $4242, $4243, $4244, $4245, $4246, $4247, $4248, $4249, $4250, $4251, $4252, $4253, $4254, $4255, $4256, $4257, $4258, VersionRange($4259, $4260)), ($4261, $4262, $4263, $4264, $4265, $4266, $4267, $4268, $4269, $4270, $4271, $4272, $4273, $4274, $4275, $4276, $4277, $4278, $4279, $4280, $4281, $4282, $4283, $4284, $4285, $4286, $4287, $4288, VersionRange($4289, $4290)), ($4291, $4292, $4293, $4294, $4295, $4296, $4297, $4298, $4299, $4300, $4301, $4302, $4303, $4304, $4305, $4306, $4307, $4308, $4309, $4310, $4311, $4312, $4313, $4314, $4315, $4316, $4317, $4318, VersionRange($4319, $4320)), ($4321, $4322, $4323, $4324, $4325, $4326, $4327, $4328, $4329, $4330, $4331, $4332, $4333, $4334, $4335, $4336, $4337, $4338, $4339, $4340, $4341, $4342, $4343, $4344, $4345, $4346, $4347, $4348, VersionRange($4349, $4350)), ($4351, $4352, $4353, $4354, $4355, $4356, $4357, $4358, $4359, $4360, $4361, $4362, $4363, $4364, $4365, $4366, $4367, $4368, $4369, $4370, $4371, $4372, $4373, $4374, $4375, $4376, $4377, $4378, VersionRange($4379, $4380)), ($4381, $4382, $4383, $4384, $4385, $4386, $4387, $4388, $4389, $4390, $4391, $4392, $4393, $4394, $4395, $4396, $4397, $4398, $4399, $4400, $4401, $4402, $4403, $4404, $4405, $4406, $4407, $4408, VersionRange($4409, $4410)), ($4411, $4412, $4413, $4414, $4415, $4416, $4417, $4418, $4419, $4420, $4421, $4422, $4423, $4424, $4425, $4426, $4427, $4428, $4429, $4430, $4431, $4432, $4433, $4434, $4435, $4436, $4437, $4438, VersionRange($4439, $4440)), ($4441, $4442, $4443, $4444, $4445, $4446, $4447, $4448, $4449, $4450, $4451, $4452, $4453, $4454, $4455, $4456, $4457, $4458, $4459, $4460, $4461, $4462, $4463, $4464, $4465, $4466, $4467, $4468, VersionRange($4469, $4470)), ($4471, $4472, $4473, $4474, $4475, $4476, $4477, $4478, $4479, $4480, $4481, $4482, $4483, $4484, $4485, $4486, $4487, $4488, $4489, $4490, $4491, $4492, $4493, $4494, $4495, $4496, $4497, $4498, VersionRange($4499, $4500)), ($4501, $4502, $4503, $4504, $4505, $4506, $4507, $4508, $4509, $4510, $4511, $4512, $4513, $4514, $4515, $4516, $4517, $4518, $4519, $4520, $4521, $4522, $4523, $4524, $4525, $4526, $4527, $4528, VersionRange($4529, $4530)), ($4531, $4532, $4533, $4534, $4535, $4536, $4537, $4538, $4539, $4540, $4541, $4542, $4543, $4544, $4545, $4546, $4547, $4548, $4549, $4550, $4551, $4552, $4553, $4554, $4555, $4556, $4557, $4558, VersionRange($4559, $4560)), ($4561, $4562, $4563, $4564, $4565, $4566, $4567, $4568, $4569, $4570, $4571, $4572, $4573, $4574, $4575, $4576, $4577, $4578, $4579, $4580, $4581, $4582, $4583, $4584, $4585, $4586, $4587, $4588, VersionRange($4589, $4590)), ($4591, $4592, $4593, $4594, $4595, $4596, $4597, $4598, $4599, $4600, $4601, $4602, $4603, $4604, $4605, $4606, $4607, $4608, $4609, $4610, $4611, $4612, $4613, $4614, $4615, $4616, $4617, $4618, VersionRange($4619, $4620)), ($4621, $4622, $4623, $4624, $4625, $4626, $4627, $4628, $4629, $4630, $4631, $4632, $4633, $4634, $4635, $4636, $4637, $4638, $4639, $4640, $4641, $4642, $4643, $4644, $4645, $4646, $4647, $4648, VersionRange($4649, $4650)), ($4651, $4652, $4653, $4654, $4655, $4656, $4657, $4658, $4659, $4660, $4661, $4662, $4663, $4664, $4665, $4666, $4667, $4668, $4669, $4670, $4671, $4672, $4673, $4674, $4675, $4676, $4677, $4678, VersionRange($4679, $4680)), ($4681, $4682, $4683, $4684, $4685, $4686, $4687, $4688, $4689, $4690, $4691, $4692, $4693, $4694, $4695, $4696, $4697, $4698, $4699, $4700, $4701, $4702, $4703, $4704, $4705, $4706, $4707, $4708, VersionRange($4709, $4710)), ($4711, $4712, $4713, $4714, $4715, $4716, $4717, $4718, $4719, $4720, $4721, $4722, $4723, $4724, $4725, $4726, $4727, $4728, $4729, $4730, $4731, $4732, $4733, $4734, $4735, $4736, $4737, $4738, VersionRange($4739, $4740)), ($4741, $4742, $4743, $4744, $4745, $4746, $4747, $4748, $4749, $4750, $4751, $4752, $4753, $4754, $4755, $4756, $4757, $4758, $4759, $4760, $4761, $4762, $4763, $4764, $4765, $4766, $4767, $4768, VersionRange($4769, $4770)), ($4771, $4772, $4773, $4774, $4775, $4776, $4777, $4778, $4779, $4780, $4781, $4782, $4783, $4784, $4785, $4786, $4787, $4788, $4789, $4790, $4791, $4792, $4793, $4794, $4795, $4796, $4797, $4798, VersionRange($4799, $4800)), ($4801, $4802, $4803, $4804, $4805, $4806, $4807, $4808, $4809, $4810, $4811, $4812, $4813, $4814, $4815, $4816, $4817, $4818, $4819, $4820, $4821, $4822, $4823, $4824, $4825, $4826, $4827, $4828, VersionRange($4829, $4830)), ($4831, $4832, $4833, $4834, $4835, $4836, $4837, $4838, $4839, $4840, $4841, $4842, $4843, $4844, $4845, $4846, $4847, $4848, $4849, $4850, $4851, $4852, $4853, $4854, $4855, $4856, $4857, $4858, VersionRange($4859, $4860)), ($4861, $4862, $4863, $4864, $4865, $4866, $4867, $4868, $4869, $4870, $4871, $4872, $4873, $4874, $4875, $4876, $4877, $4878, $4879, $4880, $4881, $4882, $4883, $4884, $4885, $4886, $4887, $4888, VersionRange($4889, $4890)), ($4891, $4892, $4893, $4894, $4895, $4896, $4897, $4898, $4899, $4900, $4901, $4902, $4903, $4904, $4905, $4906, $4907, $4908, $4909, $4910, $4911, $4912, $4913, $4914, $4915, $4916, $4917, $4918, VersionRange($4919, $4920)), ($4921, $4922, $4923, $4924, $4925, $4926, $4927, $4928, $4929, $4930, $4931, $4932, $4933, $4934, $4935, $4936, $4937, $4938, $4939, $4940, $4941, $4942, $4943, $4944, $4945, $4946, $4947, $4948, VersionRange($4949, $4950)), ($4951, $4952, $4953, $4954, $4955, $4956, $4957, $4958, $4959, $4960, $4961, $4962, $4963, $4964, $4965, $4966, $4967, $4968, $4969, $4970, $4971, $4972, $4973, $4974, $4975, $4976, $4977, $4978, VersionRange($4979, $4980)), ($4981, $4982, $4983, $4984, $4985, $4986, $4987, $4988, $4989, $4990, $4991, $4992, $4993, $4994, $4995, $4996, $4997, $4998, $4999, $5000, $5001, $5002, $5003, $5004, $5005, $5006, $5007, $5008, VersionRange($5009, $5010)), ($5011, $5012, $5013, $5014, $5015, $5016, $5017, $5018, $5019, $5020, $5021, $5022, $5023, $5024, $5025, $5026, $5027, $5028, $5029, $5030, $5031, $5032, $5033, $5034, $5035, $5036, $5037, $5038, VersionRange($5039, $5040)), ($5041, $5042, $5043, $5044, $5045, $5046, $5047, $5048, $5049, $5050, $5051, $5052, $5053, $5054, $5055, $5056, $5057, $5058, $5059, $5060, $5061, $5062, $5063, $5064, $5065, $5066, $5067, $5068, VersionRange($5069, $5070)), ($5071, $5072, $5073, $5074, $5075, $5076, $5077, $5078, $5079, $5080, $5081, $5082, $5083, $5084, $5085, $5086, $5087, $5088, $5089, $5090, $5091, $5092, $5093, $5094, $5095, $5096, $5097, $5098, VersionRange($5099, $5100)), ($5101, $5102, $5103, $5104, $5105, $5106, $5107, $5108, $5109, $5110, $5111, $5112, $5113, $5114, $5115, $5116, $5117, $5118, $5119, $5120, $5121, $5122, $5123, $5124, $5125, $5126, $5127, $5128, VersionRange($5129, $5130)), ($5131, $5132, $5133, $5134, $5135, $5136, $5137, $5138, $5139, $5140, $5141, $5142, $5143, $5144, $5145, $5146, $5147, $5148, $5149, $5150, $5151, $5152, $5153, $5154, $5155, $5156, $5157, $5158, VersionRange($5159, $5160)), ($5161, $5162, $5163, $5164, $5165, $5166, $5167, $5168, $5169, $5170, $5171, $5172, $5173, $5174, $5175, $5176, $5177, $5178, $5179, $5180, $5181, $5182, $5183, $5184, $5185, $5186, $5187, $5188, VersionRange($5189, $5190)), ($5191, $5192, $5193, $5194, $5195, $5196, $5197, $5198, $5199, $5200, $5201, $5202, $5203, $5204, $5205, $5206, $5207, $5208, $5209, $5210, $5211, $5212, $5213, $5214, $5215, $5216, $5217, $5218, VersionRange($5219, $5220)), ($5221, $5222, $5223, $5224, $5225, $5226, $5227, $5228, $5229, $5230, $5231, $5232, $5233, $5234, $5235, $5236, $5237, $5238, $5239, $5240, $5241, $5242, $5243, $5244, $5245, $5246, $5247, $5248, VersionRange($5249, $5250)), ($5251, $5252, $5253, $5254, $5255, $5256, $5257, $5258, $5259, $5260, $5261, $5262, $5263, $5264, $5265, $5266, $5267, $5268, $5269, $5270, $5271, $5272, $5273, $5274, $5275, $5276, $5277, $5278, VersionRange($5279, $5280)), ($5281, $5282, $5283, $5284, $5285, $5286, $5287, $5288, $5289, $5290, $5291, $5292, $5293, $5294, $5295, $5296, $5297, $5298, $5299, $5300, $5301, $5302, $5303, $5304, $5305, $5306, $5307, $5308, VersionRange($5309, $5310)), ($5311, $5312, $5313, $5314, $5315, $5316, $5317, $5318, $5319, $5320, $5321, $5322, $5323, $5324, $5325, $5326, $5327, $5328, $5329, $5330, $5331, $5332, $5333, $5334, $5335, $5336, $5337, $5338, VersionRange($5339, $5340)), ($5341, $5342, $5343, $5344, $5345, $5346, $5347, $5348, $5349, $5350, $5351, $5352, $5353, $5354, $5355, $5356, $5357, $5358, $5359, $5360, $5361, $5362, $5363, $5364, $5365, $5366, $5367, $5368, VersionRange($5369, $5370)), ($5371, $5372, $5373, $5374, $5375, $5376, $5377, $5378, $5379, $5380, $5381, $5382, $5383, $5384, $5385, $5386, $5387, $5388, $5389, $5390, $5391, $5392, $5393, $5394, $5395, $5396, $5397, $5398, VersionRange($5399, $5400)), ($5401, $5402, $5403, $5404, $5405, $5406, $5407, $5408, $5409, $5410, $5411, $5412, $5413, $5414, $5415, $5416, $5417, $5418, $5419, $5420, $5421, $5422, $5423, $5424, $5425, $5426, $5427, $5428, VersionRange($5429, $5430)), ($5431, $5432, $5433, $5434, $5435, $5436, $5437, $5438, $5439, $5440, $5441, $5442, $5443, $5444, $5445, $5446, $5447, $5448, $5449, $5450, $5451, $5452, $5453, $5454, $5455, $5456, $5457, $5458, VersionRange($5459, $5460)), ($5461, $5462, $5463, $5464, $5465, $5466, $5467, $5468, $5469, $5470, $5471, $5472, $5473, $5474, $5475, $5476, $5477, $5478, $5479, $5480, $5481, $5482, $5483, $5484, $5485, $5486, $5487, $5488, VersionRange($5489, $5490)), ($5491, $5492, $5493, $5494, $5495, $5496, $5497, $5498, $5499, $5500, $5501, $5502, $5503, $5504, $5505, $5506, $5507, $5508, $5509, $5510, $5511, $5512, $5513, $5514, $5515, $5516, $5517, $5518, VersionRange($5519, $5520)), ($5521, $5522, $5523, $5524, $5525, $5526, $5527, $5528, $5529, $5530, $5531, $5532, $5533, $5534, $5535, $5536, $5537, $5538, $5539, $5540, $5541, $5542, $5543, $5544, $5545, $5546, $5547, $5548, VersionRange($5549, $5550)), ($5551, $5552, $5553, $5554, $5555, $5556, $5557, $5558, $5559, $5560, $5561, $5562, $5563, $5564, $5565, $5566, $5567, $5568, $5569, $5570, $5571, $5572, $5573, $5574, $5575, $5576, $5577, $5578, VersionRange($5579, $5580)), ($5581, $5582, $5583, $5584, $5585, $5586, $5587, $5588, $5589, $5590, $5591, $5592, $5593, $5594, $5595, $5596, $5597, $5598, $5599, $5600, $5601, $5602, $5603, $5604, $5605, $5606, $5607, $5608, VersionRange($5609, $5610)), ($5611, $5612, $5613, $5614, $5615, $5616, $5617, $5618, $5619, $5620, $5621, $5622, $5623, $5624, $5625, $5626, $5627, $5628, $5629, $5630, $5631, $5632, $5633, $5634, $5635, $5636, $5637, $5638, VersionRange($5639, $5640)), ($5641, $5642, $5643, $5644, $5645, $5646, $5647, $5648, $5649, $5650, $5651, $5652, $5653, $5654, $5655, $5656, $5657, $5658, $5659, $5660, $5661, $5662, $5663, $5664, $5665, $5666, $5667, $5668, VersionRange($5669, $5670)), ($5671, $5672, $5673, $5674, $5675, $5676, $5677, $5678, $5679, $5680, $5681, $5682, $5683, $5684, $5685, $5686, $5687, $5688, $5689, $5690, $5691, $5692, $5693, $5694, $5695, $5696, $5697, $5698, VersionRange($5699, $5700)), ($5701, $5702, $5703, $5704, $5705, $5706, $5707, $5708, $5709, $5710, $5711, $5712, $5713, $5714, $5715, $5716, $5717, $5718, $5719, $5720, $5721, $5722, $5723, $5724, $5725, $5726, $5727, $5728, VersionRange($5729, $5730)), ($5731, $5732, $5733, $5734, $5735, $5736, $5737, $5738, $5739, $5740, $5741, $5742, $5743, $5744, $5745, $5746, $5747, $5748, $5749, $5750, $5751, $5752, $5753, $5754, $5755, $5756, $5757, $5758, VersionRange($5759, $5760)), ($5761, $5762, $5763, $5764, $5765, $5766, $5767, $5768, $5769, $5770, $5771, $5772, $5773, $5774, $5775, $5776, $5777, $5778, $5779, $5780, $5781, $5782, $5783, $5784, $5785, $5786, $5787, $5788, VersionRange($5789, $5790)), ($5791, $5792, $5793, $5794, $5795, $5796, $5797, $5798, $5799, $5800, $5801, $5802, $5803, $5804, $5805, $5806, $5807, $5808, $5809, $5810, $5811, $5812, $5813, $5814, $5815, $5816, $5817, $5818, VersionRange($5819, $5820)), ($5821, $5822, $5823, $5824, $5825, $5826, $5827, $5828, $5829, $5830, $5831, $5832, $5833, $5834, $5835, $5836, $5837, $5838, $5839, $5840, $5841, $5842, $5843, $5844, $5845, $5846, $5847, $5848, VersionRange($5849, $5850)), ($5851, $5852, $5853, $5854, $5855, $5856, $5857, $5858, $5859, $5860, $5861, $5862, $5863, $5864, $5865, $5866, $5867, $5868, $5869, $5870, $5871, $5872, $5873, $5874, $5875, $5876, $5877, $5878, VersionRange($5879, $5880)), ($5881, $5882, $5883, $5884, $5885, $5886, $5887, $5888, $5889, $5890, $5891, $5892, $5893, $5894, $5895, $5896, $5897, $5898, $5899, $5900, $5901, $5902, $5903, $5904, $5905, $5906, $5907, $5908, VersionRange($5909, $5910)), ($5911, $5912, $5913, $5914, $5915, $5916, $5917, $5918, $5919, $5920, $5921, $5922, $5923, $5924, $5925, $5926, $5927, $5928, $5929, $5930, $5931, $5932, $5933, $5934, $5935, $5936, $5937, $5938, VersionRange($5939, $5940)), ($5941, $5942, $5943, $5944, $5945, $5946, $5947, $5948, $5949, $5950, $5951, $5952, $5953, $5954, $5955, $5956, $5957, $5958, $5959, $5960, $5961, $5962, $5963, $5964, $5965, $5966, $5967, $5968, VersionRange($5969, $5970)), ($5971, $5972, $5973, $5974, $5975, $5976, $5977, $5978, $5979, $5980, $5981, $5982, $5983, $5984, $5985, $5986, $5987, $5988, $5989, $5990, $5991, $5992, $5993, $5994, $5995, $5996, $5997, $5998, VersionRange($5999, $6000)), ($6001, $6002, $6003, $6004, $6005, $6006, $6007, $6008, $6009, $6010, $6011, $6012, $6013, $6014, $6015, $6016, $6017, $6018, $6019, $6020, $6021, $6022, $6023, $6024, $6025, $6026, $6027, $6028, VersionRange($6029, $6030)), ($6031, $6032, $6033, $6034, $6035, $6036, $6037, $6038, $6039, $6040, $6041, $6042, $6043, $6044, $6045, $6046, $6047, $6048, $6049, $6050, $6051, $6052, $6053, $6054, $6055, $6056, $6057, $6058, VersionRange($6059, $6060)), ($6061, $6062, $6063, $6064, $6065, $6066, $6067, $6068, $6069, $6070, $6071, $6072, $6073, $6074, $6075, $6076, $6077, $6078, $6079, $6080, $6081, $6082, $6083, $6084, $6085, $6086, $6087, $6088, VersionRange($6089, $6090)), ($6091, $6092, $6093, $6094, $6095, $6096, $6097, $6098, $6099, $6100, $6101, $6102, $6103, $6104, $6105, $6106, $6107, $6108, $6109, $6110, $6111, $6112, $6113, $6114, $6115, $6116, $6117, $6118, VersionRange($6119, $6120)), ($6121, $6122, $6123, $6124, $6125, $6126, $6127, $6128, $6129, $6130, $6131, $6132, $6133, $6134, $6135, $6136, $6137, $6138, $6139, $6140, $6141, $6142, $6143, $6144, $6145, $6146, $6147, $6148, VersionRange($6149, $6150)), ($6151, $6152, $6153, $6154, $6155, $6156, $6157, $6158, $6159, $6160, $6161, $6162, $6163, $6164, $6165, $6166, $6167, $6168, $6169, $6170, $6171, $6172, $6173, $6174, $6175, $6176, $6177, $6178, VersionRange($6179, $6180)), ($6181, $6182, $6183, $6184, $6185, $6186, $6187, $6188, $6189, $6190, $6191, $6192, $6193, $6194, $6195, $6196, $6197, $6198, $6199, $6200, $6201, $6202, $6203, $6204, $6205, $6206, $6207, $6208, VersionRange($6209, $6210)), ($6211, $6212, $6213, $6214, $6215, $6216, $6217, $6218, $6219, $6220, $6221, $6222, $6223, $6224, $6225, $6226, $6227, $6228, $6229, $6230, $6231, $6232, $6233, $6234, $6235, $6236, $6237, $6238, VersionRange($6239, $6240)), ($6241, $6242, $6243, $6244, $6245, $6246, $6247, $6248, $6249, $6250, $6251, $6252, $6253, $6254, $6255, $6256, $6257, $6258, $6259, $6260, $6261, $6262, $6263, $6264, $6265, $6266, $6267, $6268, VersionRange($6269, $6270)), ($6271, $6272, $6273, $6274, $6275, $6276, $6277, $6278, $6279, $6280, $6281, $6282, $6283, $6284, $6285, $6286, $6287, $6288, $6289, $6290, $6291, $6292, $6293, $6294, $6295, $6296, $6297, $6298, VersionRange($6299, $6300)), ($6301, $6302, $6303, $6304, $6305, $6306, $6307, $6308, $6309, $6310, $6311, $6312, $6313, $6314, $6315, $6316, $6317, $6318, $6319, $6320, $6321, $6322, $6323, $6324, $6325, $6326, $6327, $6328, VersionRange($6329, $6330)), ($6331, $6332, $6333, $6334, $6335, $6336, $6337, $6338, $6339, $6340, $6341, $6342, $6343, $6344, $6345, $6346, $6347, $6348, $6349, $6350, $6351, $6352, $6353, $6354, $6355, $6356, $6357, $6358, VersionRange($6359, $6360)), ($6361, $6362, $6363, $6364, $6365, $6366, $6367, $6368, $6369, $6370, $6371, $6372, $6373, $6374, $6375, $6376, $6377, $6378, $6379, $6380, $6381, $6382, $6383, $6384, $6385, $6386, $6387, $6388, VersionRange($6389, $6390)), ($6391, $6392, $6393, $6394, $6395, $6396, $6397, $6398, $6399, $6400, $6401, $6402, $6403, $6404, $6405, $6406, $6407, $6408, $6409, $6410, $6411, $6412, $6413, $6414, $6415, $6416, $6417, $6418, VersionRange($6419, $6420)), ($6421, $6422, $6423, $6424, $6425, $6426, $6427, $6428, $6429, $6430, $6431, $6432, $6433, $6434, $6435, $6436, $6437, $6438, $6439, $6440, $6441, $6442, $6443, $6444, $6445, $6446, $6447, $6448, VersionRange($6449, $6450)), ($6451, $6452, $6453, $6454, $6455, $6456, $6457, $6458, $6459, $6460, $6461, $6462, $6463, $6464, $6465, $6466, $6467, $6468, $6469, $6470, $6471, $6472, $6473, $6474, $6475, $6476, $6477, $6478, VersionRange($6479, $6480)), ($6481, $6482, $6483, $6484, $6485, $6486, $6487, $6488, $6489, $6490, $6491, $6492, $6493, $6494, $6495, $6496, $6497, $6498, $6499, $6500, $6501, $6502, $6503, $6504, $6505, $6506, $6507, $6508, VersionRange($6509, $6510)), ($6511, $6512, $6513, $6514, $6515, $6516, $6517, $6518, $6519, $6520, $6521, $6522, $6523, $6524, $6525, $6526, $6527, $6528, $6529, $6530, $6531, $6532, $6533, $6534, $6535, $6536, $6537, $6538, VersionRange($6539, $6540)), ($6541, $6542, $6543, $6544, $6545, $6546, $6547, $6548, $6549, $6550, $6551, $6552, $6553, $6554, $6555, $6556, $6557, $6558, $6559, $6560, $6561, $6562, $6563, $6564, $6565, $6566, $6567, $6568, VersionRange($6569, $6570)), ($6571, $6572, $6573, $6574, $6575, $6576, $6577, $6578, $6579, $6580, $6581, $6582, $6583, $6584, $6585, $6586, $6587, $6588, $6589, $6590, $6591, $6592, $6593, $6594, $6595, $6596, $6597, $6598, VersionRange($6599, $6600)), ($6601, $6602, $6603, $6604, $6605, $6606, $6607, $6608, $6609, $6610, $6611, $6612, $6613, $6614, $6615, $6616, $6617, $6618, $6619, $6620, $6621, $6622, $6623, $6624, $6625, $6626, $6627, $6628, VersionRange($6629, $6630)), ($6631, $6632, $6633, $6634, $6635, $6636, $6637, $6638, $6639, $6640, $6641, $6642, $6643, $6644, $6645, $6646, $6647, $6648, $6649, $6650, $6651, $6652, $6653, $6654, $6655, $6656, $6657, $6658, VersionRange($6659, $6660)), ($6661, $6662, $6663, $6664, $6665, $6666, $6667, $6668, $6669, $6670, $6671, $6672, $6673, $6674, $6675, $6676, $6677, $6678, $6679, $6680, $6681, $6682, $6683, $6684, $6685, $6686, $6687, $6688, VersionRange($6689, $6690)), ($6691, $6692, $6693, $6694, $6695, $6696, $6697, $6698, $6699, $6700, $6701, $6702, $6703, $6704, $6705, $6706, $6707, $6708, $6709, $6710, $6711, $6712, $6713, $6714, $6715, $6716, $6717, $6718, VersionRange($6719, $6720)), ($6721, $6722, $6723, $6724, $6725, $6726, $6727, $6728, $6729, $6730, $6731, $6732, $6733, $6734, $6735, $6736, $6737, $6738, $6739, $6740, $6741, $6742, $6743, $6744, $6745, $6746, $6747, $6748, VersionRange($6749, $6750)), ($6751, $6752, $6753, $6754, $6755, $6756, $6757, $6758, $6759, $6760, $6761, $6762, $6763, $6764, $6765, $6766, $6767, $6768, $6769, $6770, $6771, $6772, $6773, $6774, $6775, $6776, $6777, $6778, VersionRange($6779, $6780)), ($6781, $6782, $6783, $6784, $6785, $6786, $6787, $6788, $6789, $6790, $6791, $6792, $6793, $6794, $6795, $6796, $6797, $6798, $6799, $6800, $6801, $6802, $6803, $6804, $6805, $6806, $6807, $6808, VersionRange($6809, $6810)), ($6811, $6812, $6813, $6814, $6815, $6816, $6817, $6818, $6819, $6820, $6821, $6822, $6823, $6824, $6825, $6826, $6827, $6828, $6829, $6830, $6831, $6832, $6833, $6834, $6835, $6836, $6837, $6838, VersionRange($6839, $6840)), ($6841, $6842, $6843, $6844, $6845, $6846, $6847, $6848, $6849, $6850, $6851, $6852, $6853, $6854, $6855, $6856, $6857, $6858, $6859, $6860, $6861, $6862, $6863, $6864, $6865, $6866, $6867, $6868, VersionRange($6869, $6870)), ($6871, $6872, $6873, $6874, $6875, $6876, $6877, $6878, $6879, $6880, $6881, $6882, $6883, $6884, $6885, $6886, $6887, $6888, $6889, $6890, $6891, $6892, $6893, $6894, $6895, $6896, $6897, $6898, VersionRange($6899, $6900)), ($6901, $6902, $6903, $6904, $6905, $6906, $6907, $6908, $6909, $6910, $6911, $6912, $6913, $6914, $6915, $6916, $6917, $6918, $6919, $6920, $6921, $6922, $6923, $6924, $6925, $6926, $6927, $6928, VersionRange($6929, $6930)), ($6931, $6932, $6933, $6934, $6935, $6936, $6937, $6938, $6939, $6940, $6941, $6942, $6943, $6944, $6945, $6946, $6947, $6948, $6949, $6950, $6951, $6952, $6953, $6954, $6955, $6956, $6957, $6958, VersionRange($6959, $6960)), ($6961, $6962, $6963, $6964, $6965, $6966, $6967, $6968, $6969, $6970, $6971, $6972, $6973, $6974, $6975, $6976, $6977, $6978, $6979, $6980, $6981, $6982, $6983, $6984, $6985, $6986, $6987, $6988, VersionRange($6989, $6990)), ($6991, $6992, $6993, $6994, $6995, $6996, $6997, $6998, $6999, $7000, $7001, $7002, $7003, $7004, $7005, $7006, $7007, $7008, $7009, $7010, $7011, $7012, $7013, $7014, $7015, $7016, $7017, $7018, VersionRange($7019, $7020)), ($7021, $7022, $7023, $7024, $7025, $7026, $7027, $7028, $7029, $7030, $7031, $7032, $7033, $7034, $7035, $7036, $7037, $7038, $7039, $7040, $7041, $7042, $7043, $7044, $7045, $7046, $7047, $7048, VersionRange($7049, $7050)), ($7051, $7052, $7053, $7054, $7055, $7056, $7057, $7058, $7059, $7060, $7061, $7062, $7063, $7064, $7065, $7066, $7067, $7068, $7069, $7070, $7071, $7072, $7073, $7074, $7075, $7076, $7077, $7078, VersionRange($7079, $7080)), ($7081, $7082, $7083, $7084, $7085, $7086, $7087, $7088, $7089, $7090, $7091, $7092, $7093, $7094, $7095, $7096, $7097, $7098, $7099, $7100, $7101, $7102, $7103, $7104, $7105, $7106, $7107, $7108, VersionRange($7109, $7110)), ($7111, $7112, $7113, $7114, $7115, $7116, $7117, $7118, $7119, $7120, $7121, $7122, $7123, $7124, $7125, $7126, $7127, $7128, $7129, $7130, $7131, $7132, $7133, $7134, $7135, $7136, $7137, $7138, VersionRange($7139, $7140)), ($7141, $7142, $7143, $7144, $7145, $7146, $7147, $7148, $7149, $7150, $7151, $7152, $7153, $7154, $7155, $7156, $7157, $7158, $7159, $7160, $7161, $7162, $7163, $7164, $7165, $7166, $7167, $7168, VersionRange($7169, $7170)), ($7171, $7172, $7173, $7174, $7175, $7176, $7177, $7178, $7179, $7180, $7181, $7182, $7183, $7184, $7185, $7186, $7187, $7188, $7189, $7190, $7191, $7192, $7193, $7194, $7195, $7196, $7197, $7198, VersionRange($7199, $7200)), ($7201, $7202, $7203, $7204, $7205, $7206, $7207, $7208, $7209, $7210, $7211, $7212, $7213, $7214, $7215, $7216, $7217, $7218, $7219, $7220, $7221, $7222, $7223, $7224, $7225, $7226, $7227, $7228, VersionRange($7229, $7230)), ($7231, $7232, $7233, $7234, $7235, $7236, $7237, $7238, $7239, $7240, $7241, $7242, $7243, $7244, $7245, $7246, $7247, $7248, $7249, $7250, $7251, $7252, $7253, $7254, $7255, $7256, $7257, $7258, VersionRange($7259, $7260)), ($7261, $7262, $7263, $7264, $7265, $7266, $7267, $7268, $7269, $7270, $7271, $7272, $7273, $7274, $7275, $7276, $7277, $7278, $7279, $7280, $7281, $7282, $7283, $7284, $7285, $7286, $7287, $7288, VersionRange($7289, $7290)), ($7291, $7292, $7293, $7294, $7295, $7296, $7297, $7298, $7299, $7300, $7301, $7302, $7303, $7304, $7305, $7306, $7307, $7308, $7309, $7310, $7311, $7312, $7313, $7314, $7315, $7316, $7317, $7318, VersionRange($7319, $7320)), ($7321, $7322, $7323, $7324, $7325, $7326, $7327, $7328, $7329, $7330, $7331, $7332, $7333, $7334, $7335, $7336, $7337, $7338, $7339, $7340, $7341, $7342, $7343, $7344, $7345, $7346, $7347, $7348, VersionRange($7349, $7350)), ($7351, $7352, $7353, $7354, $7355, $7356, $7357, $7358, $7359, $7360, $7361, $7362, $7363, $7364, $7365, $7366, $7367, $7368, $7369, $7370, $7371, $7372, $7373, $7374, $7375, $7376, $7377, $7378, VersionRange($7379, $7380)), ($7381, $7382, $7383, $7384, $7385, $7386, $7387, $7388, $7389, $7390, $7391, $7392, $7393, $7394, $7395, $7396, $7397, $7398, $7399, $7400, $7401, $7402, $7403, $7404, $7405, $7406, $7407, $7408, VersionRange($7409, $7410)), ($7411, $7412, $7413, $7414, $7415, $7416, $7417, $7418, $7419, $7420, $7421, $7422, $7423, $7424, $7425, $7426, $7427, $7428, $7429, $7430, $7431, $7432, $7433, $7434, $7435, $7436, $7437, $7438, VersionRange($7439, $7440)), ($7441, $7442, $7443, $7444, $7445, $7446, $7447, $7448, $7449, $7450, $7451, $7452, $7453, $7454, $7455, $7456, $7457, $7458, $7459, $7460, $7461, $7462, $7463, $7464, $7465, $7466, $7467, $7468, VersionRange($7469, $7470)), ($7471, $7472, $7473, $7474, $7475, $7476, $7477, $7478, $7479, $7480, $7481, $7482, $7483, $7484, $7485, $7486, $7487, $7488, $7489, $7490, $7491, $7492, $7493, $7494, $7495, $7496, $7497, $7498, VersionRange($7499, $7500)), ($7501, $7502, $7503, $7504, $7505, $7506, $7507, $7508, $7509, $7510, $7511, $7512, $7513, $7514, $7515, $7516, $7517, $7518, $7519, $7520, $7521, $7522, $7523, $7524, $7525, $7526, $7527, $7528, VersionRange($7529, $7530)), ($7531, $7532, $7533, $7534, $7535, $7536, $7537, $7538, $7539, $7540, $7541, $7542, $7543, $7544, $7545, $7546, $7547, $7548, $7549, $7550, $7551, $7552, $7553, $7554, $7555, $7556, $7557, $7558, VersionRange($7559, $7560)), ($7561, $7562, $7563, $7564, $7565, $7566, $7567, $7568, $7569, $7570, $7571, $7572, $7573, $7574, $7575, $7576, $7577, $7578, $7579, $7580, $7581, $7582, $7583, $7584, $7585, $7586, $7587, $7588, VersionRange($7589, $7590)), ($7591, $7592, $7593, $7594, $7595, $7596, $7597, $7598, $7599, $7600, $7601, $7602, $7603, $7604, $7605, $7606, $7607, $7608, $7609, $7610, $7611, $7612, $7613, $7614, $7615, $7616, $7617, $7618, VersionRange($7619, $7620)), ($7621, $7622, $7623, $7624, $7625, $7626, $7627, $7628, $7629, $7630, $7631, $7632, $7633, $7634, $7635, $7636, $7637, $7638, $7639, $7640, $7641, $7642, $7643, $7644, $7645, $7646, $7647, $7648, VersionRange($7649, $7650)), ($7651, $7652, $7653, $7654, $7655, $7656, $7657, $7658, $7659, $7660, $7661, $7662, $7663, $7664, $7665, $7666, $7667, $7668, $7669, $7670, $7671, $7672, $7673, $7674, $7675, $7676, $7677, $7678, VersionRange($7679, $7680)), ($7681, $7682, $7683, $7684, $7685, $7686, $7687, $7688, $7689, $7690, $7691, $7692, $7693, $7694, $7695, $7696, $7697, $7698, $7699, $7700, $7701, $7702, $7703, $7704, $7705, $7706, $7707, $7708, VersionRange($7709, $7710)), ($7711, $7712, $7713, $7714, $7715, $7716, $7717, $7718, $7719, $7720, $7721, $7722, $7723, $7724, $7725, $7726, $7727, $7728, $7729, $7730, $7731, $7732, $7733, $7734, $7735, $7736, $7737, $7738, VersionRange($7739, $7740)), ($7741, $7742, $7743, $7744, $7745, $7746, $7747, $7748, $7749, $7750, $7751, $7752, $7753, $7754, $7755, $7756, $7757, $7758, $7759, $7760, $7761, $7762, $7763, $7764, $7765, $7766, $7767, $7768, VersionRange($7769, $7770)), ($7771, $7772, $7773, $7774, $7775, $7776, $7777, $7778, $7779, $7780, $7781, $7782, $7783, $7784, $7785, $7786, $7787, $7788, $7789, $7790, $7791, $7792, $7793, $7794, $7795, $7796, $7797, $7798, VersionRange($7799, $7800)), ($7801, $7802, $7803, $7804, $7805, $7806, $7807, $7808, $7809, $7810, $7811, $7812, $7813, $7814, $7815, $7816, $7817, $7818, $7819, $7820, $7821, $7822, $7823, $7824, $7825, $7826, $7827, $7828, VersionRange($7829, $7830)), ($7831, $7832, $7833, $7834, $7835, $7836, $7837, $7838, $7839, $7840, $7841, $7842, $7843, $7844, $7845, $7846, $7847, $7848, $7849, $7850, $7851, $7852, $7853, $7854, $7855, $7856, $7857, $7858, VersionRange($7859, $7860)), ($7861, $7862, $7863, $7864, $7865, $7866, $7867, $7868, $7869, $7870, $7871, $7872, $7873, $7874, $7875, $7876, $7877, $7878, $7879, $7880, $7881, $7882, $7883, $7884, $7885, $7886, $7887, $7888, VersionRange($7889, $7890)), ($7891, $7892, $7893, $7894, $7895, $7896, $7897, $7898, $7899, $7900, $7901, $7902, $7903, $7904, $7905, $7906, $7907, $7908, $7909, $7910, $7911, $7912, $7913, $7914, $7915, $7916, $7917, $7918, VersionRange($7919, $7920)), ($7921, $7922, $7923, $7924, $7925, $7926, $7927, $7928, $7929, $7930, $7931, $7932, $7933, $7934, $7935, $7936, $7937, $7938, $7939, $7940, $7941, $7942, $7943, $7944, $7945, $7946, $7947, $7948, VersionRange($7949, $7950)), ($7951, $7952, $7953, $7954, $7955, $7956, $7957, $7958, $7959, $7960, $7961, $7962, $7963, $7964, $7965, $7966, $7967, $7968, $7969, $7970, $7971, $7972, $7973, $7974, $7975, $7976, $7977, $7978, VersionRange($7979, $7980)), ($7981, $7982, $7983, $7984, $7985, $7986, $7987, $7988, $7989, $7990, $7991, $7992, $7993, $7994, $7995, $7996, $7997, $7998, $7999, $8000, $8001, $8002, $8003, $8004, $8005, $8006, $8007, $8008, VersionRange($8009, $8010)), ($8011, $8012, $8013, $8014, $8015, $8016, $8017, $8018, $8019, $8020, $8021, $8022, $8023, $8024, $8025, $8026, $8027, $8028, $8029, $8030, $8031, $8032, $8033, $8034, $8035, $8036, $8037, $8038, VersionRange($8039, $8040)), ($8041, $8042, $8043, $8044, $8045, $8046, $8047, $8048, $8049, $8050, $8051, $8052, $8053, $8054, $8055, $8056, $8057, $8058, $8059, $8060, $8061, $8062, $8063, $8064, $8065, $8066, $8067, $8068, VersionRange($8069, $8070)), ($8071, $8072, $8073, $8074, $8075, $8076, $8077, $8078, $8079, $8080, $8081, $8082, $8083, $8084, $8085, $8086, $8087, $8088, $8089, $8090, $8091, $8092, $8093, $8094, $8095, $8096, $8097, $8098, VersionRange($8099, $8100)), ($8101, $8102, $8103, $8104, $8105, $8106, $8107, $8108, $8109, $8110, $8111, $8112, $8113, $8114, $8115, $8116, $8117, $8118, $8119, $8120, $8121, $8122, $8123, $8124, $8125, $8126, $8127, $8128, VersionRange($8129, $8130)), ($8131, $8132, $8133, $8134, $8135, $8136, $8137, $8138, $8139, $8140, $8141, $8142, $8143, $8144, $8145, $8146, $8147, $8148, $8149, $8150, $8151, $8152, $8153, $8154, $8155, $8156, $8157, $8158, VersionRange($8159, $8160)), ($8161, $8162, $8163, $8164, $8165, $8166, $8167, $8168, $8169, $8170, $8171, $8172, $8173, $8174, $8175, $8176, $8177, $8178, $8179, $8180, $8181, $8182, $8183, $8184, $8185, $8186, $8187, $8188, VersionRange($8189, $8190)), ($8191, $8192, $8193, $8194, $8195, $8196, $8197, $8198, $8199, $8200, $8201, $8202, $8203, $8204, $8205, $8206, $8207, $8208, $8209, $8210, $8211, $8212, $8213, $8214, $8215, $8216, $8217, $8218, VersionRange($8219, $8220)), ($8221, $8222, $8223, $8224, $8225, $8226, $8227, $8228, $8229, $8230, $8231, $8232, $8233, $8234, $8235, $8236, $8237, $8238, $8239, $8240, $8241, $8242, $8243, $8244, $8245, $8246, $8247, $8248, VersionRange($8249, $8250)), ($8251, $8252, $8253, $8254, $8255, $8256, $8257, $8258, $8259, $8260, $8261, $8262, $8263, $8264, $8265, $8266, $8267, $8268, $8269, $8270, $8271, $8272, $8273, $8274, $8275, $8276, $8277, $8278, VersionRange($8279, $8280)), ($8281, $8282, $8283, $8284, $8285, $8286, $8287, $8288, $8289, $8290, $8291, $8292, $8293, $8294, $8295, $8296, $8297, $8298, $8299, $8300, $8301, $8302, $8303, $8304, $8305, $8306, $8307, $8308, VersionRange($8309, $8310)), ($8311, $8312, $8313, $8314, $8315, $8316, $8317, $8318, $8319, $8320, $8321, $8322, $8323, $8324, $8325, $8326, $8327, $8328, $8329, $8330, $8331, $8332, $8333, $8334, $8335, $8336, $8337, $8338, VersionRange($8339, $8340)), ($8341, $8342, $8343, $8344, $8345, $8346, $8347, $8348, $8349, $8350, $8351, $8352, $8353, $8354, $8355, $8356, $8357, $8358, $8359, $8360, $8361, $8362, $8363, $8364, $8365, $8366, $8367, $8368, VersionRange($8369, $8370)), ($8371, $8372, $8373, $8374, $8375, $8376, $8377, $8378, $8379, $8380, $8381, $8382, $8383, $8384, $8385, $8386, $8387, $8388, $8389, $8390, $8391, $8392, $8393, $8394, $8395, $8396, $8397, $8398, VersionRange($8399, $8400)), ($8401, $8402, $8403, $8404, $8405, $8406, $8407, $8408, $8409, $8410, $8411, $8412, $8413, $8414, $8415, $8416, $8417, $8418, $8419, $8420, $8421, $8422, $8423, $8424, $8425, $8426, $8427, $8428, VersionRange($8429, $8430)), ($8431, $8432, $8433, $8434, $8435, $8436, $8437, $8438, $8439, $8440, $8441, $8442, $8443, $8444, $8445, $8446, $8447, $8448, $8449, $8450, $8451, $8452, $8453, $8454, $8455, $8456, $8457, $8458, VersionRange($8459, $8460)), ($8461, $8462, $8463, $8464, $8465, $8466, $8467, $8468, $8469, $8470, $8471, $8472, $8473, $8474, $8475, $8476, $8477, $8478, $8479, $8480, $8481, $8482, $8483, $8484, $8485, $8486, $8487, $8488, VersionRange($8489, $8490)), ($8491, $8492, $8493, $8494, $8495, $8496, $8497, $8498, $8499, $8500, $8501, $8502, $8503, $8504, $8505, $8506, $8507, $8508, $8509, $8510, $8511, $8512, $8513, $8514, $8515, $8516, $8517, $8518, VersionRange($8519, $8520)), ($8521, $8522, $8523, $8524, $8525, $8526, $8527, $8528, $8529, $8530, $8531, $8532, $8533, $8534, $8535, $8536, $8537, $8538, $8539, $8540, $8541, $8542, $8543, $8544, $8545, $8546, $8547, $8548, VersionRange($8549, $8550)), ($8551, $8552, $8553, $8554, $8555, $8556, $8557, $8558, $8559, $8560, $8561, $8562, $8563, $8564, $8565, $8566, $8567, $8568, $8569, $8570, $8571, $8572, $8573, $8574, $8575, $8576, $8577, $8578, VersionRange($8579, $8580)), ($8581, $8582, $8583, $8584, $8585, $8586, $8587, $8588, $8589, $8590, $8591, $8592, $8593, $8594, $8595, $8596, $8597, $8598, $8599, $8600, $8601, $8602, $8603, $8604, $8605, $8606, $8607, $8608, VersionRange($8609, $8610)), ($8611, $8612, $8613, $8614, $8615, $8616, $8617, $8618, $8619, $8620, $8621, $8622, $8623, $8624, $8625, $8626, $8627, $8628, $8629, $8630, $8631, $8632, $8633, $8634, $8635, $8636, $8637, $8638, VersionRange($8639, $8640)), ($8641, $8642, $8643, $8644, $8645, $8646, $8647, $8648, $8649, $8650, $8651, $8652, $8653, $8654, $8655, $8656, $8657, $8658, $8659, $8660, $8661, $8662, $8663, $8664, $8665, $8666, $8667, $8668, VersionRange($8669, $8670)), ($8671, $8672, $8673, $8674, $8675, $8676, $8677, $8678, $8679, $8680, $8681, $8682, $8683, $8684, $8685, $8686, $8687, $8688, $8689, $8690, $8691, $8692, $8693, $8694, $8695, $8696, $8697, $8698, VersionRange($8699, $8700)), ($8701, $8702, $8703, $8704, $8705, $8706, $8707, $8708, $8709, $8710, $8711, $8712, $8713, $8714, $8715, $8716, $8717, $8718, $8719, $8720, $8721, $8722, $8723, $8724, $8725, $8726, $8727, $8728, VersionRange($8729, $8730)), ($8731, $8732, $8733, $8734, $8735, $8736, $8737, $8738, $8739, $8740, $8741, $8742, $8743, $8744, $8745, $8746, $8747, $8748, $8749, $8750, $8751, $8752, $8753, $8754, $8755, $8756, $8757, $8758, VersionRange($8759, $8760)), ($8761, $8762, $8763, $8764, $8765, $8766, $8767, $8768, $8769, $8770, $8771, $8772, $8773, $8774, $8775, $8776, $8777, $8778, $8779, $8780, $8781, $8782, $8783, $8784, $8785, $8786, $8787, $8788, VersionRange($8789, $8790)), ($8791, $8792, $8793, $8794, $8795, $8796, $8797, $8798, $8799, $8800, $8801, $8802, $8803, $8804, $8805, $8806, $8807, $8808, $8809, $8810, $8811, $8812, $8813, $8814, $8815, $8816, $8817, $8818, VersionRange($8819, $8820)), ($8821, $8822, $8823, $8824, $8825, $8826, $8827, $8828, $8829, $8830, $8831, $8832, $8833, $8834, $8835, $8836, $8837, $8838, $8839, $8840, $8841, $8842, $8843, $8844, $8845, $8846, $8847, $8848, VersionRange($8849, $8850)), ($8851, $8852, $8853, $8854, $8855, $8856, $8857, $8858, $8859, $8860, $8861, $8862, $8863, $8864, $8865, $8866, $8867, $8868, $8869, $8870, $8871, $8872, $8873, $8874, $8875, $8876, $8877, $8878, VersionRange($8879, $8880)), ($8881, $8882, $8883, $8884, $8885, $8886, $8887, $8888, $8889, $8890, $8891, $8892, $8893, $8894, $8895, $8896, $8897, $8898, $8899, $8900, $8901, $8902, $8903, $8904, $8905, $8906, $8907, $8908, VersionRange($8909, $8910)), ($8911, $8912, $8913, $8914, $8915, $8916, $8917, $8918, $8919, $8920, $8921, $8922, $8923, $8924, $8925, $8926, $8927, $8928, $8929, $8930, $8931, $8932, $8933, $8934, $8935, $8936, $8937, $8938, VersionRange($8939, $8940)), ($8941, $8942, $8943, $8944, $8945, $8946, $8947, $8948, $8949, $8950, $8951, $8952, $8953, $8954, $8955, $8956, $8957, $8958, $8959, $8960, $8961, $8962, $8963, $8964, $8965, $8966, $8967, $8968, VersionRange($8969, $8970)), ($8971, $8972, $8973, $8974, $8975, $8976, $8977, $8978, $8979, $8980, $8981, $8982, $8983, $8984, $8985, $8986, $8987, $8988, $8989, $8990, $8991, $8992, $8993, $8994, $8995, $8996, $8997, $8998, VersionRange($8999, $9000)), ($9001, $9002, $9003, $9004, $9005, $9006, $9007, $9008, $9009, $9010, $9011, $9012, $9013, $9014, $9015, $9016, $9017, $9018, $9019, $9020, $9021, $9022, $9023, $9024, $9025, $9026, $9027, $9028, VersionRange($9029, $9030)), ($9031, $9032, $9033, $9034, $9035, $9036, $9037, $9038, $9039, $9040, $9041, $9042, $9043, $9044, $9045, $9046, $9047, $9048, $9049, $9050, $9051, $9052, $9053, $9054, $9055, $9056, $9057, $9058, VersionRange($9059, $9060)), ($9061, $9062, $9063, $9064, $9065, $9066, $9067, $9068, $9069, $9070, $9071, $9072, $9073, $9074, $9075, $9076, $9077, $9078, $9079, $9080, $9081, $9082, $9083, $9084, $9085, $9086, $9087, $9088, VersionRange($9089, $9090)), ($9091, $9092, $9093, $9094, $9095, $9096, $9097, $9098, $9099, $9100, $9101, $9102, $9103, $9104, $9105, $9106, $9107, $9108, $9109, $9110, $9111, $9112, $9113, $9114, $9115, $9116, $9117, $9118, VersionRange($9119, $9120)), ($9121, $9122, $9123, $9124, $9125, $9126, $9127, $9128, $9129, $9130, $9131, $9132, $9133, $9134, $9135, $9136, $9137, $9138, $9139, $9140, $9141, $9142, $9143, $9144, $9145, $9146, $9147, $9148, VersionRange($9149, $9150)), ($9151, $9152, $9153, $9154, $9155, $9156, $9157, $9158, $9159, $9160, $9161, $9162, $9163, $9164, $9165, $9166, $9167, $9168, $9169, $9170, $9171, $9172, $9173, $9174, $9175, $9176, $9177, $9178, VersionRange($9179, $9180)), ($9181, $9182, $9183, $9184, $9185, $9186, $9187, $9188, $9189, $9190, $9191, $9192, $9193, $9194, $9195, $9196, $9197, $9198, $9199, $9200, $9201, $9202, $9203, $9204, $9205, $9206, $9207, $9208, VersionRange($9209, $9210)), ($9211, $9212, $9213, $9214, $9215, $9216, $9217, $9218, $9219, $9220, $9221, $9222, $9223, $9224, $9225, $9226, $9227, $9228, $9229, $9230, $9231, $9232, $9233, $9234, $9235, $9236, $9237, $9238, VersionRange($9239, $9240)), ($9241, $9242, $9243, $9244, $9245, $9246, $9247, $9248, $9249, $9250, $9251, $9252, $9253, $9254, $9255, $9256, $9257, $9258, $9259, $9260, $9261, $9262, $9263, $9264, $9265, $9266, $9267, $9268, VersionRange($9269, $9270)), ($9271, $9272, $9273, $9274, $9275, $9276, $9277, $9278, $9279, $9280, $9281, $9282, $9283, $9284, $9285, $9286, $9287, $9288, $9289, $9290, $9291, $9292, $9293, $9294, $9295, $9296, $9297, $9298, VersionRange($9299, $9300)), ($9301, $9302, $9303, $9304, $9305, $9306, $9307, $9308, $9309, $9310, $9311, $9312, $9313, $9314, $9315, $9316, $9317, $9318, $9319, $9320, $9321, $9322, $9323, $9324, $9325, $9326, $9327, $9328, VersionRange($9329, $9330)), ($9331, $9332, $9333, $9334, $9335, $9336, $9337, $9338, $9339, $9340, $9341, $9342, $9343, $9344, $9345, $9346, $9347, $9348, $9349, $9350, $9351, $9352, $9353, $9354, $9355, $9356, $9357, $9358, VersionRange($9359, $9360)), ($9361, $9362, $9363, $9364, $9365, $9366, $9367, $9368, $9369, $9370, $9371, $9372, $9373, $9374, $9375, $9376, $9377, $9378, $9379, $9380, $9381, $9382, $9383, $9384, $9385, $9386, $9387, $9388, VersionRange($9389, $9390)), ($9391, $9392, $9393, $9394, $9395, $9396, $9397, $9398, $9399, $9400, $9401, $9402, $9403, $9404, $9405, $9406, $9407, $9408, $9409, $9410, $9411, $9412, $9413, $9414, $9415, $9416, $9417, $9418, VersionRange($9419, $9420)), ($9421, $9422, $9423, $9424, $9425, $9426, $9427, $9428, $9429, $9430, $9431, $9432, $9433, $9434, $9435, $9436, $9437, $9438, $9439, $9440, $9441, $9442, $9443, $9444, $9445, $9446, $9447, $9448, VersionRange($9449, $9450)), ($9451, $9452, $9453, $9454, $9455, $9456, $9457, $9458, $9459, $9460, $9461, $9462, $9463, $9464, $9465, $9466, $9467, $9468, $9469, $9470, $9471, $9472, $9473, $9474, $9475, $9476, $9477, $9478, VersionRange($9479, $9480)), ($9481, $9482, $9483, $9484, $9485, $9486, $9487, $9488, $9489, $9490, $9491, $9492, $9493, $9494, $9495, $9496, $9497, $9498, $9499, $9500, $9501, $9502, $9503, $9504, $9505, $9506, $9507, $9508, VersionRange($9509, $9510)), ($9511, $9512, $9513, $9514, $9515, $9516, $9517, $9518, $9519, $9520, $9521, $9522, $9523, $9524, $9525, $9526, $9527, $9528, $9529, $9530, $9531, $9532, $9533, $9534, $9535, $9536, $9537, $9538, VersionRange($9539, $9540)), ($9541, $9542, $9543, $9544, $9545, $9546, $9547, $9548, $9549, $9550, $9551, $9552, $9553, $9554, $9555, $9556, $9557, $9558, $9559, $9560, $9561, $9562, $9563, $9564, $9565, $9566, $9567, $9568, VersionRange($9569, $9570)), ($9571, $9572, $9573, $9574, $9575, $9576, $9577, $9578, $9579, $9580, $9581, $9582, $9583, $9584, $9585, $9586, $9587, $9588, $9589, $9590, $9591, $9592, $9593, $9594, $9595, $9596, $9597, $9598, VersionRange($9599, $9600)), ($9601, $9602, $9603, $9604, $9605, $9606, $9607, $9608, $9609, $9610, $9611, $9612, $9613, $9614, $9615, $9616, $9617, $9618, $9619, $9620, $9621, $9622, $9623, $9624, $9625, $9626, $9627, $9628, VersionRange($9629, $9630)), ($9631, $9632, $9633, $9634, $9635, $9636, $9637, $9638, $9639, $9640, $9641, $9642, $9643, $9644, $9645, $9646, $9647, $9648, $9649, $9650, $9651, $9652, $9653, $9654, $9655, $9656, $9657, $9658, VersionRange($9659, $9660)), ($9661, $9662, $9663, $9664, $9665, $9666, $9667, $9668, $9669, $9670, $9671, $9672, $9673, $9674, $9675, $9676, $9677, $9678, $9679, $9680, $9681, $9682, $9683, $9684, $9685, $9686, $9687, $9688, VersionRange($9689, $9690)), ($9691, $9692, $9693, $9694, $9695, $9696, $9697, $9698, $9699, $9700, $9701, $9702, $9703, $9704, $9705, $9706, $9707, $9708, $9709, $9710, $9711, $9712, $9713, $9714, $9715, $9716, $9717, $9718, VersionRange($9719, $9720)), ($9721, $9722, $9723, $9724, $9725, $9726, $9727, $9728, $9729, $9730, $9731, $9732, $9733, $9734, $9735, $9736, $9737, $9738, $9739, $9740, $9741, $9742, $9743, $9744, $9745, $9746, $9747, $9748, VersionRange($9749, $9750)), ($9751, $9752, $9753, $9754, $9755, $9756, $9757, $9758, $9759, $9760, $9761, $9762, $9763, $9764, $9765, $9766, $9767, $9768, $9769, $9770, $9771, $9772, $9773, $9774, $9775, $9776, $9777, $9778, VersionRange($9779, $9780)), ($9781, $9782, $9783, $9784, $9785, $9786, $9787, $9788, $9789, $9790, $9791, $9792, $9793, $9794, $9795, $9796, $9797, $9798, $9799, $9800, $9801, $9802, $9803, $9804, $9805, $9806, $9807, $9808, VersionRange($9809, $9810)), ($9811, $9812, $9813, $9814, $9815, $9816, $9817, $9818, $9819, $9820, $9821, $9822, $9823, $9824, $9825, $9826, $9827, $9828, $9829, $9830, $9831, $9832, $9833, $9834, $9835, $9836, $9837, $9838, VersionRange($9839, $9840)), ($9841, $9842, $9843, $9844, $9845, $9846, $9847, $9848, $9849, $9850, $9851, $9852, $9853, $9854, $9855, $9856, $9857, $9858, $9859, $9860, $9861, $9862, $9863, $9864, $9865, $9866, $9867, $9868, VersionRange($9869, $9870)), ($9871, $9872, $9873, $9874, $9875, $9876, $9877, $9878, $9879, $9880, $9881, $9882, $9883, $9884, $9885, $9886, $9887, $9888, $9889, $9890, $9891, $9892, $9893, $9894, $9895, $9896, $9897, $9898, VersionRange($9899, $9900)), ($9901, $9902, $9903, $9904, $9905, $9906, $9907, $9908, $9909, $9910, $9911, $9912, $9913, $9914, $9915, $9916, $9917, $9918, $9919, $9920, $9921, $9922, $9923, $9924, $9925, $9926, $9927, $9928, VersionRange($9929, $9930)), ($9931, $9932, $9933, $9934, $9935, $9936, $9937, $9938, $9939, $9940, $9941, $9942, $9943, $9944, $9945, $9946, $9947, $9948, $9949, $9950, $9951, $9952, $9953, $9954, $9955, $9956, $9957, $9958, VersionRange($9959, $9960)), ($9961, $9962, $9963, $9964, $9965, $9966, $9967, $9968, $9969, $9970, $9971, $9972, $9973, $9974, $9975, $9976, $9977, $9978, $9979, $9980, $9981, $9982, $9983, $9984, $9985, $9986, $9987, $9988, VersionRange($9989, $9990)), ($9991, $9992, $9993, $9994, $9995, $9996, $9997, $9998, $9999, $10000, $10001, $10002, $10003, $10004, $10005, $10006, $10007, $10008, $10009, $10010, $10011, $10012, $10013, $10014, $10015, $10016, $10017, $10018, VersionRange($10019, $10020)), ($10021, $10022, $10023, $10024, $10025, $10026, $10027, $10028, $10029, $10030, $10031, $10032, $10033, $10034, $10035, $10036, $10037, $10038, $10039, $10040, $10041, $10042, $10043, $10044, $10045, $10046, $10047, $10048, VersionRange($10049, $10050)), ($10051, $10052, $10053, $10054, $10055, $10056, $10057, $10058, $10059, $10060, $10061, $10062, $10063, $10064, $10065, $10066, $10067, $10068, $10069, $10070, $10071, $10072, $10073, $10074, $10075, $10076, $10077, $10078, VersionRange($10079, $10080)), ($10081, $10082, $10083, $10084, $10085, $10086, $10087, $10088, $10089, $10090, $10091, $10092, $10093, $10094, $10095, $10096, $10097, $10098, $10099, $10100, $10101, $10102, $10103, $10104, $10105, $10106, $10107, $10108, VersionRange($10109, $10110)), ($10111, $10112, $10113, $10114, $10115, $10116, $10117, $10118, $10119, $10120, $10121, $10122, $10123, $10124, $10125, $10126, $10127, $10128, $10129, $10130, $10131, $10132, $10133, $10134, $10135, $10136, $10137, $10138, VersionRange($10139, $10140)), ($10141, $10142, $10143, $10144, $10145, $10146, $10147, $10148, $10149, $10150, $10151, $10152, $10153, $10154, $10155, $10156, $10157, $10158, $10159, $10160, $10161, $10162, $10163, $10164, $10165, $10166, $10167, $10168, VersionRange($10169, $10170)), ($10171, $10172, $10173, $10174, $10175, $10176, $10177, $10178, $10179, $10180, $10181, $10182, $10183, $10184, $10185, $10186, $10187, $10188, $10189, $10190, $10191, $10192, $10193, $10194, $10195, $10196, $10197, $10198, VersionRange($10199, $10200)), ($10201, $10202, $10203, $10204, $10205, $10206, $10207, $10208, $10209, $10210, $10211, $10212, $10213, $10214, $10215, $10216, $10217, $10218, $10219, $10220, $10221, $10222, $10223, $10224, $10225, $10226, $10227, $10228, VersionRange($10229, $10230)), ($10231, $10232, $10233, $10234, $10235, $10236, $10237, $10238, $10239, $10240, $10241, $10242, $10243, $10244, $10245, $10246, $10247, $10248, $10249, $10250, $10251, $10252, $10253, $10254, $10255, $10256, $10257, $10258, VersionRange($10259, $10260)), ($10261, $10262, $10263, $10264, $10265, $10266, $10267, $10268, $10269, $10270, $10271, $10272, $10273, $10274, $10275, $10276, $10277, $10278, $10279, $10280, $10281, $10282, $10283, $10284, $10285, $10286, $10287, $10288, VersionRange($10289, $10290)), ($10291, $10292, $10293, $10294, $10295, $10296, $10297, $10298, $10299, $10300, $10301, $10302, $10303, $10304, $10305, $10306, $10307, $10308, $10309, $10310, $10311, $10312, $10313, $10314, $10315, $10316, $10317, $10318, VersionRange($10319, $10320)), ($10321, $10322, $10323, $10324, $10325, $10326, $10327, $10328, $10329, $10330, $10331, $10332, $10333, $10334, $10335, $10336, $10337, $10338, $10339, $10340, $10341, $10342, $10343, $10344, $10345, $10346, $10347, $10348, VersionRange($10349, $10350)), ($10351, $10352, $10353, $10354, $10355, $10356, $10357, $10358, $10359, $10360, $10361, $10362, $10363, $10364, $10365, $10366, $10367, $10368, $10369, $10370, $10371, $10372, $10373, $10374, $10375, $10376, $10377, $10378, VersionRange($10379, $10380)), ($10381, $10382, $10383, $10384, $10385, $10386, $10387, $10388, $10389, $10390, $10391, $10392, $10393, $10394, $10395, $10396, $10397, $10398, $10399, $10400, $10401, $10402, $10403, $10404, $10405, $10406, $10407, $10408, VersionRange($10409, $10410)), ($10411, $10412, $10413, $10414, $10415, $10416, $10417, $10418, $10419, $10420, $10421, $10422, $10423, $10424, $10425, $10426, $10427, $10428, $10429, $10430, $10431, $10432, $10433, $10434, $10435, $10436, $10437, $10438, VersionRange($10439, $10440)), ($10441, $10442, $10443, $10444, $10445, $10446, $10447, $10448, $10449, $10450, $10451, $10452, $10453, $10454, $10455, $10456, $10457, $10458, $10459, $10460, $10461, $10462, $10463, $10464, $10465, $10466, $10467, $10468, VersionRange($10469, $10470)), ($10471, $10472, $10473, $10474, $10475, $10476, $10477, $10478, $10479, $10480, $10481, $10482, $10483, $10484, $10485, $10486, $10487, $10488, $10489, $10490, $10491, $10492, $10493, $10494, $10495, $10496, $10497, $10498, VersionRange($10499, $10500)), ($10501, $10502, $10503, $10504, $10505, $10506, $10507, $10508, $10509, $10510, $10511, $10512, $10513, $10514, $10515, $10516, $10517, $10518, $10519, $10520, $10521, $10522, $10523, $10524, $10525, $10526, $10527, $10528, VersionRange($10529, $10530)), ($10531, $10532, $10533, $10534, $10535, $10536, $10537, $10538, $10539, $10540, $10541, $10542, $10543, $10544, $10545, $10546, $10547, $10548, $10549, $10550, $10551, $10552, $10553, $10554, $10555, $10556, $10557, $10558, VersionRange($10559, $10560)), ($10561, $10562, $10563, $10564, $10565, $10566, $10567, $10568, $10569, $10570, $10571, $10572, $10573, $10574, $10575, $10576, $10577, $10578, $10579, $10580, $10581, $10582, $10583, $10584, $10585, $10586, $10587, $10588, VersionRange($10589, $10590)), ($10591, $10592, $10593, $10594, $10595, $10596, $10597, $10598, $10599, $10600, $10601, $10602, $10603, $10604, $10605, $10606, $10607, $10608, $10609, $10610, $10611, $10612, $10613, $10614, $10615, $10616, $10617, $10618, VersionRange($10619, $10620)), ($10621, $10622, $10623, $10624, $10625, $10626, $10627, $10628, $10629, $10630, $10631, $10632, $10633, $10634, $10635, $10636, $10637, $10638, $10639, $10640, $10641, $10642, $10643, $10644, $10645, $10646, $10647, $10648, VersionRange($10649, $10650)), ($10651, $10652, $10653, $10654, $10655, $10656, $10657, $10658, $10659, $10660, $10661, $10662, $10663, $10664, $10665, $10666, $10667, $10668, $10669, $10670, $10671, $10672, $10673, $10674, $10675, $10676, $10677, $10678, VersionRange($10679, $10680)), ($10681, $10682, $10683, $10684, $10685, $10686, $10687, $10688, $10689, $10690, $10691, $10692, $10693, $10694, $10695, $10696, $10697, $10698, $10699, $10700, $10701, $10702, $10703, $10704, $10705, $10706, $10707, $10708, VersionRange($10709, $10710)), ($10711, $10712, $10713, $10714, $10715, $10716, $10717, $10718, $10719, $10720, $10721, $10722, $10723, $10724, $10725, $10726, $10727, $10728, $10729, $10730, $10731, $10732, $10733, $10734, $10735, $10736, $10737, $10738, VersionRange($10739, $10740)), ($10741, $10742, $10743, $10744, $10745, $10746, $10747, $10748, $10749, $10750, $10751, $10752, $10753, $10754, $10755, $10756, $10757, $10758, $10759, $10760, $10761, $10762, $10763, $10764, $10765, $10766, $10767, $10768, VersionRange($10769, $10770)), ($10771, $10772, $10773, $10774, $10775, $10776, $10777, $10778, $10779, $10780, $10781, $10782, $10783, $10784, $10785, $10786, $10787, $10788, $10789, $10790, $10791, $10792, $10793, $10794, $10795, $10796, $10797, $10798, VersionRange($10799, $10800)), ($10801, $10802, $10803, $10804, $10805, $10806, $10807, $10808, $10809, $10810, $10811, $10812, $10813, $10814, $10815, $10816, $10817, $10818, $10819, $10820, $10821, $10822, $10823, $10824, $10825, $10826, $10827, $10828, VersionRange($10829, $10830)), ($10831, $10832, $10833, $10834, $10835, $10836, $10837, $10838, $10839, $10840, $10841, $10842, $10843, $10844, $10845, $10846, $10847, $10848, $10849, $10850, $10851, $10852, $10853, $10854, $10855, $10856, $10857, $10858, VersionRange($10859, $10860)), ($10861, $10862, $10863, $10864, $10865, $10866, $10867, $10868, $10869, $10870, $10871, $10872, $10873, $10874, $10875, $10876, $10877, $10878, $10879, $10880, $10881, $10882, $10883, $10884, $10885, $10886, $10887, $10888, VersionRange($10889, $10890)), ($10891, $10892, $10893, $10894, $10895, $10896, $10897, $10898, $10899, $10900, $10901, $10902, $10903, $10904, $10905, $10906, $10907, $10908, $10909, $10910, $10911, $10912, $10913, $10914, $10915, $10916, $10917, $10918, VersionRange($10919, $10920)), ($10921, $10922, $10923, $10924, $10925, $10926, $10927, $10928, $10929, $10930, $10931, $10932, $10933, $10934, $10935, $10936, $10937, $10938, $10939, $10940, $10941, $10942, $10943, $10944, $10945, $10946, $10947, $10948, VersionRange($10949, $10950)), ($10951, $10952, $10953, $10954, $10955, $10956, $10957, $10958, $10959, $10960, $10961, $10962, $10963, $10964, $10965, $10966, $10967, $10968, $10969, $10970, $10971, $10972, $10973, $10974, $10975, $10976, $10977, $10978, VersionRange($10979, $10980)), ($10981, $10982, $10983, $10984, $10985, $10986, $10987, $10988, $10989, $10990, $10991, $10992, $10993, $10994, $10995, $10996, $10997, $10998, $10999, $11000, $11001, $11002, $11003, $11004, $11005, $11006, $11007, $11008, VersionRange($11009, $11010)), ($11011, $11012, $11013, $11014, $11015, $11016, $11017, $11018, $11019, $11020, $11021, $11022, $11023, $11024, $11025, $11026, $11027, $11028, $11029, $11030, $11031, $11032, $11033, $11034, $11035, $11036, $11037, $11038, VersionRange($11039, $11040)), ($11041, $11042, $11043, $11044, $11045, $11046, $11047, $11048, $11049, $11050, $11051, $11052, $11053, $11054, $11055, $11056, $11057, $11058, $11059, $11060, $11061, $11062, $11063, $11064, $11065, $11066, $11067, $11068, VersionRange($11069, $11070)), ($11071, $11072, $11073, $11074, $11075, $11076, $11077, $11078, $11079, $11080, $11081, $11082, $11083, $11084, $11085, $11086, $11087, $11088, $11089, $11090, $11091, $11092, $11093, $11094, $11095, $11096, $11097, $11098, VersionRange($11099, $11100)), ($11101, $11102, $11103, $11104, $11105, $11106, $11107, $11108, $11109, $11110, $11111, $11112, $11113, $11114, $11115, $11116, $11117, $11118, $11119, $11120, $11121, $11122, $11123, $11124, $11125, $11126, $11127, $11128, VersionRange($11129, $11130)), ($11131, $11132, $11133, $11134, $11135, $11136, $11137, $11138, $11139, $11140, $11141, $11142, $11143, $11144, $11145, $11146, $11147, $11148, $11149, $11150, $11151, $11152, $11153, $11154, $11155, $11156, $11157, $11158, VersionRange($11159, $11160)), ($11161, $11162, $11163, $11164, $11165, $11166, $11167, $11168, $11169, $11170, $11171, $11172, $11173, $11174, $11175, $11176, $11177, $11178, $11179, $11180, $11181, $11182, $11183, $11184, $11185, $11186, $11187, $11188, VersionRange($11189, $11190)), ($11191, $11192, $11193, $11194, $11195, $11196, $11197, $11198, $11199, $11200, $11201, $11202, $11203, $11204, $11205, $11206, $11207, $11208, $11209, $11210, $11211, $11212, $11213, $11214, $11215, $11216, $11217, $11218, VersionRange($11219, $11220)), ($11221, $11222, $11223, $11224, $11225, $11226, $11227, $11228, $11229, $11230, $11231, $11232, $11233, $11234, $11235, $11236, $11237, $11238, $11239, $11240, $11241, $11242, $11243, $11244, $11245, $11246, $11247, $11248, VersionRange($11249, $11250)), ($11251, $11252, $11253, $11254, $11255, $11256, $11257, $11258, $11259, $11260, $11261, $11262, $11263, $11264, $11265, $11266, $11267, $11268, $11269, $11270, $11271, $11272, $11273, $11274, $11275, $11276, $11277, $11278, VersionRange($11279, $11280)), ($11281, $11282, $11283, $11284, $11285, $11286, $11287, $11288, $11289, $11290, $11291, $11292, $11293, $11294, $11295, $11296, $11297, $11298, $11299, $11300, $11301, $11302, $11303, $11304, $11305, $11306, $11307, $11308, VersionRange($11309, $11310)), ($11311, $11312, $11313, $11314, $11315, $11316, $11317, $11318, $11319, $11320, $11321, $11322, $11323, $11324, $11325, $11326, $11327, $11328, $11329, $11330, $11331, $11332, $11333, $11334, $11335, $11336, $11337, $11338, VersionRange($11339, $11340)), ($11341, $11342, $11343, $11344, $11345, $11346, $11347, $11348, $11349, $11350, $11351, $11352, $11353, $11354, $11355, $11356, $11357, $11358, $11359, $11360, $11361, $11362, $11363, $11364, $11365, $11366, $11367, $11368, VersionRange($11369, $11370)), ($11371, $11372, $11373, $11374, $11375, $11376, $11377, $11378, $11379, $11380, $11381, $11382, $11383, $11384, $11385, $11386, $11387, $11388, $11389, $11390, $11391, $11392, $11393, $11394, $11395, $11396, $11397, $11398, VersionRange($11399, $11400)), ($11401, $11402, $11403, $11404, $11405, $11406, $11407, $11408, $11409, $11410, $11411, $11412, $11413, $11414, $11415, $11416, $11417, $11418, $11419, $11420, $11421, $11422, $11423, $11424, $11425, $11426, $11427, $11428, VersionRange($11429, $11430)), ($11431, $11432, $11433, $11434, $11435, $11436, $11437, $11438, $11439, $11440, $11441, $11442, $11443, $11444, $11445, $11446, $11447, $11448, $11449, $11450, $11451, $11452, $11453, $11454, $11455, $11456, $11457, $11458, VersionRange($11459, $11460)), ($11461, $11462, $11463, $11464, $11465, $11466, $11467, $11468, $11469, $11470, $11471, $11472, $11473, $11474, $11475, $11476, $11477, $11478, $11479, $11480, $11481, $11482, $11483, $11484, $11485, $11486, $11487, $11488, VersionRange($11489, $11490)), ($11491, $11492, $11493, $11494, $11495, $11496, $11497, $11498, $11499, $11500, $11501, $11502, $11503, $11504, $11505, $11506, $11507, $11508, $11509, $11510, $11511, $11512, $11513, $11514, $11515, $11516, $11517, $11518, VersionRange($11519, $11520)), ($11521, $11522, $11523, $11524, $11525, $11526, $11527, $11528, $11529, $11530, $11531, $11532, $11533, $11534, $11535, $11536, $11537, $11538, $11539, $11540, $11541, $11542, $11543, $11544, $11545, $11546, $11547, $11548, VersionRange($11549, $11550)), ($11551, $11552, $11553, $11554, $11555, $11556, $11557, $11558, $11559, $11560, $11561, $11562, $11563, $11564, $11565, $11566, $11567, $11568, $11569, $11570, $11571, $11572, $11573, $11574, $11575, $11576, $11577, $11578, VersionRange($11579, $11580)), ($11581, $11582, $11583, $11584, $11585, $11586, $11587, $11588, $11589, $11590, $11591, $11592, $11593, $11594, $11595, $11596, $11597, $11598, $11599, $11600, $11601, $11602, $11603, $11604, $11605, $11606, $11607, $11608, VersionRange($11609, $11610)), ($11611, $11612, $11613, $11614, $11615, $11616, $11617, $11618, $11619, $11620, $11621, $11622, $11623, $11624, $11625, $11626, $11627, $11628, $11629, $11630, $11631, $11632, $11633, $11634, $11635, $11636, $11637, $11638, VersionRange($11639, $11640)), ($11641, $11642, $11643, $11644, $11645, $11646, $11647, $11648, $11649, $11650, $11651, $11652, $11653, $11654, $11655, $11656, $11657, $11658, $11659, $11660, $11661, $11662, $11663, $11664, $11665, $11666, $11667, $11668, VersionRange($11669, $11670)), ($11671, $11672, $11673, $11674, $11675, $11676, $11677, $11678, $11679, $11680, $11681, $11682, $11683, $11684, $11685, $11686, $11687, $11688, $11689, $11690, $11691, $11692, $11693, $11694, $11695, $11696, $11697, $11698, VersionRange($11699, $11700)), ($11701, $11702, $11703, $11704, $11705, $11706, $11707, $11708, $11709, $11710, $11711, $11712, $11713, $11714, $11715, $11716, $11717, $11718, $11719, $11720, $11721, $11722, $11723, $11724, $11725, $11726, $11727, $11728, VersionRange($11729, $11730)), ($11731, $11732, $11733, $11734, $11735, $11736, $11737, $11738, $11739, $11740, $11741, $11742, $11743, $11744, $11745, $11746, $11747, $11748, $11749, $11750, $11751, $11752, $11753, $11754, $11755, $11756, $11757, $11758, VersionRange($11759, $11760)), ($11761, $11762, $11763, $11764, $11765, $11766, $11767, $11768, $11769, $11770, $11771, $11772, $11773, $11774, $11775, $11776, $11777, $11778, $11779, $11780, $11781, $11782, $11783, $11784, $11785, $11786, $11787, $11788, VersionRange($11789, $11790)), ($11791, $11792, $11793, $11794, $11795, $11796, $11797, $11798, $11799, $11800, $11801, $11802, $11803, $11804, $11805, $11806, $11807, $11808, $11809, $11810, $11811, $11812, $11813, $11814, $11815, $11816, $11817, $11818, VersionRange($11819, $11820)), ($11821, $11822, $11823, $11824, $11825, $11826, $11827, $11828, $11829, $11830, $11831, $11832, $11833, $11834, $11835, $11836, $11837, $11838, $11839, $11840, $11841, $11842, $11843, $11844, $11845, $11846, $11847, $11848, VersionRange($11849, $11850)), ($11851, $11852, $11853, $11854, $11855, $11856, $11857, $11858, $11859, $11860, $11861, $11862, $11863, $11864, $11865, $11866, $11867, $11868, $11869, $11870, $11871, $11872, $11873, $11874, $11875, $11876, $11877, $11878, VersionRange($11879, $11880)), ($11881, $11882, $11883, $11884, $11885, $11886, $11887, $11888, $11889, $11890, $11891, $11892, $11893, $11894, $11895, $11896, $11897, $11898, $11899, $11900, $11901, $11902, $11903, $11904, $11905, $11906, $11907, $11908, VersionRange($11909, $11910)), ($11911, $11912, $11913, $11914, $11915, $11916, $11917, $11918, $11919, $11920, $11921, $11922, $11923, $11924, $11925, $11926, $11927, $11928, $11929, $11930, $11931, $11932, $11933, $11934, $11935, $11936, $11937, $11938, VersionRange($11939, $11940)), ($11941, $11942, $11943, $11944, $11945, $11946, $11947, $11948, $11949, $11950, $11951, $11952, $11953, $11954, $11955, $11956, $11957, $11958, $11959, $11960, $11961, $11962, $11963, $11964, $11965, $11966, $11967, $11968, VersionRange($11969, $11970)), ($11971, $11972, $11973, $11974, $11975, $11976, $11977, $11978, $11979, $11980, $11981, $11982, $11983, $11984, $11985, $11986, $11987, $11988, $11989, $11990, $11991, $11992, $11993, $11994, $11995, $11996, $11997, $11998, VersionRange($11999, $12000)), ($12001, $12002, $12003, $12004, $12005, $12006, $12007, $12008, $12009, $12010, $12011, $12012, $12013, $12014, $12015, $12016, $12017, $12018, $12019, $12020, $12021, $12022, $12023, $12024, $12025, $12026, $12027, $12028, VersionRange($12029, $12030)), ($12031, $12032, $12033, $12034, $12035, $12036, $12037, $12038, $12039, $12040, $12041, $12042, $12043, $12044, $12045, $12046, $12047, $12048, $12049, $12050, $12051, $12052, $12053, $12054, $12055, $12056, $12057, $12058, VersionRange($12059, $12060)), ($12061, $12062, $12063, $12064, $12065, $12066, $12067, $12068, $12069, $12070, $12071, $12072, $12073, $12074, $12075, $12076, $12077, $12078, $12079, $12080, $12081, $12082, $12083, $12084, $12085, $12086, $12087, $12088, VersionRange($12089, $12090)), ($12091, $12092, $12093, $12094, $12095, $12096, $12097, $12098, $12099, $12100, $12101, $12102, $12103, $12104, $12105, $12106, $12107, $12108, $12109, $12110, $12111, $12112, $12113, $12114, $12115, $12116, $12117, $12118, VersionRange($12119, $12120)), ($12121, $12122, $12123, $12124, $12125, $12126, $12127, $12128, $12129, $12130, $12131, $12132, $12133, $12134, $12135, $12136, $12137, $12138, $12139, $12140, $12141, $12142, $12143, $12144, $12145, $12146, $12147, $12148, VersionRange($12149, $12150)), ($12151, $12152, $12153, $12154, $12155, $12156, $12157, $12158, $12159, $12160, $12161, $12162, $12163, $12164, $12165, $12166, $12167, $12168, $12169, $12170, $12171, $12172, $12173, $12174, $12175, $12176, $12177, $12178, VersionRange($12179, $12180)), ($12181, $12182, $12183, $12184, $12185, $12186, $12187, $12188, $12189, $12190, $12191, $12192, $12193, $12194, $12195, $12196, $12197, $12198, $12199, $12200, $12201, $12202, $12203, $12204, $12205, $12206, $12207, $12208, VersionRange($12209, $12210)), ($12211, $12212, $12213, $12214, $12215, $12216, $12217, $12218, $12219, $12220, $12221, $12222, $12223, $12224, $12225, $12226, $12227, $12228, $12229, $12230, $12231, $12232, $12233, $12234, $12235, $12236, $12237, $12238, VersionRange($12239, $12240)), ($12241, $12242, $12243, $12244, $12245, $12246, $12247, $12248, $12249, $12250, $12251, $12252, $12253, $12254, $12255, $12256, $12257, $12258, $12259, $12260, $12261, $12262, $12263, $12264, $12265, $12266, $12267, $12268, VersionRange($12269, $12270)), ($12271, $12272, $12273, $12274, $12275, $12276, $12277, $12278, $12279, $12280, $12281, $12282, $12283, $12284, $12285, $12286, $12287, $12288, $12289, $12290, $12291, $12292, $12293, $12294, $12295, $12296, $12297, $12298, VersionRange($12299, $12300)), ($12301, $12302, $12303, $12304, $12305, $12306, $12307, $12308, $12309, $12310, $12311, $12312, $12313, $12314, $12315, $12316, $12317, $12318, $12319, $12320, $12321, $12322, $12323, $12324, $12325, $12326, $12327, $12328, VersionRange($12329, $12330)), ($12331, $12332, $12333, $12334, $12335, $12336, $12337, $12338, $12339, $12340, $12341, $12342, $12343, $12344, $12345, $12346, $12347, $12348, $12349, $12350, $12351, $12352, $12353, $12354, $12355, $12356, $12357, $12358, VersionRange($12359, $12360)), ($12361, $12362, $12363, $12364, $12365, $12366, $12367, $12368, $12369, $12370, $12371, $12372, $12373, $12374, $12375, $12376, $12377, $12378, $12379, $12380, $12381, $12382, $12383, $12384, $12385, $12386, $12387, $12388, VersionRange($12389, $12390)), ($12391, $12392, $12393, $12394, $12395, $12396, $12397, $12398, $12399, $12400, $12401, $12402, $12403, $12404, $12405, $12406, $12407, $12408, $12409, $12410, $12411, $12412, $12413, $12414, $12415, $12416, $12417, $12418, VersionRange($12419, $12420)), ($12421, $12422, $12423, $12424, $12425, $12426, $12427, $12428, $12429, $12430, $12431, $12432, $12433, $12434, $12435, $12436, $12437, $12438, $12439, $12440, $12441, $12442, $12443, $12444, $12445, $12446, $12447, $12448, VersionRange($12449, $12450)), ($12451, $12452, $12453, $12454, $12455, $12456, $12457, $12458, $12459, $12460, $12461, $12462, $12463, $12464, $12465, $12466, $12467, $12468, $12469, $12470, $12471, $12472, $12473, $12474, $12475, $12476, $12477, $12478, VersionRange($12479, $12480)), ($12481, $12482, $12483, $12484, $12485, $12486, $12487, $12488, $12489, $12490, $12491, $12492, $12493, $12494, $12495, $12496, $12497, $12498, $12499, $12500, $12501, $12502, $12503, $12504, $12505, $12506, $12507, $12508, VersionRange($12509, $12510)), ($12511, $12512, $12513, $12514, $12515, $12516, $12517, $12518, $12519, $12520, $12521, $12522, $12523, $12524, $12525, $12526, $12527, $12528, $12529, $12530, $12531, $12532, $12533, $12534, $12535, $12536, $12537, $12538, VersionRange($12539, $12540)), ($12541, $12542, $12543, $12544, $12545, $12546, $12547, $12548, $12549, $12550, $12551, $12552, $12553, $12554, $12555, $12556, $12557, $12558, $12559, $12560, $12561, $12562, $12563, $12564, $12565, $12566, $12567, $12568, VersionRange($12569, $12570)), ($12571, $12572, $12573, $12574, $12575, $12576, $12577, $12578, $12579, $12580, $12581, $12582, $12583, $12584, $12585, $12586, $12587, $12588, $12589, $12590, $12591, $12592, $12593, $12594, $12595, $12596, $12597, $12598, VersionRange($12599, $12600)), ($12601, $12602, $12603, $12604, $12605, $12606, $12607, $12608, $12609, $12610, $12611, $12612, $12613, $12614, $12615, $12616, $12617, $12618, $12619, $12620, $12621, $12622, $12623, $12624, $12625, $12626, $12627, $12628, VersionRange($12629, $12630)), ($12631, $12632, $12633, $12634, $12635, $12636, $12637, $12638, $12639, $12640, $12641, $12642, $12643, $12644, $12645, $12646, $12647, $12648, $12649, $12650, $12651, $12652, $12653, $12654, $12655, $12656, $12657, $12658, VersionRange($12659, $12660)), ($12661, $12662, $12663, $12664, $12665, $12666, $12667, $12668, $12669, $12670, $12671, $12672, $12673, $12674, $12675, $12676, $12677, $12678, $12679, $12680, $12681, $12682, $12683, $12684, $12685, $12686, $12687, $12688, VersionRange($12689, $12690)), ($12691, $12692, $12693, $12694, $12695, $12696, $12697, $12698, $12699, $12700, $12701, $12702, $12703, $12704, $12705, $12706, $12707, $12708, $12709, $12710, $12711, $12712, $12713, $12714, $12715, $12716, $12717, $12718, VersionRange($12719, $12720)), ($12721, $12722, $12723, $12724, $12725, $12726, $12727, $12728, $12729, $12730, $12731, $12732, $12733, $12734, $12735, $12736, $12737, $12738, $12739, $12740, $12741, $12742, $12743, $12744, $12745, $12746, $12747, $12748, VersionRange($12749, $12750)), ($12751, $12752, $12753, $12754, $12755, $12756, $12757, $12758, $12759, $12760, $12761, $12762, $12763, $12764, $12765, $12766, $12767, $12768, $12769, $12770, $12771, $12772, $12773, $12774, $12775, $12776, $12777, $12778, VersionRange($12779, $12780)), ($12781, $12782, $12783, $12784, $12785, $12786, $12787, $12788, $12789, $12790, $12791, $12792, $12793, $12794, $12795, $12796, $12797, $12798, $12799, $12800, $12801, $12802, $12803, $12804, $12805, $12806, $12807, $12808, VersionRange($12809, $12810)), ($12811, $12812, $12813, $12814, $12815, $12816, $12817, $12818, $12819, $12820, $12821, $12822, $12823, $12824, $12825, $12826, $12827, $12828, $12829, $12830, $12831, $12832, $12833, $12834, $12835, $12836, $12837, $12838, VersionRange($12839, $12840)), ($12841, $12842, $12843, $12844, $12845, $12846, $12847, $12848, $12849, $12850, $12851, $12852, $12853, $12854, $12855, $12856, $12857, $12858, $12859, $12860, $12861, $12862, $12863, $12864, $12865, $12866, $12867, $12868, VersionRange($12869, $12870)), ($12871, $12872, $12873, $12874, $12875, $12876, $12877, $12878, $12879, $12880, $12881, $12882, $12883, $12884, $12885, $12886, $12887, $12888, $12889, $12890, $12891, $12892, $12893, $12894, $12895, $12896, $12897, $12898, VersionRange($12899, $12900)), ($12901, $12902, $12903, $12904, $12905, $12906, $12907, $12908, $12909, $12910, $12911, $12912, $12913, $12914, $12915, $12916, $12917, $12918, $12919, $12920, $12921, $12922, $12923, $12924, $12925, $12926, $12927, $12928, VersionRange($12929, $12930)), ($12931, $12932, $12933, $12934, $12935, $12936, $12937, $12938, $12939, $12940, $12941, $12942, $12943, $12944, $12945, $12946, $12947, $12948, $12949, $12950, $12951, $12952, $12953, $12954, $12955, $12956, $12957, $12958, VersionRange($12959, $12960)), ($12961, $12962, $12963, $12964, $12965, $12966, $12967, $12968, $12969, $12970[...][ Date: 2023-07-04 18:39:57 ]
15 3s710ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30)), ($31, $32, $33, $34, $35, $36, $37, $38, $39, $40, $41, $42, $43, $44, $45, $46, $47, $48, $49, $50, $51, $52, $53, $54, $55, $56, $57, $58, VersionRange($59, $60)), ($61, $62, $63, $64, $65, $66, $67, $68, $69, $70, $71, $72, $73, $74, $75, $76, $77, $78, $79, $80, $81, $82, $83, $84, $85, $86, $87, $88, VersionRange($89, $90)), ($91, $92, $93, $94, $95, $96, $97, $98, $99, $100, $101, $102, $103, $104, $105, $106, $107, $108, $109, $110, $111, $112, $113, $114, $115, $116, $117, $118, VersionRange($119, $120)), ($121, $122, $123, $124, $125, $126, $127, $128, $129, $130, $131, $132, $133, $134, $135, $136, $137, $138, $139, $140, $141, $142, $143, $144, $145, $146, $147, $148, VersionRange($149, $150)), ($151, $152, $153, $154, $155, $156, $157, $158, $159, $160, $161, $162, $163, $164, $165, $166, $167, $168, $169, $170, $171, $172, $173, $174, $175, $176, $177, $178, VersionRange($179, $180)), ($181, $182, $183, $184, $185, $186, $187, $188, $189, $190, $191, $192, $193, $194, $195, $196, $197, $198, $199, $200, $201, $202, $203, $204, $205, $206, $207, $208, VersionRange($209, $210)), ($211, $212, $213, $214, $215, $216, $217, $218, $219, $220, $221, $222, $223, $224, $225, $226, $227, $228, $229, $230, $231, $232, $233, $234, $235, $236, $237, $238, VersionRange($239, $240)), ($241, $242, $243, $244, $245, $246, $247, $248, $249, $250, $251, $252, $253, $254, $255, $256, $257, $258, $259, $260, $261, $262, $263, $264, $265, $266, $267, $268, VersionRange($269, $270)), ($271, $272, $273, $274, $275, $276, $277, $278, $279, $280, $281, $282, $283, $284, $285, $286, $287, $288, $289, $290, $291, $292, $293, $294, $295, $296, $297, $298, VersionRange($299, $300)), ($301, $302, $303, $304, $305, $306, $307, $308, $309, $310, $311, $312, $313, $314, $315, $316, $317, $318, $319, $320, $321, $322, $323, $324, $325, $326, $327, $328, VersionRange($329, $330)), ($331, $332, $333, $334, $335, $336, $337, $338, $339, $340, $341, $342, $343, $344, $345, $346, $347, $348, $349, $350, $351, $352, $353, $354, $355, $356, $357, $358, VersionRange($359, $360)), ($361, $362, $363, $364, $365, $366, $367, $368, $369, $370, $371, $372, $373, $374, $375, $376, $377, $378, $379, $380, $381, $382, $383, $384, $385, $386, $387, $388, VersionRange($389, $390)), ($391, $392, $393, $394, $395, $396, $397, $398, $399, $400, $401, $402, $403, $404, $405, $406, $407, $408, $409, $410, $411, $412, $413, $414, $415, $416, $417, $418, VersionRange($419, $420)), ($421, $422, $423, $424, $425, $426, $427, $428, $429, $430, $431, $432, $433, $434, $435, $436, $437, $438, $439, $440, $441, $442, $443, $444, $445, $446, $447, $448, VersionRange($449, $450)), ($451, $452, $453, $454, $455, $456, $457, $458, $459, $460, $461, $462, $463, $464, $465, $466, $467, $468, $469, $470, $471, $472, $473, $474, $475, $476, $477, $478, VersionRange($479, $480)), ($481, $482, $483, $484, $485, $486, $487, $488, $489, $490, $491, $492, $493, $494, $495, $496, $497, $498, $499, $500, $501, $502, $503, $504, $505, $506, $507, $508, VersionRange($509, $510)), ($511, $512, $513, $514, $515, $516, $517, $518, $519, $520, $521, $522, $523, $524, $525, $526, $527, $528, $529, $530, $531, $532, $533, $534, $535, $536, $537, $538, VersionRange($539, $540)), ($541, $542, $543, $544, $545, $546, $547, $548, $549, $550, $551, $552, $553, $554, $555, $556, $557, $558, $559, $560, $561, $562, $563, $564, $565, $566, $567, $568, VersionRange($569, $570)), ($571, $572, $573, $574, $575, $576, $577, $578, $579, $580, $581, $582, $583, $584, $585, $586, $587, $588, $589, $590, $591, $592, $593, $594, $595, $596, $597, $598, VersionRange($599, $600)), ($601, $602, $603, $604, $605, $606, $607, $608, $609, $610, $611, $612, $613, $614, $615, $616, $617, $618, $619, $620, $621, $622, $623, $624, $625, $626, $627, $628, VersionRange($629, $630)), ($631, $632, $633, $634, $635, $636, $637, $638, $639, $640, $641, $642, $643, $644, $645, $646, $647, $648, $649, $650, $651, $652, $653, $654, $655, $656, $657, $658, VersionRange($659, $660)), ($661, $662, $663, $664, $665, $666, $667, $668, $669, $670, $671, $672, $673, $674, $675, $676, $677, $678, $679, $680, $681, $682, $683, $684, $685, $686, $687, $688, VersionRange($689, $690)), ($691, $692, $693, $694, $695, $696, $697, $698, $699, $700, $701, $702, $703, $704, $705, $706, $707, $708, $709, $710, $711, $712, $713, $714, $715, $716, $717, $718, VersionRange($719, $720)), ($721, $722, $723, $724, $725, $726, $727, $728, $729, $730, $731, $732, $733, $734, $735, $736, $737, $738, $739, $740, $741, $742, $743, $744, $745, $746, $747, $748, VersionRange($749, $750)), ($751, $752, $753, $754, $755, $756, $757, $758, $759, $760, $761, $762, $763, $764, $765, $766, $767, $768, $769, $770, $771, $772, $773, $774, $775, $776, $777, $778, VersionRange($779, $780)), ($781, $782, $783, $784, $785, $786, $787, $788, $789, $790, $791, $792, $793, $794, $795, $796, $797, $798, $799, $800, $801, $802, $803, $804, $805, $806, $807, $808, VersionRange($809, $810)), ($811, $812, $813, $814, $815, $816, $817, $818, $819, $820, $821, $822, $823, $824, $825, $826, $827, $828, $829, $830, $831, $832, $833, $834, $835, $836, $837, $838, VersionRange($839, $840)), ($841, $842, $843, $844, $845, $846, $847, $848, $849, $850, $851, $852, $853, $854, $855, $856, $857, $858, $859, $860, $861, $862, $863, $864, $865, $866, $867, $868, VersionRange($869, $870)), ($871, $872, $873, $874, $875, $876, $877, $878, $879, $880, $881, $882, $883, $884, $885, $886, $887, $888, $889, $890, $891, $892, $893, $894, $895, $896, $897, $898, VersionRange($899, $900)), ($901, $902, $903, $904, $905, $906, $907, $908, $909, $910, $911, $912, $913, $914, $915, $916, $917, $918, $919, $920, $921, $922, $923, $924, $925, $926, $927, $928, VersionRange($929, $930)), ($931, $932, $933, $934, $935, $936, $937, $938, $939, $940, $941, $942, $943, $944, $945, $946, $947, $948, $949, $950, $951, $952, $953, $954, $955, $956, $957, $958, VersionRange($959, $960)), ($961, $962, $963, $964, $965, $966, $967, $968, $969, $970, $971, $972, $973, $974, $975, $976, $977, $978, $979, $980, $981, $982, $983, $984, $985, $986, $987, $988, VersionRange($989, $990)), ($991, $992, $993, $994, $995, $996, $997, $998, $999, $1000, $1001, $1002, $1003, $1004, $1005, $1006, $1007, $1008, $1009, $1010, $1011, $1012, $1013, $1014, $1015, $1016, $1017, $1018, VersionRange($1019, $1020)), ($1021, $1022, $1023, $1024, $1025, $1026, $1027, $1028, $1029, $1030, $1031, $1032, $1033, $1034, $1035, $1036, $1037, $1038, $1039, $1040, $1041, $1042, $1043, $1044, $1045, $1046, $1047, $1048, VersionRange($1049, $1050)), ($1051, $1052, $1053, $1054, $1055, $1056, $1057, $1058, $1059, $1060, $1061, $1062, $1063, $1064, $1065, $1066, $1067, $1068, $1069, $1070, $1071, $1072, $1073, $1074, $1075, $1076, $1077, $1078, VersionRange($1079, $1080)), ($1081, $1082, $1083, $1084, $1085, $1086, $1087, $1088, $1089, $1090, $1091, $1092, $1093, $1094, $1095, $1096, $1097, $1098, $1099, $1100, $1101, $1102, $1103, $1104, $1105, $1106, $1107, $1108, VersionRange($1109, $1110)), ($1111, $1112, $1113, $1114, $1115, $1116, $1117, $1118, $1119, $1120, $1121, $1122, $1123, $1124, $1125, $1126, $1127, $1128, $1129, $1130, $1131, $1132, $1133, $1134, $1135, $1136, $1137, $1138, VersionRange($1139, $1140)), ($1141, $1142, $1143, $1144, $1145, $1146, $1147, $1148, $1149, $1150, $1151, $1152, $1153, $1154, $1155, $1156, $1157, $1158, $1159, $1160, $1161, $1162, $1163, $1164, $1165, $1166, $1167, $1168, VersionRange($1169, $1170)), ($1171, $1172, $1173, $1174, $1175, $1176, $1177, $1178, $1179, $1180, $1181, $1182, $1183, $1184, $1185, $1186, $1187, $1188, $1189, $1190, $1191, $1192, $1193, $1194, $1195, $1196, $1197, $1198, VersionRange($1199, $1200)), ($1201, $1202, $1203, $1204, $1205, $1206, $1207, $1208, $1209, $1210, $1211, $1212, $1213, $1214, $1215, $1216, $1217, $1218, $1219, $1220, $1221, $1222, $1223, $1224, $1225, $1226, $1227, $1228, VersionRange($1229, $1230)), ($1231, $1232, $1233, $1234, $1235, $1236, $1237, $1238, $1239, $1240, $1241, $1242, $1243, $1244, $1245, $1246, $1247, $1248, $1249, $1250, $1251, $1252, $1253, $1254, $1255, $1256, $1257, $1258, VersionRange($1259, $1260)), ($1261, $1262, $1263, $1264, $1265, $1266, $1267, $1268, $1269, $1270, $1271, $1272, $1273, $1274, $1275, $1276, $1277, $1278, $1279, $1280, $1281, $1282, $1283, $1284, $1285, $1286, $1287, $1288, VersionRange($1289, $1290)), ($1291, $1292, $1293, $1294, $1295, $1296, $1297, $1298, $1299, $1300, $1301, $1302, $1303, $1304, $1305, $1306, $1307, $1308, $1309, $1310, $1311, $1312, $1313, $1314, $1315, $1316, $1317, $1318, VersionRange($1319, $1320)), ($1321, $1322, $1323, $1324, $1325, $1326, $1327, $1328, $1329, $1330, $1331, $1332, $1333, $1334, $1335, $1336, $1337, $1338, $1339, $1340, $1341, $1342, $1343, $1344, $1345, $1346, $1347, $1348, VersionRange($1349, $1350)), ($1351, $1352, $1353, $1354, $1355, $1356, $1357, $1358, $1359, $1360, $1361, $1362, $1363, $1364, $1365, $1366, $1367, $1368, $1369, $1370, $1371, $1372, $1373, $1374, $1375, $1376, $1377, $1378, VersionRange($1379, $1380)), ($1381, $1382, $1383, $1384, $1385, $1386, $1387, $1388, $1389, $1390, $1391, $1392, $1393, $1394, $1395, $1396, $1397, $1398, $1399, $1400, $1401, $1402, $1403, $1404, $1405, $1406, $1407, $1408, VersionRange($1409, $1410)), ($1411, $1412, $1413, $1414, $1415, $1416, $1417, $1418, $1419, $1420, $1421, $1422, $1423, $1424, $1425, $1426, $1427, $1428, $1429, $1430, $1431, $1432, $1433, $1434, $1435, $1436, $1437, $1438, VersionRange($1439, $1440)), ($1441, $1442, $1443, $1444, $1445, $1446, $1447, $1448, $1449, $1450, $1451, $1452, $1453, $1454, $1455, $1456, $1457, $1458, $1459, $1460, $1461, $1462, $1463, $1464, $1465, $1466, $1467, $1468, VersionRange($1469, $1470)), ($1471, $1472, $1473, $1474, $1475, $1476, $1477, $1478, $1479, $1480, $1481, $1482, $1483, $1484, $1485, $1486, $1487, $1488, $1489, $1490, $1491, $1492, $1493, $1494, $1495, $1496, $1497, $1498, VersionRange($1499, $1500)), ($1501, $1502, $1503, $1504, $1505, $1506, $1507, $1508, $1509, $1510, $1511, $1512, $1513, $1514, $1515, $1516, $1517, $1518, $1519, $1520, $1521, $1522, $1523, $1524, $1525, $1526, $1527, $1528, VersionRange($1529, $1530)), ($1531, $1532, $1533, $1534, $1535, $1536, $1537, $1538, $1539, $1540, $1541, $1542, $1543, $1544, $1545, $1546, $1547, $1548, $1549, $1550, $1551, $1552, $1553, $1554, $1555, $1556, $1557, $1558, VersionRange($1559, $1560)), ($1561, $1562, $1563, $1564, $1565, $1566, $1567, $1568, $1569, $1570, $1571, $1572, $1573, $1574, $1575, $1576, $1577, $1578, $1579, $1580, $1581, $1582, $1583, $1584, $1585, $1586, $1587, $1588, VersionRange($1589, $1590)), ($1591, $1592, $1593, $1594, $1595, $1596, $1597, $1598, $1599, $1600, $1601, $1602, $1603, $1604, $1605, $1606, $1607, $1608, $1609, $1610, $1611, $1612, $1613, $1614, $1615, $1616, $1617, $1618, VersionRange($1619, $1620)), ($1621, $1622, $1623, $1624, $1625, $1626, $1627, $1628, $1629, $1630, $1631, $1632, $1633, $1634, $1635, $1636, $1637, $1638, $1639, $1640, $1641, $1642, $1643, $1644, $1645, $1646, $1647, $1648, VersionRange($1649, $1650)), ($1651, $1652, $1653, $1654, $1655, $1656, $1657, $1658, $1659, $1660, $1661, $1662, $1663, $1664, $1665, $1666, $1667, $1668, $1669, $1670, $1671, $1672, $1673, $1674, $1675, $1676, $1677, $1678, VersionRange($1679, $1680)), ($1681, $1682, $1683, $1684, $1685, $1686, $1687, $1688, $1689, $1690, $1691, $1692, $1693, $1694, $1695, $1696, $1697, $1698, $1699, $1700, $1701, $1702, $1703, $1704, $1705, $1706, $1707, $1708, VersionRange($1709, $1710)), ($1711, $1712, $1713, $1714, $1715, $1716, $1717, $1718, $1719, $1720, $1721, $1722, $1723, $1724, $1725, $1726, $1727, $1728, $1729, $1730, $1731, $1732, $1733, $1734, $1735, $1736, $1737, $1738, VersionRange($1739, $1740)), ($1741, $1742, $1743, $1744, $1745, $1746, $1747, $1748, $1749, $1750, $1751, $1752, $1753, $1754, $1755, $1756, $1757, $1758, $1759, $1760, $1761, $1762, $1763, $1764, $1765, $1766, $1767, $1768, VersionRange($1769, $1770)), ($1771, $1772, $1773, $1774, $1775, $1776, $1777, $1778, $1779, $1780, $1781, $1782, $1783, $1784, $1785, $1786, $1787, $1788, $1789, $1790, $1791, $1792, $1793, $1794, $1795, $1796, $1797, $1798, VersionRange($1799, $1800)), ($1801, $1802, $1803, $1804, $1805, $1806, $1807, $1808, $1809, $1810, $1811, $1812, $1813, $1814, $1815, $1816, $1817, $1818, $1819, $1820, $1821, $1822, $1823, $1824, $1825, $1826, $1827, $1828, VersionRange($1829, $1830)), ($1831, $1832, $1833, $1834, $1835, $1836, $1837, $1838, $1839, $1840, $1841, $1842, $1843, $1844, $1845, $1846, $1847, $1848, $1849, $1850, $1851, $1852, $1853, $1854, $1855, $1856, $1857, $1858, VersionRange($1859, $1860)), ($1861, $1862, $1863, $1864, $1865, $1866, $1867, $1868, $1869, $1870, $1871, $1872, $1873, $1874, $1875, $1876, $1877, $1878, $1879, $1880, $1881, $1882, $1883, $1884, $1885, $1886, $1887, $1888, VersionRange($1889, $1890)), ($1891, $1892, $1893, $1894, $1895, $1896, $1897, $1898, $1899, $1900, $1901, $1902, $1903, $1904, $1905, $1906, $1907, $1908, $1909, $1910, $1911, $1912, $1913, $1914, $1915, $1916, $1917, $1918, VersionRange($1919, $1920)), ($1921, $1922, $1923, $1924, $1925, $1926, $1927, $1928, $1929, $1930, $1931, $1932, $1933, $1934, $1935, $1936, $1937, $1938, $1939, $1940, $1941, $1942, $1943, $1944, $1945, $1946, $1947, $1948, VersionRange($1949, $1950)), ($1951, $1952, $1953, $1954, $1955, $1956, $1957, $1958, $1959, $1960, $1961, $1962, $1963, $1964, $1965, $1966, $1967, $1968, $1969, $1970, $1971, $1972, $1973, $1974, $1975, $1976, $1977, $1978, VersionRange($1979, $1980)), ($1981, $1982, $1983, $1984, $1985, $1986, $1987, $1988, $1989, $1990, $1991, $1992, $1993, $1994, $1995, $1996, $1997, $1998, $1999, $2000, $2001, $2002, $2003, $2004, $2005, $2006, $2007, $2008, VersionRange($2009, $2010)), ($2011, $2012, $2013, $2014, $2015, $2016, $2017, $2018, $2019, $2020, $2021, $2022, $2023, $2024, $2025, $2026, $2027, $2028, $2029, $2030, $2031, $2032, $2033, $2034, $2035, $2036, $2037, $2038, VersionRange($2039, $2040)), ($2041, $2042, $2043, $2044, $2045, $2046, $2047, $2048, $2049, $2050, $2051, $2052, $2053, $2054, $2055, $2056, $2057, $2058, $2059, $2060, $2061, $2062, $2063, $2064, $2065, $2066, $2067, $2068, VersionRange($2069, $2070)), ($2071, $2072, $2073, $2074, $2075, $2076, $2077, $2078, $2079, $2080, $2081, $2082, $2083, $2084, $2085, $2086, $2087, $2088, $2089, $2090, $2091, $2092, $2093, $2094, $2095, $2096, $2097, $2098, VersionRange($2099, $2100)), ($2101, $2102, $2103, $2104, $2105, $2106, $2107, $2108, $2109, $2110, $2111, $2112, $2113, $2114, $2115, $2116, $2117, $2118, $2119, $2120, $2121, $2122, $2123, $2124, $2125, $2126, $2127, $2128, VersionRange($2129, $2130)), ($2131, $2132, $2133, $2134, $2135, $2136, $2137, $2138, $2139, $2140, $2141, $2142, $2143, $2144, $2145, $2146, $2147, $2148, $2149, $2150, $2151, $2152, $2153, $2154, $2155, $2156, $2157, $2158, VersionRange($2159, $2160)), ($2161, $2162, $2163, $2164, $2165, $2166, $2167, $2168, $2169, $2170, $2171, $2172, $2173, $2174, $2175, $2176, $2177, $2178, $2179, $2180, $2181, $2182, $2183, $2184, $2185, $2186, $2187, $2188, VersionRange($2189, $2190)), ($2191, $2192, $2193, $2194, $2195, $2196, $2197, $2198, $2199, $2200, $2201, $2202, $2203, $2204, $2205, $2206, $2207, $2208, $2209, $2210, $2211, $2212, $2213, $2214, $2215, $2216, $2217, $2218, VersionRange($2219, $2220)), ($2221, $2222, $2223, $2224, $2225, $2226, $2227, $2228, $2229, $2230, $2231, $2232, $2233, $2234, $2235, $2236, $2237, $2238, $2239, $2240, $2241, $2242, $2243, $2244, $2245, $2246, $2247, $2248, VersionRange($2249, $2250)), ($2251, $2252, $2253, $2254, $2255, $2256, $2257, $2258, $2259, $2260, $2261, $2262, $2263, $2264, $2265, $2266, $2267, $2268, $2269, $2270, $2271, $2272, $2273, $2274, $2275, $2276, $2277, $2278, VersionRange($2279, $2280)), ($2281, $2282, $2283, $2284, $2285, $2286, $2287, $2288, $2289, $2290, $2291, $2292, $2293, $2294, $2295, $2296, $2297, $2298, $2299, $2300, $2301, $2302, $2303, $2304, $2305, $2306, $2307, $2308, VersionRange($2309, $2310)), ($2311, $2312, $2313, $2314, $2315, $2316, $2317, $2318, $2319, $2320, $2321, $2322, $2323, $2324, $2325, $2326, $2327, $2328, $2329, $2330, $2331, $2332, $2333, $2334, $2335, $2336, $2337, $2338, VersionRange($2339, $2340)), ($2341, $2342, $2343, $2344, $2345, $2346, $2347, $2348, $2349, $2350, $2351, $2352, $2353, $2354, $2355, $2356, $2357, $2358, $2359, $2360, $2361, $2362, $2363, $2364, $2365, $2366, $2367, $2368, VersionRange($2369, $2370)), ($2371, $2372, $2373, $2374, $2375, $2376, $2377, $2378, $2379, $2380, $2381, $2382, $2383, $2384, $2385, $2386, $2387, $2388, $2389, $2390, $2391, $2392, $2393, $2394, $2395, $2396, $2397, $2398, VersionRange($2399, $2400)), ($2401, $2402, $2403, $2404, $2405, $2406, $2407, $2408, $2409, $2410, $2411, $2412, $2413, $2414, $2415, $2416, $2417, $2418, $2419, $2420, $2421, $2422, $2423, $2424, $2425, $2426, $2427, $2428, VersionRange($2429, $2430)), ($2431, $2432, $2433, $2434, $2435, $2436, $2437, $2438, $2439, $2440, $2441, $2442, $2443, $2444, $2445, $2446, $2447, $2448, $2449, $2450, $2451, $2452, $2453, $2454, $2455, $2456, $2457, $2458, VersionRange($2459, $2460)), ($2461, $2462, $2463, $2464, $2465, $2466, $2467, $2468, $2469, $2470, $2471, $2472, $2473, $2474, $2475, $2476, $2477, $2478, $2479, $2480, $2481, $2482, $2483, $2484, $2485, $2486, $2487, $2488, VersionRange($2489, $2490)), ($2491, $2492, $2493, $2494, $2495, $2496, $2497, $2498, $2499, $2500, $2501, $2502, $2503, $2504, $2505, $2506, $2507, $2508, $2509, $2510, $2511, $2512, $2513, $2514, $2515, $2516, $2517, $2518, VersionRange($2519, $2520)), ($2521, $2522, $2523, $2524, $2525, $2526, $2527, $2528, $2529, $2530, $2531, $2532, $2533, $2534, $2535, $2536, $2537, $2538, $2539, $2540, $2541, $2542, $2543, $2544, $2545, $2546, $2547, $2548, VersionRange($2549, $2550)), ($2551, $2552, $2553, $2554, $2555, $2556, $2557, $2558, $2559, $2560, $2561, $2562, $2563, $2564, $2565, $2566, $2567, $2568, $2569, $2570, $2571, $2572, $2573, $2574, $2575, $2576, $2577, $2578, VersionRange($2579, $2580)), ($2581, $2582, $2583, $2584, $2585, $2586, $2587, $2588, $2589, $2590, $2591, $2592, $2593, $2594, $2595, $2596, $2597, $2598, $2599, $2600, $2601, $2602, $2603, $2604, $2605, $2606, $2607, $2608, VersionRange($2609, $2610)), ($2611, $2612, $2613, $2614, $2615, $2616, $2617, $2618, $2619, $2620, $2621, $2622, $2623, $2624, $2625, $2626, $2627, $2628, $2629, $2630, $2631, $2632, $2633, $2634, $2635, $2636, $2637, $2638, VersionRange($2639, $2640)), ($2641, $2642, $2643, $2644, $2645, $2646, $2647, $2648, $2649, $2650, $2651, $2652, $2653, $2654, $2655, $2656, $2657, $2658, $2659, $2660, $2661, $2662, $2663, $2664, $2665, $2666, $2667, $2668, VersionRange($2669, $2670)), ($2671, $2672, $2673, $2674, $2675, $2676, $2677, $2678, $2679, $2680, $2681, $2682, $2683, $2684, $2685, $2686, $2687, $2688, $2689, $2690, $2691, $2692, $2693, $2694, $2695, $2696, $2697, $2698, VersionRange($2699, $2700)), ($2701, $2702, $2703, $2704, $2705, $2706, $2707, $2708, $2709, $2710, $2711, $2712, $2713, $2714, $2715, $2716, $2717, $2718, $2719, $2720, $2721, $2722, $2723, $2724, $2725, $2726, $2727, $2728, VersionRange($2729, $2730)), ($2731, $2732, $2733, $2734, $2735, $2736, $2737, $2738, $2739, $2740, $2741, $2742, $2743, $2744, $2745, $2746, $2747, $2748, $2749, $2750, $2751, $2752, $2753, $2754, $2755, $2756, $2757, $2758, VersionRange($2759, $2760)), ($2761, $2762, $2763, $2764, $2765, $2766, $2767, $2768, $2769, $2770, $2771, $2772, $2773, $2774, $2775, $2776, $2777, $2778, $2779, $2780, $2781, $2782, $2783, $2784, $2785, $2786, $2787, $2788, VersionRange($2789, $2790)), ($2791, $2792, $2793, $2794, $2795, $2796, $2797, $2798, $2799, $2800, $2801, $2802, $2803, $2804, $2805, $2806, $2807, $2808, $2809, $2810, $2811, $2812, $2813, $2814, $2815, $2816, $2817, $2818, VersionRange($2819, $2820)), ($2821, $2822, $2823, $2824, $2825, $2826, $2827, $2828, $2829, $2830, $2831, $2832, $2833, $2834, $2835, $2836, $2837, $2838, $2839, $2840, $2841, $2842, $2843, $2844, $2845, $2846, $2847, $2848, VersionRange($2849, $2850)), ($2851, $2852, $2853, $2854, $2855, $2856, $2857, $2858, $2859, $2860, $2861, $2862, $2863, $2864, $2865, $2866, $2867, $2868, $2869, $2870, $2871, $2872, $2873, $2874, $2875, $2876, $2877, $2878, VersionRange($2879, $2880)), ($2881, $2882, $2883, $2884, $2885, $2886, $2887, $2888, $2889, $2890, $2891, $2892, $2893, $2894, $2895, $2896, $2897, $2898, $2899, $2900, $2901, $2902, $2903, $2904, $2905, $2906, $2907, $2908, VersionRange($2909, $2910)), ($2911, $2912, $2913, $2914, $2915, $2916, $2917, $2918, $2919, $2920, $2921, $2922, $2923, $2924, $2925, $2926, $2927, $2928, $2929, $2930, $2931, $2932, $2933, $2934, $2935, $2936, $2937, $2938, VersionRange($2939, $2940)), ($2941, $2942, $2943, $2944, $2945, $2946, $2947, $2948, $2949, $2950, $2951, $2952, $2953, $2954, $2955, $2956, $2957, $2958, $2959, $2960, $2961, $2962, $2963, $2964, $2965, $2966, $2967, $2968, VersionRange($2969, $2970)), ($2971, $2972, $2973, $2974, $2975, $2976, $2977, $2978, $2979, $2980, $2981, $2982, $2983, $2984, $2985, $2986, $2987, $2988, $2989, $2990, $2991, $2992, $2993, $2994, $2995, $2996, $2997, $2998, VersionRange($2999, $3000)), ($3001, $3002, $3003, $3004, $3005, $3006, $3007, $3008, $3009, $3010, $3011, $3012, $3013, $3014, $3015, $3016, $3017, $3018, $3019, $3020, $3021, $3022, $3023, $3024, $3025, $3026, $3027, $3028, VersionRange($3029, $3030)), ($3031, $3032, $3033, $3034, $3035, $3036, $3037, $3038, $3039, $3040, $3041, $3042, $3043, $3044, $3045, $3046, $3047, $3048, $3049, $3050, $3051, $3052, $3053, $3054, $3055, $3056, $3057, $3058, VersionRange($3059, $3060)), ($3061, $3062, $3063, $3064, $3065, $3066, $3067, $3068, $3069, $3070, $3071, $3072, $3073, $3074, $3075, $3076, $3077, $3078, $3079, $3080, $3081, $3082, $3083, $3084, $3085, $3086, $3087, $3088, VersionRange($3089, $3090)), ($3091, $3092, $3093, $3094, $3095, $3096, $3097, $3098, $3099, $3100, $3101, $3102, $3103, $3104, $3105, $3106, $3107, $3108, $3109, $3110, $3111, $3112, $3113, $3114, $3115, $3116, $3117, $3118, VersionRange($3119, $3120)), ($3121, $3122, $3123, $3124, $3125, $3126, $3127, $3128, $3129, $3130, $3131, $3132, $3133, $3134, $3135, $3136, $3137, $3138, $3139, $3140, $3141, $3142, $3143, $3144, $3145, $3146, $3147, $3148, VersionRange($3149, $3150)), ($3151, $3152, $3153, $3154, $3155, $3156, $3157, $3158, $3159, $3160, $3161, $3162, $3163, $3164, $3165, $3166, $3167, $3168, $3169, $3170, $3171, $3172, $3173, $3174, $3175, $3176, $3177, $3178, VersionRange($3179, $3180)), ($3181, $3182, $3183, $3184, $3185, $3186, $3187, $3188, $3189, $3190, $3191, $3192, $3193, $3194, $3195, $3196, $3197, $3198, $3199, $3200, $3201, $3202, $3203, $3204, $3205, $3206, $3207, $3208, VersionRange($3209, $3210)), ($3211, $3212, $3213, $3214, $3215, $3216, $3217, $3218, $3219, $3220, $3221, $3222, $3223, $3224, $3225, $3226, $3227, $3228, $3229, $3230, $3231, $3232, $3233, $3234, $3235, $3236, $3237, $3238, VersionRange($3239, $3240)), ($3241, $3242, $3243, $3244, $3245, $3246, $3247, $3248, $3249, $3250, $3251, $3252, $3253, $3254, $3255, $3256, $3257, $3258, $3259, $3260, $3261, $3262, $3263, $3264, $3265, $3266, $3267, $3268, VersionRange($3269, $3270)), ($3271, $3272, $3273, $3274, $3275, $3276, $3277, $3278, $3279, $3280, $3281, $3282, $3283, $3284, $3285, $3286, $3287, $3288, $3289, $3290, $3291, $3292, $3293, $3294, $3295, $3296, $3297, $3298, VersionRange($3299, $3300)), ($3301, $3302, $3303, $3304, $3305, $3306, $3307, $3308, $3309, $3310, $3311, $3312, $3313, $3314, $3315, $3316, $3317, $3318, $3319, $3320, $3321, $3322, $3323, $3324, $3325, $3326, $3327, $3328, VersionRange($3329, $3330)), ($3331, $3332, $3333, $3334, $3335, $3336, $3337, $3338, $3339, $3340, $3341, $3342, $3343, $3344, $3345, $3346, $3347, $3348, $3349, $3350, $3351, $3352, $3353, $3354, $3355, $3356, $3357, $3358, VersionRange($3359, $3360)), ($3361, $3362, $3363, $3364, $3365, $3366, $3367, $3368, $3369, $3370, $3371, $3372, $3373, $3374, $3375, $3376, $3377, $3378, $3379, $3380, $3381, $3382, $3383, $3384, $3385, $3386, $3387, $3388, VersionRange($3389, $3390)), ($3391, $3392, $3393, $3394, $3395, $3396, $3397, $3398, $3399, $3400, $3401, $3402, $3403, $3404, $3405, $3406, $3407, $3408, $3409, $3410, $3411, $3412, $3413, $3414, $3415, $3416, $3417, $3418, VersionRange($3419, $3420)), ($3421, $3422, $3423, $3424, $3425, $3426, $3427, $3428, $3429, $3430, $3431, $3432, $3433, $3434, $3435, $3436, $3437, $3438, $3439, $3440, $3441, $3442, $3443, $3444, $3445, $3446, $3447, $3448, VersionRange($3449, $3450)), ($3451, $3452, $3453, $3454, $3455, $3456, $3457, $3458, $3459, $3460, $3461, $3462, $3463, $3464, $3465, $3466, $3467, $3468, $3469, $3470, $3471, $3472, $3473, $3474, $3475, $3476, $3477, $3478, VersionRange($3479, $3480)), ($3481, $3482, $3483, $3484, $3485, $3486, $3487, $3488, $3489, $3490, $3491, $3492, $3493, $3494, $3495, $3496, $3497, $3498, $3499, $3500, $3501, $3502, $3503, $3504, $3505, $3506, $3507, $3508, VersionRange($3509, $3510)), ($3511, $3512, $3513, $3514, $3515, $3516, $3517, $3518, $3519, $3520, $3521, $3522, $3523, $3524, $3525, $3526, $3527, $3528, $3529, $3530, $3531, $3532, $3533, $3534, $3535, $3536, $3537, $3538, VersionRange($3539, $3540)), ($3541, $3542, $3543, $3544, $3545, $3546, $3547, $3548, $3549, $3550, $3551, $3552, $3553, $3554, $3555, $3556, $3557, $3558, $3559, $3560, $3561, $3562, $3563, $3564, $3565, $3566, $3567, $3568, VersionRange($3569, $3570)), ($3571, $3572, $3573, $3574, $3575, $3576, $3577, $3578, $3579, $3580, $3581, $3582, $3583, $3584, $3585, $3586, $3587, $3588, $3589, $3590, $3591, $3592, $3593, $3594, $3595, $3596, $3597, $3598, VersionRange($3599, $3600)), ($3601, $3602, $3603, $3604, $3605, $3606, $3607, $3608, $3609, $3610, $3611, $3612, $3613, $3614, $3615, $3616, $3617, $3618, $3619, $3620, $3621, $3622, $3623, $3624, $3625, $3626, $3627, $3628, VersionRange($3629, $3630)), ($3631, $3632, $3633, $3634, $3635, $3636, $3637, $3638, $3639, $3640, $3641, $3642, $3643, $3644, $3645, $3646, $3647, $3648, $3649, $3650, $3651, $3652, $3653, $3654, $3655, $3656, $3657, $3658, VersionRange($3659, $3660)), ($3661, $3662, $3663, $3664, $3665, $3666, $3667, $3668, $3669, $3670, $3671, $3672, $3673, $3674, $3675, $3676, $3677, $3678, $3679, $3680, $3681, $3682, $3683, $3684, $3685, $3686, $3687, $3688, VersionRange($3689, $3690)), ($3691, $3692, $3693, $3694, $3695, $3696, $3697, $3698, $3699, $3700, $3701, $3702, $3703, $3704, $3705, $3706, $3707, $3708, $3709, $3710, $3711, $3712, $3713, $3714, $3715, $3716, $3717, $3718, VersionRange($3719, $3720)), ($3721, $3722, $3723, $3724, $3725, $3726, $3727, $3728, $3729, $3730, $3731, $3732, $3733, $3734, $3735, $3736, $3737, $3738, $3739, $3740, $3741, $3742, $3743, $3744, $3745, $3746, $3747, $3748, VersionRange($3749, $3750)), ($3751, $3752, $3753, $3754, $3755, $3756, $3757, $3758, $3759, $3760, $3761, $3762, $3763, $3764, $3765, $3766, $3767, $3768, $3769, $3770, $3771, $3772, $3773, $3774, $3775, $3776, $3777, $3778, VersionRange($3779, $3780)), ($3781, $3782, $3783, $3784, $3785, $3786, $3787, $3788, $3789, $3790, $3791, $3792, $3793, $3794, $3795, $3796, $3797, $3798, $3799, $3800, $3801, $3802, $3803, $3804, $3805, $3806, $3807, $3808, VersionRange($3809, $3810)), ($3811, $3812, $3813, $3814, $3815, $3816, $3817, $3818, $3819, $3820, $3821, $3822, $3823, $3824, $3825, $3826, $3827, $3828, $3829, $3830, $3831, $3832, $3833, $3834, $3835, $3836, $3837, $3838, VersionRange($3839, $3840)), ($3841, $3842, $3843, $3844, $3845, $3846, $3847, $3848, $3849, $3850, $3851, $3852, $3853, $3854, $3855, $3856, $3857, $3858, $3859, $3860, $3861, $3862, $3863, $3864, $3865, $3866, $3867, $3868, VersionRange($3869, $3870)), ($3871, $3872, $3873, $3874, $3875, $3876, $3877, $3878, $3879, $3880, $3881, $3882, $3883, $3884, $3885, $3886, $3887, $3888, $3889, $3890, $3891, $3892, $3893, $3894, $3895, $3896, $3897, $3898, VersionRange($3899, $3900)), ($3901, $3902, $3903, $3904, $3905, $3906, $3907, $3908, $3909, $3910, $3911, $3912, $3913, $3914, $3915, $3916, $3917, $3918, $3919, $3920, $3921, $3922, $3923, $3924, $3925, $3926, $3927, $3928, VersionRange($3929, $3930)), ($3931, $3932, $3933, $3934, $3935, $3936, $3937, $3938, $3939, $3940, $3941, $3942, $3943, $3944, $3945, $3946, $3947, $3948, $3949, $3950, $3951, $3952, $3953, $3954, $3955, $3956, $3957, $3958, VersionRange($3959, $3960)), ($3961, $3962, $3963, $3964, $3965, $3966, $3967, $3968, $3969, $3970, $3971, $3972, $3973, $3974, $3975, $3976, $3977, $3978, $3979, $3980, $3981, $3982, $3983, $3984, $3985, $3986, $3987, $3988, VersionRange($3989, $3990)), ($3991, $3992, $3993, $3994, $3995, $3996, $3997, $3998, $3999, $4000, $4001, $4002, $4003, $4004, $4005, $4006, $4007, $4008, $4009, $4010, $4011, $4012, $4013, $4014, $4015, $4016, $4017, $4018, VersionRange($4019, $4020)), ($4021, $4022, $4023, $4024, $4025, $4026, $4027, $4028, $4029, $4030, $4031, $4032, $4033, $4034, $4035, $4036, $4037, $4038, $4039, $4040, $4041, $4042, $4043, $4044, $4045, $4046, $4047, $4048, VersionRange($4049, $4050)), ($4051, $4052, $4053, $4054, $4055, $4056, $4057, $4058, $4059, $4060, $4061, $4062, $4063, $4064, $4065, $4066, $4067, $4068, $4069, $4070, $4071, $4072, $4073, $4074, $4075, $4076, $4077, $4078, VersionRange($4079, $4080)), ($4081, $4082, $4083, $4084, $4085, $4086, $4087, $4088, $4089, $4090, $4091, $4092, $4093, $4094, $4095, $4096, $4097, $4098, $4099, $4100, $4101, $4102, $4103, $4104, $4105, $4106, $4107, $4108, VersionRange($4109, $4110)), ($4111, $4112, $4113, $4114, $4115, $4116, $4117, $4118, $4119, $4120, $4121, $4122, $4123, $4124, $4125, $4126, $4127, $4128, $4129, $4130, $4131, $4132, $4133, $4134, $4135, $4136, $4137, $4138, VersionRange($4139, $4140)), ($4141, $4142, $4143, $4144, $4145, $4146, $4147, $4148, $4149, $4150, $4151, $4152, $4153, $4154, $4155, $4156, $4157, $4158, $4159, $4160, $4161, $4162, $4163, $4164, $4165, $4166, $4167, $4168, VersionRange($4169, $4170)), ($4171, $4172, $4173, $4174, $4175, $4176, $4177, $4178, $4179, $4180, $4181, $4182, $4183, $4184, $4185, $4186, $4187, $4188, $4189, $4190, $4191, $4192, $4193, $4194, $4195, $4196, $4197, $4198, VersionRange($4199, $4200)), ($4201, $4202, $4203, $4204, $4205, $4206, $4207, $4208, $4209, $4210, $4211, $4212, $4213, $4214, $4215, $4216, $4217, $4218, $4219, $4220, $4221, $4222, $4223, $4224, $4225, $4226, $4227, $4228, VersionRange($4229, $4230)), ($4231, $4232, $4233, $4234, $4235, $4236, $4237, $4238, $4239, $4240, $4241, $4242, $4243, $4244, $4245, $4246, $4247, $4248, $4249, $4250, $4251, $4252, $4253, $4254, $4255, $4256, $4257, $4258, VersionRange($4259, $4260)), ($4261, $4262, $4263, $4264, $4265, $4266, $4267, $4268, $4269, $4270, $4271, $4272, $4273, $4274, $4275, $4276, $4277, $4278, $4279, $4280, $4281, $4282, $4283, $4284, $4285, $4286, $4287, $4288, VersionRange($4289, $4290)), ($4291, $4292, $4293, $4294, $4295, $4296, $4297, $4298, $4299, $4300, $4301, $4302, $4303, $4304, $4305, $4306, $4307, $4308, $4309, $4310, $4311, $4312, $4313, $4314, $4315, $4316, $4317, $4318, VersionRange($4319, $4320)), ($4321, $4322, $4323, $4324, $4325, $4326, $4327, $4328, $4329, $4330, $4331, $4332, $4333, $4334, $4335, $4336, $4337, $4338, $4339, $4340, $4341, $4342, $4343, $4344, $4345, $4346, $4347, $4348, VersionRange($4349, $4350)), ($4351, $4352, $4353, $4354, $4355, $4356, $4357, $4358, $4359, $4360, $4361, $4362, $4363, $4364, $4365, $4366, $4367, $4368, $4369, $4370, $4371, $4372, $4373, $4374, $4375, $4376, $4377, $4378, VersionRange($4379, $4380)), ($4381, $4382, $4383, $4384, $4385, $4386, $4387, $4388, $4389, $4390, $4391, $4392, $4393, $4394, $4395, $4396, $4397, $4398, $4399, $4400, $4401, $4402, $4403, $4404, $4405, $4406, $4407, $4408, VersionRange($4409, $4410)), ($4411, $4412, $4413, $4414, $4415, $4416, $4417, $4418, $4419, $4420, $4421, $4422, $4423, $4424, $4425, $4426, $4427, $4428, $4429, $4430, $4431, $4432, $4433, $4434, $4435, $4436, $4437, $4438, VersionRange($4439, $4440)), ($4441, $4442, $4443, $4444, $4445, $4446, $4447, $4448, $4449, $4450, $4451, $4452, $4453, $4454, $4455, $4456, $4457, $4458, $4459, $4460, $4461, $4462, $4463, $4464, $4465, $4466, $4467, $4468, VersionRange($4469, $4470)), ($4471, $4472, $4473, $4474, $4475, $4476, $4477, $4478, $4479, $4480, $4481, $4482, $4483, $4484, $4485, $4486, $4487, $4488, $4489, $4490, $4491, $4492, $4493, $4494, $4495, $4496, $4497, $4498, VersionRange($4499, $4500)), ($4501, $4502, $4503, $4504, $4505, $4506, $4507, $4508, $4509, $4510, $4511, $4512, $4513, $4514, $4515, $4516, $4517, $4518, $4519, $4520, $4521, $4522, $4523, $4524, $4525, $4526, $4527, $4528, VersionRange($4529, $4530)), ($4531, $4532, $4533, $4534, $4535, $4536, $4537, $4538, $4539, $4540, $4541, $4542, $4543, $4544, $4545, $4546, $4547, $4548, $4549, $4550, $4551, $4552, $4553, $4554, $4555, $4556, $4557, $4558, VersionRange($4559, $4560)), ($4561, $4562, $4563, $4564, $4565, $4566, $4567, $4568, $4569, $4570, $4571, $4572, $4573, $4574, $4575, $4576, $4577, $4578, $4579, $4580, $4581, $4582, $4583, $4584, $4585, $4586, $4587, $4588, VersionRange($4589, $4590)), ($4591, $4592, $4593, $4594, $4595, $4596, $4597, $4598, $4599, $4600, $4601, $4602, $4603, $4604, $4605, $4606, $4607, $4608, $4609, $4610, $4611, $4612, $4613, $4614, $4615, $4616, $4617, $4618, VersionRange($4619, $4620)), ($4621, $4622, $4623, $4624, $4625, $4626, $4627, $4628, $4629, $4630, $4631, $4632, $4633, $4634, $4635, $4636, $4637, $4638, $4639, $4640, $4641, $4642, $4643, $4644, $4645, $4646, $4647, $4648, VersionRange($4649, $4650)), ($4651, $4652, $4653, $4654, $4655, $4656, $4657, $4658, $4659, $4660, $4661, $4662, $4663, $4664, $4665, $4666, $4667, $4668, $4669, $4670, $4671, $4672, $4673, $4674, $4675, $4676, $4677, $4678, VersionRange($4679, $4680)), ($4681, $4682, $4683, $4684, $4685, $4686, $4687, $4688, $4689, $4690, $4691, $4692, $4693, $4694, $4695, $4696, $4697, $4698, $4699, $4700, $4701, $4702, $4703, $4704, $4705, $4706, $4707, $4708, VersionRange($4709, $4710)), ($4711, $4712, $4713, $4714, $4715, $4716, $4717, $4718, $4719, $4720, $4721, $4722, $4723, $4724, $4725, $4726, $4727, $4728, $4729, $4730, $4731, $4732, $4733, $4734, $4735, $4736, $4737, $4738, VersionRange($4739, $4740)), ($4741, $4742, $4743, $4744, $4745, $4746, $4747, $4748, $4749, $4750, $4751, $4752, $4753, $4754, $4755, $4756, $4757, $4758, $4759, $4760, $4761, $4762, $4763, $4764, $4765, $4766, $4767, $4768, VersionRange($4769, $4770)), ($4771, $4772, $4773, $4774, $4775, $4776, $4777, $4778, $4779, $4780, $4781, $4782, $4783, $4784, $4785, $4786, $4787, $4788, $4789, $4790, $4791, $4792, $4793, $4794, $4795, $4796, $4797, $4798, VersionRange($4799, $4800)), ($4801, $4802, $4803, $4804, $4805, $4806, $4807, $4808, $4809, $4810, $4811, $4812, $4813, $4814, $4815, $4816, $4817, $4818, $4819, $4820, $4821, $4822, $4823, $4824, $4825, $4826, $4827, $4828, VersionRange($4829, $4830)), ($4831, $4832, $4833, $4834, $4835, $4836, $4837, $4838, $4839, $4840, $4841, $4842, $4843, $4844, $4845, $4846, $4847, $4848, $4849, $4850, $4851, $4852, $4853, $4854, $4855, $4856, $4857, $4858, VersionRange($4859, $4860)), ($4861, $4862, $4863, $4864, $4865, $4866, $4867, $4868, $4869, $4870, $4871, $4872, $4873, $4874, $4875, $4876, $4877, $4878, $4879, $4880, $4881, $4882, $4883, $4884, $4885, $4886, $4887, $4888, VersionRange($4889, $4890)), ($4891, $4892, $4893, $4894, $4895, $4896, $4897, $4898, $4899, $4900, $4901, $4902, $4903, $4904, $4905, $4906, $4907, $4908, $4909, $4910, $4911, $4912, $4913, $4914, $4915, $4916, $4917, $4918, VersionRange($4919, $4920)), ($4921, $4922, $4923, $4924, $4925, $4926, $4927, $4928, $4929, $4930, $4931, $4932, $4933, $4934, $4935, $4936, $4937, $4938, $4939, $4940, $4941, $4942, $4943, $4944, $4945, $4946, $4947, $4948, VersionRange($4949, $4950)), ($4951, $4952, $4953, $4954, $4955, $4956, $4957, $4958, $4959, $4960, $4961, $4962, $4963, $4964, $4965, $4966, $4967, $4968, $4969, $4970, $4971, $4972, $4973, $4974, $4975, $4976, $4977, $4978, VersionRange($4979, $4980)), ($4981, $4982, $4983, $4984, $4985, $4986, $4987, $4988, $4989, $4990, $4991, $4992, $4993, $4994, $4995, $4996, $4997, $4998, $4999, $5000, $5001, $5002, $5003, $5004, $5005, $5006, $5007, $5008, VersionRange($5009, $5010)), ($5011, $5012, $5013, $5014, $5015, $5016, $5017, $5018, $5019, $5020, $5021, $5022, $5023, $5024, $5025, $5026, $5027, $5028, $5029, $5030, $5031, $5032, $5033, $5034, $5035, $5036, $5037, $5038, VersionRange($5039, $5040)), ($5041, $5042, $5043, $5044, $5045, $5046, $5047, $5048, $5049, $5050, $5051, $5052, $5053, $5054, $5055, $5056, $5057, $5058, $5059, $5060, $5061, $5062, $5063, $5064, $5065, $5066, $5067, $5068, VersionRange($5069, $5070)), ($5071, $5072, $5073, $5074, $5075, $5076, $5077, $5078, $5079, $5080, $5081, $5082, $5083, $5084, $5085, $5086, $5087, $5088, $5089, $5090, $5091, $5092, $5093, $5094, $5095, $5096, $5097, $5098, VersionRange($5099, $5100)), ($5101, $5102, $5103, $5104, $5105, $5106, $5107, $5108, $5109, $5110, $5111, $5112, $5113, $5114, $5115, $5116, $5117, $5118, $5119, $5120, $5121, $5122, $5123, $5124, $5125, $5126, $5127, $5128, VersionRange($5129, $5130)), ($5131, $5132, $5133, $5134, $5135, $5136, $5137, $5138, $5139, $5140, $5141, $5142, $5143, $5144, $5145, $5146, $5147, $5148, $5149, $5150, $5151, $5152, $5153, $5154, $5155, $5156, $5157, $5158, VersionRange($5159, $5160)), ($5161, $5162, $5163, $5164, $5165, $5166, $5167, $5168, $5169, $5170, $5171, $5172, $5173, $5174, $5175, $5176, $5177, $5178, $5179, $5180, $5181, $5182, $5183, $5184, $5185, $5186, $5187, $5188, VersionRange($5189, $5190)), ($5191, $5192, $5193, $5194, $5195, $5196, $5197, $5198, $5199, $5200, $5201, $5202, $5203, $5204, $5205, $5206, $5207, $5208, $5209, $5210, $5211, $5212, $5213, $5214, $5215, $5216, $5217, $5218, VersionRange($5219, $5220)), ($5221, $5222, $5223, $5224, $5225, $5226, $5227, $5228, $5229, $5230, $5231, $5232, $5233, $5234, $5235, $5236, $5237, $5238, $5239, $5240, $5241, $5242, $5243, $5244, $5245, $5246, $5247, $5248, VersionRange($5249, $5250)), ($5251, $5252, $5253, $5254, $5255, $5256, $5257, $5258, $5259, $5260, $5261, $5262, $5263, $5264, $5265, $5266, $5267, $5268, $5269, $5270, $5271, $5272, $5273, $5274, $5275, $5276, $5277, $5278, VersionRange($5279, $5280)), ($5281, $5282, $5283, $5284, $5285, $5286, $5287, $5288, $5289, $5290, $5291, $5292, $5293, $5294, $5295, $5296, $5297, $5298, $5299, $5300, $5301, $5302, $5303, $5304, $5305, $5306, $5307, $5308, VersionRange($5309, $5310)), ($5311, $5312, $5313, $5314, $5315, $5316, $5317, $5318, $5319, $5320, $5321, $5322, $5323, $5324, $5325, $5326, $5327, $5328, $5329, $5330, $5331, $5332, $5333, $5334, $5335, $5336, $5337, $5338, VersionRange($5339, $5340)), ($5341, $5342, $5343, $5344, $5345, $5346, $5347, $5348, $5349, $5350, $5351, $5352, $5353, $5354, $5355, $5356, $5357, $5358, $5359, $5360, $5361, $5362, $5363, $5364, $5365, $5366, $5367, $5368, VersionRange($5369, $5370)), ($5371, $5372, $5373, $5374, $5375, $5376, $5377, $5378, $5379, $5380, $5381, $5382, $5383, $5384, $5385, $5386, $5387, $5388, $5389, $5390, $5391, $5392, $5393, $5394, $5395, $5396, $5397, $5398, VersionRange($5399, $5400)), ($5401, $5402, $5403, $5404, $5405, $5406, $5407, $5408, $5409, $5410, $5411, $5412, $5413, $5414, $5415, $5416, $5417, $5418, $5419, $5420, $5421, $5422, $5423, $5424, $5425, $5426, $5427, $5428, VersionRange($5429, $5430)), ($5431, $5432, $5433, $5434, $5435, $5436, $5437, $5438, $5439, $5440, $5441, $5442, $5443, $5444, $5445, $5446, $5447, $5448, $5449, $5450, $5451, $5452, $5453, $5454, $5455, $5456, $5457, $5458, VersionRange($5459, $5460)), ($5461, $5462, $5463, $5464, $5465, $5466, $5467, $5468, $5469, $5470, $5471, $5472, $5473, $5474, $5475, $5476, $5477, $5478, $5479, $5480, $5481, $5482, $5483, $5484, $5485, $5486, $5487, $5488, VersionRange($5489, $5490)), ($5491, $5492, $5493, $5494, $5495, $5496, $5497, $5498, $5499, $5500, $5501, $5502, $5503, $5504, $5505, $5506, $5507, $5508, $5509, $5510, $5511, $5512, $5513, $5514, $5515, $5516, $5517, $5518, VersionRange($5519, $5520)), ($5521, $5522, $5523, $5524, $5525, $5526, $5527, $5528, $5529, $5530, $5531, $5532, $5533, $5534, $5535, $5536, $5537, $5538, $5539, $5540, $5541, $5542, $5543, $5544, $5545, $5546, $5547, $5548, VersionRange($5549, $5550)), ($5551, $5552, $5553, $5554, $5555, $5556, $5557, $5558, $5559, $5560, $5561, $5562, $5563, $5564, $5565, $5566, $5567, $5568, $5569, $5570, $5571, $5572, $5573, $5574, $5575, $5576, $5577, $5578, VersionRange($5579, $5580)), ($5581, $5582, $5583, $5584, $5585, $5586, $5587, $5588, $5589, $5590, $5591, $5592, $5593, $5594, $5595, $5596, $5597, $5598, $5599, $5600, $5601, $5602, $5603, $5604, $5605, $5606, $5607, $5608, VersionRange($5609, $5610)), ($5611, $5612, $5613, $5614, $5615, $5616, $5617, $5618, $5619, $5620, $5621, $5622, $5623, $5624, $5625, $5626, $5627, $5628, $5629, $5630, $5631, $5632, $5633, $5634, $5635, $5636, $5637, $5638, VersionRange($5639, $5640)), ($5641, $5642, $5643, $5644, $5645, $5646, $5647, $5648, $5649, $5650, $5651, $5652, $5653, $5654, $5655, $5656, $5657, $5658, $5659, $5660, $5661, $5662, $5663, $5664, $5665, $5666, $5667, $5668, VersionRange($5669, $5670)), ($5671, $5672, $5673, $5674, $5675, $5676, $5677, $5678, $5679, $5680, $5681, $5682, $5683, $5684, $5685, $5686, $5687, $5688, $5689, $5690, $5691, $5692, $5693, $5694, $5695, $5696, $5697, $5698, VersionRange($5699, $5700)), ($5701, $5702, $5703, $5704, $5705, $5706, $5707, $5708, $5709, $5710, $5711, $5712, $5713, $5714, $5715, $5716, $5717, $5718, $5719, $5720, $5721, $5722, $5723, $5724, $5725, $5726, $5727, $5728, VersionRange($5729, $5730)), ($5731, $5732, $5733, $5734, $5735, $5736, $5737, $5738, $5739, $5740, $5741, $5742, $5743, $5744, $5745, $5746, $5747, $5748, $5749, $5750, $5751, $5752, $5753, $5754, $5755, $5756, $5757, $5758, VersionRange($5759, $5760)), ($5761, $5762, $5763, $5764, $5765, $5766, $5767, $5768, $5769, $5770, $5771, $5772, $5773, $5774, $5775, $5776, $5777, $5778, $5779, $5780, $5781, $5782, $5783, $5784, $5785, $5786, $5787, $5788, VersionRange($5789, $5790)), ($5791, $5792, $5793, $5794, $5795, $5796, $5797, $5798, $5799, $5800, $5801, $5802, $5803, $5804, $5805, $5806, $5807, $5808, $5809, $5810, $5811, $5812, $5813, $5814, $5815, $5816, $5817, $5818, VersionRange($5819, $5820)), ($5821, $5822, $5823, $5824, $5825, $5826, $5827, $5828, $5829, $5830, $5831, $5832, $5833, $5834, $5835, $5836, $5837, $5838, $5839, $5840, $5841, $5842, $5843, $5844, $5845, $5846, $5847, $5848, VersionRange($5849, $5850)), ($5851, $5852, $5853, $5854, $5855, $5856, $5857, $5858, $5859, $5860, $5861, $5862, $5863, $5864, $5865, $5866, $5867, $5868, $5869, $5870, $5871, $5872, $5873, $5874, $5875, $5876, $5877, $5878, VersionRange($5879, $5880)), ($5881, $5882, $5883, $5884, $5885, $5886, $5887, $5888, $5889, $5890, $5891, $5892, $5893, $5894, $5895, $5896, $5897, $5898, $5899, $5900, $5901, $5902, $5903, $5904, $5905, $5906, $5907, $5908, VersionRange($5909, $5910)), ($5911, $5912, $5913, $5914, $5915, $5916, $5917, $5918, $5919, $5920, $5921, $5922, $5923, $5924, $5925, $5926, $5927, $5928, $5929, $5930, $5931, $5932, $5933, $5934, $5935, $5936, $5937, $5938, VersionRange($5939, $5940)), ($5941, $5942, $5943, $5944, $5945, $5946, $5947, $5948, $5949, $5950, $5951, $5952, $5953, $5954, $5955, $5956, $5957, $5958, $5959, $5960, $5961, $5962, $5963, $5964, $5965, $5966, $5967, $5968, VersionRange($5969, $5970)), ($5971, $5972, $5973, $5974, $5975, $5976, $5977, $5978, $5979, $5980, $5981, $5982, $5983, $5984, $5985, $5986, $5987, $5988, $5989, $5990, $5991, $5992, $5993, $5994, $5995, $5996, $5997, $5998, VersionRange($5999, $6000)), ($6001, $6002, $6003, $6004, $6005, $6006, $6007, $6008, $6009, $6010, $6011, $6012, $6013, $6014, $6015, $6016, $6017, $6018, $6019, $6020, $6021, $6022, $6023, $6024, $6025, $6026, $6027, $6028, VersionRange($6029, $6030)), ($6031, $6032, $6033, $6034, $6035, $6036, $6037, $6038, $6039, $6040, $6041, $6042, $6043, $6044, $6045, $6046, $6047, $6048, $6049, $6050, $6051, $6052, $6053, $6054, $6055, $6056, $6057, $6058, VersionRange($6059, $6060)), ($6061, $6062, $6063, $6064, $6065, $6066, $6067, $6068, $6069, $6070, $6071, $6072, $6073, $6074, $6075, $6076, $6077, $6078, $6079, $6080, $6081, $6082, $6083, $6084, $6085, $6086, $6087, $6088, VersionRange($6089, $6090)), ($6091, $6092, $6093, $6094, $6095, $6096, $6097, $6098, $6099, $6100, $6101, $6102, $6103, $6104, $6105, $6106, $6107, $6108, $6109, $6110, $6111, $6112, $6113, $6114, $6115, $6116, $6117, $6118, VersionRange($6119, $6120)), ($6121, $6122, $6123, $6124, $6125, $6126, $6127, $6128, $6129, $6130, $6131, $6132, $6133, $6134, $6135, $6136, $6137, $6138, $6139, $6140, $6141, $6142, $6143, $6144, $6145, $6146, $6147, $6148, VersionRange($6149, $6150)), ($6151, $6152, $6153, $6154, $6155, $6156, $6157, $6158, $6159, $6160, $6161, $6162, $6163, $6164, $6165, $6166, $6167, $6168, $6169, $6170, $6171, $6172, $6173, $6174, $6175, $6176, $6177, $6178, VersionRange($6179, $6180)), ($6181, $6182, $6183, $6184, $6185, $6186, $6187, $6188, $6189, $6190, $6191, $6192, $6193, $6194, $6195, $6196, $6197, $6198, $6199, $6200, $6201, $6202, $6203, $6204, $6205, $6206, $6207, $6208, VersionRange($6209, $6210)), ($6211, $6212, $6213, $6214, $6215, $6216, $6217, $6218, $6219, $6220, $6221, $6222, $6223, $6224, $6225, $6226, $6227, $6228, $6229, $6230, $6231, $6232, $6233, $6234, $6235, $6236, $6237, $6238, VersionRange($6239, $6240)), ($6241, $6242, $6243, $6244, $6245, $6246, $6247, $6248, $6249, $6250, $6251, $6252, $6253, $6254, $6255, $6256, $6257, $6258, $6259, $6260, $6261, $6262, $6263, $6264, $6265, $6266, $6267, $6268, VersionRange($6269, $6270)), ($6271, $6272, $6273, $6274, $6275, $6276, $6277, $6278, $6279, $6280, $6281, $6282, $6283, $6284, $6285, $6286, $6287, $6288, $6289, $6290, $6291, $6292, $6293, $6294, $6295, $6296, $6297, $6298, VersionRange($6299, $6300)), ($6301, $6302, $6303, $6304, $6305, $6306, $6307, $6308, $6309, $6310, $6311, $6312, $6313, $6314, $6315, $6316, $6317, $6318, $6319, $6320, $6321, $6322, $6323, $6324, $6325, $6326, $6327, $6328, VersionRange($6329, $6330)), ($6331, $6332, $6333, $6334, $6335, $6336, $6337, $6338, $6339, $6340, $6341, $6342, $6343, $6344, $6345, $6346, $6347, $6348, $6349, $6350, $6351, $6352, $6353, $6354, $6355, $6356, $6357, $6358, VersionRange($6359, $6360)), ($6361, $6362, $6363, $6364, $6365, $6366, $6367, $6368, $6369, $6370, $6371, $6372, $6373, $6374, $6375, $6376, $6377, $6378, $6379, $6380, $6381, $6382, $6383, $6384, $6385, $6386, $6387, $6388, VersionRange($6389, $6390)), ($6391, $6392, $6393, $6394, $6395, $6396, $6397, $6398, $6399, $6400, $6401, $6402, $6403, $6404, $6405, $6406, $6407, $6408, $6409, $6410, $6411, $6412, $6413, $6414, $6415, $6416, $6417, $6418, VersionRange($6419, $6420)), ($6421, $6422, $6423, $6424, $6425, $6426, $6427, $6428, $6429, $6430, $6431, $6432, $6433, $6434, $6435, $6436, $6437, $6438, $6439, $6440, $6441, $6442, $6443, $6444, $6445, $6446, $6447, $6448, VersionRange($6449, $6450)), ($6451, $6452, $6453, $6454, $6455, $6456, $6457, $6458, $6459, $6460, $6461, $6462, $6463, $6464, $6465, $6466, $6467, $6468, $6469, $6470, $6471, $6472, $6473, $6474, $6475, $6476, $6477, $6478, VersionRange($6479, $6480)), ($6481, $6482, $6483, $6484, $6485, $6486, $6487, $6488, $6489, $6490, $6491, $6492, $6493, $6494, $6495, $6496, $6497, $6498, $6499, $6500, $6501, $6502, $6503, $6504, $6505, $6506, $6507, $6508, VersionRange($6509, $6510)), ($6511, $6512, $6513, $6514, $6515, $6516, $6517, $6518, $6519, $6520, $6521, $6522, $6523, $6524, $6525, $6526, $6527, $6528, $6529, $6530, $6531, $6532, $6533, $6534, $6535, $6536, $6537, $6538, VersionRange($6539, $6540)), ($6541, $6542, $6543, $6544, $6545, $6546, $6547, $6548, $6549, $6550, $6551, $6552, $6553, $6554, $6555, $6556, $6557, $6558, $6559, $6560, $6561, $6562, $6563, $6564, $6565, $6566, $6567, $6568, VersionRange($6569, $6570)), ($6571, $6572, $6573, $6574, $6575, $6576, $6577, $6578, $6579, $6580, $6581, $6582, $6583, $6584, $6585, $6586, $6587, $6588, $6589, $6590, $6591, $6592, $6593, $6594, $6595, $6596, $6597, $6598, VersionRange($6599, $6600)), ($6601, $6602, $6603, $6604, $6605, $6606, $6607, $6608, $6609, $6610, $6611, $6612, $6613, $6614, $6615, $6616, $6617, $6618, $6619, $6620, $6621, $6622, $6623, $6624, $6625, $6626, $6627, $6628, VersionRange($6629, $6630)), ($6631, $6632, $6633, $6634, $6635, $6636, $6637, $6638, $6639, $6640, $6641, $6642, $6643, $6644, $6645, $6646, $6647, $6648, $6649, $6650, $6651, $6652, $6653, $6654, $6655, $6656, $6657, $6658, VersionRange($6659, $6660)), ($6661, $6662, $6663, $6664, $6665, $6666, $6667, $6668, $6669, $6670, $6671, $6672, $6673, $6674, $6675, $6676, $6677, $6678, $6679, $6680, $6681, $6682, $6683, $6684, $6685, $6686, $6687, $6688, VersionRange($6689, $6690)), ($6691, $6692, $6693, $6694, $6695, $6696, $6697, $6698, $6699, $6700, $6701, $6702, $6703, $6704, $6705, $6706, $6707, $6708, $6709, $6710, $6711, $6712, $6713, $6714, $6715, $6716, $6717, $6718, VersionRange($6719, $6720)), ($6721, $6722, $6723, $6724, $6725, $6726, $6727, $6728, $6729, $6730, $6731, $6732, $6733, $6734, $6735, $6736, $6737, $6738, $6739, $6740, $6741, $6742, $6743, $6744, $6745, $6746, $6747, $6748, VersionRange($6749, $6750)), ($6751, $6752, $6753, $6754, $6755, $6756, $6757, $6758, $6759, $6760, $6761, $6762, $6763, $6764, $6765, $6766, $6767, $6768, $6769, $6770, $6771, $6772, $6773, $6774, $6775, $6776, $6777, $6778, VersionRange($6779, $6780)), ($6781, $6782, $6783, $6784, $6785, $6786, $6787, $6788, $6789, $6790, $6791, $6792, $6793, $6794, $6795, $6796, $6797, $6798, $6799, $6800, $6801, $6802, $6803, $6804, $6805, $6806, $6807, $6808, VersionRange($6809, $6810)), ($6811, $6812, $6813, $6814, $6815, $6816, $6817, $6818, $6819, $6820, $6821, $6822, $6823, $6824, $6825, $6826, $6827, $6828, $6829, $6830, $6831, $6832, $6833, $6834, $6835, $6836, $6837, $6838, VersionRange($6839, $6840)), ($6841, $6842, $6843, $6844, $6845, $6846, $6847, $6848, $6849, $6850, $6851, $6852, $6853, $6854, $6855, $6856, $6857, $6858, $6859, $6860, $6861, $6862, $6863, $6864, $6865, $6866, $6867, $6868, VersionRange($6869, $6870)), ($6871, $6872, $6873, $6874, $6875, $6876, $6877, $6878, $6879, $6880, $6881, $6882, $6883, $6884, $6885, $6886, $6887, $6888, $6889, $6890, $6891, $6892, $6893, $6894, $6895, $6896, $6897, $6898, VersionRange($6899, $6900)), ($6901, $6902, $6903, $6904, $6905, $6906, $6907, $6908, $6909, $6910, $6911, $6912, $6913, $6914, $6915, $6916, $6917, $6918, $6919, $6920, $6921, $6922, $6923, $6924, $6925, $6926, $6927, $6928, VersionRange($6929, $6930)), ($6931, $6932, $6933, $6934, $6935, $6936, $6937, $6938, $6939, $6940, $6941, $6942, $6943, $6944, $6945, $6946, $6947, $6948, $6949, $6950, $6951, $6952, $6953, $6954, $6955, $6956, $6957, $6958, VersionRange($6959, $6960)), ($6961, $6962, $6963, $6964, $6965, $6966, $6967, $6968, $6969, $6970, $6971, $6972, $6973, $6974, $6975, $6976, $6977, $6978, $6979, $6980, $6981, $6982, $6983, $6984, $6985, $6986, $6987, $6988, VersionRange($6989, $6990)), ($6991, $6992, $6993, $6994, $6995, $6996, $6997, $6998, $6999, $7000, $7001, $7002, $7003, $7004, $7005, $7006, $7007, $7008, $7009, $7010, $7011, $7012, $7013, $7014, $7015, $7016, $7017, $7018, VersionRange($7019, $7020)), ($7021, $7022, $7023, $7024, $7025, $7026, $7027, $7028, $7029, $7030, $7031, $7032, $7033, $7034, $7035, $7036, $7037, $7038, $7039, $7040, $7041, $7042, $7043, $7044, $7045, $7046, $7047, $7048, VersionRange($7049, $7050)), ($7051, $7052, $7053, $7054, $7055, $7056, $7057, $7058, $7059, $7060, $7061, $7062, $7063, $7064, $7065, $7066, $7067, $7068, $7069, $7070, $7071, $7072, $7073, $7074, $7075, $7076, $7077, $7078, VersionRange($7079, $7080)), ($7081, $7082, $7083, $7084, $7085, $7086, $7087, $7088, $7089, $7090, $7091, $7092, $7093, $7094, $7095, $7096, $7097, $7098, $7099, $7100, $7101, $7102, $7103, $7104, $7105, $7106, $7107, $7108, VersionRange($7109, $7110)), ($7111, $7112, $7113, $7114, $7115, $7116, $7117, $7118, $7119, $7120, $7121, $7122, $7123, $7124, $7125, $7126, $7127, $7128, $7129, $7130, $7131, $7132, $7133, $7134, $7135, $7136, $7137, $7138, VersionRange($7139, $7140)), ($7141, $7142, $7143, $7144, $7145, $7146, $7147, $7148, $7149, $7150, $7151, $7152, $7153, $7154, $7155, $7156, $7157, $7158, $7159, $7160, $7161, $7162, $7163, $7164, $7165, $7166, $7167, $7168, VersionRange($7169, $7170)), ($7171, $7172, $7173, $7174, $7175, $7176, $7177, $7178, $7179, $7180, $7181, $7182, $7183, $7184, $7185, $7186, $7187, $7188, $7189, $7190, $7191, $7192, $7193, $7194, $7195, $7196, $7197, $7198, VersionRange($7199, $7200)), ($7201, $7202, $7203, $7204, $7205, $7206, $7207, $7208, $7209, $7210, $7211, $7212, $7213, $7214, $7215, $7216, $7217, $7218, $7219, $7220, $7221, $7222, $7223, $7224, $7225, $7226, $7227, $7228, VersionRange($7229, $7230)), ($7231, $7232, $7233, $7234, $7235, $7236, $7237, $7238, $7239, $7240, $7241, $7242, $7243, $7244, $7245, $7246, $7247, $7248, $7249, $7250, $7251, $7252, $7253, $7254, $7255, $7256, $7257, $7258, VersionRange($7259, $7260)), ($7261, $7262, $7263, $7264, $7265, $7266, $7267, $7268, $7269, $7270, $7271, $7272, $7273, $7274, $7275, $7276, $7277, $7278, $7279, $7280, $7281, $7282, $7283, $7284, $7285, $7286, $7287, $7288, VersionRange($7289, $7290)), ($7291, $7292, $7293, $7294, $7295, $7296, $7297, $7298, $7299, $7300, $7301, $7302, $7303, $7304, $7305, $7306, $7307, $7308, $7309, $7310, $7311, $7312, $7313, $7314, $7315, $7316, $7317, $7318, VersionRange($7319, $7320)), ($7321, $7322, $7323, $7324, $7325, $7326, $7327, $7328, $7329, $7330, $7331, $7332, $7333, $7334, $7335, $7336, $7337, $7338, $7339, $7340, $7341, $7342, $7343, $7344, $7345, $7346, $7347, $7348, VersionRange($7349, $7350)), ($7351, $7352, $7353, $7354, $7355, $7356, $7357, $7358, $7359, $7360, $7361, $7362, $7363, $7364, $7365, $7366, $7367, $7368, $7369, $7370, $7371, $7372, $7373, $7374, $7375, $7376, $7377, $7378, VersionRange($7379, $7380)), ($7381, $7382, $7383, $7384, $7385, $7386, $7387, $7388, $7389, $7390, $7391, $7392, $7393, $7394, $7395, $7396, $7397, $7398, $7399, $7400, $7401, $7402, $7403, $7404, $7405, $7406, $7407, $7408, VersionRange($7409, $7410)), ($7411, $7412, $7413, $7414, $7415, $7416, $7417, $7418, $7419, $7420, $7421, $7422, $7423, $7424, $7425, $7426, $7427, $7428, $7429, $7430, $7431, $7432, $7433, $7434, $7435, $7436, $7437, $7438, VersionRange($7439, $7440)), ($7441, $7442, $7443, $7444, $7445, $7446, $7447, $7448, $7449, $7450, $7451, $7452, $7453, $7454, $7455, $7456, $7457, $7458, $7459, $7460, $7461, $7462, $7463, $7464, $7465, $7466, $7467, $7468, VersionRange($7469, $7470)), ($7471, $7472, $7473, $7474, $7475, $7476, $7477, $7478, $7479, $7480, $7481, $7482, $7483, $7484, $7485, $7486, $7487, $7488, $7489, $7490, $7491, $7492, $7493, $7494, $7495, $7496, $7497, $7498, VersionRange($7499, $7500)), ($7501, $7502, $7503, $7504, $7505, $7506, $7507, $7508, $7509, $7510, $7511, $7512, $7513, $7514, $7515, $7516, $7517, $7518, $7519, $7520, $7521, $7522, $7523, $7524, $7525, $7526, $7527, $7528, VersionRange($7529, $7530)), ($7531, $7532, $7533, $7534, $7535, $7536, $7537, $7538, $7539, $7540, $7541, $7542, $7543, $7544, $7545, $7546, $7547, $7548, $7549, $7550, $7551, $7552, $7553, $7554, $7555, $7556, $7557, $7558, VersionRange($7559, $7560)), ($7561, $7562, $7563, $7564, $7565, $7566, $7567, $7568, $7569, $7570, $7571, $7572, $7573, $7574, $7575, $7576, $7577, $7578, $7579, $7580, $7581, $7582, $7583, $7584, $7585, $7586, $7587, $7588, VersionRange($7589, $7590)), ($7591, $7592, $7593, $7594, $7595, $7596, $7597, $7598, $7599, $7600, $7601, $7602, $7603, $7604, $7605, $7606, $7607, $7608, $7609, $7610, $7611, $7612, $7613, $7614, $7615, $7616, $7617, $7618, VersionRange($7619, $7620)), ($7621, $7622, $7623, $7624, $7625, $7626, $7627, $7628, $7629, $7630, $7631, $7632, $7633, $7634, $7635, $7636, $7637, $7638, $7639, $7640, $7641, $7642, $7643, $7644, $7645, $7646, $7647, $7648, VersionRange($7649, $7650)), ($7651, $7652, $7653, $7654, $7655, $7656, $7657, $7658, $7659, $7660, $7661, $7662, $7663, $7664, $7665, $7666, $7667, $7668, $7669, $7670, $7671, $7672, $7673, $7674, $7675, $7676, $7677, $7678, VersionRange($7679, $7680)), ($7681, $7682, $7683, $7684, $7685, $7686, $7687, $7688, $7689, $7690, $7691, $7692, $7693, $7694, $7695, $7696, $7697, $7698, $7699, $7700, $7701, $7702, $7703, $7704, $7705, $7706, $7707, $7708, VersionRange($7709, $7710)), ($7711, $7712, $7713, $7714, $7715, $7716, $7717, $7718, $7719, $7720, $7721, $7722, $7723, $7724, $7725, $7726, $7727, $7728, $7729, $7730, $7731, $7732, $7733, $7734, $7735, $7736, $7737, $7738, VersionRange($7739, $7740)), ($7741, $7742, $7743, $7744, $7745, $7746, $7747, $7748, $7749, $7750, $7751, $7752, $7753, $7754, $7755, $7756, $7757, $7758, $7759, $7760, $7761, $7762, $7763, $7764, $7765, $7766, $7767, $7768, VersionRange($7769, $7770)), ($7771, $7772, $7773, $7774, $7775, $7776, $7777, $7778, $7779, $7780, $7781, $7782, $7783, $7784, $7785, $7786, $7787, $7788, $7789, $7790, $7791, $7792, $7793, $7794, $7795, $7796, $7797, $7798, VersionRange($7799, $7800)), ($7801, $7802, $7803, $7804, $7805, $7806, $7807, $7808, $7809, $7810, $7811, $7812, $7813, $7814, $7815, $7816, $7817, $7818, $7819, $7820, $7821, $7822, $7823, $7824, $7825, $7826, $7827, $7828, VersionRange($7829, $7830)), ($7831, $7832, $7833, $7834, $7835, $7836, $7837, $7838, $7839, $7840, $7841, $7842, $7843, $7844, $7845, $7846, $7847, $7848, $7849, $7850, $7851, $7852, $7853, $7854, $7855, $7856, $7857, $7858, VersionRange($7859, $7860)), ($7861, $7862, $7863, $7864, $7865, $7866, $7867, $7868, $7869, $7870, $7871, $7872, $7873, $7874, $7875, $7876, $7877, $7878, $7879, $7880, $7881, $7882, $7883, $7884, $7885, $7886, $7887, $7888, VersionRange($7889, $7890)), ($7891, $7892, $7893, $7894, $7895, $7896, $7897, $7898, $7899, $7900, $7901, $7902, $7903, $7904, $7905, $7906, $7907, $7908, $7909, $7910, $7911, $7912, $7913, $7914, $7915, $7916, $7917, $7918, VersionRange($7919, $7920)), ($7921, $7922, $7923, $7924, $7925, $7926, $7927, $7928, $7929, $7930, $7931, $7932, $7933, $7934, $7935, $7936, $7937, $7938, $7939, $7940, $7941, $7942, $7943, $7944, $7945, $7946, $7947, $7948, VersionRange($7949, $7950)), ($7951, $7952, $7953, $7954, $7955, $7956, $7957, $7958, $7959, $7960, $7961, $7962, $7963, $7964, $7965, $7966, $7967, $7968, $7969, $7970, $7971, $7972, $7973, $7974, $7975, $7976, $7977, $7978, VersionRange($7979, $7980)), ($7981, $7982, $7983, $7984, $7985, $7986, $7987, $7988, $7989, $7990, $7991, $7992, $7993, $7994, $7995, $7996, $7997, $7998, $7999, $8000, $8001, $8002, $8003, $8004, $8005, $8006, $8007, $8008, VersionRange($8009, $8010)), ($8011, $8012, $8013, $8014, $8015, $8016, $8017, $8018, $8019, $8020, $8021, $8022, $8023, $8024, $8025, $8026, $8027, $8028, $8029, $8030, $8031, $8032, $8033, $8034, $8035, $8036, $8037, $8038, VersionRange($8039, $8040)), ($8041, $8042, $8043, $8044, $8045, $8046, $8047, $8048, $8049, $8050, $8051, $8052, $8053, $8054, $8055, $8056, $8057, $8058, $8059, $8060, $8061, $8062, $8063, $8064, $8065, $8066, $8067, $8068, VersionRange($8069, $8070)), ($8071, $8072, $8073, $8074, $8075, $8076, $8077, $8078, $8079, $8080, $8081, $8082, $8083, $8084, $8085, $8086, $8087, $8088, $8089, $8090, $8091, $8092, $8093, $8094, $8095, $8096, $8097, $8098, VersionRange($8099, $8100)), ($8101, $8102, $8103, $8104, $8105, $8106, $8107, $8108, $8109, $8110, $8111, $8112, $8113, $8114, $8115, $8116, $8117, $8118, $8119, $8120, $8121, $8122, $8123, $8124, $8125, $8126, $8127, $8128, VersionRange($8129, $8130)), ($8131, $8132, $8133, $8134, $8135, $8136, $8137, $8138, $8139, $8140, $8141, $8142, $8143, $8144, $8145, $8146, $8147, $8148, $8149, $8150, $8151, $8152, $8153, $8154, $8155, $8156, $8157, $8158, VersionRange($8159, $8160)), ($8161, $8162, $8163, $8164, $8165, $8166, $8167, $8168, $8169, $8170, $8171, $8172, $8173, $8174, $8175, $8176, $8177, $8178, $8179, $8180, $8181, $8182, $8183, $8184, $8185, $8186, $8187, $8188, VersionRange($8189, $8190)), ($8191, $8192, $8193, $8194, $8195, $8196, $8197, $8198, $8199, $8200, $8201, $8202, $8203, $8204, $8205, $8206, $8207, $8208, $8209, $8210, $8211, $8212, $8213, $8214, $8215, $8216, $8217, $8218, VersionRange($8219, $8220)), ($8221, $8222, $8223, $8224, $8225, $8226, $8227, $8228, $8229, $8230, $8231, $8232, $8233, $8234, $8235, $8236, $8237, $8238, $8239, $8240, $8241, $8242, $8243, $8244, $8245, $8246, $8247, $8248, VersionRange($8249, $8250)), ($8251, $8252, $8253, $8254, $8255, $8256, $8257, $8258, $8259, $8260, $8261, $8262, $8263, $8264, $8265, $8266, $8267, $8268, $8269, $8270, $8271, $8272, $8273, $8274, $8275, $8276, $8277, $8278, VersionRange($8279, $8280)), ($8281, $8282, $8283, $8284, $8285, $8286, $8287, $8288, $8289, $8290, $8291, $8292, $8293, $8294, $8295, $8296, $8297, $8298, $8299, $8300, $8301, $8302, $8303, $8304, $8305, $8306, $8307, $8308, VersionRange($8309, $8310)), ($8311, $8312, $8313, $8314, $8315, $8316, $8317, $8318, $8319, $8320, $8321, $8322, $8323, $8324, $8325, $8326, $8327, $8328, $8329, $8330, $8331, $8332, $8333, $8334, $8335, $8336, $8337, $8338, VersionRange($8339, $8340)), ($8341, $8342, $8343, $8344, $8345, $8346, $8347, $8348, $8349, $8350, $8351, $8352, $8353, $8354, $8355, $8356, $8357, $8358, $8359, $8360, $8361, $8362, $8363, $8364, $8365, $8366, $8367, $8368, VersionRange($8369, $8370)), ($8371, $8372, $8373, $8374, $8375, $8376, $8377, $8378, $8379, $8380, $8381, $8382, $8383, $8384, $8385, $8386, $8387, $8388, $8389, $8390, $8391, $8392, $8393, $8394, $8395, $8396, $8397, $8398, VersionRange($8399, $8400)), ($8401, $8402, $8403, $8404, $8405, $8406, $8407, $8408, $8409, $8410, $8411, $8412, $8413, $8414, $8415, $8416, $8417, $8418, $8419, $8420, $8421, $8422, $8423, $8424, $8425, $8426, $8427, $8428, VersionRange($8429, $8430)), ($8431, $8432, $8433, $8434, $8435, $8436, $8437, $8438, $8439, $8440, $8441, $8442, $8443, $8444, $8445, $8446, $8447, $8448, $8449, $8450, $8451, $8452, $8453, $8454, $8455, $8456, $8457, $8458, VersionRange($8459, $8460)), ($8461, $8462, $8463, $8464, $8465, $8466, $8467, $8468, $8469, $8470, $8471, $8472, $8473, $8474, $8475, $8476, $8477, $8478, $8479, $8480, $8481, $8482, $8483, $8484, $8485, $8486, $8487, $8488, VersionRange($8489, $8490)), ($8491, $8492, $8493, $8494, $8495, $8496, $8497, $8498, $8499, $8500, $8501, $8502, $8503, $8504, $8505, $8506, $8507, $8508, $8509, $8510, $8511, $8512, $8513, $8514, $8515, $8516, $8517, $8518, VersionRange($8519, $8520)), ($8521, $8522, $8523, $8524, $8525, $8526, $8527, $8528, $8529, $8530, $8531, $8532, $8533, $8534, $8535, $8536, $8537, $8538, $8539, $8540, $8541, $8542, $8543, $8544, $8545, $8546, $8547, $8548, VersionRange($8549, $8550)), ($8551, $8552, $8553, $8554, $8555, $8556, $8557, $8558, $8559, $8560, $8561, $8562, $8563, $8564, $8565, $8566, $8567, $8568, $8569, $8570, $8571, $8572, $8573, $8574, $8575, $8576, $8577, $8578, VersionRange($8579, $8580)), ($8581, $8582, $8583, $8584, $8585, $8586, $8587, $8588, $8589, $8590, $8591, $8592, $8593, $8594, $8595, $8596, $8597, $8598, $8599, $8600, $8601, $8602, $8603, $8604, $8605, $8606, $8607, $8608, VersionRange($8609, $8610)), ($8611, $8612, $8613, $8614, $8615, $8616, $8617, $8618, $8619, $8620, $8621, $8622, $8623, $8624, $8625, $8626, $8627, $8628, $8629, $8630, $8631, $8632, $8633, $8634, $8635, $8636, $8637, $8638, VersionRange($8639, $8640)), ($8641, $8642, $8643, $8644, $8645, $8646, $8647, $8648, $8649, $8650, $8651, $8652, $8653, $8654, $8655, $8656, $8657, $8658, $8659, $8660, $8661, $8662, $8663, $8664, $8665, $8666, $8667, $8668, VersionRange($8669, $8670)), ($8671, $8672, $8673, $8674, $8675, $8676, $8677, $8678, $8679, $8680, $8681, $8682, $8683, $8684, $8685, $8686, $8687, $8688, $8689, $8690, $8691, $8692, $8693, $8694, $8695, $8696, $8697, $8698, VersionRange($8699, $8700)), ($8701, $8702, $8703, $8704, $8705, $8706, $8707, $8708, $8709, $8710, $8711, $8712, $8713, $8714, $8715, $8716, $8717, $8718, $8719, $8720, $8721, $8722, $8723, $8724, $8725, $8726, $8727, $8728, VersionRange($8729, $8730)), ($8731, $8732, $8733, $8734, $8735, $8736, $8737, $8738, $8739, $8740, $8741, $8742, $8743, $8744, $8745, $8746, $8747, $8748, $8749, $8750, $8751, $8752, $8753, $8754, $8755, $8756, $8757, $8758, VersionRange($8759, $8760)), ($8761, $8762, $8763, $8764, $8765, $8766, $8767, $8768, $8769, $8770, $8771, $8772, $8773, $8774, $8775, $8776, $8777, $8778, $8779, $8780, $8781, $8782, $8783, $8784, $8785, $8786, $8787, $8788, VersionRange($8789, $8790)), ($8791, $8792, $8793, $8794, $8795, $8796, $8797, $8798, $8799, $8800, $8801, $8802, $8803, $8804, $8805, $8806, $8807, $8808, $8809, $8810, $8811, $8812, $8813, $8814, $8815, $8816, $8817, $8818, VersionRange($8819, $8820)), ($8821, $8822, $8823, $8824, $8825, $8826, $8827, $8828, $8829, $8830, $8831, $8832, $8833, $8834, $8835, $8836, $8837, $8838, $8839, $8840, $8841, $8842, $8843, $8844, $8845, $8846, $8847, $8848, VersionRange($8849, $8850)), ($8851, $8852, $8853, $8854, $8855, $8856, $8857, $8858, $8859, $8860, $8861, $8862, $8863, $8864, $8865, $8866, $8867, $8868, $8869, $8870, $8871, $8872, $8873, $8874, $8875, $8876, $8877, $8878, VersionRange($8879, $8880)), ($8881, $8882, $8883, $8884, $8885, $8886, $8887, $8888, $8889, $8890, $8891, $8892, $8893, $8894, $8895, $8896, $8897, $8898, $8899, $8900, $8901, $8902, $8903, $8904, $8905, $8906, $8907, $8908, VersionRange($8909, $8910)), ($8911, $8912, $8913, $8914, $8915, $8916, $8917, $8918, $8919, $8920, $8921, $8922, $8923, $8924, $8925, $8926, $8927, $8928, $8929, $8930, $8931, $8932, $8933, $8934, $8935, $8936, $8937, $8938, VersionRange($8939, $8940)), ($8941, $8942, $8943, $8944, $8945, $8946, $8947, $8948, $8949, $8950, $8951, $8952, $8953, $8954, $8955, $8956, $8957, $8958, $8959, $8960, $8961, $8962, $8963, $8964, $8965, $8966, $8967, $8968, VersionRange($8969, $8970)), ($8971, $8972, $8973, $8974, $8975, $8976, $8977, $8978, $8979, $8980, $8981, $8982, $8983, $8984, $8985, $8986, $8987, $8988, $8989, $8990, $8991, $8992, $8993, $8994, $8995, $8996, $8997, $8998, VersionRange($8999, $9000)), ($9001, $9002, $9003, $9004, $9005, $9006, $9007, $9008, $9009, $9010, $9011, $9012, $9013, $9014, $9015, $9016, $9017, $9018, $9019, $9020, $9021, $9022, $9023, $9024, $9025, $9026, $9027, $9028, VersionRange($9029, $9030)), ($9031, $9032, $9033, $9034, $9035, $9036, $9037, $9038, $9039, $9040, $9041, $9042, $9043, $9044, $9045, $9046, $9047, $9048, $9049, $9050, $9051, $9052, $9053, $9054, $9055, $9056, $9057, $9058, VersionRange($9059, $9060)), ($9061, $9062, $9063, $9064, $9065, $9066, $9067, $9068, $9069, $9070, $9071, $9072, $9073, $9074, $9075, $9076, $9077, $9078, $9079, $9080, $9081, $9082, $9083, $9084, $9085, $9086, $9087, $9088, VersionRange($9089, $9090)), ($9091, $9092, $9093, $9094, $9095, $9096, $9097, $9098, $9099, $9100, $9101, $9102, $9103, $9104, $9105, $9106, $9107, $9108, $9109, $9110, $9111, $9112, $9113, $9114, $9115, $9116, $9117, $9118, VersionRange($9119, $9120)), ($9121, $9122, $9123, $9124, $9125, $9126, $9127, $9128, $9129, $9130, $9131, $9132, $9133, $9134, $9135, $9136, $9137, $9138, $9139, $9140, $9141, $9142, $9143, $9144, $9145, $9146, $9147, $9148, VersionRange($9149, $9150)), ($9151, $9152, $9153, $9154, $9155, $9156, $9157, $9158, $9159, $9160, $9161, $9162, $9163, $9164, $9165, $9166, $9167, $9168, $9169, $9170, $9171, $9172, $9173, $9174, $9175, $9176, $9177, $9178, VersionRange($9179, $9180)), ($9181, $9182, $9183, $9184, $9185, $9186, $9187, $9188, $9189, $9190, $9191, $9192, $9193, $9194, $9195, $9196, $9197, $9198, $9199, $9200, $9201, $9202, $9203, $9204, $9205, $9206, $9207, $9208, VersionRange($9209, $9210)), ($9211, $9212, $9213, $9214, $9215, $9216, $9217, $9218, $9219, $9220, $9221, $9222, $9223, $9224, $9225, $9226, $9227, $9228, $9229, $9230, $9231, $9232, $9233, $9234, $9235, $9236, $9237, $9238, VersionRange($9239, $9240)), ($9241, $9242, $9243, $9244, $9245, $9246, $9247, $9248, $9249, $9250, $9251, $9252, $9253, $9254, $9255, $9256, $9257, $9258, $9259, $9260, $9261, $9262, $9263, $9264, $9265, $9266, $9267, $9268, VersionRange($9269, $9270)), ($9271, $9272, $9273, $9274, $9275, $9276, $9277, $9278, $9279, $9280, $9281, $9282, $9283, $9284, $9285, $9286, $9287, $9288, $9289, $9290, $9291, $9292, $9293, $9294, $9295, $9296, $9297, $9298, VersionRange($9299, $9300)), ($9301, $9302, $9303, $9304, $9305, $9306, $9307, $9308, $9309, $9310, $9311, $9312, $9313, $9314, $9315, $9316, $9317, $9318, $9319, $9320, $9321, $9322, $9323, $9324, $9325, $9326, $9327, $9328, VersionRange($9329, $9330)), ($9331, $9332, $9333, $9334, $9335, $9336, $9337, $9338, $9339, $9340, $9341, $9342, $9343, $9344, $9345, $9346, $9347, $9348, $9349, $9350, $9351, $9352, $9353, $9354, $9355, $9356, $9357, $9358, VersionRange($9359, $9360)), ($9361, $9362, $9363, $9364, $9365, $9366, $9367, $9368, $9369, $9370, $9371, $9372, $9373, $9374, $9375, $9376, $9377, $9378, $9379, $9380, $9381, $9382, $9383, $9384, $9385, $9386, $9387, $9388, VersionRange($9389, $9390)), ($9391, $9392, $9393, $9394, $9395, $9396, $9397, $9398, $9399, $9400, $9401, $9402, $9403, $9404, $9405, $9406, $9407, $9408, $9409, $9410, $9411, $9412, $9413, $9414, $9415, $9416, $9417, $9418, VersionRange($9419, $9420)), ($9421, $9422, $9423, $9424, $9425, $9426, $9427, $9428, $9429, $9430, $9431, $9432, $9433, $9434, $9435, $9436, $9437, $9438, $9439, $9440, $9441, $9442, $9443, $9444, $9445, $9446, $9447, $9448, VersionRange($9449, $9450)), ($9451, $9452, $9453, $9454, $9455, $9456, $9457, $9458, $9459, $9460, $9461, $9462, $9463, $9464, $9465, $9466, $9467, $9468, $9469, $9470, $9471, $9472, $9473, $9474, $9475, $9476, $9477, $9478, VersionRange($9479, $9480)), ($9481, $9482, $9483, $9484, $9485, $9486, $9487, $9488, $9489, $9490, $9491, $9492, $9493, $9494, $9495, $9496, $9497, $9498, $9499, $9500, $9501, $9502, $9503, $9504, $9505, $9506, $9507, $9508, VersionRange($9509, $9510)), ($9511, $9512, $9513, $9514, $9515, $9516, $9517, $9518, $9519, $9520, $9521, $9522, $9523, $9524, $9525, $9526, $9527, $9528, $9529, $9530, $9531, $9532, $9533, $9534, $9535, $9536, $9537, $9538, VersionRange($9539, $9540)), ($9541, $9542, $9543, $9544, $9545, $9546, $9547, $9548, $9549, $9550, $9551, $9552, $9553, $9554, $9555, $9556, $9557, $9558, $9559, $9560, $9561, $9562, $9563, $9564, $9565, $9566, $9567, $9568, VersionRange($9569, $9570)), ($9571, $9572, $9573, $9574, $9575, $9576, $9577, $9578, $9579, $9580, $9581, $9582, $9583, $9584, $9585, $9586, $9587, $9588, $9589, $9590, $9591, $9592, $9593, $9594, $9595, $9596, $9597, $9598, VersionRange($9599, $9600)), ($9601, $9602, $9603, $9604, $9605, $9606, $9607, $9608, $9609, $9610, $9611, $9612, $9613, $9614, $9615, $9616, $9617, $9618, $9619, $9620, $9621, $9622, $9623, $9624, $9625, $9626, $9627, $9628, VersionRange($9629, $9630)), ($9631, $9632, $9633, $9634, $9635, $9636, $9637, $9638, $9639, $9640, $9641, $9642, $9643, $9644, $9645, $9646, $9647, $9648, $9649, $9650, $9651, $9652, $9653, $9654, $9655, $9656, $9657, $9658, VersionRange($9659, $9660)), ($9661, $9662, $9663, $9664, $9665, $9666, $9667, $9668, $9669, $9670, $9671, $9672, $9673, $9674, $9675, $9676, $9677, $9678, $9679, $9680, $9681, $9682, $9683, $9684, $9685, $9686, $9687, $9688, VersionRange($9689, $9690)), ($9691, $9692, $9693, $9694, $9695, $9696, $9697, $9698, $9699, $9700, $9701, $9702, $9703, $9704, $9705, $9706, $9707, $9708, $9709, $9710, $9711, $9712, $9713, $9714, $9715, $9716, $9717, $9718, VersionRange($9719, $9720)), ($9721, $9722, $9723, $9724, $9725, $9726, $9727, $9728, $9729, $9730, $9731, $9732, $9733, $9734, $9735, $9736, $9737, $9738, $9739, $9740, $9741, $9742, $9743, $9744, $9745, $9746, $9747, $9748, VersionRange($9749, $9750)), ($9751, $9752, $9753, $9754, $9755, $9756, $9757, $9758, $9759, $9760, $9761, $9762, $9763, $9764, $9765, $9766, $9767, $9768, $9769, $9770, $9771, $9772, $9773, $9774, $9775, $9776, $9777, $9778, VersionRange($9779, $9780)), ($9781, $9782, $9783, $9784, $9785, $9786, $9787, $9788, $9789, $9790, $9791, $9792, $9793, $9794, $9795, $9796, $9797, $9798, $9799, $9800, $9801, $9802, $9803, $9804, $9805, $9806, $9807, $9808, VersionRange($9809, $9810)), ($9811, $9812, $9813, $9814, $9815, $9816, $9817, $9818, $9819, $9820, $9821, $9822, $9823, $9824, $9825, $9826, $9827, $9828, $9829, $9830, $9831, $9832, $9833, $9834, $9835, $9836, $9837, $9838, VersionRange($9839, $9840)), ($9841, $9842, $9843, $9844, $9845, $9846, $9847, $9848, $9849, $9850, $9851, $9852, $9853, $9854, $9855, $9856, $9857, $9858, $9859, $9860, $9861, $9862, $9863, $9864, $9865, $9866, $9867, $9868, VersionRange($9869, $9870)), ($9871, $9872, $9873, $9874, $9875, $9876, $9877, $9878, $9879, $9880, $9881, $9882, $9883, $9884, $9885, $9886, $9887, $9888, $9889, $9890, $9891, $9892, $9893, $9894, $9895, $9896, $9897, $9898, VersionRange($9899, $9900)), ($9901, $9902, $9903, $9904, $9905, $9906, $9907, $9908, $9909, $9910, $9911, $9912, $9913, $9914, $9915, $9916, $9917, $9918, $9919, $9920, $9921, $9922, $9923, $9924, $9925, $9926, $9927, $9928, VersionRange($9929, $9930)), ($9931, $9932, $9933, $9934, $9935, $9936, $9937, $9938, $9939, $9940, $9941, $9942, $9943, $9944, $9945, $9946, $9947, $9948, $9949, $9950, $9951, $9952, $9953, $9954, $9955, $9956, $9957, $9958, VersionRange($9959, $9960)), ($9961, $9962, $9963, $9964, $9965, $9966, $9967, $9968, $9969, $9970, $9971, $9972, $9973, $9974, $9975, $9976, $9977, $9978, $9979, $9980, $9981, $9982, $9983, $9984, $9985, $9986, $9987, $9988, VersionRange($9989, $9990)), ($9991, $9992, $9993, $9994, $9995, $9996, $9997, $9998, $9999, $10000, $10001, $10002, $10003, $10004, $10005, $10006, $10007, $10008, $10009, $10010, $10011, $10012, $10013, $10014, $10015, $10016, $10017, $10018, VersionRange($10019, $10020)), ($10021, $10022, $10023, $10024, $10025, $10026, $10027, $10028, $10029, $10030, $10031, $10032, $10033, $10034, $10035, $10036, $10037, $10038, $10039, $10040, $10041, $10042, $10043, $10044, $10045, $10046, $10047, $10048, VersionRange($10049, $10050)), ($10051, $10052, $10053, $10054, $10055, $10056, $10057, $10058, $10059, $10060, $10061, $10062, $10063, $10064, $10065, $10066, $10067, $10068, $10069, $10070, $10071, $10072, $10073, $10074, $10075, $10076, $10077, $10078, VersionRange($10079, $10080)), ($10081, $10082, $10083, $10084, $10085, $10086, $10087, $10088, $10089, $10090, $10091, $10092, $10093, $10094, $10095, $10096, $10097, $10098, $10099, $10100, $10101, $10102, $10103, $10104, $10105, $10106, $10107, $10108, VersionRange($10109, $10110)), ($10111, $10112, $10113, $10114, $10115, $10116, $10117, $10118, $10119, $10120, $10121, $10122, $10123, $10124, $10125, $10126, $10127, $10128, $10129, $10130, $10131, $10132, $10133, $10134, $10135, $10136, $10137, $10138, VersionRange($10139, $10140)), ($10141, $10142, $10143, $10144, $10145, $10146, $10147, $10148, $10149, $10150, $10151, $10152, $10153, $10154, $10155, $10156, $10157, $10158, $10159, $10160, $10161, $10162, $10163, $10164, $10165, $10166, $10167, $10168, VersionRange($10169, $10170)), ($10171, $10172, $10173, $10174, $10175, $10176, $10177, $10178, $10179, $10180, $10181, $10182, $10183, $10184, $10185, $10186, $10187, $10188, $10189, $10190, $10191, $10192, $10193, $10194, $10195, $10196, $10197, $10198, VersionRange($10199, $10200)), ($10201, $10202, $10203, $10204, $10205, $10206, $10207, $10208, $10209, $10210, $10211, $10212, $10213, $10214, $10215, $10216, $10217, $10218, $10219, $10220, $10221, $10222, $10223, $10224, $10225, $10226, $10227, $10228, VersionRange($10229, $10230)), ($10231, $10232, $10233, $10234, $10235, $10236, $10237, $10238, $10239, $10240, $10241, $10242, $10243, $10244, $10245, $10246, $10247, $10248, $10249, $10250, $10251, $10252, $10253, $10254, $10255, $10256, $10257, $10258, VersionRange($10259, $10260)), ($10261, $10262, $10263, $10264, $10265, $10266, $10267, $10268, $10269, $10270, $10271, $10272, $10273, $10274, $10275, $10276, $10277, $10278, $10279, $10280, $10281, $10282, $10283, $10284, $10285, $10286, $10287, $10288, VersionRange($10289, $10290)), ($10291, $10292, $10293, $10294, $10295, $10296, $10297, $10298, $10299, $10300, $10301, $10302, $10303, $10304, $10305, $10306, $10307, $10308, $10309, $10310, $10311, $10312, $10313, $10314, $10315, $10316, $10317, $10318, VersionRange($10319, $10320)), ($10321, $10322, $10323, $10324, $10325, $10326, $10327, $10328, $10329, $10330, $10331, $10332, $10333, $10334, $10335, $10336, $10337, $10338, $10339, $10340, $10341, $10342, $10343, $10344, $10345, $10346, $10347, $10348, VersionRange($10349, $10350)), ($10351, $10352, $10353, $10354, $10355, $10356, $10357, $10358, $10359, $10360, $10361, $10362, $10363, $10364, $10365, $10366, $10367, $10368, $10369, $10370, $10371, $10372, $10373, $10374, $10375, $10376, $10377, $10378, VersionRange($10379, $10380)), ($10381, $10382, $10383, $10384, $10385, $10386, $10387, $10388, $10389, $10390, $10391, $10392, $10393, $10394, $10395, $10396, $10397, $10398, $10399, $10400, $10401, $10402, $10403, $10404, $10405, $10406, $10407, $10408, VersionRange($10409, $10410)), ($10411, $10412, $10413, $10414, $10415, $10416, $10417, $10418, $10419, $10420, $10421, $10422, $10423, $10424, $10425, $10426, $10427, $10428, $10429, $10430, $10431, $10432, $10433, $10434, $10435, $10436, $10437, $10438, VersionRange($10439, $10440)), ($10441, $10442, $10443, $10444, $10445, $10446, $10447, $10448, $10449, $10450, $10451, $10452, $10453, $10454, $10455, $10456, $10457, $10458, $10459, $10460, $10461, $10462, $10463, $10464, $10465, $10466, $10467, $10468, VersionRange($10469, $10470)), ($10471, $10472, $10473, $10474, $10475, $10476, $10477, $10478, $10479, $10480, $10481, $10482, $10483, $10484, $10485, $10486, $10487, $10488, $10489, $10490, $10491, $10492, $10493, $10494, $10495, $10496, $10497, $10498, VersionRange($10499, $10500)), ($10501, $10502, $10503, $10504, $10505, $10506, $10507, $10508, $10509, $10510, $10511, $10512, $10513, $10514, $10515, $10516, $10517, $10518, $10519, $10520, $10521, $10522, $10523, $10524, $10525, $10526, $10527, $10528, VersionRange($10529, $10530)), ($10531, $10532, $10533, $10534, $10535, $10536, $10537, $10538, $10539, $10540, $10541, $10542, $10543, $10544, $10545, $10546, $10547, $10548, $10549, $10550, $10551, $10552, $10553, $10554, $10555, $10556, $10557, $10558, VersionRange($10559, $10560)), ($10561, $10562, $10563, $10564, $10565, $10566, $10567, $10568, $10569, $10570, $10571, $10572, $10573, $10574, $10575, $10576, $10577, $10578, $10579, $10580, $10581, $10582, $10583, $10584, $10585, $10586, $10587, $10588, VersionRange($10589, $10590)), ($10591, $10592, $10593, $10594, $10595, $10596, $10597, $10598, $10599, $10600, $10601, $10602, $10603, $10604, $10605, $10606, $10607, $10608, $10609, $10610, $10611, $10612, $10613, $10614, $10615, $10616, $10617, $10618, VersionRange($10619, $10620)), ($10621, $10622, $10623, $10624, $10625, $10626, $10627, $10628, $10629, $10630, $10631, $10632, $10633, $10634, $10635, $10636, $10637, $10638, $10639, $10640, $10641, $10642, $10643, $10644, $10645, $10646, $10647, $10648, VersionRange($10649, $10650)), ($10651, $10652, $10653, $10654, $10655, $10656, $10657, $10658, $10659, $10660, $10661, $10662, $10663, $10664, $10665, $10666, $10667, $10668, $10669, $10670, $10671, $10672, $10673, $10674, $10675, $10676, $10677, $10678, VersionRange($10679, $10680)), ($10681, $10682, $10683, $10684, $10685, $10686, $10687, $10688, $10689, $10690, $10691, $10692, $10693, $10694, $10695, $10696, $10697, $10698, $10699, $10700, $10701, $10702, $10703, $10704, $10705, $10706, $10707, $10708, VersionRange($10709, $10710)), ($10711, $10712, $10713, $10714, $10715, $10716, $10717, $10718, $10719, $10720, $10721, $10722, $10723, $10724, $10725, $10726, $10727, $10728, $10729, $10730, $10731, $10732, $10733, $10734, $10735, $10736, $10737, $10738, VersionRange($10739, $10740)), ($10741, $10742, $10743, $10744, $10745, $10746, $10747, $10748, $10749, $10750, $10751, $10752, $10753, $10754, $10755, $10756, $10757, $10758, $10759, $10760, $10761, $10762, $10763, $10764, $10765, $10766, $10767, $10768, VersionRange($10769, $10770)), ($10771, $10772, $10773, $10774, $10775, $10776, $10777, $10778, $10779, $10780, $10781, $10782, $10783, $10784, $10785, $10786, $10787, $10788, $10789, $10790, $10791, $10792, $10793, $10794, $10795, $10796, $10797, $10798, VersionRange($10799, $10800)), ($10801, $10802, $10803, $10804, $10805, $10806, $10807, $10808, $10809, $10810, $10811, $10812, $10813, $10814, $10815, $10816, $10817, $10818, $10819, $10820, $10821, $10822, $10823, $10824, $10825, $10826, $10827, $10828, VersionRange($10829, $10830)), ($10831, $10832, $10833, $10834, $10835, $10836, $10837, $10838, $10839, $10840, $10841, $10842, $10843, $10844, $10845, $10846, $10847, $10848, $10849, $10850, $10851, $10852, $10853, $10854, $10855, $10856, $10857, $10858, VersionRange($10859, $10860)), ($10861, $10862, $10863, $10864, $10865, $10866, $10867, $10868, $10869, $10870, $10871, $10872, $10873, $10874, $10875, $10876, $10877, $10878, $10879, $10880, $10881, $10882, $10883, $10884, $10885, $10886, $10887, $10888, VersionRange($10889, $10890)), ($10891, $10892, $10893, $10894, $10895, $10896, $10897, $10898, $10899, $10900, $10901, $10902, $10903, $10904, $10905, $10906, $10907, $10908, $10909, $10910, $10911, $10912, $10913, $10914, $10915, $10916, $10917, $10918, VersionRange($10919, $10920)), ($10921, $10922, $10923, $10924, $10925, $10926, $10927, $10928, $10929, $10930, $10931, $10932, $10933, $10934, $10935, $10936, $10937, $10938, $10939, $10940, $10941, $10942, $10943, $10944, $10945, $10946, $10947, $10948, VersionRange($10949, $10950)), ($10951, $10952, $10953, $10954, $10955, $10956, $10957, $10958, $10959, $10960, $10961, $10962, $10963, $10964, $10965, $10966, $10967, $10968, $10969, $10970, $10971, $10972, $10973, $10974, $10975, $10976, $10977, $10978, VersionRange($10979, $10980)), ($10981, $10982, $10983, $10984, $10985, $10986, $10987, $10988, $10989, $10990, $10991, $10992, $10993, $10994, $10995, $10996, $10997, $10998, $10999, $11000, $11001, $11002, $11003, $11004, $11005, $11006, $11007, $11008, VersionRange($11009, $11010)), ($11011, $11012, $11013, $11014, $11015, $11016, $11017, $11018, $11019, $11020, $11021, $11022, $11023, $11024, $11025, $11026, $11027, $11028, $11029, $11030, $11031, $11032, $11033, $11034, $11035, $11036, $11037, $11038, VersionRange($11039, $11040)), ($11041, $11042, $11043, $11044, $11045, $11046, $11047, $11048, $11049, $11050, $11051, $11052, $11053, $11054, $11055, $11056, $11057, $11058, $11059, $11060, $11061, $11062, $11063, $11064, $11065, $11066, $11067, $11068, VersionRange($11069, $11070)), ($11071, $11072, $11073, $11074, $11075, $11076, $11077, $11078, $11079, $11080, $11081, $11082, $11083, $11084, $11085, $11086, $11087, $11088, $11089, $11090, $11091, $11092, $11093, $11094, $11095, $11096, $11097, $11098, VersionRange($11099, $11100)), ($11101, $11102, $11103, $11104, $11105, $11106, $11107, $11108, $11109, $11110, $11111, $11112, $11113, $11114, $11115, $11116, $11117, $11118, $11119, $11120, $11121, $11122, $11123, $11124, $11125, $11126, $11127, $11128, VersionRange($11129, $11130)), ($11131, $11132, $11133, $11134, $11135, $11136, $11137, $11138, $11139, $11140, $11141, $11142, $11143, $11144, $11145, $11146, $11147, $11148, $11149, $11150, $11151, $11152, $11153, $11154, $11155, $11156, $11157, $11158, VersionRange($11159, $11160)), ($11161, $11162, $11163, $11164, $11165, $11166, $11167, $11168, $11169, $11170, $11171, $11172, $11173, $11174, $11175, $11176, $11177, $11178, $11179, $11180, $11181, $11182, $11183, $11184, $11185, $11186, $11187, $11188, VersionRange($11189, $11190)), ($11191, $11192, $11193, $11194, $11195, $11196, $11197, $11198, $11199, $11200, $11201, $11202, $11203, $11204, $11205, $11206, $11207, $11208, $11209, $11210, $11211, $11212, $11213, $11214, $11215, $11216, $11217, $11218, VersionRange($11219, $11220)), ($11221, $11222, $11223, $11224, $11225, $11226, $11227, $11228, $11229, $11230, $11231, $11232, $11233, $11234, $11235, $11236, $11237, $11238, $11239, $11240, $11241, $11242, $11243, $11244, $11245, $11246, $11247, $11248, VersionRange($11249, $11250)), ($11251, $11252, $11253, $11254, $11255, $11256, $11257, $11258, $11259, $11260, $11261, $11262, $11263, $11264, $11265, $11266, $11267, $11268, $11269, $11270, $11271, $11272, $11273, $11274, $11275, $11276, $11277, $11278, VersionRange($11279, $11280)), ($11281, $11282, $11283, $11284, $11285, $11286, $11287, $11288, $11289, $11290, $11291, $11292, $11293, $11294, $11295, $11296, $11297, $11298, $11299, $11300, $11301, $11302, $11303, $11304, $11305, $11306, $11307, $11308, VersionRange($11309, $11310)), ($11311, $11312, $11313, $11314, $11315, $11316, $11317, $11318, $11319, $11320, $11321, $11322, $11323, $11324, $11325, $11326, $11327, $11328, $11329, $11330, $11331, $11332, $11333, $11334, $11335, $11336, $11337, $11338, VersionRange($11339, $11340)), ($11341, $11342, $11343, $11344, $11345, $11346, $11347, $11348, $11349, $11350, $11351, $11352, $11353, $11354, $11355, $11356, $11357, $11358, $11359, $11360, $11361, $11362, $11363, $11364, $11365, $11366, $11367, $11368, VersionRange($11369, $11370)), ($11371, $11372, $11373, $11374, $11375, $11376, $11377, $11378, $11379, $11380, $11381, $11382, $11383, $11384, $11385, $11386, $11387, $11388, $11389, $11390, $11391, $11392, $11393, $11394, $11395, $11396, $11397, $11398, VersionRange($11399, $11400)), ($11401, $11402, $11403, $11404, $11405, $11406, $11407, $11408, $11409, $11410, $11411, $11412, $11413, $11414, $11415, $11416, $11417, $11418, $11419, $11420, $11421, $11422, $11423, $11424, $11425, $11426, $11427, $11428, VersionRange($11429, $11430)), ($11431, $11432, $11433, $11434, $11435, $11436, $11437, $11438, $11439, $11440, $11441, $11442, $11443, $11444, $11445, $11446, $11447, $11448, $11449, $11450, $11451, $11452, $11453, $11454, $11455, $11456, $11457, $11458, VersionRange($11459, $11460)), ($11461, $11462, $11463, $11464, $11465, $11466, $11467, $11468, $11469, $11470, $11471, $11472, $11473, $11474, $11475, $11476, $11477, $11478, $11479, $11480, $11481, $11482, $11483, $11484, $11485, $11486, $11487, $11488, VersionRange($11489, $11490)), ($11491, $11492, $11493, $11494, $11495, $11496, $11497, $11498, $11499, $11500, $11501, $11502, $11503, $11504, $11505, $11506, $11507, $11508, $11509, $11510, $11511, $11512, $11513, $11514, $11515, $11516, $11517, $11518, VersionRange($11519, $11520)), ($11521, $11522, $11523, $11524, $11525, $11526, $11527, $11528, $11529, $11530, $11531, $11532, $11533, $11534, $11535, $11536, $11537, $11538, $11539, $11540, $11541, $11542, $11543, $11544, $11545, $11546, $11547, $11548, VersionRange($11549, $11550)), ($11551, $11552, $11553, $11554, $11555, $11556, $11557, $11558, $11559, $11560, $11561, $11562, $11563, $11564, $11565, $11566, $11567, $11568, $11569, $11570, $11571, $11572, $11573, $11574, $11575, $11576, $11577, $11578, VersionRange($11579, $11580)), ($11581, $11582, $11583, $11584, $11585, $11586, $11587, $11588, $11589, $11590, $11591, $11592, $11593, $11594, $11595, $11596, $11597, $11598, $11599, $11600, $11601, $11602, $11603, $11604, $11605, $11606, $11607, $11608, VersionRange($11609, $11610)), ($11611, $11612, $11613, $11614, $11615, $11616, $11617, $11618, $11619, $11620, $11621, $11622, $11623, $11624, $11625, $11626, $11627, $11628, $11629, $11630, $11631, $11632, $11633, $11634, $11635, $11636, $11637, $11638, VersionRange($11639, $11640)), ($11641, $11642, $11643, $11644, $11645, $11646, $11647, $11648, $11649, $11650, $11651, $11652, $11653, $11654, $11655, $11656, $11657, $11658, $11659, $11660, $11661, $11662, $11663, $11664, $11665, $11666, $11667, $11668, VersionRange($11669, $11670)), ($11671, $11672, $11673, $11674, $11675, $11676, $11677, $11678, $11679, $11680, $11681, $11682, $11683, $11684, $11685, $11686, $11687, $11688, $11689, $11690, $11691, $11692, $11693, $11694, $11695, $11696, $11697, $11698, VersionRange($11699, $11700)), ($11701, $11702, $11703, $11704, $11705, $11706, $11707, $11708, $11709, $11710, $11711, $11712, $11713, $11714, $11715, $11716, $11717, $11718, $11719, $11720, $11721, $11722, $11723, $11724, $11725, $11726, $11727, $11728, VersionRange($11729, $11730)), ($11731, $11732, $11733, $11734, $11735, $11736, $11737, $11738, $11739, $11740, $11741, $11742, $11743, $11744, $11745, $11746, $11747, $11748, $11749, $11750, $11751, $11752, $11753, $11754, $11755, $11756, $11757, $11758, VersionRange($11759, $11760)), ($11761, $11762, $11763, $11764, $11765, $11766, $11767, $11768, $11769, $11770, $11771, $11772, $11773, $11774, $11775, $11776, $11777, $11778, $11779, $11780, $11781, $11782, $11783, $11784, $11785, $11786, $11787, $11788, VersionRange($11789, $11790)), ($11791, $11792, $11793, $11794, $11795, $11796, $11797, $11798, $11799, $11800, $11801, $11802, $11803, $11804, $11805, $11806, $11807, $11808, $11809, $11810, $11811, $11812, $11813, $11814, $11815, $11816, $11817, $11818, VersionRange($11819, $11820)), ($11821, $11822, $11823, $11824, $11825, $11826, $11827, $11828, $11829, $11830, $11831, $11832, $11833, $11834, $11835, $11836, $11837, $11838, $11839, $11840, $11841, $11842, $11843, $11844, $11845, $11846, $11847, $11848, VersionRange($11849, $11850)), ($11851, $11852, $11853, $11854, $11855, $11856, $11857, $11858, $11859, $11860, $11861, $11862, $11863, $11864, $11865, $11866, $11867, $11868, $11869, $11870, $11871, $11872, $11873, $11874, $11875, $11876, $11877, $11878, VersionRange($11879, $11880)), ($11881, $11882, $11883, $11884, $11885, $11886, $11887, $11888, $11889, $11890, $11891, $11892, $11893, $11894, $11895, $11896, $11897, $11898, $11899, $11900, $11901, $11902, $11903, $11904, $11905, $11906, $11907, $11908, VersionRange($11909, $11910)), ($11911, $11912, $11913, $11914, $11915, $11916, $11917, $11918, $11919, $11920, $11921, $11922, $11923, $11924, $11925, $11926, $11927, $11928, $11929, $11930, $11931, $11932, $11933, $11934, $11935, $11936, $11937, $11938, VersionRange($11939, $11940)), ($11941, $11942, $11943, $11944, $11945, $11946, $11947, $11948, $11949, $11950, $11951, $11952, $11953, $11954, $11955, $11956, $11957, $11958, $11959, $11960, $11961, $11962, $11963, $11964, $11965, $11966, $11967, $11968, VersionRange($11969, $11970)), ($11971, $11972, $11973, $11974, $11975, $11976, $11977, $11978, $11979, $11980, $11981, $11982, $11983, $11984, $11985, $11986, $11987, $11988, $11989, $11990, $11991, $11992, $11993, $11994, $11995, $11996, $11997, $11998, VersionRange($11999, $12000)), ($12001, $12002, $12003, $12004, $12005, $12006, $12007, $12008, $12009, $12010, $12011, $12012, $12013, $12014, $12015, $12016, $12017, $12018, $12019, $12020, $12021, $12022, $12023, $12024, $12025, $12026, $12027, $12028, VersionRange($12029, $12030)), ($12031, $12032, $12033, $12034, $12035, $12036, $12037, $12038, $12039, $12040, $12041, $12042, $12043, $12044, $12045, $12046, $12047, $12048, $12049, $12050, $12051, $12052, $12053, $12054, $12055, $12056, $12057, $12058, VersionRange($12059, $12060)), ($12061, $12062, $12063, $12064, $12065, $12066, $12067, $12068, $12069, $12070, $12071, $12072, $12073, $12074, $12075, $12076, $12077, $12078, $12079, $12080, $12081, $12082, $12083, $12084, $12085, $12086, $12087, $12088, VersionRange($12089, $12090)), ($12091, $12092, $12093, $12094, $12095, $12096, $12097, $12098, $12099, $12100, $12101, $12102, $12103, $12104, $12105, $12106, $12107, $12108, $12109, $12110, $12111, $12112, $12113, $12114, $12115, $12116, $12117, $12118, VersionRange($12119, $12120)), ($12121, $12122, $12123, $12124, $12125, $12126, $12127, $12128, $12129, $12130, $12131, $12132, $12133, $12134, $12135, $12136, $12137, $12138, $12139, $12140, $12141, $12142, $12143, $12144, $12145, $12146, $12147, $12148, VersionRange($12149, $12150)), ($12151, $12152, $12153, $12154, $12155, $12156, $12157, $12158, $12159, $12160, $12161, $12162, $12163, $12164, $12165, $12166, $12167, $12168, $12169, $12170, $12171, $12172, $12173, $12174, $12175, $12176, $12177, $12178, VersionRange($12179, $12180)), ($12181, $12182, $12183, $12184, $12185, $12186, $12187, $12188, $12189, $12190, $12191, $12192, $12193, $12194, $12195, $12196, $12197, $12198, $12199, $12200, $12201, $12202, $12203, $12204, $12205, $12206, $12207, $12208, VersionRange($12209, $12210)), ($12211, $12212, $12213, $12214, $12215, $12216, $12217, $12218, $12219, $12220, $12221, $12222, $12223, $12224, $12225, $12226, $12227, $12228, $12229, $12230, $12231, $12232, $12233, $12234, $12235, $12236, $12237, $12238, VersionRange($12239, $12240)), ($12241, $12242, $12243, $12244, $12245, $12246, $12247, $12248, $12249, $12250, $12251, $12252, $12253, $12254, $12255, $12256, $12257, $12258, $12259, $12260, $12261, $12262, $12263, $12264, $12265, $12266, $12267, $12268, VersionRange($12269, $12270)), ($12271, $12272, $12273, $12274, $12275, $12276, $12277, $12278, $12279, $12280, $12281, $12282, $12283, $12284, $12285, $12286, $12287, $12288, $12289, $12290, $12291, $12292, $12293, $12294, $12295, $12296, $12297, $12298, VersionRange($12299, $12300)), ($12301, $12302, $12303, $12304, $12305, $12306, $12307, $12308, $12309, $12310, $12311, $12312, $12313, $12314, $12315, $12316, $12317, $12318, $12319, $12320, $12321, $12322, $12323, $12324, $12325, $12326, $12327, $12328, VersionRange($12329, $12330)), ($12331, $12332, $12333, $12334, $12335, $12336, $12337, $12338, $12339, $12340, $12341, $12342, $12343, $12344, $12345, $12346, $12347, $12348, $12349, $12350, $12351, $12352, $12353, $12354, $12355, $12356, $12357, $12358, VersionRange($12359, $12360)), ($12361, $12362, $12363, $12364, $12365, $12366, $12367, $12368, $12369, $12370, $12371, $12372, $12373, $12374, $12375, $12376, $12377, $12378, $12379, $12380, $12381, $12382, $12383, $12384, $12385, $12386, $12387, $12388, VersionRange($12389, $12390)), ($12391, $12392, $12393, $12394, $12395, $12396, $12397, $12398, $12399, $12400, $12401, $12402, $12403, $12404, $12405, $12406, $12407, $12408, $12409, $12410, $12411, $12412, $12413, $12414, $12415, $12416, $12417, $12418, VersionRange($12419, $12420)), ($12421, $12422, $12423, $12424, $12425, $12426, $12427, $12428, $12429, $12430, $12431, $12432, $12433, $12434, $12435, $12436, $12437, $12438, $12439, $12440, $12441, $12442, $12443, $12444, $12445, $12446, $12447, $12448, VersionRange($12449, $12450)), ($12451, $12452, $12453, $12454, $12455, $12456, $12457, $12458, $12459, $12460, $12461, $12462, $12463, $12464, $12465, $12466, $12467, $12468, $12469, $12470, $12471, $12472, $12473, $12474, $12475, $12476, $12477, $12478, VersionRange($12479, $12480)), ($12481, $12482, $12483, $12484, $12485, $12486, $12487, $12488, $12489, $12490, $12491, $12492, $12493, $12494, $12495, $12496, $12497, $12498, $12499, $12500, $12501, $12502, $12503, $12504, $12505, $12506, $12507, $12508, VersionRange($12509, $12510)), ($12511, $12512, $12513, $12514, $12515, $12516, $12517, $12518, $12519, $12520, $12521, $12522, $12523, $12524, $12525, $12526, $12527, $12528, $12529, $12530, $12531, $12532, $12533, $12534, $12535, $12536, $12537, $12538, VersionRange($12539, $12540)), ($12541, $12542, $12543, $12544, $12545, $12546, $12547, $12548, $12549, $12550, $12551, $12552, $12553, $12554, $12555, $12556, $12557, $12558, $12559, $12560, $12561, $12562, $12563, $12564, $12565, $12566, $12567, $12568, VersionRange($12569, $12570)), ($12571, $12572, $12573, $12574, $12575, $12576, $12577, $12578, $12579, $12580, $12581, $12582, $12583, $12584, $12585, $12586, $12587, $12588, $12589, $12590, $12591, $12592, $12593, $12594, $12595, $12596, $12597, $12598, VersionRange($12599, $12600)), ($12601, $12602, $12603, $12604, $12605, $12606, $12607, $12608, $12609, $12610, $12611, $12612, $12613, $12614, $12615, $12616, $12617, $12618, $12619, $12620, $12621, $12622, $12623, $12624, $12625, $12626, $12627, $12628, VersionRange($12629, $12630)), ($12631, $12632, $12633, $12634, $12635, $12636, $12637, $12638, $12639, $12640, $12641, $12642, $12643, $12644, $12645, $12646, $12647, $12648, $12649, $12650, $12651, $12652, $12653, $12654, $12655, $12656, $12657, $12658, VersionRange($12659, $12660)), ($12661, $12662, $12663, $12664, $12665, $12666, $12667, $12668, $12669, $12670, $12671, $12672, $12673, $12674, $12675, $12676, $12677, $12678, $12679, $12680, $12681, $12682, $12683, $12684, $12685, $12686, $12687, $12688, VersionRange($12689, $12690)), ($12691, $12692, $12693, $12694, $12695, $12696, $12697, $12698, $12699, $12700, $12701, $12702, $12703, $12704, $12705, $12706, $12707, $12708, $12709, $12710, $12711, $12712, $12713, $12714, $12715, $12716, $12717, $12718, VersionRange($12719, $12720)), ($12721, $12722, $12723, $12724, $12725, $12726, $12727, $12728, $12729, $12730, $12731, $12732, $12733, $12734, $12735, $12736, $12737, $12738, $12739, $12740, $12741, $12742, $12743, $12744, $12745, $12746, $12747, $12748, VersionRange($12749, $12750)), ($12751, $12752, $12753, $12754, $12755, $12756, $12757, $12758, $12759, $12760, $12761, $12762, $12763, $12764, $12765, $12766, $12767, $12768, $12769, $12770, $12771, $12772, $12773, $12774, $12775, $12776, $12777, $12778, VersionRange($12779, $12780)), ($12781, $12782, $12783, $12784, $12785, $12786, $12787, $12788, $12789, $12790, $12791, $12792, $12793, $12794, $12795, $12796, $12797, $12798, $12799, $12800, $12801, $12802, $12803, $12804, $12805, $12806, $12807, $12808, VersionRange($12809, $12810)), ($12811, $12812, $12813, $12814, $12815, $12816, $12817, $12818, $12819, $12820, $12821, $12822, $12823, $12824, $12825, $12826, $12827, $12828, $12829, $12830, $12831, $12832, $12833, $12834, $12835, $12836, $12837, $12838, VersionRange($12839, $12840)), ($12841, $12842, $12843, $12844, $12845, $12846, $12847, $12848, $12849, $12850, $12851, $12852, $12853, $12854, $12855, $12856, $12857, $12858, $12859, $12860, $12861, $12862, $12863, $12864, $12865, $12866, $12867, $12868, VersionRange($12869, $12870)), ($12871, $12872, $12873, $12874, $12875, $12876, $12877, $12878, $12879, $12880, $12881, $12882, $12883, $12884, $12885, $12886, $12887, $12888, $12889, $12890, $12891, $12892, $12893, $12894, $12895, $12896, $12897, $12898, VersionRange($12899, $12900)), ($12901, $12902, $12903, $12904, $12905, $12906, $12907, $12908, $12909, $12910, $12911, $12912, $12913, $12914, $12915, $12916, $12917, $12918, $12919, $12920, $12921, $12922, $12923, $12924, $12925, $12926, $12927, $12928, VersionRange($12929, $12930)), ($12931, $12932, $12933, $12934, $12935, $12936, $12937, $12938, $12939, $12940, $12941, $12942, $12943, $12944, $12945, $12946, $12947, $12948, $12949, $12950, $12951, $12952, $12953, $12954, $12955, $12956, $12957, $12958, VersionRange($12959, $12960)), ($12961, $12962, $12963, $12964, $12965, $12966, $12967, $12968, $12969, $12970[...][ Date: 2023-07-04 18:40:02 ]
16 3s704ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30)), ($31, $32, $33, $34, $35, $36, $37, $38, $39, $40, $41, $42, $43, $44, $45, $46, $47, $48, $49, $50, $51, $52, $53, $54, $55, $56, $57, $58, VersionRange($59, $60)), ($61, $62, $63, $64, $65, $66, $67, $68, $69, $70, $71, $72, $73, $74, $75, $76, $77, $78, $79, $80, $81, $82, $83, $84, $85, $86, $87, $88, VersionRange($89, $90)), ($91, $92, $93, $94, $95, $96, $97, $98, $99, $100, $101, $102, $103, $104, $105, $106, $107, $108, $109, $110, $111, $112, $113, $114, $115, $116, $117, $118, VersionRange($119, $120)), ($121, $122, $123, $124, $125, $126, $127, $128, $129, $130, $131, $132, $133, $134, $135, $136, $137, $138, $139, $140, $141, $142, $143, $144, $145, $146, $147, $148, VersionRange($149, $150)), ($151, $152, $153, $154, $155, $156, $157, $158, $159, $160, $161, $162, $163, $164, $165, $166, $167, $168, $169, $170, $171, $172, $173, $174, $175, $176, $177, $178, VersionRange($179, $180)), ($181, $182, $183, $184, $185, $186, $187, $188, $189, $190, $191, $192, $193, $194, $195, $196, $197, $198, $199, $200, $201, $202, $203, $204, $205, $206, $207, $208, VersionRange($209, $210)), ($211, $212, $213, $214, $215, $216, $217, $218, $219, $220, $221, $222, $223, $224, $225, $226, $227, $228, $229, $230, $231, $232, $233, $234, $235, $236, $237, $238, VersionRange($239, $240)), ($241, $242, $243, $244, $245, $246, $247, $248, $249, $250, $251, $252, $253, $254, $255, $256, $257, $258, $259, $260, $261, $262, $263, $264, $265, $266, $267, $268, VersionRange($269, $270)), ($271, $272, $273, $274, $275, $276, $277, $278, $279, $280, $281, $282, $283, $284, $285, $286, $287, $288, $289, $290, $291, $292, $293, $294, $295, $296, $297, $298, VersionRange($299, $300)), ($301, $302, $303, $304, $305, $306, $307, $308, $309, $310, $311, $312, $313, $314, $315, $316, $317, $318, $319, $320, $321, $322, $323, $324, $325, $326, $327, $328, VersionRange($329, $330)), ($331, $332, $333, $334, $335, $336, $337, $338, $339, $340, $341, $342, $343, $344, $345, $346, $347, $348, $349, $350, $351, $352, $353, $354, $355, $356, $357, $358, VersionRange($359, $360)), ($361, $362, $363, $364, $365, $366, $367, $368, $369, $370, $371, $372, $373, $374, $375, $376, $377, $378, $379, $380, $381, $382, $383, $384, $385, $386, $387, $388, VersionRange($389, $390)), ($391, $392, $393, $394, $395, $396, $397, $398, $399, $400, $401, $402, $403, $404, $405, $406, $407, $408, $409, $410, $411, $412, $413, $414, $415, $416, $417, $418, VersionRange($419, $420)), ($421, $422, $423, $424, $425, $426, $427, $428, $429, $430, $431, $432, $433, $434, $435, $436, $437, $438, $439, $440, $441, $442, $443, $444, $445, $446, $447, $448, VersionRange($449, $450)), ($451, $452, $453, $454, $455, $456, $457, $458, $459, $460, $461, $462, $463, $464, $465, $466, $467, $468, $469, $470, $471, $472, $473, $474, $475, $476, $477, $478, VersionRange($479, $480)), ($481, $482, $483, $484, $485, $486, $487, $488, $489, $490, $491, $492, $493, $494, $495, $496, $497, $498, $499, $500, $501, $502, $503, $504, $505, $506, $507, $508, VersionRange($509, $510)), ($511, $512, $513, $514, $515, $516, $517, $518, $519, $520, $521, $522, $523, $524, $525, $526, $527, $528, $529, $530, $531, $532, $533, $534, $535, $536, $537, $538, VersionRange($539, $540)), ($541, $542, $543, $544, $545, $546, $547, $548, $549, $550, $551, $552, $553, $554, $555, $556, $557, $558, $559, $560, $561, $562, $563, $564, $565, $566, $567, $568, VersionRange($569, $570)), ($571, $572, $573, $574, $575, $576, $577, $578, $579, $580, $581, $582, $583, $584, $585, $586, $587, $588, $589, $590, $591, $592, $593, $594, $595, $596, $597, $598, VersionRange($599, $600)), ($601, $602, $603, $604, $605, $606, $607, $608, $609, $610, $611, $612, $613, $614, $615, $616, $617, $618, $619, $620, $621, $622, $623, $624, $625, $626, $627, $628, VersionRange($629, $630)), ($631, $632, $633, $634, $635, $636, $637, $638, $639, $640, $641, $642, $643, $644, $645, $646, $647, $648, $649, $650, $651, $652, $653, $654, $655, $656, $657, $658, VersionRange($659, $660)), ($661, $662, $663, $664, $665, $666, $667, $668, $669, $670, $671, $672, $673, $674, $675, $676, $677, $678, $679, $680, $681, $682, $683, $684, $685, $686, $687, $688, VersionRange($689, $690)), ($691, $692, $693, $694, $695, $696, $697, $698, $699, $700, $701, $702, $703, $704, $705, $706, $707, $708, $709, $710, $711, $712, $713, $714, $715, $716, $717, $718, VersionRange($719, $720)), ($721, $722, $723, $724, $725, $726, $727, $728, $729, $730, $731, $732, $733, $734, $735, $736, $737, $738, $739, $740, $741, $742, $743, $744, $745, $746, $747, $748, VersionRange($749, $750)), ($751, $752, $753, $754, $755, $756, $757, $758, $759, $760, $761, $762, $763, $764, $765, $766, $767, $768, $769, $770, $771, $772, $773, $774, $775, $776, $777, $778, VersionRange($779, $780)), ($781, $782, $783, $784, $785, $786, $787, $788, $789, $790, $791, $792, $793, $794, $795, $796, $797, $798, $799, $800, $801, $802, $803, $804, $805, $806, $807, $808, VersionRange($809, $810)), ($811, $812, $813, $814, $815, $816, $817, $818, $819, $820, $821, $822, $823, $824, $825, $826, $827, $828, $829, $830, $831, $832, $833, $834, $835, $836, $837, $838, VersionRange($839, $840)), ($841, $842, $843, $844, $845, $846, $847, $848, $849, $850, $851, $852, $853, $854, $855, $856, $857, $858, $859, $860, $861, $862, $863, $864, $865, $866, $867, $868, VersionRange($869, $870)), ($871, $872, $873, $874, $875, $876, $877, $878, $879, $880, $881, $882, $883, $884, $885, $886, $887, $888, $889, $890, $891, $892, $893, $894, $895, $896, $897, $898, VersionRange($899, $900)), ($901, $902, $903, $904, $905, $906, $907, $908, $909, $910, $911, $912, $913, $914, $915, $916, $917, $918, $919, $920, $921, $922, $923, $924, $925, $926, $927, $928, VersionRange($929, $930)), ($931, $932, $933, $934, $935, $936, $937, $938, $939, $940, $941, $942, $943, $944, $945, $946, $947, $948, $949, $950, $951, $952, $953, $954, $955, $956, $957, $958, VersionRange($959, $960)), ($961, $962, $963, $964, $965, $966, $967, $968, $969, $970, $971, $972, $973, $974, $975, $976, $977, $978, $979, $980, $981, $982, $983, $984, $985, $986, $987, $988, VersionRange($989, $990)), ($991, $992, $993, $994, $995, $996, $997, $998, $999, $1000, $1001, $1002, $1003, $1004, $1005, $1006, $1007, $1008, $1009, $1010, $1011, $1012, $1013, $1014, $1015, $1016, $1017, $1018, VersionRange($1019, $1020)), ($1021, $1022, $1023, $1024, $1025, $1026, $1027, $1028, $1029, $1030, $1031, $1032, $1033, $1034, $1035, $1036, $1037, $1038, $1039, $1040, $1041, $1042, $1043, $1044, $1045, $1046, $1047, $1048, VersionRange($1049, $1050)), ($1051, $1052, $1053, $1054, $1055, $1056, $1057, $1058, $1059, $1060, $1061, $1062, $1063, $1064, $1065, $1066, $1067, $1068, $1069, $1070, $1071, $1072, $1073, $1074, $1075, $1076, $1077, $1078, VersionRange($1079, $1080)), ($1081, $1082, $1083, $1084, $1085, $1086, $1087, $1088, $1089, $1090, $1091, $1092, $1093, $1094, $1095, $1096, $1097, $1098, $1099, $1100, $1101, $1102, $1103, $1104, $1105, $1106, $1107, $1108, VersionRange($1109, $1110)), ($1111, $1112, $1113, $1114, $1115, $1116, $1117, $1118, $1119, $1120, $1121, $1122, $1123, $1124, $1125, $1126, $1127, $1128, $1129, $1130, $1131, $1132, $1133, $1134, $1135, $1136, $1137, $1138, VersionRange($1139, $1140)), ($1141, $1142, $1143, $1144, $1145, $1146, $1147, $1148, $1149, $1150, $1151, $1152, $1153, $1154, $1155, $1156, $1157, $1158, $1159, $1160, $1161, $1162, $1163, $1164, $1165, $1166, $1167, $1168, VersionRange($1169, $1170)), ($1171, $1172, $1173, $1174, $1175, $1176, $1177, $1178, $1179, $1180, $1181, $1182, $1183, $1184, $1185, $1186, $1187, $1188, $1189, $1190, $1191, $1192, $1193, $1194, $1195, $1196, $1197, $1198, VersionRange($1199, $1200)), ($1201, $1202, $1203, $1204, $1205, $1206, $1207, $1208, $1209, $1210, $1211, $1212, $1213, $1214, $1215, $1216, $1217, $1218, $1219, $1220, $1221, $1222, $1223, $1224, $1225, $1226, $1227, $1228, VersionRange($1229, $1230)), ($1231, $1232, $1233, $1234, $1235, $1236, $1237, $1238, $1239, $1240, $1241, $1242, $1243, $1244, $1245, $1246, $1247, $1248, $1249, $1250, $1251, $1252, $1253, $1254, $1255, $1256, $1257, $1258, VersionRange($1259, $1260)), ($1261, $1262, $1263, $1264, $1265, $1266, $1267, $1268, $1269, $1270, $1271, $1272, $1273, $1274, $1275, $1276, $1277, $1278, $1279, $1280, $1281, $1282, $1283, $1284, $1285, $1286, $1287, $1288, VersionRange($1289, $1290)), ($1291, $1292, $1293, $1294, $1295, $1296, $1297, $1298, $1299, $1300, $1301, $1302, $1303, $1304, $1305, $1306, $1307, $1308, $1309, $1310, $1311, $1312, $1313, $1314, $1315, $1316, $1317, $1318, VersionRange($1319, $1320)), ($1321, $1322, $1323, $1324, $1325, $1326, $1327, $1328, $1329, $1330, $1331, $1332, $1333, $1334, $1335, $1336, $1337, $1338, $1339, $1340, $1341, $1342, $1343, $1344, $1345, $1346, $1347, $1348, VersionRange($1349, $1350)), ($1351, $1352, $1353, $1354, $1355, $1356, $1357, $1358, $1359, $1360, $1361, $1362, $1363, $1364, $1365, $1366, $1367, $1368, $1369, $1370, $1371, $1372, $1373, $1374, $1375, $1376, $1377, $1378, VersionRange($1379, $1380)), ($1381, $1382, $1383, $1384, $1385, $1386, $1387, $1388, $1389, $1390, $1391, $1392, $1393, $1394, $1395, $1396, $1397, $1398, $1399, $1400, $1401, $1402, $1403, $1404, $1405, $1406, $1407, $1408, VersionRange($1409, $1410)), ($1411, $1412, $1413, $1414, $1415, $1416, $1417, $1418, $1419, $1420, $1421, $1422, $1423, $1424, $1425, $1426, $1427, $1428, $1429, $1430, $1431, $1432, $1433, $1434, $1435, $1436, $1437, $1438, VersionRange($1439, $1440)), ($1441, $1442, $1443, $1444, $1445, $1446, $1447, $1448, $1449, $1450, $1451, $1452, $1453, $1454, $1455, $1456, $1457, $1458, $1459, $1460, $1461, $1462, $1463, $1464, $1465, $1466, $1467, $1468, VersionRange($1469, $1470)), ($1471, $1472, $1473, $1474, $1475, $1476, $1477, $1478, $1479, $1480, $1481, $1482, $1483, $1484, $1485, $1486, $1487, $1488, $1489, $1490, $1491, $1492, $1493, $1494, $1495, $1496, $1497, $1498, VersionRange($1499, $1500)), ($1501, $1502, $1503, $1504, $1505, $1506, $1507, $1508, $1509, $1510, $1511, $1512, $1513, $1514, $1515, $1516, $1517, $1518, $1519, $1520, $1521, $1522, $1523, $1524, $1525, $1526, $1527, $1528, VersionRange($1529, $1530)), ($1531, $1532, $1533, $1534, $1535, $1536, $1537, $1538, $1539, $1540, $1541, $1542, $1543, $1544, $1545, $1546, $1547, $1548, $1549, $1550, $1551, $1552, $1553, $1554, $1555, $1556, $1557, $1558, VersionRange($1559, $1560)), ($1561, $1562, $1563, $1564, $1565, $1566, $1567, $1568, $1569, $1570, $1571, $1572, $1573, $1574, $1575, $1576, $1577, $1578, $1579, $1580, $1581, $1582, $1583, $1584, $1585, $1586, $1587, $1588, VersionRange($1589, $1590)), ($1591, $1592, $1593, $1594, $1595, $1596, $1597, $1598, $1599, $1600, $1601, $1602, $1603, $1604, $1605, $1606, $1607, $1608, $1609, $1610, $1611, $1612, $1613, $1614, $1615, $1616, $1617, $1618, VersionRange($1619, $1620)), ($1621, $1622, $1623, $1624, $1625, $1626, $1627, $1628, $1629, $1630, $1631, $1632, $1633, $1634, $1635, $1636, $1637, $1638, $1639, $1640, $1641, $1642, $1643, $1644, $1645, $1646, $1647, $1648, VersionRange($1649, $1650)), ($1651, $1652, $1653, $1654, $1655, $1656, $1657, $1658, $1659, $1660, $1661, $1662, $1663, $1664, $1665, $1666, $1667, $1668, $1669, $1670, $1671, $1672, $1673, $1674, $1675, $1676, $1677, $1678, VersionRange($1679, $1680)), ($1681, $1682, $1683, $1684, $1685, $1686, $1687, $1688, $1689, $1690, $1691, $1692, $1693, $1694, $1695, $1696, $1697, $1698, $1699, $1700, $1701, $1702, $1703, $1704, $1705, $1706, $1707, $1708, VersionRange($1709, $1710)), ($1711, $1712, $1713, $1714, $1715, $1716, $1717, $1718, $1719, $1720, $1721, $1722, $1723, $1724, $1725, $1726, $1727, $1728, $1729, $1730, $1731, $1732, $1733, $1734, $1735, $1736, $1737, $1738, VersionRange($1739, $1740)), ($1741, $1742, $1743, $1744, $1745, $1746, $1747, $1748, $1749, $1750, $1751, $1752, $1753, $1754, $1755, $1756, $1757, $1758, $1759, $1760, $1761, $1762, $1763, $1764, $1765, $1766, $1767, $1768, VersionRange($1769, $1770)), ($1771, $1772, $1773, $1774, $1775, $1776, $1777, $1778, $1779, $1780, $1781, $1782, $1783, $1784, $1785, $1786, $1787, $1788, $1789, $1790, $1791, $1792, $1793, $1794, $1795, $1796, $1797, $1798, VersionRange($1799, $1800)), ($1801, $1802, $1803, $1804, $1805, $1806, $1807, $1808, $1809, $1810, $1811, $1812, $1813, $1814, $1815, $1816, $1817, $1818, $1819, $1820, $1821, $1822, $1823, $1824, $1825, $1826, $1827, $1828, VersionRange($1829, $1830)), ($1831, $1832, $1833, $1834, $1835, $1836, $1837, $1838, $1839, $1840, $1841, $1842, $1843, $1844, $1845, $1846, $1847, $1848, $1849, $1850, $1851, $1852, $1853, $1854, $1855, $1856, $1857, $1858, VersionRange($1859, $1860)), ($1861, $1862, $1863, $1864, $1865, $1866, $1867, $1868, $1869, $1870, $1871, $1872, $1873, $1874, $1875, $1876, $1877, $1878, $1879, $1880, $1881, $1882, $1883, $1884, $1885, $1886, $1887, $1888, VersionRange($1889, $1890)), ($1891, $1892, $1893, $1894, $1895, $1896, $1897, $1898, $1899, $1900, $1901, $1902, $1903, $1904, $1905, $1906, $1907, $1908, $1909, $1910, $1911, $1912, $1913, $1914, $1915, $1916, $1917, $1918, VersionRange($1919, $1920)), ($1921, $1922, $1923, $1924, $1925, $1926, $1927, $1928, $1929, $1930, $1931, $1932, $1933, $1934, $1935, $1936, $1937, $1938, $1939, $1940, $1941, $1942, $1943, $1944, $1945, $1946, $1947, $1948, VersionRange($1949, $1950)), ($1951, $1952, $1953, $1954, $1955, $1956, $1957, $1958, $1959, $1960, $1961, $1962, $1963, $1964, $1965, $1966, $1967, $1968, $1969, $1970, $1971, $1972, $1973, $1974, $1975, $1976, $1977, $1978, VersionRange($1979, $1980)), ($1981, $1982, $1983, $1984, $1985, $1986, $1987, $1988, $1989, $1990, $1991, $1992, $1993, $1994, $1995, $1996, $1997, $1998, $1999, $2000, $2001, $2002, $2003, $2004, $2005, $2006, $2007, $2008, VersionRange($2009, $2010)), ($2011, $2012, $2013, $2014, $2015, $2016, $2017, $2018, $2019, $2020, $2021, $2022, $2023, $2024, $2025, $2026, $2027, $2028, $2029, $2030, $2031, $2032, $2033, $2034, $2035, $2036, $2037, $2038, VersionRange($2039, $2040)), ($2041, $2042, $2043, $2044, $2045, $2046, $2047, $2048, $2049, $2050, $2051, $2052, $2053, $2054, $2055, $2056, $2057, $2058, $2059, $2060, $2061, $2062, $2063, $2064, $2065, $2066, $2067, $2068, VersionRange($2069, $2070)), ($2071, $2072, $2073, $2074, $2075, $2076, $2077, $2078, $2079, $2080, $2081, $2082, $2083, $2084, $2085, $2086, $2087, $2088, $2089, $2090, $2091, $2092, $2093, $2094, $2095, $2096, $2097, $2098, VersionRange($2099, $2100)), ($2101, $2102, $2103, $2104, $2105, $2106, $2107, $2108, $2109, $2110, $2111, $2112, $2113, $2114, $2115, $2116, $2117, $2118, $2119, $2120, $2121, $2122, $2123, $2124, $2125, $2126, $2127, $2128, VersionRange($2129, $2130)), ($2131, $2132, $2133, $2134, $2135, $2136, $2137, $2138, $2139, $2140, $2141, $2142, $2143, $2144, $2145, $2146, $2147, $2148, $2149, $2150, $2151, $2152, $2153, $2154, $2155, $2156, $2157, $2158, VersionRange($2159, $2160)), ($2161, $2162, $2163, $2164, $2165, $2166, $2167, $2168, $2169, $2170, $2171, $2172, $2173, $2174, $2175, $2176, $2177, $2178, $2179, $2180, $2181, $2182, $2183, $2184, $2185, $2186, $2187, $2188, VersionRange($2189, $2190)), ($2191, $2192, $2193, $2194, $2195, $2196, $2197, $2198, $2199, $2200, $2201, $2202, $2203, $2204, $2205, $2206, $2207, $2208, $2209, $2210, $2211, $2212, $2213, $2214, $2215, $2216, $2217, $2218, VersionRange($2219, $2220)), ($2221, $2222, $2223, $2224, $2225, $2226, $2227, $2228, $2229, $2230, $2231, $2232, $2233, $2234, $2235, $2236, $2237, $2238, $2239, $2240, $2241, $2242, $2243, $2244, $2245, $2246, $2247, $2248, VersionRange($2249, $2250)), ($2251, $2252, $2253, $2254, $2255, $2256, $2257, $2258, $2259, $2260, $2261, $2262, $2263, $2264, $2265, $2266, $2267, $2268, $2269, $2270, $2271, $2272, $2273, $2274, $2275, $2276, $2277, $2278, VersionRange($2279, $2280)), ($2281, $2282, $2283, $2284, $2285, $2286, $2287, $2288, $2289, $2290, $2291, $2292, $2293, $2294, $2295, $2296, $2297, $2298, $2299, $2300, $2301, $2302, $2303, $2304, $2305, $2306, $2307, $2308, VersionRange($2309, $2310)), ($2311, $2312, $2313, $2314, $2315, $2316, $2317, $2318, $2319, $2320, $2321, $2322, $2323, $2324, $2325, $2326, $2327, $2328, $2329, $2330, $2331, $2332, $2333, $2334, $2335, $2336, $2337, $2338, VersionRange($2339, $2340)), ($2341, $2342, $2343, $2344, $2345, $2346, $2347, $2348, $2349, $2350, $2351, $2352, $2353, $2354, $2355, $2356, $2357, $2358, $2359, $2360, $2361, $2362, $2363, $2364, $2365, $2366, $2367, $2368, VersionRange($2369, $2370)), ($2371, $2372, $2373, $2374, $2375, $2376, $2377, $2378, $2379, $2380, $2381, $2382, $2383, $2384, $2385, $2386, $2387, $2388, $2389, $2390, $2391, $2392, $2393, $2394, $2395, $2396, $2397, $2398, VersionRange($2399, $2400)), ($2401, $2402, $2403, $2404, $2405, $2406, $2407, $2408, $2409, $2410, $2411, $2412, $2413, $2414, $2415, $2416, $2417, $2418, $2419, $2420, $2421, $2422, $2423, $2424, $2425, $2426, $2427, $2428, VersionRange($2429, $2430)), ($2431, $2432, $2433, $2434, $2435, $2436, $2437, $2438, $2439, $2440, $2441, $2442, $2443, $2444, $2445, $2446, $2447, $2448, $2449, $2450, $2451, $2452, $2453, $2454, $2455, $2456, $2457, $2458, VersionRange($2459, $2460)), ($2461, $2462, $2463, $2464, $2465, $2466, $2467, $2468, $2469, $2470, $2471, $2472, $2473, $2474, $2475, $2476, $2477, $2478, $2479, $2480, $2481, $2482, $2483, $2484, $2485, $2486, $2487, $2488, VersionRange($2489, $2490)), ($2491, $2492, $2493, $2494, $2495, $2496, $2497, $2498, $2499, $2500, $2501, $2502, $2503, $2504, $2505, $2506, $2507, $2508, $2509, $2510, $2511, $2512, $2513, $2514, $2515, $2516, $2517, $2518, VersionRange($2519, $2520)), ($2521, $2522, $2523, $2524, $2525, $2526, $2527, $2528, $2529, $2530, $2531, $2532, $2533, $2534, $2535, $2536, $2537, $2538, $2539, $2540, $2541, $2542, $2543, $2544, $2545, $2546, $2547, $2548, VersionRange($2549, $2550)), ($2551, $2552, $2553, $2554, $2555, $2556, $2557, $2558, $2559, $2560, $2561, $2562, $2563, $2564, $2565, $2566, $2567, $2568, $2569, $2570, $2571, $2572, $2573, $2574, $2575, $2576, $2577, $2578, VersionRange($2579, $2580)), ($2581, $2582, $2583, $2584, $2585, $2586, $2587, $2588, $2589, $2590, $2591, $2592, $2593, $2594, $2595, $2596, $2597, $2598, $2599, $2600, $2601, $2602, $2603, $2604, $2605, $2606, $2607, $2608, VersionRange($2609, $2610)), ($2611, $2612, $2613, $2614, $2615, $2616, $2617, $2618, $2619, $2620, $2621, $2622, $2623, $2624, $2625, $2626, $2627, $2628, $2629, $2630, $2631, $2632, $2633, $2634, $2635, $2636, $2637, $2638, VersionRange($2639, $2640)), ($2641, $2642, $2643, $2644, $2645, $2646, $2647, $2648, $2649, $2650, $2651, $2652, $2653, $2654, $2655, $2656, $2657, $2658, $2659, $2660, $2661, $2662, $2663, $2664, $2665, $2666, $2667, $2668, VersionRange($2669, $2670)), ($2671, $2672, $2673, $2674, $2675, $2676, $2677, $2678, $2679, $2680, $2681, $2682, $2683, $2684, $2685, $2686, $2687, $2688, $2689, $2690, $2691, $2692, $2693, $2694, $2695, $2696, $2697, $2698, VersionRange($2699, $2700)), ($2701, $2702, $2703, $2704, $2705, $2706, $2707, $2708, $2709, $2710, $2711, $2712, $2713, $2714, $2715, $2716, $2717, $2718, $2719, $2720, $2721, $2722, $2723, $2724, $2725, $2726, $2727, $2728, VersionRange($2729, $2730)), ($2731, $2732, $2733, $2734, $2735, $2736, $2737, $2738, $2739, $2740, $2741, $2742, $2743, $2744, $2745, $2746, $2747, $2748, $2749, $2750, $2751, $2752, $2753, $2754, $2755, $2756, $2757, $2758, VersionRange($2759, $2760)), ($2761, $2762, $2763, $2764, $2765, $2766, $2767, $2768, $2769, $2770, $2771, $2772, $2773, $2774, $2775, $2776, $2777, $2778, $2779, $2780, $2781, $2782, $2783, $2784, $2785, $2786, $2787, $2788, VersionRange($2789, $2790)), ($2791, $2792, $2793, $2794, $2795, $2796, $2797, $2798, $2799, $2800, $2801, $2802, $2803, $2804, $2805, $2806, $2807, $2808, $2809, $2810, $2811, $2812, $2813, $2814, $2815, $2816, $2817, $2818, VersionRange($2819, $2820)), ($2821, $2822, $2823, $2824, $2825, $2826, $2827, $2828, $2829, $2830, $2831, $2832, $2833, $2834, $2835, $2836, $2837, $2838, $2839, $2840, $2841, $2842, $2843, $2844, $2845, $2846, $2847, $2848, VersionRange($2849, $2850)), ($2851, $2852, $2853, $2854, $2855, $2856, $2857, $2858, $2859, $2860, $2861, $2862, $2863, $2864, $2865, $2866, $2867, $2868, $2869, $2870, $2871, $2872, $2873, $2874, $2875, $2876, $2877, $2878, VersionRange($2879, $2880)), ($2881, $2882, $2883, $2884, $2885, $2886, $2887, $2888, $2889, $2890, $2891, $2892, $2893, $2894, $2895, $2896, $2897, $2898, $2899, $2900, $2901, $2902, $2903, $2904, $2905, $2906, $2907, $2908, VersionRange($2909, $2910)), ($2911, $2912, $2913, $2914, $2915, $2916, $2917, $2918, $2919, $2920, $2921, $2922, $2923, $2924, $2925, $2926, $2927, $2928, $2929, $2930, $2931, $2932, $2933, $2934, $2935, $2936, $2937, $2938, VersionRange($2939, $2940)), ($2941, $2942, $2943, $2944, $2945, $2946, $2947, $2948, $2949, $2950, $2951, $2952, $2953, $2954, $2955, $2956, $2957, $2958, $2959, $2960, $2961, $2962, $2963, $2964, $2965, $2966, $2967, $2968, VersionRange($2969, $2970)), ($2971, $2972, $2973, $2974, $2975, $2976, $2977, $2978, $2979, $2980, $2981, $2982, $2983, $2984, $2985, $2986, $2987, $2988, $2989, $2990, $2991, $2992, $2993, $2994, $2995, $2996, $2997, $2998, VersionRange($2999, $3000)), ($3001, $3002, $3003, $3004, $3005, $3006, $3007, $3008, $3009, $3010, $3011, $3012, $3013, $3014, $3015, $3016, $3017, $3018, $3019, $3020, $3021, $3022, $3023, $3024, $3025, $3026, $3027, $3028, VersionRange($3029, $3030)), ($3031, $3032, $3033, $3034, $3035, $3036, $3037, $3038, $3039, $3040, $3041, $3042, $3043, $3044, $3045, $3046, $3047, $3048, $3049, $3050, $3051, $3052, $3053, $3054, $3055, $3056, $3057, $3058, VersionRange($3059, $3060)), ($3061, $3062, $3063, $3064, $3065, $3066, $3067, $3068, $3069, $3070, $3071, $3072, $3073, $3074, $3075, $3076, $3077, $3078, $3079, $3080, $3081, $3082, $3083, $3084, $3085, $3086, $3087, $3088, VersionRange($3089, $3090)), ($3091, $3092, $3093, $3094, $3095, $3096, $3097, $3098, $3099, $3100, $3101, $3102, $3103, $3104, $3105, $3106, $3107, $3108, $3109, $3110, $3111, $3112, $3113, $3114, $3115, $3116, $3117, $3118, VersionRange($3119, $3120)), ($3121, $3122, $3123, $3124, $3125, $3126, $3127, $3128, $3129, $3130, $3131, $3132, $3133, $3134, $3135, $3136, $3137, $3138, $3139, $3140, $3141, $3142, $3143, $3144, $3145, $3146, $3147, $3148, VersionRange($3149, $3150)), ($3151, $3152, $3153, $3154, $3155, $3156, $3157, $3158, $3159, $3160, $3161, $3162, $3163, $3164, $3165, $3166, $3167, $3168, $3169, $3170, $3171, $3172, $3173, $3174, $3175, $3176, $3177, $3178, VersionRange($3179, $3180)), ($3181, $3182, $3183, $3184, $3185, $3186, $3187, $3188, $3189, $3190, $3191, $3192, $3193, $3194, $3195, $3196, $3197, $3198, $3199, $3200, $3201, $3202, $3203, $3204, $3205, $3206, $3207, $3208, VersionRange($3209, $3210)), ($3211, $3212, $3213, $3214, $3215, $3216, $3217, $3218, $3219, $3220, $3221, $3222, $3223, $3224, $3225, $3226, $3227, $3228, $3229, $3230, $3231, $3232, $3233, $3234, $3235, $3236, $3237, $3238, VersionRange($3239, $3240)), ($3241, $3242, $3243, $3244, $3245, $3246, $3247, $3248, $3249, $3250, $3251, $3252, $3253, $3254, $3255, $3256, $3257, $3258, $3259, $3260, $3261, $3262, $3263, $3264, $3265, $3266, $3267, $3268, VersionRange($3269, $3270)), ($3271, $3272, $3273, $3274, $3275, $3276, $3277, $3278, $3279, $3280, $3281, $3282, $3283, $3284, $3285, $3286, $3287, $3288, $3289, $3290, $3291, $3292, $3293, $3294, $3295, $3296, $3297, $3298, VersionRange($3299, $3300)), ($3301, $3302, $3303, $3304, $3305, $3306, $3307, $3308, $3309, $3310, $3311, $3312, $3313, $3314, $3315, $3316, $3317, $3318, $3319, $3320, $3321, $3322, $3323, $3324, $3325, $3326, $3327, $3328, VersionRange($3329, $3330)), ($3331, $3332, $3333, $3334, $3335, $3336, $3337, $3338, $3339, $3340, $3341, $3342, $3343, $3344, $3345, $3346, $3347, $3348, $3349, $3350, $3351, $3352, $3353, $3354, $3355, $3356, $3357, $3358, VersionRange($3359, $3360)), ($3361, $3362, $3363, $3364, $3365, $3366, $3367, $3368, $3369, $3370, $3371, $3372, $3373, $3374, $3375, $3376, $3377, $3378, $3379, $3380, $3381, $3382, $3383, $3384, $3385, $3386, $3387, $3388, VersionRange($3389, $3390)), ($3391, $3392, $3393, $3394, $3395, $3396, $3397, $3398, $3399, $3400, $3401, $3402, $3403, $3404, $3405, $3406, $3407, $3408, $3409, $3410, $3411, $3412, $3413, $3414, $3415, $3416, $3417, $3418, VersionRange($3419, $3420)), ($3421, $3422, $3423, $3424, $3425, $3426, $3427, $3428, $3429, $3430, $3431, $3432, $3433, $3434, $3435, $3436, $3437, $3438, $3439, $3440, $3441, $3442, $3443, $3444, $3445, $3446, $3447, $3448, VersionRange($3449, $3450)), ($3451, $3452, $3453, $3454, $3455, $3456, $3457, $3458, $3459, $3460, $3461, $3462, $3463, $3464, $3465, $3466, $3467, $3468, $3469, $3470, $3471, $3472, $3473, $3474, $3475, $3476, $3477, $3478, VersionRange($3479, $3480)), ($3481, $3482, $3483, $3484, $3485, $3486, $3487, $3488, $3489, $3490, $3491, $3492, $3493, $3494, $3495, $3496, $3497, $3498, $3499, $3500, $3501, $3502, $3503, $3504, $3505, $3506, $3507, $3508, VersionRange($3509, $3510)), ($3511, $3512, $3513, $3514, $3515, $3516, $3517, $3518, $3519, $3520, $3521, $3522, $3523, $3524, $3525, $3526, $3527, $3528, $3529, $3530, $3531, $3532, $3533, $3534, $3535, $3536, $3537, $3538, VersionRange($3539, $3540)), ($3541, $3542, $3543, $3544, $3545, $3546, $3547, $3548, $3549, $3550, $3551, $3552, $3553, $3554, $3555, $3556, $3557, $3558, $3559, $3560, $3561, $3562, $3563, $3564, $3565, $3566, $3567, $3568, VersionRange($3569, $3570)), ($3571, $3572, $3573, $3574, $3575, $3576, $3577, $3578, $3579, $3580, $3581, $3582, $3583, $3584, $3585, $3586, $3587, $3588, $3589, $3590, $3591, $3592, $3593, $3594, $3595, $3596, $3597, $3598, VersionRange($3599, $3600)), ($3601, $3602, $3603, $3604, $3605, $3606, $3607, $3608, $3609, $3610, $3611, $3612, $3613, $3614, $3615, $3616, $3617, $3618, $3619, $3620, $3621, $3622, $3623, $3624, $3625, $3626, $3627, $3628, VersionRange($3629, $3630)), ($3631, $3632, $3633, $3634, $3635, $3636, $3637, $3638, $3639, $3640, $3641, $3642, $3643, $3644, $3645, $3646, $3647, $3648, $3649, $3650, $3651, $3652, $3653, $3654, $3655, $3656, $3657, $3658, VersionRange($3659, $3660)), ($3661, $3662, $3663, $3664, $3665, $3666, $3667, $3668, $3669, $3670, $3671, $3672, $3673, $3674, $3675, $3676, $3677, $3678, $3679, $3680, $3681, $3682, $3683, $3684, $3685, $3686, $3687, $3688, VersionRange($3689, $3690)), ($3691, $3692, $3693, $3694, $3695, $3696, $3697, $3698, $3699, $3700, $3701, $3702, $3703, $3704, $3705, $3706, $3707, $3708, $3709, $3710, $3711, $3712, $3713, $3714, $3715, $3716, $3717, $3718, VersionRange($3719, $3720)), ($3721, $3722, $3723, $3724, $3725, $3726, $3727, $3728, $3729, $3730, $3731, $3732, $3733, $3734, $3735, $3736, $3737, $3738, $3739, $3740, $3741, $3742, $3743, $3744, $3745, $3746, $3747, $3748, VersionRange($3749, $3750)), ($3751, $3752, $3753, $3754, $3755, $3756, $3757, $3758, $3759, $3760, $3761, $3762, $3763, $3764, $3765, $3766, $3767, $3768, $3769, $3770, $3771, $3772, $3773, $3774, $3775, $3776, $3777, $3778, VersionRange($3779, $3780)), ($3781, $3782, $3783, $3784, $3785, $3786, $3787, $3788, $3789, $3790, $3791, $3792, $3793, $3794, $3795, $3796, $3797, $3798, $3799, $3800, $3801, $3802, $3803, $3804, $3805, $3806, $3807, $3808, VersionRange($3809, $3810)), ($3811, $3812, $3813, $3814, $3815, $3816, $3817, $3818, $3819, $3820, $3821, $3822, $3823, $3824, $3825, $3826, $3827, $3828, $3829, $3830, $3831, $3832, $3833, $3834, $3835, $3836, $3837, $3838, VersionRange($3839, $3840)), ($3841, $3842, $3843, $3844, $3845, $3846, $3847, $3848, $3849, $3850, $3851, $3852, $3853, $3854, $3855, $3856, $3857, $3858, $3859, $3860, $3861, $3862, $3863, $3864, $3865, $3866, $3867, $3868, VersionRange($3869, $3870)), ($3871, $3872, $3873, $3874, $3875, $3876, $3877, $3878, $3879, $3880, $3881, $3882, $3883, $3884, $3885, $3886, $3887, $3888, $3889, $3890, $3891, $3892, $3893, $3894, $3895, $3896, $3897, $3898, VersionRange($3899, $3900)), ($3901, $3902, $3903, $3904, $3905, $3906, $3907, $3908, $3909, $3910, $3911, $3912, $3913, $3914, $3915, $3916, $3917, $3918, $3919, $3920, $3921, $3922, $3923, $3924, $3925, $3926, $3927, $3928, VersionRange($3929, $3930)), ($3931, $3932, $3933, $3934, $3935, $3936, $3937, $3938, $3939, $3940, $3941, $3942, $3943, $3944, $3945, $3946, $3947, $3948, $3949, $3950, $3951, $3952, $3953, $3954, $3955, $3956, $3957, $3958, VersionRange($3959, $3960)), ($3961, $3962, $3963, $3964, $3965, $3966, $3967, $3968, $3969, $3970, $3971, $3972, $3973, $3974, $3975, $3976, $3977, $3978, $3979, $3980, $3981, $3982, $3983, $3984, $3985, $3986, $3987, $3988, VersionRange($3989, $3990)), ($3991, $3992, $3993, $3994, $3995, $3996, $3997, $3998, $3999, $4000, $4001, $4002, $4003, $4004, $4005, $4006, $4007, $4008, $4009, $4010, $4011, $4012, $4013, $4014, $4015, $4016, $4017, $4018, VersionRange($4019, $4020)), ($4021, $4022, $4023, $4024, $4025, $4026, $4027, $4028, $4029, $4030, $4031, $4032, $4033, $4034, $4035, $4036, $4037, $4038, $4039, $4040, $4041, $4042, $4043, $4044, $4045, $4046, $4047, $4048, VersionRange($4049, $4050)), ($4051, $4052, $4053, $4054, $4055, $4056, $4057, $4058, $4059, $4060, $4061, $4062, $4063, $4064, $4065, $4066, $4067, $4068, $4069, $4070, $4071, $4072, $4073, $4074, $4075, $4076, $4077, $4078, VersionRange($4079, $4080)), ($4081, $4082, $4083, $4084, $4085, $4086, $4087, $4088, $4089, $4090, $4091, $4092, $4093, $4094, $4095, $4096, $4097, $4098, $4099, $4100, $4101, $4102, $4103, $4104, $4105, $4106, $4107, $4108, VersionRange($4109, $4110)), ($4111, $4112, $4113, $4114, $4115, $4116, $4117, $4118, $4119, $4120, $4121, $4122, $4123, $4124, $4125, $4126, $4127, $4128, $4129, $4130, $4131, $4132, $4133, $4134, $4135, $4136, $4137, $4138, VersionRange($4139, $4140)), ($4141, $4142, $4143, $4144, $4145, $4146, $4147, $4148, $4149, $4150, $4151, $4152, $4153, $4154, $4155, $4156, $4157, $4158, $4159, $4160, $4161, $4162, $4163, $4164, $4165, $4166, $4167, $4168, VersionRange($4169, $4170)), ($4171, $4172, $4173, $4174, $4175, $4176, $4177, $4178, $4179, $4180, $4181, $4182, $4183, $4184, $4185, $4186, $4187, $4188, $4189, $4190, $4191, $4192, $4193, $4194, $4195, $4196, $4197, $4198, VersionRange($4199, $4200)), ($4201, $4202, $4203, $4204, $4205, $4206, $4207, $4208, $4209, $4210, $4211, $4212, $4213, $4214, $4215, $4216, $4217, $4218, $4219, $4220, $4221, $4222, $4223, $4224, $4225, $4226, $4227, $4228, VersionRange($4229, $4230)), ($4231, $4232, $4233, $4234, $4235, $4236, $4237, $4238, $4239, $4240, $4241, $4242, $4243, $4244, $4245, $4246, $4247, $4248, $4249, $4250, $4251, $4252, $4253, $4254, $4255, $4256, $4257, $4258, VersionRange($4259, $4260)), ($4261, $4262, $4263, $4264, $4265, $4266, $4267, $4268, $4269, $4270, $4271, $4272, $4273, $4274, $4275, $4276, $4277, $4278, $4279, $4280, $4281, $4282, $4283, $4284, $4285, $4286, $4287, $4288, VersionRange($4289, $4290)), ($4291, $4292, $4293, $4294, $4295, $4296, $4297, $4298, $4299, $4300, $4301, $4302, $4303, $4304, $4305, $4306, $4307, $4308, $4309, $4310, $4311, $4312, $4313, $4314, $4315, $4316, $4317, $4318, VersionRange($4319, $4320)), ($4321, $4322, $4323, $4324, $4325, $4326, $4327, $4328, $4329, $4330, $4331, $4332, $4333, $4334, $4335, $4336, $4337, $4338, $4339, $4340, $4341, $4342, $4343, $4344, $4345, $4346, $4347, $4348, VersionRange($4349, $4350)), ($4351, $4352, $4353, $4354, $4355, $4356, $4357, $4358, $4359, $4360, $4361, $4362, $4363, $4364, $4365, $4366, $4367, $4368, $4369, $4370, $4371, $4372, $4373, $4374, $4375, $4376, $4377, $4378, VersionRange($4379, $4380)), ($4381, $4382, $4383, $4384, $4385, $4386, $4387, $4388, $4389, $4390, $4391, $4392, $4393, $4394, $4395, $4396, $4397, $4398, $4399, $4400, $4401, $4402, $4403, $4404, $4405, $4406, $4407, $4408, VersionRange($4409, $4410)), ($4411, $4412, $4413, $4414, $4415, $4416, $4417, $4418, $4419, $4420, $4421, $4422, $4423, $4424, $4425, $4426, $4427, $4428, $4429, $4430, $4431, $4432, $4433, $4434, $4435, $4436, $4437, $4438, VersionRange($4439, $4440)), ($4441, $4442, $4443, $4444, $4445, $4446, $4447, $4448, $4449, $4450, $4451, $4452, $4453, $4454, $4455, $4456, $4457, $4458, $4459, $4460, $4461, $4462, $4463, $4464, $4465, $4466, $4467, $4468, VersionRange($4469, $4470)), ($4471, $4472, $4473, $4474, $4475, $4476, $4477, $4478, $4479, $4480, $4481, $4482, $4483, $4484, $4485, $4486, $4487, $4488, $4489, $4490, $4491, $4492, $4493, $4494, $4495, $4496, $4497, $4498, VersionRange($4499, $4500)), ($4501, $4502, $4503, $4504, $4505, $4506, $4507, $4508, $4509, $4510, $4511, $4512, $4513, $4514, $4515, $4516, $4517, $4518, $4519, $4520, $4521, $4522, $4523, $4524, $4525, $4526, $4527, $4528, VersionRange($4529, $4530)), ($4531, $4532, $4533, $4534, $4535, $4536, $4537, $4538, $4539, $4540, $4541, $4542, $4543, $4544, $4545, $4546, $4547, $4548, $4549, $4550, $4551, $4552, $4553, $4554, $4555, $4556, $4557, $4558, VersionRange($4559, $4560)), ($4561, $4562, $4563, $4564, $4565, $4566, $4567, $4568, $4569, $4570, $4571, $4572, $4573, $4574, $4575, $4576, $4577, $4578, $4579, $4580, $4581, $4582, $4583, $4584, $4585, $4586, $4587, $4588, VersionRange($4589, $4590)), ($4591, $4592, $4593, $4594, $4595, $4596, $4597, $4598, $4599, $4600, $4601, $4602, $4603, $4604, $4605, $4606, $4607, $4608, $4609, $4610, $4611, $4612, $4613, $4614, $4615, $4616, $4617, $4618, VersionRange($4619, $4620)), ($4621, $4622, $4623, $4624, $4625, $4626, $4627, $4628, $4629, $4630, $4631, $4632, $4633, $4634, $4635, $4636, $4637, $4638, $4639, $4640, $4641, $4642, $4643, $4644, $4645, $4646, $4647, $4648, VersionRange($4649, $4650)), ($4651, $4652, $4653, $4654, $4655, $4656, $4657, $4658, $4659, $4660, $4661, $4662, $4663, $4664, $4665, $4666, $4667, $4668, $4669, $4670, $4671, $4672, $4673, $4674, $4675, $4676, $4677, $4678, VersionRange($4679, $4680)), ($4681, $4682, $4683, $4684, $4685, $4686, $4687, $4688, $4689, $4690, $4691, $4692, $4693, $4694, $4695, $4696, $4697, $4698, $4699, $4700, $4701, $4702, $4703, $4704, $4705, $4706, $4707, $4708, VersionRange($4709, $4710)), ($4711, $4712, $4713, $4714, $4715, $4716, $4717, $4718, $4719, $4720, $4721, $4722, $4723, $4724, $4725, $4726, $4727, $4728, $4729, $4730, $4731, $4732, $4733, $4734, $4735, $4736, $4737, $4738, VersionRange($4739, $4740)), ($4741, $4742, $4743, $4744, $4745, $4746, $4747, $4748, $4749, $4750, $4751, $4752, $4753, $4754, $4755, $4756, $4757, $4758, $4759, $4760, $4761, $4762, $4763, $4764, $4765, $4766, $4767, $4768, VersionRange($4769, $4770)), ($4771, $4772, $4773, $4774, $4775, $4776, $4777, $4778, $4779, $4780, $4781, $4782, $4783, $4784, $4785, $4786, $4787, $4788, $4789, $4790, $4791, $4792, $4793, $4794, $4795, $4796, $4797, $4798, VersionRange($4799, $4800)), ($4801, $4802, $4803, $4804, $4805, $4806, $4807, $4808, $4809, $4810, $4811, $4812, $4813, $4814, $4815, $4816, $4817, $4818, $4819, $4820, $4821, $4822, $4823, $4824, $4825, $4826, $4827, $4828, VersionRange($4829, $4830)), ($4831, $4832, $4833, $4834, $4835, $4836, $4837, $4838, $4839, $4840, $4841, $4842, $4843, $4844, $4845, $4846, $4847, $4848, $4849, $4850, $4851, $4852, $4853, $4854, $4855, $4856, $4857, $4858, VersionRange($4859, $4860)), ($4861, $4862, $4863, $4864, $4865, $4866, $4867, $4868, $4869, $4870, $4871, $4872, $4873, $4874, $4875, $4876, $4877, $4878, $4879, $4880, $4881, $4882, $4883, $4884, $4885, $4886, $4887, $4888, VersionRange($4889, $4890)), ($4891, $4892, $4893, $4894, $4895, $4896, $4897, $4898, $4899, $4900, $4901, $4902, $4903, $4904, $4905, $4906, $4907, $4908, $4909, $4910, $4911, $4912, $4913, $4914, $4915, $4916, $4917, $4918, VersionRange($4919, $4920)), ($4921, $4922, $4923, $4924, $4925, $4926, $4927, $4928, $4929, $4930, $4931, $4932, $4933, $4934, $4935, $4936, $4937, $4938, $4939, $4940, $4941, $4942, $4943, $4944, $4945, $4946, $4947, $4948, VersionRange($4949, $4950)), ($4951, $4952, $4953, $4954, $4955, $4956, $4957, $4958, $4959, $4960, $4961, $4962, $4963, $4964, $4965, $4966, $4967, $4968, $4969, $4970, $4971, $4972, $4973, $4974, $4975, $4976, $4977, $4978, VersionRange($4979, $4980)), ($4981, $4982, $4983, $4984, $4985, $4986, $4987, $4988, $4989, $4990, $4991, $4992, $4993, $4994, $4995, $4996, $4997, $4998, $4999, $5000, $5001, $5002, $5003, $5004, $5005, $5006, $5007, $5008, VersionRange($5009, $5010)), ($5011, $5012, $5013, $5014, $5015, $5016, $5017, $5018, $5019, $5020, $5021, $5022, $5023, $5024, $5025, $5026, $5027, $5028, $5029, $5030, $5031, $5032, $5033, $5034, $5035, $5036, $5037, $5038, VersionRange($5039, $5040)), ($5041, $5042, $5043, $5044, $5045, $5046, $5047, $5048, $5049, $5050, $5051, $5052, $5053, $5054, $5055, $5056, $5057, $5058, $5059, $5060, $5061, $5062, $5063, $5064, $5065, $5066, $5067, $5068, VersionRange($5069, $5070)), ($5071, $5072, $5073, $5074, $5075, $5076, $5077, $5078, $5079, $5080, $5081, $5082, $5083, $5084, $5085, $5086, $5087, $5088, $5089, $5090, $5091, $5092, $5093, $5094, $5095, $5096, $5097, $5098, VersionRange($5099, $5100)), ($5101, $5102, $5103, $5104, $5105, $5106, $5107, $5108, $5109, $5110, $5111, $5112, $5113, $5114, $5115, $5116, $5117, $5118, $5119, $5120, $5121, $5122, $5123, $5124, $5125, $5126, $5127, $5128, VersionRange($5129, $5130)), ($5131, $5132, $5133, $5134, $5135, $5136, $5137, $5138, $5139, $5140, $5141, $5142, $5143, $5144, $5145, $5146, $5147, $5148, $5149, $5150, $5151, $5152, $5153, $5154, $5155, $5156, $5157, $5158, VersionRange($5159, $5160)), ($5161, $5162, $5163, $5164, $5165, $5166, $5167, $5168, $5169, $5170, $5171, $5172, $5173, $5174, $5175, $5176, $5177, $5178, $5179, $5180, $5181, $5182, $5183, $5184, $5185, $5186, $5187, $5188, VersionRange($5189, $5190)), ($5191, $5192, $5193, $5194, $5195, $5196, $5197, $5198, $5199, $5200, $5201, $5202, $5203, $5204, $5205, $5206, $5207, $5208, $5209, $5210, $5211, $5212, $5213, $5214, $5215, $5216, $5217, $5218, VersionRange($5219, $5220)), ($5221, $5222, $5223, $5224, $5225, $5226, $5227, $5228, $5229, $5230, $5231, $5232, $5233, $5234, $5235, $5236, $5237, $5238, $5239, $5240, $5241, $5242, $5243, $5244, $5245, $5246, $5247, $5248, VersionRange($5249, $5250)), ($5251, $5252, $5253, $5254, $5255, $5256, $5257, $5258, $5259, $5260, $5261, $5262, $5263, $5264, $5265, $5266, $5267, $5268, $5269, $5270, $5271, $5272, $5273, $5274, $5275, $5276, $5277, $5278, VersionRange($5279, $5280)), ($5281, $5282, $5283, $5284, $5285, $5286, $5287, $5288, $5289, $5290, $5291, $5292, $5293, $5294, $5295, $5296, $5297, $5298, $5299, $5300, $5301, $5302, $5303, $5304, $5305, $5306, $5307, $5308, VersionRange($5309, $5310)), ($5311, $5312, $5313, $5314, $5315, $5316, $5317, $5318, $5319, $5320, $5321, $5322, $5323, $5324, $5325, $5326, $5327, $5328, $5329, $5330, $5331, $5332, $5333, $5334, $5335, $5336, $5337, $5338, VersionRange($5339, $5340)), ($5341, $5342, $5343, $5344, $5345, $5346, $5347, $5348, $5349, $5350, $5351, $5352, $5353, $5354, $5355, $5356, $5357, $5358, $5359, $5360, $5361, $5362, $5363, $5364, $5365, $5366, $5367, $5368, VersionRange($5369, $5370)), ($5371, $5372, $5373, $5374, $5375, $5376, $5377, $5378, $5379, $5380, $5381, $5382, $5383, $5384, $5385, $5386, $5387, $5388, $5389, $5390, $5391, $5392, $5393, $5394, $5395, $5396, $5397, $5398, VersionRange($5399, $5400)), ($5401, $5402, $5403, $5404, $5405, $5406, $5407, $5408, $5409, $5410, $5411, $5412, $5413, $5414, $5415, $5416, $5417, $5418, $5419, $5420, $5421, $5422, $5423, $5424, $5425, $5426, $5427, $5428, VersionRange($5429, $5430)), ($5431, $5432, $5433, $5434, $5435, $5436, $5437, $5438, $5439, $5440, $5441, $5442, $5443, $5444, $5445, $5446, $5447, $5448, $5449, $5450, $5451, $5452, $5453, $5454, $5455, $5456, $5457, $5458, VersionRange($5459, $5460)), ($5461, $5462, $5463, $5464, $5465, $5466, $5467, $5468, $5469, $5470, $5471, $5472, $5473, $5474, $5475, $5476, $5477, $5478, $5479, $5480, $5481, $5482, $5483, $5484, $5485, $5486, $5487, $5488, VersionRange($5489, $5490)), ($5491, $5492, $5493, $5494, $5495, $5496, $5497, $5498, $5499, $5500, $5501, $5502, $5503, $5504, $5505, $5506, $5507, $5508, $5509, $5510, $5511, $5512, $5513, $5514, $5515, $5516, $5517, $5518, VersionRange($5519, $5520)), ($5521, $5522, $5523, $5524, $5525, $5526, $5527, $5528, $5529, $5530, $5531, $5532, $5533, $5534, $5535, $5536, $5537, $5538, $5539, $5540, $5541, $5542, $5543, $5544, $5545, $5546, $5547, $5548, VersionRange($5549, $5550)), ($5551, $5552, $5553, $5554, $5555, $5556, $5557, $5558, $5559, $5560, $5561, $5562, $5563, $5564, $5565, $5566, $5567, $5568, $5569, $5570, $5571, $5572, $5573, $5574, $5575, $5576, $5577, $5578, VersionRange($5579, $5580)), ($5581, $5582, $5583, $5584, $5585, $5586, $5587, $5588, $5589, $5590, $5591, $5592, $5593, $5594, $5595, $5596, $5597, $5598, $5599, $5600, $5601, $5602, $5603, $5604, $5605, $5606, $5607, $5608, VersionRange($5609, $5610)), ($5611, $5612, $5613, $5614, $5615, $5616, $5617, $5618, $5619, $5620, $5621, $5622, $5623, $5624, $5625, $5626, $5627, $5628, $5629, $5630, $5631, $5632, $5633, $5634, $5635, $5636, $5637, $5638, VersionRange($5639, $5640)), ($5641, $5642, $5643, $5644, $5645, $5646, $5647, $5648, $5649, $5650, $5651, $5652, $5653, $5654, $5655, $5656, $5657, $5658, $5659, $5660, $5661, $5662, $5663, $5664, $5665, $5666, $5667, $5668, VersionRange($5669, $5670)), ($5671, $5672, $5673, $5674, $5675, $5676, $5677, $5678, $5679, $5680, $5681, $5682, $5683, $5684, $5685, $5686, $5687, $5688, $5689, $5690, $5691, $5692, $5693, $5694, $5695, $5696, $5697, $5698, VersionRange($5699, $5700)), ($5701, $5702, $5703, $5704, $5705, $5706, $5707, $5708, $5709, $5710, $5711, $5712, $5713, $5714, $5715, $5716, $5717, $5718, $5719, $5720, $5721, $5722, $5723, $5724, $5725, $5726, $5727, $5728, VersionRange($5729, $5730)), ($5731, $5732, $5733, $5734, $5735, $5736, $5737, $5738, $5739, $5740, $5741, $5742, $5743, $5744, $5745, $5746, $5747, $5748, $5749, $5750, $5751, $5752, $5753, $5754, $5755, $5756, $5757, $5758, VersionRange($5759, $5760)), ($5761, $5762, $5763, $5764, $5765, $5766, $5767, $5768, $5769, $5770, $5771, $5772, $5773, $5774, $5775, $5776, $5777, $5778, $5779, $5780, $5781, $5782, $5783, $5784, $5785, $5786, $5787, $5788, VersionRange($5789, $5790)), ($5791, $5792, $5793, $5794, $5795, $5796, $5797, $5798, $5799, $5800, $5801, $5802, $5803, $5804, $5805, $5806, $5807, $5808, $5809, $5810, $5811, $5812, $5813, $5814, $5815, $5816, $5817, $5818, VersionRange($5819, $5820)), ($5821, $5822, $5823, $5824, $5825, $5826, $5827, $5828, $5829, $5830, $5831, $5832, $5833, $5834, $5835, $5836, $5837, $5838, $5839, $5840, $5841, $5842, $5843, $5844, $5845, $5846, $5847, $5848, VersionRange($5849, $5850)), ($5851, $5852, $5853, $5854, $5855, $5856, $5857, $5858, $5859, $5860, $5861, $5862, $5863, $5864, $5865, $5866, $5867, $5868, $5869, $5870, $5871, $5872, $5873, $5874, $5875, $5876, $5877, $5878, VersionRange($5879, $5880)), ($5881, $5882, $5883, $5884, $5885, $5886, $5887, $5888, $5889, $5890, $5891, $5892, $5893, $5894, $5895, $5896, $5897, $5898, $5899, $5900, $5901, $5902, $5903, $5904, $5905, $5906, $5907, $5908, VersionRange($5909, $5910)), ($5911, $5912, $5913, $5914, $5915, $5916, $5917, $5918, $5919, $5920, $5921, $5922, $5923, $5924, $5925, $5926, $5927, $5928, $5929, $5930, $5931, $5932, $5933, $5934, $5935, $5936, $5937, $5938, VersionRange($5939, $5940)), ($5941, $5942, $5943, $5944, $5945, $5946, $5947, $5948, $5949, $5950, $5951, $5952, $5953, $5954, $5955, $5956, $5957, $5958, $5959, $5960, $5961, $5962, $5963, $5964, $5965, $5966, $5967, $5968, VersionRange($5969, $5970)), ($5971, $5972, $5973, $5974, $5975, $5976, $5977, $5978, $5979, $5980, $5981, $5982, $5983, $5984, $5985, $5986, $5987, $5988, $5989, $5990, $5991, $5992, $5993, $5994, $5995, $5996, $5997, $5998, VersionRange($5999, $6000)), ($6001, $6002, $6003, $6004, $6005, $6006, $6007, $6008, $6009, $6010, $6011, $6012, $6013, $6014, $6015, $6016, $6017, $6018, $6019, $6020, $6021, $6022, $6023, $6024, $6025, $6026, $6027, $6028, VersionRange($6029, $6030)), ($6031, $6032, $6033, $6034, $6035, $6036, $6037, $6038, $6039, $6040, $6041, $6042, $6043, $6044, $6045, $6046, $6047, $6048, $6049, $6050, $6051, $6052, $6053, $6054, $6055, $6056, $6057, $6058, VersionRange($6059, $6060)), ($6061, $6062, $6063, $6064, $6065, $6066, $6067, $6068, $6069, $6070, $6071, $6072, $6073, $6074, $6075, $6076, $6077, $6078, $6079, $6080, $6081, $6082, $6083, $6084, $6085, $6086, $6087, $6088, VersionRange($6089, $6090)), ($6091, $6092, $6093, $6094, $6095, $6096, $6097, $6098, $6099, $6100, $6101, $6102, $6103, $6104, $6105, $6106, $6107, $6108, $6109, $6110, $6111, $6112, $6113, $6114, $6115, $6116, $6117, $6118, VersionRange($6119, $6120)), ($6121, $6122, $6123, $6124, $6125, $6126, $6127, $6128, $6129, $6130, $6131, $6132, $6133, $6134, $6135, $6136, $6137, $6138, $6139, $6140, $6141, $6142, $6143, $6144, $6145, $6146, $6147, $6148, VersionRange($6149, $6150)), ($6151, $6152, $6153, $6154, $6155, $6156, $6157, $6158, $6159, $6160, $6161, $6162, $6163, $6164, $6165, $6166, $6167, $6168, $6169, $6170, $6171, $6172, $6173, $6174, $6175, $6176, $6177, $6178, VersionRange($6179, $6180)), ($6181, $6182, $6183, $6184, $6185, $6186, $6187, $6188, $6189, $6190, $6191, $6192, $6193, $6194, $6195, $6196, $6197, $6198, $6199, $6200, $6201, $6202, $6203, $6204, $6205, $6206, $6207, $6208, VersionRange($6209, $6210)), ($6211, $6212, $6213, $6214, $6215, $6216, $6217, $6218, $6219, $6220, $6221, $6222, $6223, $6224, $6225, $6226, $6227, $6228, $6229, $6230, $6231, $6232, $6233, $6234, $6235, $6236, $6237, $6238, VersionRange($6239, $6240)), ($6241, $6242, $6243, $6244, $6245, $6246, $6247, $6248, $6249, $6250, $6251, $6252, $6253, $6254, $6255, $6256, $6257, $6258, $6259, $6260, $6261, $6262, $6263, $6264, $6265, $6266, $6267, $6268, VersionRange($6269, $6270)), ($6271, $6272, $6273, $6274, $6275, $6276, $6277, $6278, $6279, $6280, $6281, $6282, $6283, $6284, $6285, $6286, $6287, $6288, $6289, $6290, $6291, $6292, $6293, $6294, $6295, $6296, $6297, $6298, VersionRange($6299, $6300)), ($6301, $6302, $6303, $6304, $6305, $6306, $6307, $6308, $6309, $6310, $6311, $6312, $6313, $6314, $6315, $6316, $6317, $6318, $6319, $6320, $6321, $6322, $6323, $6324, $6325, $6326, $6327, $6328, VersionRange($6329, $6330)), ($6331, $6332, $6333, $6334, $6335, $6336, $6337, $6338, $6339, $6340, $6341, $6342, $6343, $6344, $6345, $6346, $6347, $6348, $6349, $6350, $6351, $6352, $6353, $6354, $6355, $6356, $6357, $6358, VersionRange($6359, $6360)), ($6361, $6362, $6363, $6364, $6365, $6366, $6367, $6368, $6369, $6370, $6371, $6372, $6373, $6374, $6375, $6376, $6377, $6378, $6379, $6380, $6381, $6382, $6383, $6384, $6385, $6386, $6387, $6388, VersionRange($6389, $6390)), ($6391, $6392, $6393, $6394, $6395, $6396, $6397, $6398, $6399, $6400, $6401, $6402, $6403, $6404, $6405, $6406, $6407, $6408, $6409, $6410, $6411, $6412, $6413, $6414, $6415, $6416, $6417, $6418, VersionRange($6419, $6420)), ($6421, $6422, $6423, $6424, $6425, $6426, $6427, $6428, $6429, $6430, $6431, $6432, $6433, $6434, $6435, $6436, $6437, $6438, $6439, $6440, $6441, $6442, $6443, $6444, $6445, $6446, $6447, $6448, VersionRange($6449, $6450)), ($6451, $6452, $6453, $6454, $6455, $6456, $6457, $6458, $6459, $6460, $6461, $6462, $6463, $6464, $6465, $6466, $6467, $6468, $6469, $6470, $6471, $6472, $6473, $6474, $6475, $6476, $6477, $6478, VersionRange($6479, $6480)), ($6481, $6482, $6483, $6484, $6485, $6486, $6487, $6488, $6489, $6490, $6491, $6492, $6493, $6494, $6495, $6496, $6497, $6498, $6499, $6500, $6501, $6502, $6503, $6504, $6505, $6506, $6507, $6508, VersionRange($6509, $6510)), ($6511, $6512, $6513, $6514, $6515, $6516, $6517, $6518, $6519, $6520, $6521, $6522, $6523, $6524, $6525, $6526, $6527, $6528, $6529, $6530, $6531, $6532, $6533, $6534, $6535, $6536, $6537, $6538, VersionRange($6539, $6540)), ($6541, $6542, $6543, $6544, $6545, $6546, $6547, $6548, $6549, $6550, $6551, $6552, $6553, $6554, $6555, $6556, $6557, $6558, $6559, $6560, $6561, $6562, $6563, $6564, $6565, $6566, $6567, $6568, VersionRange($6569, $6570)), ($6571, $6572, $6573, $6574, $6575, $6576, $6577, $6578, $6579, $6580, $6581, $6582, $6583, $6584, $6585, $6586, $6587, $6588, $6589, $6590, $6591, $6592, $6593, $6594, $6595, $6596, $6597, $6598, VersionRange($6599, $6600)), ($6601, $6602, $6603, $6604, $6605, $6606, $6607, $6608, $6609, $6610, $6611, $6612, $6613, $6614, $6615, $6616, $6617, $6618, $6619, $6620, $6621, $6622, $6623, $6624, $6625, $6626, $6627, $6628, VersionRange($6629, $6630)), ($6631, $6632, $6633, $6634, $6635, $6636, $6637, $6638, $6639, $6640, $6641, $6642, $6643, $6644, $6645, $6646, $6647, $6648, $6649, $6650, $6651, $6652, $6653, $6654, $6655, $6656, $6657, $6658, VersionRange($6659, $6660)), ($6661, $6662, $6663, $6664, $6665, $6666, $6667, $6668, $6669, $6670, $6671, $6672, $6673, $6674, $6675, $6676, $6677, $6678, $6679, $6680, $6681, $6682, $6683, $6684, $6685, $6686, $6687, $6688, VersionRange($6689, $6690)), ($6691, $6692, $6693, $6694, $6695, $6696, $6697, $6698, $6699, $6700, $6701, $6702, $6703, $6704, $6705, $6706, $6707, $6708, $6709, $6710, $6711, $6712, $6713, $6714, $6715, $6716, $6717, $6718, VersionRange($6719, $6720)), ($6721, $6722, $6723, $6724, $6725, $6726, $6727, $6728, $6729, $6730, $6731, $6732, $6733, $6734, $6735, $6736, $6737, $6738, $6739, $6740, $6741, $6742, $6743, $6744, $6745, $6746, $6747, $6748, VersionRange($6749, $6750)), ($6751, $6752, $6753, $6754, $6755, $6756, $6757, $6758, $6759, $6760, $6761, $6762, $6763, $6764, $6765, $6766, $6767, $6768, $6769, $6770, $6771, $6772, $6773, $6774, $6775, $6776, $6777, $6778, VersionRange($6779, $6780)), ($6781, $6782, $6783, $6784, $6785, $6786, $6787, $6788, $6789, $6790, $6791, $6792, $6793, $6794, $6795, $6796, $6797, $6798, $6799, $6800, $6801, $6802, $6803, $6804, $6805, $6806, $6807, $6808, VersionRange($6809, $6810)), ($6811, $6812, $6813, $6814, $6815, $6816, $6817, $6818, $6819, $6820, $6821, $6822, $6823, $6824, $6825, $6826, $6827, $6828, $6829, $6830, $6831, $6832, $6833, $6834, $6835, $6836, $6837, $6838, VersionRange($6839, $6840)), ($6841, $6842, $6843, $6844, $6845, $6846, $6847, $6848, $6849, $6850, $6851, $6852, $6853, $6854, $6855, $6856, $6857, $6858, $6859, $6860, $6861, $6862, $6863, $6864, $6865, $6866, $6867, $6868, VersionRange($6869, $6870)), ($6871, $6872, $6873, $6874, $6875, $6876, $6877, $6878, $6879, $6880, $6881, $6882, $6883, $6884, $6885, $6886, $6887, $6888, $6889, $6890, $6891, $6892, $6893, $6894, $6895, $6896, $6897, $6898, VersionRange($6899, $6900)), ($6901, $6902, $6903, $6904, $6905, $6906, $6907, $6908, $6909, $6910, $6911, $6912, $6913, $6914, $6915, $6916, $6917, $6918, $6919, $6920, $6921, $6922, $6923, $6924, $6925, $6926, $6927, $6928, VersionRange($6929, $6930)), ($6931, $6932, $6933, $6934, $6935, $6936, $6937, $6938, $6939, $6940, $6941, $6942, $6943, $6944, $6945, $6946, $6947, $6948, $6949, $6950, $6951, $6952, $6953, $6954, $6955, $6956, $6957, $6958, VersionRange($6959, $6960)), ($6961, $6962, $6963, $6964, $6965, $6966, $6967, $6968, $6969, $6970, $6971, $6972, $6973, $6974, $6975, $6976, $6977, $6978, $6979, $6980, $6981, $6982, $6983, $6984, $6985, $6986, $6987, $6988, VersionRange($6989, $6990)), ($6991, $6992, $6993, $6994, $6995, $6996, $6997, $6998, $6999, $7000, $7001, $7002, $7003, $7004, $7005, $7006, $7007, $7008, $7009, $7010, $7011, $7012, $7013, $7014, $7015, $7016, $7017, $7018, VersionRange($7019, $7020)), ($7021, $7022, $7023, $7024, $7025, $7026, $7027, $7028, $7029, $7030, $7031, $7032, $7033, $7034, $7035, $7036, $7037, $7038, $7039, $7040, $7041, $7042, $7043, $7044, $7045, $7046, $7047, $7048, VersionRange($7049, $7050)), ($7051, $7052, $7053, $7054, $7055, $7056, $7057, $7058, $7059, $7060, $7061, $7062, $7063, $7064, $7065, $7066, $7067, $7068, $7069, $7070, $7071, $7072, $7073, $7074, $7075, $7076, $7077, $7078, VersionRange($7079, $7080)), ($7081, $7082, $7083, $7084, $7085, $7086, $7087, $7088, $7089, $7090, $7091, $7092, $7093, $7094, $7095, $7096, $7097, $7098, $7099, $7100, $7101, $7102, $7103, $7104, $7105, $7106, $7107, $7108, VersionRange($7109, $7110)), ($7111, $7112, $7113, $7114, $7115, $7116, $7117, $7118, $7119, $7120, $7121, $7122, $7123, $7124, $7125, $7126, $7127, $7128, $7129, $7130, $7131, $7132, $7133, $7134, $7135, $7136, $7137, $7138, VersionRange($7139, $7140)), ($7141, $7142, $7143, $7144, $7145, $7146, $7147, $7148, $7149, $7150, $7151, $7152, $7153, $7154, $7155, $7156, $7157, $7158, $7159, $7160, $7161, $7162, $7163, $7164, $7165, $7166, $7167, $7168, VersionRange($7169, $7170)), ($7171, $7172, $7173, $7174, $7175, $7176, $7177, $7178, $7179, $7180, $7181, $7182, $7183, $7184, $7185, $7186, $7187, $7188, $7189, $7190, $7191, $7192, $7193, $7194, $7195, $7196, $7197, $7198, VersionRange($7199, $7200)), ($7201, $7202, $7203, $7204, $7205, $7206, $7207, $7208, $7209, $7210, $7211, $7212, $7213, $7214, $7215, $7216, $7217, $7218, $7219, $7220, $7221, $7222, $7223, $7224, $7225, $7226, $7227, $7228, VersionRange($7229, $7230)), ($7231, $7232, $7233, $7234, $7235, $7236, $7237, $7238, $7239, $7240, $7241, $7242, $7243, $7244, $7245, $7246, $7247, $7248, $7249, $7250, $7251, $7252, $7253, $7254, $7255, $7256, $7257, $7258, VersionRange($7259, $7260)), ($7261, $7262, $7263, $7264, $7265, $7266, $7267, $7268, $7269, $7270, $7271, $7272, $7273, $7274, $7275, $7276, $7277, $7278, $7279, $7280, $7281, $7282, $7283, $7284, $7285, $7286, $7287, $7288, VersionRange($7289, $7290)), ($7291, $7292, $7293, $7294, $7295, $7296, $7297, $7298, $7299, $7300, $7301, $7302, $7303, $7304, $7305, $7306, $7307, $7308, $7309, $7310, $7311, $7312, $7313, $7314, $7315, $7316, $7317, $7318, VersionRange($7319, $7320)), ($7321, $7322, $7323, $7324, $7325, $7326, $7327, $7328, $7329, $7330, $7331, $7332, $7333, $7334, $7335, $7336, $7337, $7338, $7339, $7340, $7341, $7342, $7343, $7344, $7345, $7346, $7347, $7348, VersionRange($7349, $7350)), ($7351, $7352, $7353, $7354, $7355, $7356, $7357, $7358, $7359, $7360, $7361, $7362, $7363, $7364, $7365, $7366, $7367, $7368, $7369, $7370, $7371, $7372, $7373, $7374, $7375, $7376, $7377, $7378, VersionRange($7379, $7380)), ($7381, $7382, $7383, $7384, $7385, $7386, $7387, $7388, $7389, $7390, $7391, $7392, $7393, $7394, $7395, $7396, $7397, $7398, $7399, $7400, $7401, $7402, $7403, $7404, $7405, $7406, $7407, $7408, VersionRange($7409, $7410)), ($7411, $7412, $7413, $7414, $7415, $7416, $7417, $7418, $7419, $7420, $7421, $7422, $7423, $7424, $7425, $7426, $7427, $7428, $7429, $7430, $7431, $7432, $7433, $7434, $7435, $7436, $7437, $7438, VersionRange($7439, $7440)), ($7441, $7442, $7443, $7444, $7445, $7446, $7447, $7448, $7449, $7450, $7451, $7452, $7453, $7454, $7455, $7456, $7457, $7458, $7459, $7460, $7461, $7462, $7463, $7464, $7465, $7466, $7467, $7468, VersionRange($7469, $7470)), ($7471, $7472, $7473, $7474, $7475, $7476, $7477, $7478, $7479, $7480, $7481, $7482, $7483, $7484, $7485, $7486, $7487, $7488, $7489, $7490, $7491, $7492, $7493, $7494, $7495, $7496, $7497, $7498, VersionRange($7499, $7500)), ($7501, $7502, $7503, $7504, $7505, $7506, $7507, $7508, $7509, $7510, $7511, $7512, $7513, $7514, $7515, $7516, $7517, $7518, $7519, $7520, $7521, $7522, $7523, $7524, $7525, $7526, $7527, $7528, VersionRange($7529, $7530)), ($7531, $7532, $7533, $7534, $7535, $7536, $7537, $7538, $7539, $7540, $7541, $7542, $7543, $7544, $7545, $7546, $7547, $7548, $7549, $7550, $7551, $7552, $7553, $7554, $7555, $7556, $7557, $7558, VersionRange($7559, $7560)), ($7561, $7562, $7563, $7564, $7565, $7566, $7567, $7568, $7569, $7570, $7571, $7572, $7573, $7574, $7575, $7576, $7577, $7578, $7579, $7580, $7581, $7582, $7583, $7584, $7585, $7586, $7587, $7588, VersionRange($7589, $7590)), ($7591, $7592, $7593, $7594, $7595, $7596, $7597, $7598, $7599, $7600, $7601, $7602, $7603, $7604, $7605, $7606, $7607, $7608, $7609, $7610, $7611, $7612, $7613, $7614, $7615, $7616, $7617, $7618, VersionRange($7619, $7620)), ($7621, $7622, $7623, $7624, $7625, $7626, $7627, $7628, $7629, $7630, $7631, $7632, $7633, $7634, $7635, $7636, $7637, $7638, $7639, $7640, $7641, $7642, $7643, $7644, $7645, $7646, $7647, $7648, VersionRange($7649, $7650)), ($7651, $7652, $7653, $7654, $7655, $7656, $7657, $7658, $7659, $7660, $7661, $7662, $7663, $7664, $7665, $7666, $7667, $7668, $7669, $7670, $7671, $7672, $7673, $7674, $7675, $7676, $7677, $7678, VersionRange($7679, $7680)), ($7681, $7682, $7683, $7684, $7685, $7686, $7687, $7688, $7689, $7690, $7691, $7692, $7693, $7694, $7695, $7696, $7697, $7698, $7699, $7700, $7701, $7702, $7703, $7704, $7705, $7706, $7707, $7708, VersionRange($7709, $7710)), ($7711, $7712, $7713, $7714, $7715, $7716, $7717, $7718, $7719, $7720, $7721, $7722, $7723, $7724, $7725, $7726, $7727, $7728, $7729, $7730, $7731, $7732, $7733, $7734, $7735, $7736, $7737, $7738, VersionRange($7739, $7740)), ($7741, $7742, $7743, $7744, $7745, $7746, $7747, $7748, $7749, $7750, $7751, $7752, $7753, $7754, $7755, $7756, $7757, $7758, $7759, $7760, $7761, $7762, $7763, $7764, $7765, $7766, $7767, $7768, VersionRange($7769, $7770)), ($7771, $7772, $7773, $7774, $7775, $7776, $7777, $7778, $7779, $7780, $7781, $7782, $7783, $7784, $7785, $7786, $7787, $7788, $7789, $7790, $7791, $7792, $7793, $7794, $7795, $7796, $7797, $7798, VersionRange($7799, $7800)), ($7801, $7802, $7803, $7804, $7805, $7806, $7807, $7808, $7809, $7810, $7811, $7812, $7813, $7814, $7815, $7816, $7817, $7818, $7819, $7820, $7821, $7822, $7823, $7824, $7825, $7826, $7827, $7828, VersionRange($7829, $7830)), ($7831, $7832, $7833, $7834, $7835, $7836, $7837, $7838, $7839, $7840, $7841, $7842, $7843, $7844, $7845, $7846, $7847, $7848, $7849, $7850, $7851, $7852, $7853, $7854, $7855, $7856, $7857, $7858, VersionRange($7859, $7860)), ($7861, $7862, $7863, $7864, $7865, $7866, $7867, $7868, $7869, $7870, $7871, $7872, $7873, $7874, $7875, $7876, $7877, $7878, $7879, $7880, $7881, $7882, $7883, $7884, $7885, $7886, $7887, $7888, VersionRange($7889, $7890)), ($7891, $7892, $7893, $7894, $7895, $7896, $7897, $7898, $7899, $7900, $7901, $7902, $7903, $7904, $7905, $7906, $7907, $7908, $7909, $7910, $7911, $7912, $7913, $7914, $7915, $7916, $7917, $7918, VersionRange($7919, $7920)), ($7921, $7922, $7923, $7924, $7925, $7926, $7927, $7928, $7929, $7930, $7931, $7932, $7933, $7934, $7935, $7936, $7937, $7938, $7939, $7940, $7941, $7942, $7943, $7944, $7945, $7946, $7947, $7948, VersionRange($7949, $7950)), ($7951, $7952, $7953, $7954, $7955, $7956, $7957, $7958, $7959, $7960, $7961, $7962, $7963, $7964, $7965, $7966, $7967, $7968, $7969, $7970, $7971, $7972, $7973, $7974, $7975, $7976, $7977, $7978, VersionRange($7979, $7980)), ($7981, $7982, $7983, $7984, $7985, $7986, $7987, $7988, $7989, $7990, $7991, $7992, $7993, $7994, $7995, $7996, $7997, $7998, $7999, $8000, $8001, $8002, $8003, $8004, $8005, $8006, $8007, $8008, VersionRange($8009, $8010)), ($8011, $8012, $8013, $8014, $8015, $8016, $8017, $8018, $8019, $8020, $8021, $8022, $8023, $8024, $8025, $8026, $8027, $8028, $8029, $8030, $8031, $8032, $8033, $8034, $8035, $8036, $8037, $8038, VersionRange($8039, $8040)), ($8041, $8042, $8043, $8044, $8045, $8046, $8047, $8048, $8049, $8050, $8051, $8052, $8053, $8054, $8055, $8056, $8057, $8058, $8059, $8060, $8061, $8062, $8063, $8064, $8065, $8066, $8067, $8068, VersionRange($8069, $8070)), ($8071, $8072, $8073, $8074, $8075, $8076, $8077, $8078, $8079, $8080, $8081, $8082, $8083, $8084, $8085, $8086, $8087, $8088, $8089, $8090, $8091, $8092, $8093, $8094, $8095, $8096, $8097, $8098, VersionRange($8099, $8100)), ($8101, $8102, $8103, $8104, $8105, $8106, $8107, $8108, $8109, $8110, $8111, $8112, $8113, $8114, $8115, $8116, $8117, $8118, $8119, $8120, $8121, $8122, $8123, $8124, $8125, $8126, $8127, $8128, VersionRange($8129, $8130)), ($8131, $8132, $8133, $8134, $8135, $8136, $8137, $8138, $8139, $8140, $8141, $8142, $8143, $8144, $8145, $8146, $8147, $8148, $8149, $8150, $8151, $8152, $8153, $8154, $8155, $8156, $8157, $8158, VersionRange($8159, $8160)), ($8161, $8162, $8163, $8164, $8165, $8166, $8167, $8168, $8169, $8170, $8171, $8172, $8173, $8174, $8175, $8176, $8177, $8178, $8179, $8180, $8181, $8182, $8183, $8184, $8185, $8186, $8187, $8188, VersionRange($8189, $8190)), ($8191, $8192, $8193, $8194, $8195, $8196, $8197, $8198, $8199, $8200, $8201, $8202, $8203, $8204, $8205, $8206, $8207, $8208, $8209, $8210, $8211, $8212, $8213, $8214, $8215, $8216, $8217, $8218, VersionRange($8219, $8220)), ($8221, $8222, $8223, $8224, $8225, $8226, $8227, $8228, $8229, $8230, $8231, $8232, $8233, $8234, $8235, $8236, $8237, $8238, $8239, $8240, $8241, $8242, $8243, $8244, $8245, $8246, $8247, $8248, VersionRange($8249, $8250)), ($8251, $8252, $8253, $8254, $8255, $8256, $8257, $8258, $8259, $8260, $8261, $8262, $8263, $8264, $8265, $8266, $8267, $8268, $8269, $8270, $8271, $8272, $8273, $8274, $8275, $8276, $8277, $8278, VersionRange($8279, $8280)), ($8281, $8282, $8283, $8284, $8285, $8286, $8287, $8288, $8289, $8290, $8291, $8292, $8293, $8294, $8295, $8296, $8297, $8298, $8299, $8300, $8301, $8302, $8303, $8304, $8305, $8306, $8307, $8308, VersionRange($8309, $8310)), ($8311, $8312, $8313, $8314, $8315, $8316, $8317, $8318, $8319, $8320, $8321, $8322, $8323, $8324, $8325, $8326, $8327, $8328, $8329, $8330, $8331, $8332, $8333, $8334, $8335, $8336, $8337, $8338, VersionRange($8339, $8340)), ($8341, $8342, $8343, $8344, $8345, $8346, $8347, $8348, $8349, $8350, $8351, $8352, $8353, $8354, $8355, $8356, $8357, $8358, $8359, $8360, $8361, $8362, $8363, $8364, $8365, $8366, $8367, $8368, VersionRange($8369, $8370)), ($8371, $8372, $8373, $8374, $8375, $8376, $8377, $8378, $8379, $8380, $8381, $8382, $8383, $8384, $8385, $8386, $8387, $8388, $8389, $8390, $8391, $8392, $8393, $8394, $8395, $8396, $8397, $8398, VersionRange($8399, $8400)), ($8401, $8402, $8403, $8404, $8405, $8406, $8407, $8408, $8409, $8410, $8411, $8412, $8413, $8414, $8415, $8416, $8417, $8418, $8419, $8420, $8421, $8422, $8423, $8424, $8425, $8426, $8427, $8428, VersionRange($8429, $8430)), ($8431, $8432, $8433, $8434, $8435, $8436, $8437, $8438, $8439, $8440, $8441, $8442, $8443, $8444, $8445, $8446, $8447, $8448, $8449, $8450, $8451, $8452, $8453, $8454, $8455, $8456, $8457, $8458, VersionRange($8459, $8460)), ($8461, $8462, $8463, $8464, $8465, $8466, $8467, $8468, $8469, $8470, $8471, $8472, $8473, $8474, $8475, $8476, $8477, $8478, $8479, $8480, $8481, $8482, $8483, $8484, $8485, $8486, $8487, $8488, VersionRange($8489, $8490)), ($8491, $8492, $8493, $8494, $8495, $8496, $8497, $8498, $8499, $8500, $8501, $8502, $8503, $8504, $8505, $8506, $8507, $8508, $8509, $8510, $8511, $8512, $8513, $8514, $8515, $8516, $8517, $8518, VersionRange($8519, $8520)), ($8521, $8522, $8523, $8524, $8525, $8526, $8527, $8528, $8529, $8530, $8531, $8532, $8533, $8534, $8535, $8536, $8537, $8538, $8539, $8540, $8541, $8542, $8543, $8544, $8545, $8546, $8547, $8548, VersionRange($8549, $8550)), ($8551, $8552, $8553, $8554, $8555, $8556, $8557, $8558, $8559, $8560, $8561, $8562, $8563, $8564, $8565, $8566, $8567, $8568, $8569, $8570, $8571, $8572, $8573, $8574, $8575, $8576, $8577, $8578, VersionRange($8579, $8580)), ($8581, $8582, $8583, $8584, $8585, $8586, $8587, $8588, $8589, $8590, $8591, $8592, $8593, $8594, $8595, $8596, $8597, $8598, $8599, $8600, $8601, $8602, $8603, $8604, $8605, $8606, $8607, $8608, VersionRange($8609, $8610)), ($8611, $8612, $8613, $8614, $8615, $8616, $8617, $8618, $8619, $8620, $8621, $8622, $8623, $8624, $8625, $8626, $8627, $8628, $8629, $8630, $8631, $8632, $8633, $8634, $8635, $8636, $8637, $8638, VersionRange($8639, $8640)), ($8641, $8642, $8643, $8644, $8645, $8646, $8647, $8648, $8649, $8650, $8651, $8652, $8653, $8654, $8655, $8656, $8657, $8658, $8659, $8660, $8661, $8662, $8663, $8664, $8665, $8666, $8667, $8668, VersionRange($8669, $8670)), ($8671, $8672, $8673, $8674, $8675, $8676, $8677, $8678, $8679, $8680, $8681, $8682, $8683, $8684, $8685, $8686, $8687, $8688, $8689, $8690, $8691, $8692, $8693, $8694, $8695, $8696, $8697, $8698, VersionRange($8699, $8700)), ($8701, $8702, $8703, $8704, $8705, $8706, $8707, $8708, $8709, $8710, $8711, $8712, $8713, $8714, $8715, $8716, $8717, $8718, $8719, $8720, $8721, $8722, $8723, $8724, $8725, $8726, $8727, $8728, VersionRange($8729, $8730)), ($8731, $8732, $8733, $8734, $8735, $8736, $8737, $8738, $8739, $8740, $8741, $8742, $8743, $8744, $8745, $8746, $8747, $8748, $8749, $8750, $8751, $8752, $8753, $8754, $8755, $8756, $8757, $8758, VersionRange($8759, $8760)), ($8761, $8762, $8763, $8764, $8765, $8766, $8767, $8768, $8769, $8770, $8771, $8772, $8773, $8774, $8775, $8776, $8777, $8778, $8779, $8780, $8781, $8782, $8783, $8784, $8785, $8786, $8787, $8788, VersionRange($8789, $8790)), ($8791, $8792, $8793, $8794, $8795, $8796, $8797, $8798, $8799, $8800, $8801, $8802, $8803, $8804, $8805, $8806, $8807, $8808, $8809, $8810, $8811, $8812, $8813, $8814, $8815, $8816, $8817, $8818, VersionRange($8819, $8820)), ($8821, $8822, $8823, $8824, $8825, $8826, $8827, $8828, $8829, $8830, $8831, $8832, $8833, $8834, $8835, $8836, $8837, $8838, $8839, $8840, $8841, $8842, $8843, $8844, $8845, $8846, $8847, $8848, VersionRange($8849, $8850)), ($8851, $8852, $8853, $8854, $8855, $8856, $8857, $8858, $8859, $8860, $8861, $8862, $8863, $8864, $8865, $8866, $8867, $8868, $8869, $8870, $8871, $8872, $8873, $8874, $8875, $8876, $8877, $8878, VersionRange($8879, $8880)), ($8881, $8882, $8883, $8884, $8885, $8886, $8887, $8888, $8889, $8890, $8891, $8892, $8893, $8894, $8895, $8896, $8897, $8898, $8899, $8900, $8901, $8902, $8903, $8904, $8905, $8906, $8907, $8908, VersionRange($8909, $8910)), ($8911, $8912, $8913, $8914, $8915, $8916, $8917, $8918, $8919, $8920, $8921, $8922, $8923, $8924, $8925, $8926, $8927, $8928, $8929, $8930, $8931, $8932, $8933, $8934, $8935, $8936, $8937, $8938, VersionRange($8939, $8940)), ($8941, $8942, $8943, $8944, $8945, $8946, $8947, $8948, $8949, $8950, $8951, $8952, $8953, $8954, $8955, $8956, $8957, $8958, $8959, $8960, $8961, $8962, $8963, $8964, $8965, $8966, $8967, $8968, VersionRange($8969, $8970)), ($8971, $8972, $8973, $8974, $8975, $8976, $8977, $8978, $8979, $8980, $8981, $8982, $8983, $8984, $8985, $8986, $8987, $8988, $8989, $8990, $8991, $8992, $8993, $8994, $8995, $8996, $8997, $8998, VersionRange($8999, $9000)), ($9001, $9002, $9003, $9004, $9005, $9006, $9007, $9008, $9009, $9010, $9011, $9012, $9013, $9014, $9015, $9016, $9017, $9018, $9019, $9020, $9021, $9022, $9023, $9024, $9025, $9026, $9027, $9028, VersionRange($9029, $9030)), ($9031, $9032, $9033, $9034, $9035, $9036, $9037, $9038, $9039, $9040, $9041, $9042, $9043, $9044, $9045, $9046, $9047, $9048, $9049, $9050, $9051, $9052, $9053, $9054, $9055, $9056, $9057, $9058, VersionRange($9059, $9060)), ($9061, $9062, $9063, $9064, $9065, $9066, $9067, $9068, $9069, $9070, $9071, $9072, $9073, $9074, $9075, $9076, $9077, $9078, $9079, $9080, $9081, $9082, $9083, $9084, $9085, $9086, $9087, $9088, VersionRange($9089, $9090)), ($9091, $9092, $9093, $9094, $9095, $9096, $9097, $9098, $9099, $9100, $9101, $9102, $9103, $9104, $9105, $9106, $9107, $9108, $9109, $9110, $9111, $9112, $9113, $9114, $9115, $9116, $9117, $9118, VersionRange($9119, $9120)), ($9121, $9122, $9123, $9124, $9125, $9126, $9127, $9128, $9129, $9130, $9131, $9132, $9133, $9134, $9135, $9136, $9137, $9138, $9139, $9140, $9141, $9142, $9143, $9144, $9145, $9146, $9147, $9148, VersionRange($9149, $9150)), ($9151, $9152, $9153, $9154, $9155, $9156, $9157, $9158, $9159, $9160, $9161, $9162, $9163, $9164, $9165, $9166, $9167, $9168, $9169, $9170, $9171, $9172, $9173, $9174, $9175, $9176, $9177, $9178, VersionRange($9179, $9180)), ($9181, $9182, $9183, $9184, $9185, $9186, $9187, $9188, $9189, $9190, $9191, $9192, $9193, $9194, $9195, $9196, $9197, $9198, $9199, $9200, $9201, $9202, $9203, $9204, $9205, $9206, $9207, $9208, VersionRange($9209, $9210)), ($9211, $9212, $9213, $9214, $9215, $9216, $9217, $9218, $9219, $9220, $9221, $9222, $9223, $9224, $9225, $9226, $9227, $9228, $9229, $9230, $9231, $9232, $9233, $9234, $9235, $9236, $9237, $9238, VersionRange($9239, $9240)), ($9241, $9242, $9243, $9244, $9245, $9246, $9247, $9248, $9249, $9250, $9251, $9252, $9253, $9254, $9255, $9256, $9257, $9258, $9259, $9260, $9261, $9262, $9263, $9264, $9265, $9266, $9267, $9268, VersionRange($9269, $9270)), ($9271, $9272, $9273, $9274, $9275, $9276, $9277, $9278, $9279, $9280, $9281, $9282, $9283, $9284, $9285, $9286, $9287, $9288, $9289, $9290, $9291, $9292, $9293, $9294, $9295, $9296, $9297, $9298, VersionRange($9299, $9300)), ($9301, $9302, $9303, $9304, $9305, $9306, $9307, $9308, $9309, $9310, $9311, $9312, $9313, $9314, $9315, $9316, $9317, $9318, $9319, $9320, $9321, $9322, $9323, $9324, $9325, $9326, $9327, $9328, VersionRange($9329, $9330)), ($9331, $9332, $9333, $9334, $9335, $9336, $9337, $9338, $9339, $9340, $9341, $9342, $9343, $9344, $9345, $9346, $9347, $9348, $9349, $9350, $9351, $9352, $9353, $9354, $9355, $9356, $9357, $9358, VersionRange($9359, $9360)), ($9361, $9362, $9363, $9364, $9365, $9366, $9367, $9368, $9369, $9370, $9371, $9372, $9373, $9374, $9375, $9376, $9377, $9378, $9379, $9380, $9381, $9382, $9383, $9384, $9385, $9386, $9387, $9388, VersionRange($9389, $9390)), ($9391, $9392, $9393, $9394, $9395, $9396, $9397, $9398, $9399, $9400, $9401, $9402, $9403, $9404, $9405, $9406, $9407, $9408, $9409, $9410, $9411, $9412, $9413, $9414, $9415, $9416, $9417, $9418, VersionRange($9419, $9420)), ($9421, $9422, $9423, $9424, $9425, $9426, $9427, $9428, $9429, $9430, $9431, $9432, $9433, $9434, $9435, $9436, $9437, $9438, $9439, $9440, $9441, $9442, $9443, $9444, $9445, $9446, $9447, $9448, VersionRange($9449, $9450)), ($9451, $9452, $9453, $9454, $9455, $9456, $9457, $9458, $9459, $9460, $9461, $9462, $9463, $9464, $9465, $9466, $9467, $9468, $9469, $9470, $9471, $9472, $9473, $9474, $9475, $9476, $9477, $9478, VersionRange($9479, $9480)), ($9481, $9482, $9483, $9484, $9485, $9486, $9487, $9488, $9489, $9490, $9491, $9492, $9493, $9494, $9495, $9496, $9497, $9498, $9499, $9500, $9501, $9502, $9503, $9504, $9505, $9506, $9507, $9508, VersionRange($9509, $9510)), ($9511, $9512, $9513, $9514, $9515, $9516, $9517, $9518, $9519, $9520, $9521, $9522, $9523, $9524, $9525, $9526, $9527, $9528, $9529, $9530, $9531, $9532, $9533, $9534, $9535, $9536, $9537, $9538, VersionRange($9539, $9540)), ($9541, $9542, $9543, $9544, $9545, $9546, $9547, $9548, $9549, $9550, $9551, $9552, $9553, $9554, $9555, $9556, $9557, $9558, $9559, $9560, $9561, $9562, $9563, $9564, $9565, $9566, $9567, $9568, VersionRange($9569, $9570)), ($9571, $9572, $9573, $9574, $9575, $9576, $9577, $9578, $9579, $9580, $9581, $9582, $9583, $9584, $9585, $9586, $9587, $9588, $9589, $9590, $9591, $9592, $9593, $9594, $9595, $9596, $9597, $9598, VersionRange($9599, $9600)), ($9601, $9602, $9603, $9604, $9605, $9606, $9607, $9608, $9609, $9610, $9611, $9612, $9613, $9614, $9615, $9616, $9617, $9618, $9619, $9620, $9621, $9622, $9623, $9624, $9625, $9626, $9627, $9628, VersionRange($9629, $9630)), ($9631, $9632, $9633, $9634, $9635, $9636, $9637, $9638, $9639, $9640, $9641, $9642, $9643, $9644, $9645, $9646, $9647, $9648, $9649, $9650, $9651, $9652, $9653, $9654, $9655, $9656, $9657, $9658, VersionRange($9659, $9660)), ($9661, $9662, $9663, $9664, $9665, $9666, $9667, $9668, $9669, $9670, $9671, $9672, $9673, $9674, $9675, $9676, $9677, $9678, $9679, $9680, $9681, $9682, $9683, $9684, $9685, $9686, $9687, $9688, VersionRange($9689, $9690)), ($9691, $9692, $9693, $9694, $9695, $9696, $9697, $9698, $9699, $9700, $9701, $9702, $9703, $9704, $9705, $9706, $9707, $9708, $9709, $9710, $9711, $9712, $9713, $9714, $9715, $9716, $9717, $9718, VersionRange($9719, $9720)), ($9721, $9722, $9723, $9724, $9725, $9726, $9727, $9728, $9729, $9730, $9731, $9732, $9733, $9734, $9735, $9736, $9737, $9738, $9739, $9740, $9741, $9742, $9743, $9744, $9745, $9746, $9747, $9748, VersionRange($9749, $9750)), ($9751, $9752, $9753, $9754, $9755, $9756, $9757, $9758, $9759, $9760, $9761, $9762, $9763, $9764, $9765, $9766, $9767, $9768, $9769, $9770, $9771, $9772, $9773, $9774, $9775, $9776, $9777, $9778, VersionRange($9779, $9780)), ($9781, $9782, $9783, $9784, $9785, $9786, $9787, $9788, $9789, $9790, $9791, $9792, $9793, $9794, $9795, $9796, $9797, $9798, $9799, $9800, $9801, $9802, $9803, $9804, $9805, $9806, $9807, $9808, VersionRange($9809, $9810)), ($9811, $9812, $9813, $9814, $9815, $9816, $9817, $9818, $9819, $9820, $9821, $9822, $9823, $9824, $9825, $9826, $9827, $9828, $9829, $9830, $9831, $9832, $9833, $9834, $9835, $9836, $9837, $9838, VersionRange($9839, $9840)), ($9841, $9842, $9843, $9844, $9845, $9846, $9847, $9848, $9849, $9850, $9851, $9852, $9853, $9854, $9855, $9856, $9857, $9858, $9859, $9860, $9861, $9862, $9863, $9864, $9865, $9866, $9867, $9868, VersionRange($9869, $9870)), ($9871, $9872, $9873, $9874, $9875, $9876, $9877, $9878, $9879, $9880, $9881, $9882, $9883, $9884, $9885, $9886, $9887, $9888, $9889, $9890, $9891, $9892, $9893, $9894, $9895, $9896, $9897, $9898, VersionRange($9899, $9900)), ($9901, $9902, $9903, $9904, $9905, $9906, $9907, $9908, $9909, $9910, $9911, $9912, $9913, $9914, $9915, $9916, $9917, $9918, $9919, $9920, $9921, $9922, $9923, $9924, $9925, $9926, $9927, $9928, VersionRange($9929, $9930)), ($9931, $9932, $9933, $9934, $9935, $9936, $9937, $9938, $9939, $9940, $9941, $9942, $9943, $9944, $9945, $9946, $9947, $9948, $9949, $9950, $9951, $9952, $9953, $9954, $9955, $9956, $9957, $9958, VersionRange($9959, $9960)), ($9961, $9962, $9963, $9964, $9965, $9966, $9967, $9968, $9969, $9970, $9971, $9972, $9973, $9974, $9975, $9976, $9977, $9978, $9979, $9980, $9981, $9982, $9983, $9984, $9985, $9986, $9987, $9988, VersionRange($9989, $9990)), ($9991, $9992, $9993, $9994, $9995, $9996, $9997, $9998, $9999, $10000, $10001, $10002, $10003, $10004, $10005, $10006, $10007, $10008, $10009, $10010, $10011, $10012, $10013, $10014, $10015, $10016, $10017, $10018, VersionRange($10019, $10020)), ($10021, $10022, $10023, $10024, $10025, $10026, $10027, $10028, $10029, $10030, $10031, $10032, $10033, $10034, $10035, $10036, $10037, $10038, $10039, $10040, $10041, $10042, $10043, $10044, $10045, $10046, $10047, $10048, VersionRange($10049, $10050)), ($10051, $10052, $10053, $10054, $10055, $10056, $10057, $10058, $10059, $10060, $10061, $10062, $10063, $10064, $10065, $10066, $10067, $10068, $10069, $10070, $10071, $10072, $10073, $10074, $10075, $10076, $10077, $10078, VersionRange($10079, $10080)), ($10081, $10082, $10083, $10084, $10085, $10086, $10087, $10088, $10089, $10090, $10091, $10092, $10093, $10094, $10095, $10096, $10097, $10098, $10099, $10100, $10101, $10102, $10103, $10104, $10105, $10106, $10107, $10108, VersionRange($10109, $10110)), ($10111, $10112, $10113, $10114, $10115, $10116, $10117, $10118, $10119, $10120, $10121, $10122, $10123, $10124, $10125, $10126, $10127, $10128, $10129, $10130, $10131, $10132, $10133, $10134, $10135, $10136, $10137, $10138, VersionRange($10139, $10140)), ($10141, $10142, $10143, $10144, $10145, $10146, $10147, $10148, $10149, $10150, $10151, $10152, $10153, $10154, $10155, $10156, $10157, $10158, $10159, $10160, $10161, $10162, $10163, $10164, $10165, $10166, $10167, $10168, VersionRange($10169, $10170)), ($10171, $10172, $10173, $10174, $10175, $10176, $10177, $10178, $10179, $10180, $10181, $10182, $10183, $10184, $10185, $10186, $10187, $10188, $10189, $10190, $10191, $10192, $10193, $10194, $10195, $10196, $10197, $10198, VersionRange($10199, $10200)), ($10201, $10202, $10203, $10204, $10205, $10206, $10207, $10208, $10209, $10210, $10211, $10212, $10213, $10214, $10215, $10216, $10217, $10218, $10219, $10220, $10221, $10222, $10223, $10224, $10225, $10226, $10227, $10228, VersionRange($10229, $10230)), ($10231, $10232, $10233, $10234, $10235, $10236, $10237, $10238, $10239, $10240, $10241, $10242, $10243, $10244, $10245, $10246, $10247, $10248, $10249, $10250, $10251, $10252, $10253, $10254, $10255, $10256, $10257, $10258, VersionRange($10259, $10260)), ($10261, $10262, $10263, $10264, $10265, $10266, $10267, $10268, $10269, $10270, $10271, $10272, $10273, $10274, $10275, $10276, $10277, $10278, $10279, $10280, $10281, $10282, $10283, $10284, $10285, $10286, $10287, $10288, VersionRange($10289, $10290)), ($10291, $10292, $10293, $10294, $10295, $10296, $10297, $10298, $10299, $10300, $10301, $10302, $10303, $10304, $10305, $10306, $10307, $10308, $10309, $10310, $10311, $10312, $10313, $10314, $10315, $10316, $10317, $10318, VersionRange($10319, $10320)), ($10321, $10322, $10323, $10324, $10325, $10326, $10327, $10328, $10329, $10330, $10331, $10332, $10333, $10334, $10335, $10336, $10337, $10338, $10339, $10340, $10341, $10342, $10343, $10344, $10345, $10346, $10347, $10348, VersionRange($10349, $10350)), ($10351, $10352, $10353, $10354, $10355, $10356, $10357, $10358, $10359, $10360, $10361, $10362, $10363, $10364, $10365, $10366, $10367, $10368, $10369, $10370, $10371, $10372, $10373, $10374, $10375, $10376, $10377, $10378, VersionRange($10379, $10380)), ($10381, $10382, $10383, $10384, $10385, $10386, $10387, $10388, $10389, $10390, $10391, $10392, $10393, $10394, $10395, $10396, $10397, $10398, $10399, $10400, $10401, $10402, $10403, $10404, $10405, $10406, $10407, $10408, VersionRange($10409, $10410)), ($10411, $10412, $10413, $10414, $10415, $10416, $10417, $10418, $10419, $10420, $10421, $10422, $10423, $10424, $10425, $10426, $10427, $10428, $10429, $10430, $10431, $10432, $10433, $10434, $10435, $10436, $10437, $10438, VersionRange($10439, $10440)), ($10441, $10442, $10443, $10444, $10445, $10446, $10447, $10448, $10449, $10450, $10451, $10452, $10453, $10454, $10455, $10456, $10457, $10458, $10459, $10460, $10461, $10462, $10463, $10464, $10465, $10466, $10467, $10468, VersionRange($10469, $10470)), ($10471, $10472, $10473, $10474, $10475, $10476, $10477, $10478, $10479, $10480, $10481, $10482, $10483, $10484, $10485, $10486, $10487, $10488, $10489, $10490, $10491, $10492, $10493, $10494, $10495, $10496, $10497, $10498, VersionRange($10499, $10500)), ($10501, $10502, $10503, $10504, $10505, $10506, $10507, $10508, $10509, $10510, $10511, $10512, $10513, $10514, $10515, $10516, $10517, $10518, $10519, $10520, $10521, $10522, $10523, $10524, $10525, $10526, $10527, $10528, VersionRange($10529, $10530)), ($10531, $10532, $10533, $10534, $10535, $10536, $10537, $10538, $10539, $10540, $10541, $10542, $10543, $10544, $10545, $10546, $10547, $10548, $10549, $10550, $10551, $10552, $10553, $10554, $10555, $10556, $10557, $10558, VersionRange($10559, $10560)), ($10561, $10562, $10563, $10564, $10565, $10566, $10567, $10568, $10569, $10570, $10571, $10572, $10573, $10574, $10575, $10576, $10577, $10578, $10579, $10580, $10581, $10582, $10583, $10584, $10585, $10586, $10587, $10588, VersionRange($10589, $10590)), ($10591, $10592, $10593, $10594, $10595, $10596, $10597, $10598, $10599, $10600, $10601, $10602, $10603, $10604, $10605, $10606, $10607, $10608, $10609, $10610, $10611, $10612, $10613, $10614, $10615, $10616, $10617, $10618, VersionRange($10619, $10620)), ($10621, $10622, $10623, $10624, $10625, $10626, $10627, $10628, $10629, $10630, $10631, $10632, $10633, $10634, $10635, $10636, $10637, $10638, $10639, $10640, $10641, $10642, $10643, $10644, $10645, $10646, $10647, $10648, VersionRange($10649, $10650)), ($10651, $10652, $10653, $10654, $10655, $10656, $10657, $10658, $10659, $10660, $10661, $10662, $10663, $10664, $10665, $10666, $10667, $10668, $10669, $10670, $10671, $10672, $10673, $10674, $10675, $10676, $10677, $10678, VersionRange($10679, $10680)), ($10681, $10682, $10683, $10684, $10685, $10686, $10687, $10688, $10689, $10690, $10691, $10692, $10693, $10694, $10695, $10696, $10697, $10698, $10699, $10700, $10701, $10702, $10703, $10704, $10705, $10706, $10707, $10708, VersionRange($10709, $10710)), ($10711, $10712, $10713, $10714, $10715, $10716, $10717, $10718, $10719, $10720, $10721, $10722, $10723, $10724, $10725, $10726, $10727, $10728, $10729, $10730, $10731, $10732, $10733, $10734, $10735, $10736, $10737, $10738, VersionRange($10739, $10740)), ($10741, $10742, $10743, $10744, $10745, $10746, $10747, $10748, $10749, $10750, $10751, $10752, $10753, $10754, $10755, $10756, $10757, $10758, $10759, $10760, $10761, $10762, $10763, $10764, $10765, $10766, $10767, $10768, VersionRange($10769, $10770)), ($10771, $10772, $10773, $10774, $10775, $10776, $10777, $10778, $10779, $10780, $10781, $10782, $10783, $10784, $10785, $10786, $10787, $10788, $10789, $10790, $10791, $10792, $10793, $10794, $10795, $10796, $10797, $10798, VersionRange($10799, $10800)), ($10801, $10802, $10803, $10804, $10805, $10806, $10807, $10808, $10809, $10810, $10811, $10812, $10813, $10814, $10815, $10816, $10817, $10818, $10819, $10820, $10821, $10822, $10823, $10824, $10825, $10826, $10827, $10828, VersionRange($10829, $10830)), ($10831, $10832, $10833, $10834, $10835, $10836, $10837, $10838, $10839, $10840, $10841, $10842, $10843, $10844, $10845, $10846, $10847, $10848, $10849, $10850, $10851, $10852, $10853, $10854, $10855, $10856, $10857, $10858, VersionRange($10859, $10860)), ($10861, $10862, $10863, $10864, $10865, $10866, $10867, $10868, $10869, $10870, $10871, $10872, $10873, $10874, $10875, $10876, $10877, $10878, $10879, $10880, $10881, $10882, $10883, $10884, $10885, $10886, $10887, $10888, VersionRange($10889, $10890)), ($10891, $10892, $10893, $10894, $10895, $10896, $10897, $10898, $10899, $10900, $10901, $10902, $10903, $10904, $10905, $10906, $10907, $10908, $10909, $10910, $10911, $10912, $10913, $10914, $10915, $10916, $10917, $10918, VersionRange($10919, $10920)), ($10921, $10922, $10923, $10924, $10925, $10926, $10927, $10928, $10929, $10930, $10931, $10932, $10933, $10934, $10935, $10936, $10937, $10938, $10939, $10940, $10941, $10942, $10943, $10944, $10945, $10946, $10947, $10948, VersionRange($10949, $10950)), ($10951, $10952, $10953, $10954, $10955, $10956, $10957, $10958, $10959, $10960, $10961, $10962, $10963, $10964, $10965, $10966, $10967, $10968, $10969, $10970, $10971, $10972, $10973, $10974, $10975, $10976, $10977, $10978, VersionRange($10979, $10980)), ($10981, $10982, $10983, $10984, $10985, $10986, $10987, $10988, $10989, $10990, $10991, $10992, $10993, $10994, $10995, $10996, $10997, $10998, $10999, $11000, $11001, $11002, $11003, $11004, $11005, $11006, $11007, $11008, VersionRange($11009, $11010)), ($11011, $11012, $11013, $11014, $11015, $11016, $11017, $11018, $11019, $11020, $11021, $11022, $11023, $11024, $11025, $11026, $11027, $11028, $11029, $11030, $11031, $11032, $11033, $11034, $11035, $11036, $11037, $11038, VersionRange($11039, $11040)), ($11041, $11042, $11043, $11044, $11045, $11046, $11047, $11048, $11049, $11050, $11051, $11052, $11053, $11054, $11055, $11056, $11057, $11058, $11059, $11060, $11061, $11062, $11063, $11064, $11065, $11066, $11067, $11068, VersionRange($11069, $11070)), ($11071, $11072, $11073, $11074, $11075, $11076, $11077, $11078, $11079, $11080, $11081, $11082, $11083, $11084, $11085, $11086, $11087, $11088, $11089, $11090, $11091, $11092, $11093, $11094, $11095, $11096, $11097, $11098, VersionRange($11099, $11100)), ($11101, $11102, $11103, $11104, $11105, $11106, $11107, $11108, $11109, $11110, $11111, $11112, $11113, $11114, $11115, $11116, $11117, $11118, $11119, $11120, $11121, $11122, $11123, $11124, $11125, $11126, $11127, $11128, VersionRange($11129, $11130)), ($11131, $11132, $11133, $11134, $11135, $11136, $11137, $11138, $11139, $11140, $11141, $11142, $11143, $11144, $11145, $11146, $11147, $11148, $11149, $11150, $11151, $11152, $11153, $11154, $11155, $11156, $11157, $11158, VersionRange($11159, $11160)), ($11161, $11162, $11163, $11164, $11165, $11166, $11167, $11168, $11169, $11170, $11171, $11172, $11173, $11174, $11175, $11176, $11177, $11178, $11179, $11180, $11181, $11182, $11183, $11184, $11185, $11186, $11187, $11188, VersionRange($11189, $11190)), ($11191, $11192, $11193, $11194, $11195, $11196, $11197, $11198, $11199, $11200, $11201, $11202, $11203, $11204, $11205, $11206, $11207, $11208, $11209, $11210, $11211, $11212, $11213, $11214, $11215, $11216, $11217, $11218, VersionRange($11219, $11220)), ($11221, $11222, $11223, $11224, $11225, $11226, $11227, $11228, $11229, $11230, $11231, $11232, $11233, $11234, $11235, $11236, $11237, $11238, $11239, $11240, $11241, $11242, $11243, $11244, $11245, $11246, $11247, $11248, VersionRange($11249, $11250)), ($11251, $11252, $11253, $11254, $11255, $11256, $11257, $11258, $11259, $11260, $11261, $11262, $11263, $11264, $11265, $11266, $11267, $11268, $11269, $11270, $11271, $11272, $11273, $11274, $11275, $11276, $11277, $11278, VersionRange($11279, $11280)), ($11281, $11282, $11283, $11284, $11285, $11286, $11287, $11288, $11289, $11290, $11291, $11292, $11293, $11294, $11295, $11296, $11297, $11298, $11299, $11300, $11301, $11302, $11303, $11304, $11305, $11306, $11307, $11308, VersionRange($11309, $11310)), ($11311, $11312, $11313, $11314, $11315, $11316, $11317, $11318, $11319, $11320, $11321, $11322, $11323, $11324, $11325, $11326, $11327, $11328, $11329, $11330, $11331, $11332, $11333, $11334, $11335, $11336, $11337, $11338, VersionRange($11339, $11340)), ($11341, $11342, $11343, $11344, $11345, $11346, $11347, $11348, $11349, $11350, $11351, $11352, $11353, $11354, $11355, $11356, $11357, $11358, $11359, $11360, $11361, $11362, $11363, $11364, $11365, $11366, $11367, $11368, VersionRange($11369, $11370)), ($11371, $11372, $11373, $11374, $11375, $11376, $11377, $11378, $11379, $11380, $11381, $11382, $11383, $11384, $11385, $11386, $11387, $11388, $11389, $11390, $11391, $11392, $11393, $11394, $11395, $11396, $11397, $11398, VersionRange($11399, $11400)), ($11401, $11402, $11403, $11404, $11405, $11406, $11407, $11408, $11409, $11410, $11411, $11412, $11413, $11414, $11415, $11416, $11417, $11418, $11419, $11420, $11421, $11422, $11423, $11424, $11425, $11426, $11427, $11428, VersionRange($11429, $11430)), ($11431, $11432, $11433, $11434, $11435, $11436, $11437, $11438, $11439, $11440, $11441, $11442, $11443, $11444, $11445, $11446, $11447, $11448, $11449, $11450, $11451, $11452, $11453, $11454, $11455, $11456, $11457, $11458, VersionRange($11459, $11460)), ($11461, $11462, $11463, $11464, $11465, $11466, $11467, $11468, $11469, $11470, $11471, $11472, $11473, $11474, $11475, $11476, $11477, $11478, $11479, $11480, $11481, $11482, $11483, $11484, $11485, $11486, $11487, $11488, VersionRange($11489, $11490)), ($11491, $11492, $11493, $11494, $11495, $11496, $11497, $11498, $11499, $11500, $11501, $11502, $11503, $11504, $11505, $11506, $11507, $11508, $11509, $11510, $11511, $11512, $11513, $11514, $11515, $11516, $11517, $11518, VersionRange($11519, $11520)), ($11521, $11522, $11523, $11524, $11525, $11526, $11527, $11528, $11529, $11530, $11531, $11532, $11533, $11534, $11535, $11536, $11537, $11538, $11539, $11540, $11541, $11542, $11543, $11544, $11545, $11546, $11547, $11548, VersionRange($11549, $11550)), ($11551, $11552, $11553, $11554, $11555, $11556, $11557, $11558, $11559, $11560, $11561, $11562, $11563, $11564, $11565, $11566, $11567, $11568, $11569, $11570, $11571, $11572, $11573, $11574, $11575, $11576, $11577, $11578, VersionRange($11579, $11580)), ($11581, $11582, $11583, $11584, $11585, $11586, $11587, $11588, $11589, $11590, $11591, $11592, $11593, $11594, $11595, $11596, $11597, $11598, $11599, $11600, $11601, $11602, $11603, $11604, $11605, $11606, $11607, $11608, VersionRange($11609, $11610)), ($11611, $11612, $11613, $11614, $11615, $11616, $11617, $11618, $11619, $11620, $11621, $11622, $11623, $11624, $11625, $11626, $11627, $11628, $11629, $11630, $11631, $11632, $11633, $11634, $11635, $11636, $11637, $11638, VersionRange($11639, $11640)), ($11641, $11642, $11643, $11644, $11645, $11646, $11647, $11648, $11649, $11650, $11651, $11652, $11653, $11654, $11655, $11656, $11657, $11658, $11659, $11660, $11661, $11662, $11663, $11664, $11665, $11666, $11667, $11668, VersionRange($11669, $11670)), ($11671, $11672, $11673, $11674, $11675, $11676, $11677, $11678, $11679, $11680, $11681, $11682, $11683, $11684, $11685, $11686, $11687, $11688, $11689, $11690, $11691, $11692, $11693, $11694, $11695, $11696, $11697, $11698, VersionRange($11699, $11700)), ($11701, $11702, $11703, $11704, $11705, $11706, $11707, $11708, $11709, $11710, $11711, $11712, $11713, $11714, $11715, $11716, $11717, $11718, $11719, $11720, $11721, $11722, $11723, $11724, $11725, $11726, $11727, $11728, VersionRange($11729, $11730)), ($11731, $11732, $11733, $11734, $11735, $11736, $11737, $11738, $11739, $11740, $11741, $11742, $11743, $11744, $11745, $11746, $11747, $11748, $11749, $11750, $11751, $11752, $11753, $11754, $11755, $11756, $11757, $11758, VersionRange($11759, $11760)), ($11761, $11762, $11763, $11764, $11765, $11766, $11767, $11768, $11769, $11770, $11771, $11772, $11773, $11774, $11775, $11776, $11777, $11778, $11779, $11780, $11781, $11782, $11783, $11784, $11785, $11786, $11787, $11788, VersionRange($11789, $11790)), ($11791, $11792, $11793, $11794, $11795, $11796, $11797, $11798, $11799, $11800, $11801, $11802, $11803, $11804, $11805, $11806, $11807, $11808, $11809, $11810, $11811, $11812, $11813, $11814, $11815, $11816, $11817, $11818, VersionRange($11819, $11820)), ($11821, $11822, $11823, $11824, $11825, $11826, $11827, $11828, $11829, $11830, $11831, $11832, $11833, $11834, $11835, $11836, $11837, $11838, $11839, $11840, $11841, $11842, $11843, $11844, $11845, $11846, $11847, $11848, VersionRange($11849, $11850)), ($11851, $11852, $11853, $11854, $11855, $11856, $11857, $11858, $11859, $11860, $11861, $11862, $11863, $11864, $11865, $11866, $11867, $11868, $11869, $11870, $11871, $11872, $11873, $11874, $11875, $11876, $11877, $11878, VersionRange($11879, $11880)), ($11881, $11882, $11883, $11884, $11885, $11886, $11887, $11888, $11889, $11890, $11891, $11892, $11893, $11894, $11895, $11896, $11897, $11898, $11899, $11900, $11901, $11902, $11903, $11904, $11905, $11906, $11907, $11908, VersionRange($11909, $11910)), ($11911, $11912, $11913, $11914, $11915, $11916, $11917, $11918, $11919, $11920, $11921, $11922, $11923, $11924, $11925, $11926, $11927, $11928, $11929, $11930, $11931, $11932, $11933, $11934, $11935, $11936, $11937, $11938, VersionRange($11939, $11940)), ($11941, $11942, $11943, $11944, $11945, $11946, $11947, $11948, $11949, $11950, $11951, $11952, $11953, $11954, $11955, $11956, $11957, $11958, $11959, $11960, $11961, $11962, $11963, $11964, $11965, $11966, $11967, $11968, VersionRange($11969, $11970)), ($11971, $11972, $11973, $11974, $11975, $11976, $11977, $11978, $11979, $11980, $11981, $11982, $11983, $11984, $11985, $11986, $11987, $11988, $11989, $11990, $11991, $11992, $11993, $11994, $11995, $11996, $11997, $11998, VersionRange($11999, $12000)), ($12001, $12002, $12003, $12004, $12005, $12006, $12007, $12008, $12009, $12010, $12011, $12012, $12013, $12014, $12015, $12016, $12017, $12018, $12019, $12020, $12021, $12022, $12023, $12024, $12025, $12026, $12027, $12028, VersionRange($12029, $12030)), ($12031, $12032, $12033, $12034, $12035, $12036, $12037, $12038, $12039, $12040, $12041, $12042, $12043, $12044, $12045, $12046, $12047, $12048, $12049, $12050, $12051, $12052, $12053, $12054, $12055, $12056, $12057, $12058, VersionRange($12059, $12060)), ($12061, $12062, $12063, $12064, $12065, $12066, $12067, $12068, $12069, $12070, $12071, $12072, $12073, $12074, $12075, $12076, $12077, $12078, $12079, $12080, $12081, $12082, $12083, $12084, $12085, $12086, $12087, $12088, VersionRange($12089, $12090)), ($12091, $12092, $12093, $12094, $12095, $12096, $12097, $12098, $12099, $12100, $12101, $12102, $12103, $12104, $12105, $12106, $12107, $12108, $12109, $12110, $12111, $12112, $12113, $12114, $12115, $12116, $12117, $12118, VersionRange($12119, $12120)), ($12121, $12122, $12123, $12124, $12125, $12126, $12127, $12128, $12129, $12130, $12131, $12132, $12133, $12134, $12135, $12136, $12137, $12138, $12139, $12140, $12141, $12142, $12143, $12144, $12145, $12146, $12147, $12148, VersionRange($12149, $12150)), ($12151, $12152, $12153, $12154, $12155, $12156, $12157, $12158, $12159, $12160, $12161, $12162, $12163, $12164, $12165, $12166, $12167, $12168, $12169, $12170, $12171, $12172, $12173, $12174, $12175, $12176, $12177, $12178, VersionRange($12179, $12180)), ($12181, $12182, $12183, $12184, $12185, $12186, $12187, $12188, $12189, $12190, $12191, $12192, $12193, $12194, $12195, $12196, $12197, $12198, $12199, $12200, $12201, $12202, $12203, $12204, $12205, $12206, $12207, $12208, VersionRange($12209, $12210)), ($12211, $12212, $12213, $12214, $12215, $12216, $12217, $12218, $12219, $12220, $12221, $12222, $12223, $12224, $12225, $12226, $12227, $12228, $12229, $12230, $12231, $12232, $12233, $12234, $12235, $12236, $12237, $12238, VersionRange($12239, $12240)), ($12241, $12242, $12243, $12244, $12245, $12246, $12247, $12248, $12249, $12250, $12251, $12252, $12253, $12254, $12255, $12256, $12257, $12258, $12259, $12260, $12261, $12262, $12263, $12264, $12265, $12266, $12267, $12268, VersionRange($12269, $12270)), ($12271, $12272, $12273, $12274, $12275, $12276, $12277, $12278, $12279, $12280, $12281, $12282, $12283, $12284, $12285, $12286, $12287, $12288, $12289, $12290, $12291, $12292, $12293, $12294, $12295, $12296, $12297, $12298, VersionRange($12299, $12300)), ($12301, $12302, $12303, $12304, $12305, $12306, $12307, $12308, $12309, $12310, $12311, $12312, $12313, $12314, $12315, $12316, $12317, $12318, $12319, $12320, $12321, $12322, $12323, $12324, $12325, $12326, $12327, $12328, VersionRange($12329, $12330)), ($12331, $12332, $12333, $12334, $12335, $12336, $12337, $12338, $12339, $12340, $12341, $12342, $12343, $12344, $12345, $12346, $12347, $12348, $12349, $12350, $12351, $12352, $12353, $12354, $12355, $12356, $12357, $12358, VersionRange($12359, $12360)), ($12361, $12362, $12363, $12364, $12365, $12366, $12367, $12368, $12369, $12370, $12371, $12372, $12373, $12374, $12375, $12376, $12377, $12378, $12379, $12380, $12381, $12382, $12383, $12384, $12385, $12386, $12387, $12388, VersionRange($12389, $12390)), ($12391, $12392, $12393, $12394, $12395, $12396, $12397, $12398, $12399, $12400, $12401, $12402, $12403, $12404, $12405, $12406, $12407, $12408, $12409, $12410, $12411, $12412, $12413, $12414, $12415, $12416, $12417, $12418, VersionRange($12419, $12420)), ($12421, $12422, $12423, $12424, $12425, $12426, $12427, $12428, $12429, $12430, $12431, $12432, $12433, $12434, $12435, $12436, $12437, $12438, $12439, $12440, $12441, $12442, $12443, $12444, $12445, $12446, $12447, $12448, VersionRange($12449, $12450)), ($12451, $12452, $12453, $12454, $12455, $12456, $12457, $12458, $12459, $12460, $12461, $12462, $12463, $12464, $12465, $12466, $12467, $12468, $12469, $12470, $12471, $12472, $12473, $12474, $12475, $12476, $12477, $12478, VersionRange($12479, $12480)), ($12481, $12482, $12483, $12484, $12485, $12486, $12487, $12488, $12489, $12490, $12491, $12492, $12493, $12494, $12495, $12496, $12497, $12498, $12499, $12500, $12501, $12502, $12503, $12504, $12505, $12506, $12507, $12508, VersionRange($12509, $12510)), ($12511, $12512, $12513, $12514, $12515, $12516, $12517, $12518, $12519, $12520, $12521, $12522, $12523, $12524, $12525, $12526, $12527, $12528, $12529, $12530, $12531, $12532, $12533, $12534, $12535, $12536, $12537, $12538, VersionRange($12539, $12540)), ($12541, $12542, $12543, $12544, $12545, $12546, $12547, $12548, $12549, $12550, $12551, $12552, $12553, $12554, $12555, $12556, $12557, $12558, $12559, $12560, $12561, $12562, $12563, $12564, $12565, $12566, $12567, $12568, VersionRange($12569, $12570)), ($12571, $12572, $12573, $12574, $12575, $12576, $12577, $12578, $12579, $12580, $12581, $12582, $12583, $12584, $12585, $12586, $12587, $12588, $12589, $12590, $12591, $12592, $12593, $12594, $12595, $12596, $12597, $12598, VersionRange($12599, $12600)), ($12601, $12602, $12603, $12604, $12605, $12606, $12607, $12608, $12609, $12610, $12611, $12612, $12613, $12614, $12615, $12616, $12617, $12618, $12619, $12620, $12621, $12622, $12623, $12624, $12625, $12626, $12627, $12628, VersionRange($12629, $12630)), ($12631, $12632, $12633, $12634, $12635, $12636, $12637, $12638, $12639, $12640, $12641, $12642, $12643, $12644, $12645, $12646, $12647, $12648, $12649, $12650, $12651, $12652, $12653, $12654, $12655, $12656, $12657, $12658, VersionRange($12659, $12660)), ($12661, $12662, $12663, $12664, $12665, $12666, $12667, $12668, $12669, $12670, $12671, $12672, $12673, $12674, $12675, $12676, $12677, $12678, $12679, $12680, $12681, $12682, $12683, $12684, $12685, $12686, $12687, $12688, VersionRange($12689, $12690)), ($12691, $12692, $12693, $12694, $12695, $12696, $12697, $12698, $12699, $12700, $12701, $12702, $12703, $12704, $12705, $12706, $12707, $12708, $12709, $12710, $12711, $12712, $12713, $12714, $12715, $12716, $12717, $12718, VersionRange($12719, $12720)), ($12721, $12722, $12723, $12724, $12725, $12726, $12727, $12728, $12729, $12730, $12731, $12732, $12733, $12734, $12735, $12736, $12737, $12738, $12739, $12740, $12741, $12742, $12743, $12744, $12745, $12746, $12747, $12748, VersionRange($12749, $12750)), ($12751, $12752, $12753, $12754, $12755, $12756, $12757, $12758, $12759, $12760, $12761, $12762, $12763, $12764, $12765, $12766, $12767, $12768, $12769, $12770, $12771, $12772, $12773, $12774, $12775, $12776, $12777, $12778, VersionRange($12779, $12780)), ($12781, $12782, $12783, $12784, $12785, $12786, $12787, $12788, $12789, $12790, $12791, $12792, $12793, $12794, $12795, $12796, $12797, $12798, $12799, $12800, $12801, $12802, $12803, $12804, $12805, $12806, $12807, $12808, VersionRange($12809, $12810)), ($12811, $12812, $12813, $12814, $12815, $12816, $12817, $12818, $12819, $12820, $12821, $12822, $12823, $12824, $12825, $12826, $12827, $12828, $12829, $12830, $12831, $12832, $12833, $12834, $12835, $12836, $12837, $12838, VersionRange($12839, $12840)), ($12841, $12842, $12843, $12844, $12845, $12846, $12847, $12848, $12849, $12850, $12851, $12852, $12853, $12854, $12855, $12856, $12857, $12858, $12859, $12860, $12861, $12862, $12863, $12864, $12865, $12866, $12867, $12868, VersionRange($12869, $12870)), ($12871, $12872, $12873, $12874, $12875, $12876, $12877, $12878, $12879, $12880, $12881, $12882, $12883, $12884, $12885, $12886, $12887, $12888, $12889, $12890, $12891, $12892, $12893, $12894, $12895, $12896, $12897, $12898, VersionRange($12899, $12900)), ($12901, $12902, $12903, $12904, $12905, $12906, $12907, $12908, $12909, $12910, $12911, $12912, $12913, $12914, $12915, $12916, $12917, $12918, $12919, $12920, $12921, $12922, $12923, $12924, $12925, $12926, $12927, $12928, VersionRange($12929, $12930)), ($12931, $12932, $12933, $12934, $12935, $12936, $12937, $12938, $12939, $12940, $12941, $12942, $12943, $12944, $12945, $12946, $12947, $12948, $12949, $12950, $12951, $12952, $12953, $12954, $12955, $12956, $12957, $12958, VersionRange($12959, $12960)), ($12961, $12962, $12963, $12964, $12965, $12966, $12967, $12968, $12969, $12970[...][ Date: 2023-07-04 18:40:11 ]
17 3s686ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30)), ($31, $32, $33, $34, $35, $36, $37, $38, $39, $40, $41, $42, $43, $44, $45, $46, $47, $48, $49, $50, $51, $52, $53, $54, $55, $56, $57, $58, VersionRange($59, $60)), ($61, $62, $63, $64, $65, $66, $67, $68, $69, $70, $71, $72, $73, $74, $75, $76, $77, $78, $79, $80, $81, $82, $83, $84, $85, $86, $87, $88, VersionRange($89, $90)), ($91, $92, $93, $94, $95, $96, $97, $98, $99, $100, $101, $102, $103, $104, $105, $106, $107, $108, $109, $110, $111, $112, $113, $114, $115, $116, $117, $118, VersionRange($119, $120)), ($121, $122, $123, $124, $125, $126, $127, $128, $129, $130, $131, $132, $133, $134, $135, $136, $137, $138, $139, $140, $141, $142, $143, $144, $145, $146, $147, $148, VersionRange($149, $150)), ($151, $152, $153, $154, $155, $156, $157, $158, $159, $160, $161, $162, $163, $164, $165, $166, $167, $168, $169, $170, $171, $172, $173, $174, $175, $176, $177, $178, VersionRange($179, $180)), ($181, $182, $183, $184, $185, $186, $187, $188, $189, $190, $191, $192, $193, $194, $195, $196, $197, $198, $199, $200, $201, $202, $203, $204, $205, $206, $207, $208, VersionRange($209, $210)), ($211, $212, $213, $214, $215, $216, $217, $218, $219, $220, $221, $222, $223, $224, $225, $226, $227, $228, $229, $230, $231, $232, $233, $234, $235, $236, $237, $238, VersionRange($239, $240)), ($241, $242, $243, $244, $245, $246, $247, $248, $249, $250, $251, $252, $253, $254, $255, $256, $257, $258, $259, $260, $261, $262, $263, $264, $265, $266, $267, $268, VersionRange($269, $270)), ($271, $272, $273, $274, $275, $276, $277, $278, $279, $280, $281, $282, $283, $284, $285, $286, $287, $288, $289, $290, $291, $292, $293, $294, $295, $296, $297, $298, VersionRange($299, $300)), ($301, $302, $303, $304, $305, $306, $307, $308, $309, $310, $311, $312, $313, $314, $315, $316, $317, $318, $319, $320, $321, $322, $323, $324, $325, $326, $327, $328, VersionRange($329, $330)), ($331, $332, $333, $334, $335, $336, $337, $338, $339, $340, $341, $342, $343, $344, $345, $346, $347, $348, $349, $350, $351, $352, $353, $354, $355, $356, $357, $358, VersionRange($359, $360)), ($361, $362, $363, $364, $365, $366, $367, $368, $369, $370, $371, $372, $373, $374, $375, $376, $377, $378, $379, $380, $381, $382, $383, $384, $385, $386, $387, $388, VersionRange($389, $390)), ($391, $392, $393, $394, $395, $396, $397, $398, $399, $400, $401, $402, $403, $404, $405, $406, $407, $408, $409, $410, $411, $412, $413, $414, $415, $416, $417, $418, VersionRange($419, $420)), ($421, $422, $423, $424, $425, $426, $427, $428, $429, $430, $431, $432, $433, $434, $435, $436, $437, $438, $439, $440, $441, $442, $443, $444, $445, $446, $447, $448, VersionRange($449, $450)), ($451, $452, $453, $454, $455, $456, $457, $458, $459, $460, $461, $462, $463, $464, $465, $466, $467, $468, $469, $470, $471, $472, $473, $474, $475, $476, $477, $478, VersionRange($479, $480)), ($481, $482, $483, $484, $485, $486, $487, $488, $489, $490, $491, $492, $493, $494, $495, $496, $497, $498, $499, $500, $501, $502, $503, $504, $505, $506, $507, $508, VersionRange($509, $510)), ($511, $512, $513, $514, $515, $516, $517, $518, $519, $520, $521, $522, $523, $524, $525, $526, $527, $528, $529, $530, $531, $532, $533, $534, $535, $536, $537, $538, VersionRange($539, $540)), ($541, $542, $543, $544, $545, $546, $547, $548, $549, $550, $551, $552, $553, $554, $555, $556, $557, $558, $559, $560, $561, $562, $563, $564, $565, $566, $567, $568, VersionRange($569, $570)), ($571, $572, $573, $574, $575, $576, $577, $578, $579, $580, $581, $582, $583, $584, $585, $586, $587, $588, $589, $590, $591, $592, $593, $594, $595, $596, $597, $598, VersionRange($599, $600)), ($601, $602, $603, $604, $605, $606, $607, $608, $609, $610, $611, $612, $613, $614, $615, $616, $617, $618, $619, $620, $621, $622, $623, $624, $625, $626, $627, $628, VersionRange($629, $630)), ($631, $632, $633, $634, $635, $636, $637, $638, $639, $640, $641, $642, $643, $644, $645, $646, $647, $648, $649, $650, $651, $652, $653, $654, $655, $656, $657, $658, VersionRange($659, $660)), ($661, $662, $663, $664, $665, $666, $667, $668, $669, $670, $671, $672, $673, $674, $675, $676, $677, $678, $679, $680, $681, $682, $683, $684, $685, $686, $687, $688, VersionRange($689, $690)), ($691, $692, $693, $694, $695, $696, $697, $698, $699, $700, $701, $702, $703, $704, $705, $706, $707, $708, $709, $710, $711, $712, $713, $714, $715, $716, $717, $718, VersionRange($719, $720)), ($721, $722, $723, $724, $725, $726, $727, $728, $729, $730, $731, $732, $733, $734, $735, $736, $737, $738, $739, $740, $741, $742, $743, $744, $745, $746, $747, $748, VersionRange($749, $750)), ($751, $752, $753, $754, $755, $756, $757, $758, $759, $760, $761, $762, $763, $764, $765, $766, $767, $768, $769, $770, $771, $772, $773, $774, $775, $776, $777, $778, VersionRange($779, $780)), ($781, $782, $783, $784, $785, $786, $787, $788, $789, $790, $791, $792, $793, $794, $795, $796, $797, $798, $799, $800, $801, $802, $803, $804, $805, $806, $807, $808, VersionRange($809, $810)), ($811, $812, $813, $814, $815, $816, $817, $818, $819, $820, $821, $822, $823, $824, $825, $826, $827, $828, $829, $830, $831, $832, $833, $834, $835, $836, $837, $838, VersionRange($839, $840)), ($841, $842, $843, $844, $845, $846, $847, $848, $849, $850, $851, $852, $853, $854, $855, $856, $857, $858, $859, $860, $861, $862, $863, $864, $865, $866, $867, $868, VersionRange($869, $870)), ($871, $872, $873, $874, $875, $876, $877, $878, $879, $880, $881, $882, $883, $884, $885, $886, $887, $888, $889, $890, $891, $892, $893, $894, $895, $896, $897, $898, VersionRange($899, $900)), ($901, $902, $903, $904, $905, $906, $907, $908, $909, $910, $911, $912, $913, $914, $915, $916, $917, $918, $919, $920, $921, $922, $923, $924, $925, $926, $927, $928, VersionRange($929, $930)), ($931, $932, $933, $934, $935, $936, $937, $938, $939, $940, $941, $942, $943, $944, $945, $946, $947, $948, $949, $950, $951, $952, $953, $954, $955, $956, $957, $958, VersionRange($959, $960)), ($961, $962, $963, $964, $965, $966, $967, $968, $969, $970, $971, $972, $973, $974, $975, $976, $977, $978, $979, $980, $981, $982, $983, $984, $985, $986, $987, $988, VersionRange($989, $990)), ($991, $992, $993, $994, $995, $996, $997, $998, $999, $1000, $1001, $1002, $1003, $1004, $1005, $1006, $1007, $1008, $1009, $1010, $1011, $1012, $1013, $1014, $1015, $1016, $1017, $1018, VersionRange($1019, $1020)), ($1021, $1022, $1023, $1024, $1025, $1026, $1027, $1028, $1029, $1030, $1031, $1032, $1033, $1034, $1035, $1036, $1037, $1038, $1039, $1040, $1041, $1042, $1043, $1044, $1045, $1046, $1047, $1048, VersionRange($1049, $1050)), ($1051, $1052, $1053, $1054, $1055, $1056, $1057, $1058, $1059, $1060, $1061, $1062, $1063, $1064, $1065, $1066, $1067, $1068, $1069, $1070, $1071, $1072, $1073, $1074, $1075, $1076, $1077, $1078, VersionRange($1079, $1080)), ($1081, $1082, $1083, $1084, $1085, $1086, $1087, $1088, $1089, $1090, $1091, $1092, $1093, $1094, $1095, $1096, $1097, $1098, $1099, $1100, $1101, $1102, $1103, $1104, $1105, $1106, $1107, $1108, VersionRange($1109, $1110)), ($1111, $1112, $1113, $1114, $1115, $1116, $1117, $1118, $1119, $1120, $1121, $1122, $1123, $1124, $1125, $1126, $1127, $1128, $1129, $1130, $1131, $1132, $1133, $1134, $1135, $1136, $1137, $1138, VersionRange($1139, $1140)), ($1141, $1142, $1143, $1144, $1145, $1146, $1147, $1148, $1149, $1150, $1151, $1152, $1153, $1154, $1155, $1156, $1157, $1158, $1159, $1160, $1161, $1162, $1163, $1164, $1165, $1166, $1167, $1168, VersionRange($1169, $1170)), ($1171, $1172, $1173, $1174, $1175, $1176, $1177, $1178, $1179, $1180, $1181, $1182, $1183, $1184, $1185, $1186, $1187, $1188, $1189, $1190, $1191, $1192, $1193, $1194, $1195, $1196, $1197, $1198, VersionRange($1199, $1200)), ($1201, $1202, $1203, $1204, $1205, $1206, $1207, $1208, $1209, $1210, $1211, $1212, $1213, $1214, $1215, $1216, $1217, $1218, $1219, $1220, $1221, $1222, $1223, $1224, $1225, $1226, $1227, $1228, VersionRange($1229, $1230)), ($1231, $1232, $1233, $1234, $1235, $1236, $1237, $1238, $1239, $1240, $1241, $1242, $1243, $1244, $1245, $1246, $1247, $1248, $1249, $1250, $1251, $1252, $1253, $1254, $1255, $1256, $1257, $1258, VersionRange($1259, $1260)), ($1261, $1262, $1263, $1264, $1265, $1266, $1267, $1268, $1269, $1270, $1271, $1272, $1273, $1274, $1275, $1276, $1277, $1278, $1279, $1280, $1281, $1282, $1283, $1284, $1285, $1286, $1287, $1288, VersionRange($1289, $1290)), ($1291, $1292, $1293, $1294, $1295, $1296, $1297, $1298, $1299, $1300, $1301, $1302, $1303, $1304, $1305, $1306, $1307, $1308, $1309, $1310, $1311, $1312, $1313, $1314, $1315, $1316, $1317, $1318, VersionRange($1319, $1320)), ($1321, $1322, $1323, $1324, $1325, $1326, $1327, $1328, $1329, $1330, $1331, $1332, $1333, $1334, $1335, $1336, $1337, $1338, $1339, $1340, $1341, $1342, $1343, $1344, $1345, $1346, $1347, $1348, VersionRange($1349, $1350)), ($1351, $1352, $1353, $1354, $1355, $1356, $1357, $1358, $1359, $1360, $1361, $1362, $1363, $1364, $1365, $1366, $1367, $1368, $1369, $1370, $1371, $1372, $1373, $1374, $1375, $1376, $1377, $1378, VersionRange($1379, $1380)), ($1381, $1382, $1383, $1384, $1385, $1386, $1387, $1388, $1389, $1390, $1391, $1392, $1393, $1394, $1395, $1396, $1397, $1398, $1399, $1400, $1401, $1402, $1403, $1404, $1405, $1406, $1407, $1408, VersionRange($1409, $1410)), ($1411, $1412, $1413, $1414, $1415, $1416, $1417, $1418, $1419, $1420, $1421, $1422, $1423, $1424, $1425, $1426, $1427, $1428, $1429, $1430, $1431, $1432, $1433, $1434, $1435, $1436, $1437, $1438, VersionRange($1439, $1440)), ($1441, $1442, $1443, $1444, $1445, $1446, $1447, $1448, $1449, $1450, $1451, $1452, $1453, $1454, $1455, $1456, $1457, $1458, $1459, $1460, $1461, $1462, $1463, $1464, $1465, $1466, $1467, $1468, VersionRange($1469, $1470)), ($1471, $1472, $1473, $1474, $1475, $1476, $1477, $1478, $1479, $1480, $1481, $1482, $1483, $1484, $1485, $1486, $1487, $1488, $1489, $1490, $1491, $1492, $1493, $1494, $1495, $1496, $1497, $1498, VersionRange($1499, $1500)), ($1501, $1502, $1503, $1504, $1505, $1506, $1507, $1508, $1509, $1510, $1511, $1512, $1513, $1514, $1515, $1516, $1517, $1518, $1519, $1520, $1521, $1522, $1523, $1524, $1525, $1526, $1527, $1528, VersionRange($1529, $1530)), ($1531, $1532, $1533, $1534, $1535, $1536, $1537, $1538, $1539, $1540, $1541, $1542, $1543, $1544, $1545, $1546, $1547, $1548, $1549, $1550, $1551, $1552, $1553, $1554, $1555, $1556, $1557, $1558, VersionRange($1559, $1560)), ($1561, $1562, $1563, $1564, $1565, $1566, $1567, $1568, $1569, $1570, $1571, $1572, $1573, $1574, $1575, $1576, $1577, $1578, $1579, $1580, $1581, $1582, $1583, $1584, $1585, $1586, $1587, $1588, VersionRange($1589, $1590)), ($1591, $1592, $1593, $1594, $1595, $1596, $1597, $1598, $1599, $1600, $1601, $1602, $1603, $1604, $1605, $1606, $1607, $1608, $1609, $1610, $1611, $1612, $1613, $1614, $1615, $1616, $1617, $1618, VersionRange($1619, $1620)), ($1621, $1622, $1623, $1624, $1625, $1626, $1627, $1628, $1629, $1630, $1631, $1632, $1633, $1634, $1635, $1636, $1637, $1638, $1639, $1640, $1641, $1642, $1643, $1644, $1645, $1646, $1647, $1648, VersionRange($1649, $1650)), ($1651, $1652, $1653, $1654, $1655, $1656, $1657, $1658, $1659, $1660, $1661, $1662, $1663, $1664, $1665, $1666, $1667, $1668, $1669, $1670, $1671, $1672, $1673, $1674, $1675, $1676, $1677, $1678, VersionRange($1679, $1680)), ($1681, $1682, $1683, $1684, $1685, $1686, $1687, $1688, $1689, $1690, $1691, $1692, $1693, $1694, $1695, $1696, $1697, $1698, $1699, $1700, $1701, $1702, $1703, $1704, $1705, $1706, $1707, $1708, VersionRange($1709, $1710)), ($1711, $1712, $1713, $1714, $1715, $1716, $1717, $1718, $1719, $1720, $1721, $1722, $1723, $1724, $1725, $1726, $1727, $1728, $1729, $1730, $1731, $1732, $1733, $1734, $1735, $1736, $1737, $1738, VersionRange($1739, $1740)), ($1741, $1742, $1743, $1744, $1745, $1746, $1747, $1748, $1749, $1750, $1751, $1752, $1753, $1754, $1755, $1756, $1757, $1758, $1759, $1760, $1761, $1762, $1763, $1764, $1765, $1766, $1767, $1768, VersionRange($1769, $1770)), ($1771, $1772, $1773, $1774, $1775, $1776, $1777, $1778, $1779, $1780, $1781, $1782, $1783, $1784, $1785, $1786, $1787, $1788, $1789, $1790, $1791, $1792, $1793, $1794, $1795, $1796, $1797, $1798, VersionRange($1799, $1800)), ($1801, $1802, $1803, $1804, $1805, $1806, $1807, $1808, $1809, $1810, $1811, $1812, $1813, $1814, $1815, $1816, $1817, $1818, $1819, $1820, $1821, $1822, $1823, $1824, $1825, $1826, $1827, $1828, VersionRange($1829, $1830)), ($1831, $1832, $1833, $1834, $1835, $1836, $1837, $1838, $1839, $1840, $1841, $1842, $1843, $1844, $1845, $1846, $1847, $1848, $1849, $1850, $1851, $1852, $1853, $1854, $1855, $1856, $1857, $1858, VersionRange($1859, $1860)), ($1861, $1862, $1863, $1864, $1865, $1866, $1867, $1868, $1869, $1870, $1871, $1872, $1873, $1874, $1875, $1876, $1877, $1878, $1879, $1880, $1881, $1882, $1883, $1884, $1885, $1886, $1887, $1888, VersionRange($1889, $1890)), ($1891, $1892, $1893, $1894, $1895, $1896, $1897, $1898, $1899, $1900, $1901, $1902, $1903, $1904, $1905, $1906, $1907, $1908, $1909, $1910, $1911, $1912, $1913, $1914, $1915, $1916, $1917, $1918, VersionRange($1919, $1920)), ($1921, $1922, $1923, $1924, $1925, $1926, $1927, $1928, $1929, $1930, $1931, $1932, $1933, $1934, $1935, $1936, $1937, $1938, $1939, $1940, $1941, $1942, $1943, $1944, $1945, $1946, $1947, $1948, VersionRange($1949, $1950)), ($1951, $1952, $1953, $1954, $1955, $1956, $1957, $1958, $1959, $1960, $1961, $1962, $1963, $1964, $1965, $1966, $1967, $1968, $1969, $1970, $1971, $1972, $1973, $1974, $1975, $1976, $1977, $1978, VersionRange($1979, $1980)), ($1981, $1982, $1983, $1984, $1985, $1986, $1987, $1988, $1989, $1990, $1991, $1992, $1993, $1994, $1995, $1996, $1997, $1998, $1999, $2000, $2001, $2002, $2003, $2004, $2005, $2006, $2007, $2008, VersionRange($2009, $2010)), ($2011, $2012, $2013, $2014, $2015, $2016, $2017, $2018, $2019, $2020, $2021, $2022, $2023, $2024, $2025, $2026, $2027, $2028, $2029, $2030, $2031, $2032, $2033, $2034, $2035, $2036, $2037, $2038, VersionRange($2039, $2040)), ($2041, $2042, $2043, $2044, $2045, $2046, $2047, $2048, $2049, $2050, $2051, $2052, $2053, $2054, $2055, $2056, $2057, $2058, $2059, $2060, $2061, $2062, $2063, $2064, $2065, $2066, $2067, $2068, VersionRange($2069, $2070)), ($2071, $2072, $2073, $2074, $2075, $2076, $2077, $2078, $2079, $2080, $2081, $2082, $2083, $2084, $2085, $2086, $2087, $2088, $2089, $2090, $2091, $2092, $2093, $2094, $2095, $2096, $2097, $2098, VersionRange($2099, $2100)), ($2101, $2102, $2103, $2104, $2105, $2106, $2107, $2108, $2109, $2110, $2111, $2112, $2113, $2114, $2115, $2116, $2117, $2118, $2119, $2120, $2121, $2122, $2123, $2124, $2125, $2126, $2127, $2128, VersionRange($2129, $2130)), ($2131, $2132, $2133, $2134, $2135, $2136, $2137, $2138, $2139, $2140, $2141, $2142, $2143, $2144, $2145, $2146, $2147, $2148, $2149, $2150, $2151, $2152, $2153, $2154, $2155, $2156, $2157, $2158, VersionRange($2159, $2160)), ($2161, $2162, $2163, $2164, $2165, $2166, $2167, $2168, $2169, $2170, $2171, $2172, $2173, $2174, $2175, $2176, $2177, $2178, $2179, $2180, $2181, $2182, $2183, $2184, $2185, $2186, $2187, $2188, VersionRange($2189, $2190)), ($2191, $2192, $2193, $2194, $2195, $2196, $2197, $2198, $2199, $2200, $2201, $2202, $2203, $2204, $2205, $2206, $2207, $2208, $2209, $2210, $2211, $2212, $2213, $2214, $2215, $2216, $2217, $2218, VersionRange($2219, $2220)), ($2221, $2222, $2223, $2224, $2225, $2226, $2227, $2228, $2229, $2230, $2231, $2232, $2233, $2234, $2235, $2236, $2237, $2238, $2239, $2240, $2241, $2242, $2243, $2244, $2245, $2246, $2247, $2248, VersionRange($2249, $2250)), ($2251, $2252, $2253, $2254, $2255, $2256, $2257, $2258, $2259, $2260, $2261, $2262, $2263, $2264, $2265, $2266, $2267, $2268, $2269, $2270, $2271, $2272, $2273, $2274, $2275, $2276, $2277, $2278, VersionRange($2279, $2280)), ($2281, $2282, $2283, $2284, $2285, $2286, $2287, $2288, $2289, $2290, $2291, $2292, $2293, $2294, $2295, $2296, $2297, $2298, $2299, $2300, $2301, $2302, $2303, $2304, $2305, $2306, $2307, $2308, VersionRange($2309, $2310)), ($2311, $2312, $2313, $2314, $2315, $2316, $2317, $2318, $2319, $2320, $2321, $2322, $2323, $2324, $2325, $2326, $2327, $2328, $2329, $2330, $2331, $2332, $2333, $2334, $2335, $2336, $2337, $2338, VersionRange($2339, $2340)), ($2341, $2342, $2343, $2344, $2345, $2346, $2347, $2348, $2349, $2350, $2351, $2352, $2353, $2354, $2355, $2356, $2357, $2358, $2359, $2360, $2361, $2362, $2363, $2364, $2365, $2366, $2367, $2368, VersionRange($2369, $2370)), ($2371, $2372, $2373, $2374, $2375, $2376, $2377, $2378, $2379, $2380, $2381, $2382, $2383, $2384, $2385, $2386, $2387, $2388, $2389, $2390, $2391, $2392, $2393, $2394, $2395, $2396, $2397, $2398, VersionRange($2399, $2400)), ($2401, $2402, $2403, $2404, $2405, $2406, $2407, $2408, $2409, $2410, $2411, $2412, $2413, $2414, $2415, $2416, $2417, $2418, $2419, $2420, $2421, $2422, $2423, $2424, $2425, $2426, $2427, $2428, VersionRange($2429, $2430)), ($2431, $2432, $2433, $2434, $2435, $2436, $2437, $2438, $2439, $2440, $2441, $2442, $2443, $2444, $2445, $2446, $2447, $2448, $2449, $2450, $2451, $2452, $2453, $2454, $2455, $2456, $2457, $2458, VersionRange($2459, $2460)), ($2461, $2462, $2463, $2464, $2465, $2466, $2467, $2468, $2469, $2470, $2471, $2472, $2473, $2474, $2475, $2476, $2477, $2478, $2479, $2480, $2481, $2482, $2483, $2484, $2485, $2486, $2487, $2488, VersionRange($2489, $2490)), ($2491, $2492, $2493, $2494, $2495, $2496, $2497, $2498, $2499, $2500, $2501, $2502, $2503, $2504, $2505, $2506, $2507, $2508, $2509, $2510, $2511, $2512, $2513, $2514, $2515, $2516, $2517, $2518, VersionRange($2519, $2520)), ($2521, $2522, $2523, $2524, $2525, $2526, $2527, $2528, $2529, $2530, $2531, $2532, $2533, $2534, $2535, $2536, $2537, $2538, $2539, $2540, $2541, $2542, $2543, $2544, $2545, $2546, $2547, $2548, VersionRange($2549, $2550)), ($2551, $2552, $2553, $2554, $2555, $2556, $2557, $2558, $2559, $2560, $2561, $2562, $2563, $2564, $2565, $2566, $2567, $2568, $2569, $2570, $2571, $2572, $2573, $2574, $2575, $2576, $2577, $2578, VersionRange($2579, $2580)), ($2581, $2582, $2583, $2584, $2585, $2586, $2587, $2588, $2589, $2590, $2591, $2592, $2593, $2594, $2595, $2596, $2597, $2598, $2599, $2600, $2601, $2602, $2603, $2604, $2605, $2606, $2607, $2608, VersionRange($2609, $2610)), ($2611, $2612, $2613, $2614, $2615, $2616, $2617, $2618, $2619, $2620, $2621, $2622, $2623, $2624, $2625, $2626, $2627, $2628, $2629, $2630, $2631, $2632, $2633, $2634, $2635, $2636, $2637, $2638, VersionRange($2639, $2640)), ($2641, $2642, $2643, $2644, $2645, $2646, $2647, $2648, $2649, $2650, $2651, $2652, $2653, $2654, $2655, $2656, $2657, $2658, $2659, $2660, $2661, $2662, $2663, $2664, $2665, $2666, $2667, $2668, VersionRange($2669, $2670)), ($2671, $2672, $2673, $2674, $2675, $2676, $2677, $2678, $2679, $2680, $2681, $2682, $2683, $2684, $2685, $2686, $2687, $2688, $2689, $2690, $2691, $2692, $2693, $2694, $2695, $2696, $2697, $2698, VersionRange($2699, $2700)), ($2701, $2702, $2703, $2704, $2705, $2706, $2707, $2708, $2709, $2710, $2711, $2712, $2713, $2714, $2715, $2716, $2717, $2718, $2719, $2720, $2721, $2722, $2723, $2724, $2725, $2726, $2727, $2728, VersionRange($2729, $2730)), ($2731, $2732, $2733, $2734, $2735, $2736, $2737, $2738, $2739, $2740, $2741, $2742, $2743, $2744, $2745, $2746, $2747, $2748, $2749, $2750, $2751, $2752, $2753, $2754, $2755, $2756, $2757, $2758, VersionRange($2759, $2760)), ($2761, $2762, $2763, $2764, $2765, $2766, $2767, $2768, $2769, $2770, $2771, $2772, $2773, $2774, $2775, $2776, $2777, $2778, $2779, $2780, $2781, $2782, $2783, $2784, $2785, $2786, $2787, $2788, VersionRange($2789, $2790)), ($2791, $2792, $2793, $2794, $2795, $2796, $2797, $2798, $2799, $2800, $2801, $2802, $2803, $2804, $2805, $2806, $2807, $2808, $2809, $2810, $2811, $2812, $2813, $2814, $2815, $2816, $2817, $2818, VersionRange($2819, $2820)), ($2821, $2822, $2823, $2824, $2825, $2826, $2827, $2828, $2829, $2830, $2831, $2832, $2833, $2834, $2835, $2836, $2837, $2838, $2839, $2840, $2841, $2842, $2843, $2844, $2845, $2846, $2847, $2848, VersionRange($2849, $2850)), ($2851, $2852, $2853, $2854, $2855, $2856, $2857, $2858, $2859, $2860, $2861, $2862, $2863, $2864, $2865, $2866, $2867, $2868, $2869, $2870, $2871, $2872, $2873, $2874, $2875, $2876, $2877, $2878, VersionRange($2879, $2880)), ($2881, $2882, $2883, $2884, $2885, $2886, $2887, $2888, $2889, $2890, $2891, $2892, $2893, $2894, $2895, $2896, $2897, $2898, $2899, $2900, $2901, $2902, $2903, $2904, $2905, $2906, $2907, $2908, VersionRange($2909, $2910)), ($2911, $2912, $2913, $2914, $2915, $2916, $2917, $2918, $2919, $2920, $2921, $2922, $2923, $2924, $2925, $2926, $2927, $2928, $2929, $2930, $2931, $2932, $2933, $2934, $2935, $2936, $2937, $2938, VersionRange($2939, $2940)), ($2941, $2942, $2943, $2944, $2945, $2946, $2947, $2948, $2949, $2950, $2951, $2952, $2953, $2954, $2955, $2956, $2957, $2958, $2959, $2960, $2961, $2962, $2963, $2964, $2965, $2966, $2967, $2968, VersionRange($2969, $2970)), ($2971, $2972, $2973, $2974, $2975, $2976, $2977, $2978, $2979, $2980, $2981, $2982, $2983, $2984, $2985, $2986, $2987, $2988, $2989, $2990, $2991, $2992, $2993, $2994, $2995, $2996, $2997, $2998, VersionRange($2999, $3000)), ($3001, $3002, $3003, $3004, $3005, $3006, $3007, $3008, $3009, $3010, $3011, $3012, $3013, $3014, $3015, $3016, $3017, $3018, $3019, $3020, $3021, $3022, $3023, $3024, $3025, $3026, $3027, $3028, VersionRange($3029, $3030)), ($3031, $3032, $3033, $3034, $3035, $3036, $3037, $3038, $3039, $3040, $3041, $3042, $3043, $3044, $3045, $3046, $3047, $3048, $3049, $3050, $3051, $3052, $3053, $3054, $3055, $3056, $3057, $3058, VersionRange($3059, $3060)), ($3061, $3062, $3063, $3064, $3065, $3066, $3067, $3068, $3069, $3070, $3071, $3072, $3073, $3074, $3075, $3076, $3077, $3078, $3079, $3080, $3081, $3082, $3083, $3084, $3085, $3086, $3087, $3088, VersionRange($3089, $3090)), ($3091, $3092, $3093, $3094, $3095, $3096, $3097, $3098, $3099, $3100, $3101, $3102, $3103, $3104, $3105, $3106, $3107, $3108, $3109, $3110, $3111, $3112, $3113, $3114, $3115, $3116, $3117, $3118, VersionRange($3119, $3120)), ($3121, $3122, $3123, $3124, $3125, $3126, $3127, $3128, $3129, $3130, $3131, $3132, $3133, $3134, $3135, $3136, $3137, $3138, $3139, $3140, $3141, $3142, $3143, $3144, $3145, $3146, $3147, $3148, VersionRange($3149, $3150)), ($3151, $3152, $3153, $3154, $3155, $3156, $3157, $3158, $3159, $3160, $3161, $3162, $3163, $3164, $3165, $3166, $3167, $3168, $3169, $3170, $3171, $3172, $3173, $3174, $3175, $3176, $3177, $3178, VersionRange($3179, $3180)), ($3181, $3182, $3183, $3184, $3185, $3186, $3187, $3188, $3189, $3190, $3191, $3192, $3193, $3194, $3195, $3196, $3197, $3198, $3199, $3200, $3201, $3202, $3203, $3204, $3205, $3206, $3207, $3208, VersionRange($3209, $3210)), ($3211, $3212, $3213, $3214, $3215, $3216, $3217, $3218, $3219, $3220, $3221, $3222, $3223, $3224, $3225, $3226, $3227, $3228, $3229, $3230, $3231, $3232, $3233, $3234, $3235, $3236, $3237, $3238, VersionRange($3239, $3240)), ($3241, $3242, $3243, $3244, $3245, $3246, $3247, $3248, $3249, $3250, $3251, $3252, $3253, $3254, $3255, $3256, $3257, $3258, $3259, $3260, $3261, $3262, $3263, $3264, $3265, $3266, $3267, $3268, VersionRange($3269, $3270)), ($3271, $3272, $3273, $3274, $3275, $3276, $3277, $3278, $3279, $3280, $3281, $3282, $3283, $3284, $3285, $3286, $3287, $3288, $3289, $3290, $3291, $3292, $3293, $3294, $3295, $3296, $3297, $3298, VersionRange($3299, $3300)), ($3301, $3302, $3303, $3304, $3305, $3306, $3307, $3308, $3309, $3310, $3311, $3312, $3313, $3314, $3315, $3316, $3317, $3318, $3319, $3320, $3321, $3322, $3323, $3324, $3325, $3326, $3327, $3328, VersionRange($3329, $3330)), ($3331, $3332, $3333, $3334, $3335, $3336, $3337, $3338, $3339, $3340, $3341, $3342, $3343, $3344, $3345, $3346, $3347, $3348, $3349, $3350, $3351, $3352, $3353, $3354, $3355, $3356, $3357, $3358, VersionRange($3359, $3360)), ($3361, $3362, $3363, $3364, $3365, $3366, $3367, $3368, $3369, $3370, $3371, $3372, $3373, $3374, $3375, $3376, $3377, $3378, $3379, $3380, $3381, $3382, $3383, $3384, $3385, $3386, $3387, $3388, VersionRange($3389, $3390)), ($3391, $3392, $3393, $3394, $3395, $3396, $3397, $3398, $3399, $3400, $3401, $3402, $3403, $3404, $3405, $3406, $3407, $3408, $3409, $3410, $3411, $3412, $3413, $3414, $3415, $3416, $3417, $3418, VersionRange($3419, $3420)), ($3421, $3422, $3423, $3424, $3425, $3426, $3427, $3428, $3429, $3430, $3431, $3432, $3433, $3434, $3435, $3436, $3437, $3438, $3439, $3440, $3441, $3442, $3443, $3444, $3445, $3446, $3447, $3448, VersionRange($3449, $3450)), ($3451, $3452, $3453, $3454, $3455, $3456, $3457, $3458, $3459, $3460, $3461, $3462, $3463, $3464, $3465, $3466, $3467, $3468, $3469, $3470, $3471, $3472, $3473, $3474, $3475, $3476, $3477, $3478, VersionRange($3479, $3480)), ($3481, $3482, $3483, $3484, $3485, $3486, $3487, $3488, $3489, $3490, $3491, $3492, $3493, $3494, $3495, $3496, $3497, $3498, $3499, $3500, $3501, $3502, $3503, $3504, $3505, $3506, $3507, $3508, VersionRange($3509, $3510)), ($3511, $3512, $3513, $3514, $3515, $3516, $3517, $3518, $3519, $3520, $3521, $3522, $3523, $3524, $3525, $3526, $3527, $3528, $3529, $3530, $3531, $3532, $3533, $3534, $3535, $3536, $3537, $3538, VersionRange($3539, $3540)), ($3541, $3542, $3543, $3544, $3545, $3546, $3547, $3548, $3549, $3550, $3551, $3552, $3553, $3554, $3555, $3556, $3557, $3558, $3559, $3560, $3561, $3562, $3563, $3564, $3565, $3566, $3567, $3568, VersionRange($3569, $3570)), ($3571, $3572, $3573, $3574, $3575, $3576, $3577, $3578, $3579, $3580, $3581, $3582, $3583, $3584, $3585, $3586, $3587, $3588, $3589, $3590, $3591, $3592, $3593, $3594, $3595, $3596, $3597, $3598, VersionRange($3599, $3600)), ($3601, $3602, $3603, $3604, $3605, $3606, $3607, $3608, $3609, $3610, $3611, $3612, $3613, $3614, $3615, $3616, $3617, $3618, $3619, $3620, $3621, $3622, $3623, $3624, $3625, $3626, $3627, $3628, VersionRange($3629, $3630)), ($3631, $3632, $3633, $3634, $3635, $3636, $3637, $3638, $3639, $3640, $3641, $3642, $3643, $3644, $3645, $3646, $3647, $3648, $3649, $3650, $3651, $3652, $3653, $3654, $3655, $3656, $3657, $3658, VersionRange($3659, $3660)), ($3661, $3662, $3663, $3664, $3665, $3666, $3667, $3668, $3669, $3670, $3671, $3672, $3673, $3674, $3675, $3676, $3677, $3678, $3679, $3680, $3681, $3682, $3683, $3684, $3685, $3686, $3687, $3688, VersionRange($3689, $3690)), ($3691, $3692, $3693, $3694, $3695, $3696, $3697, $3698, $3699, $3700, $3701, $3702, $3703, $3704, $3705, $3706, $3707, $3708, $3709, $3710, $3711, $3712, $3713, $3714, $3715, $3716, $3717, $3718, VersionRange($3719, $3720)), ($3721, $3722, $3723, $3724, $3725, $3726, $3727, $3728, $3729, $3730, $3731, $3732, $3733, $3734, $3735, $3736, $3737, $3738, $3739, $3740, $3741, $3742, $3743, $3744, $3745, $3746, $3747, $3748, VersionRange($3749, $3750)), ($3751, $3752, $3753, $3754, $3755, $3756, $3757, $3758, $3759, $3760, $3761, $3762, $3763, $3764, $3765, $3766, $3767, $3768, $3769, $3770, $3771, $3772, $3773, $3774, $3775, $3776, $3777, $3778, VersionRange($3779, $3780)), ($3781, $3782, $3783, $3784, $3785, $3786, $3787, $3788, $3789, $3790, $3791, $3792, $3793, $3794, $3795, $3796, $3797, $3798, $3799, $3800, $3801, $3802, $3803, $3804, $3805, $3806, $3807, $3808, VersionRange($3809, $3810)), ($3811, $3812, $3813, $3814, $3815, $3816, $3817, $3818, $3819, $3820, $3821, $3822, $3823, $3824, $3825, $3826, $3827, $3828, $3829, $3830, $3831, $3832, $3833, $3834, $3835, $3836, $3837, $3838, VersionRange($3839, $3840)), ($3841, $3842, $3843, $3844, $3845, $3846, $3847, $3848, $3849, $3850, $3851, $3852, $3853, $3854, $3855, $3856, $3857, $3858, $3859, $3860, $3861, $3862, $3863, $3864, $3865, $3866, $3867, $3868, VersionRange($3869, $3870)), ($3871, $3872, $3873, $3874, $3875, $3876, $3877, $3878, $3879, $3880, $3881, $3882, $3883, $3884, $3885, $3886, $3887, $3888, $3889, $3890, $3891, $3892, $3893, $3894, $3895, $3896, $3897, $3898, VersionRange($3899, $3900)), ($3901, $3902, $3903, $3904, $3905, $3906, $3907, $3908, $3909, $3910, $3911, $3912, $3913, $3914, $3915, $3916, $3917, $3918, $3919, $3920, $3921, $3922, $3923, $3924, $3925, $3926, $3927, $3928, VersionRange($3929, $3930)), ($3931, $3932, $3933, $3934, $3935, $3936, $3937, $3938, $3939, $3940, $3941, $3942, $3943, $3944, $3945, $3946, $3947, $3948, $3949, $3950, $3951, $3952, $3953, $3954, $3955, $3956, $3957, $3958, VersionRange($3959, $3960)), ($3961, $3962, $3963, $3964, $3965, $3966, $3967, $3968, $3969, $3970, $3971, $3972, $3973, $3974, $3975, $3976, $3977, $3978, $3979, $3980, $3981, $3982, $3983, $3984, $3985, $3986, $3987, $3988, VersionRange($3989, $3990)), ($3991, $3992, $3993, $3994, $3995, $3996, $3997, $3998, $3999, $4000, $4001, $4002, $4003, $4004, $4005, $4006, $4007, $4008, $4009, $4010, $4011, $4012, $4013, $4014, $4015, $4016, $4017, $4018, VersionRange($4019, $4020)), ($4021, $4022, $4023, $4024, $4025, $4026, $4027, $4028, $4029, $4030, $4031, $4032, $4033, $4034, $4035, $4036, $4037, $4038, $4039, $4040, $4041, $4042, $4043, $4044, $4045, $4046, $4047, $4048, VersionRange($4049, $4050)), ($4051, $4052, $4053, $4054, $4055, $4056, $4057, $4058, $4059, $4060, $4061, $4062, $4063, $4064, $4065, $4066, $4067, $4068, $4069, $4070, $4071, $4072, $4073, $4074, $4075, $4076, $4077, $4078, VersionRange($4079, $4080)), ($4081, $4082, $4083, $4084, $4085, $4086, $4087, $4088, $4089, $4090, $4091, $4092, $4093, $4094, $4095, $4096, $4097, $4098, $4099, $4100, $4101, $4102, $4103, $4104, $4105, $4106, $4107, $4108, VersionRange($4109, $4110)), ($4111, $4112, $4113, $4114, $4115, $4116, $4117, $4118, $4119, $4120, $4121, $4122, $4123, $4124, $4125, $4126, $4127, $4128, $4129, $4130, $4131, $4132, $4133, $4134, $4135, $4136, $4137, $4138, VersionRange($4139, $4140)), ($4141, $4142, $4143, $4144, $4145, $4146, $4147, $4148, $4149, $4150, $4151, $4152, $4153, $4154, $4155, $4156, $4157, $4158, $4159, $4160, $4161, $4162, $4163, $4164, $4165, $4166, $4167, $4168, VersionRange($4169, $4170)), ($4171, $4172, $4173, $4174, $4175, $4176, $4177, $4178, $4179, $4180, $4181, $4182, $4183, $4184, $4185, $4186, $4187, $4188, $4189, $4190, $4191, $4192, $4193, $4194, $4195, $4196, $4197, $4198, VersionRange($4199, $4200)), ($4201, $4202, $4203, $4204, $4205, $4206, $4207, $4208, $4209, $4210, $4211, $4212, $4213, $4214, $4215, $4216, $4217, $4218, $4219, $4220, $4221, $4222, $4223, $4224, $4225, $4226, $4227, $4228, VersionRange($4229, $4230)), ($4231, $4232, $4233, $4234, $4235, $4236, $4237, $4238, $4239, $4240, $4241, $4242, $4243, $4244, $4245, $4246, $4247, $4248, $4249, $4250, $4251, $4252, $4253, $4254, $4255, $4256, $4257, $4258, VersionRange($4259, $4260)), ($4261, $4262, $4263, $4264, $4265, $4266, $4267, $4268, $4269, $4270, $4271, $4272, $4273, $4274, $4275, $4276, $4277, $4278, $4279, $4280, $4281, $4282, $4283, $4284, $4285, $4286, $4287, $4288, VersionRange($4289, $4290)), ($4291, $4292, $4293, $4294, $4295, $4296, $4297, $4298, $4299, $4300, $4301, $4302, $4303, $4304, $4305, $4306, $4307, $4308, $4309, $4310, $4311, $4312, $4313, $4314, $4315, $4316, $4317, $4318, VersionRange($4319, $4320)), ($4321, $4322, $4323, $4324, $4325, $4326, $4327, $4328, $4329, $4330, $4331, $4332, $4333, $4334, $4335, $4336, $4337, $4338, $4339, $4340, $4341, $4342, $4343, $4344, $4345, $4346, $4347, $4348, VersionRange($4349, $4350)), ($4351, $4352, $4353, $4354, $4355, $4356, $4357, $4358, $4359, $4360, $4361, $4362, $4363, $4364, $4365, $4366, $4367, $4368, $4369, $4370, $4371, $4372, $4373, $4374, $4375, $4376, $4377, $4378, VersionRange($4379, $4380)), ($4381, $4382, $4383, $4384, $4385, $4386, $4387, $4388, $4389, $4390, $4391, $4392, $4393, $4394, $4395, $4396, $4397, $4398, $4399, $4400, $4401, $4402, $4403, $4404, $4405, $4406, $4407, $4408, VersionRange($4409, $4410)), ($4411, $4412, $4413, $4414, $4415, $4416, $4417, $4418, $4419, $4420, $4421, $4422, $4423, $4424, $4425, $4426, $4427, $4428, $4429, $4430, $4431, $4432, $4433, $4434, $4435, $4436, $4437, $4438, VersionRange($4439, $4440)), ($4441, $4442, $4443, $4444, $4445, $4446, $4447, $4448, $4449, $4450, $4451, $4452, $4453, $4454, $4455, $4456, $4457, $4458, $4459, $4460, $4461, $4462, $4463, $4464, $4465, $4466, $4467, $4468, VersionRange($4469, $4470)), ($4471, $4472, $4473, $4474, $4475, $4476, $4477, $4478, $4479, $4480, $4481, $4482, $4483, $4484, $4485, $4486, $4487, $4488, $4489, $4490, $4491, $4492, $4493, $4494, $4495, $4496, $4497, $4498, VersionRange($4499, $4500)), ($4501, $4502, $4503, $4504, $4505, $4506, $4507, $4508, $4509, $4510, $4511, $4512, $4513, $4514, $4515, $4516, $4517, $4518, $4519, $4520, $4521, $4522, $4523, $4524, $4525, $4526, $4527, $4528, VersionRange($4529, $4530)), ($4531, $4532, $4533, $4534, $4535, $4536, $4537, $4538, $4539, $4540, $4541, $4542, $4543, $4544, $4545, $4546, $4547, $4548, $4549, $4550, $4551, $4552, $4553, $4554, $4555, $4556, $4557, $4558, VersionRange($4559, $4560)), ($4561, $4562, $4563, $4564, $4565, $4566, $4567, $4568, $4569, $4570, $4571, $4572, $4573, $4574, $4575, $4576, $4577, $4578, $4579, $4580, $4581, $4582, $4583, $4584, $4585, $4586, $4587, $4588, VersionRange($4589, $4590)), ($4591, $4592, $4593, $4594, $4595, $4596, $4597, $4598, $4599, $4600, $4601, $4602, $4603, $4604, $4605, $4606, $4607, $4608, $4609, $4610, $4611, $4612, $4613, $4614, $4615, $4616, $4617, $4618, VersionRange($4619, $4620)), ($4621, $4622, $4623, $4624, $4625, $4626, $4627, $4628, $4629, $4630, $4631, $4632, $4633, $4634, $4635, $4636, $4637, $4638, $4639, $4640, $4641, $4642, $4643, $4644, $4645, $4646, $4647, $4648, VersionRange($4649, $4650)), ($4651, $4652, $4653, $4654, $4655, $4656, $4657, $4658, $4659, $4660, $4661, $4662, $4663, $4664, $4665, $4666, $4667, $4668, $4669, $4670, $4671, $4672, $4673, $4674, $4675, $4676, $4677, $4678, VersionRange($4679, $4680)), ($4681, $4682, $4683, $4684, $4685, $4686, $4687, $4688, $4689, $4690, $4691, $4692, $4693, $4694, $4695, $4696, $4697, $4698, $4699, $4700, $4701, $4702, $4703, $4704, $4705, $4706, $4707, $4708, VersionRange($4709, $4710)), ($4711, $4712, $4713, $4714, $4715, $4716, $4717, $4718, $4719, $4720, $4721, $4722, $4723, $4724, $4725, $4726, $4727, $4728, $4729, $4730, $4731, $4732, $4733, $4734, $4735, $4736, $4737, $4738, VersionRange($4739, $4740)), ($4741, $4742, $4743, $4744, $4745, $4746, $4747, $4748, $4749, $4750, $4751, $4752, $4753, $4754, $4755, $4756, $4757, $4758, $4759, $4760, $4761, $4762, $4763, $4764, $4765, $4766, $4767, $4768, VersionRange($4769, $4770)), ($4771, $4772, $4773, $4774, $4775, $4776, $4777, $4778, $4779, $4780, $4781, $4782, $4783, $4784, $4785, $4786, $4787, $4788, $4789, $4790, $4791, $4792, $4793, $4794, $4795, $4796, $4797, $4798, VersionRange($4799, $4800)), ($4801, $4802, $4803, $4804, $4805, $4806, $4807, $4808, $4809, $4810, $4811, $4812, $4813, $4814, $4815, $4816, $4817, $4818, $4819, $4820, $4821, $4822, $4823, $4824, $4825, $4826, $4827, $4828, VersionRange($4829, $4830)), ($4831, $4832, $4833, $4834, $4835, $4836, $4837, $4838, $4839, $4840, $4841, $4842, $4843, $4844, $4845, $4846, $4847, $4848, $4849, $4850, $4851, $4852, $4853, $4854, $4855, $4856, $4857, $4858, VersionRange($4859, $4860)), ($4861, $4862, $4863, $4864, $4865, $4866, $4867, $4868, $4869, $4870, $4871, $4872, $4873, $4874, $4875, $4876, $4877, $4878, $4879, $4880, $4881, $4882, $4883, $4884, $4885, $4886, $4887, $4888, VersionRange($4889, $4890)), ($4891, $4892, $4893, $4894, $4895, $4896, $4897, $4898, $4899, $4900, $4901, $4902, $4903, $4904, $4905, $4906, $4907, $4908, $4909, $4910, $4911, $4912, $4913, $4914, $4915, $4916, $4917, $4918, VersionRange($4919, $4920)), ($4921, $4922, $4923, $4924, $4925, $4926, $4927, $4928, $4929, $4930, $4931, $4932, $4933, $4934, $4935, $4936, $4937, $4938, $4939, $4940, $4941, $4942, $4943, $4944, $4945, $4946, $4947, $4948, VersionRange($4949, $4950)), ($4951, $4952, $4953, $4954, $4955, $4956, $4957, $4958, $4959, $4960, $4961, $4962, $4963, $4964, $4965, $4966, $4967, $4968, $4969, $4970, $4971, $4972, $4973, $4974, $4975, $4976, $4977, $4978, VersionRange($4979, $4980)), ($4981, $4982, $4983, $4984, $4985, $4986, $4987, $4988, $4989, $4990, $4991, $4992, $4993, $4994, $4995, $4996, $4997, $4998, $4999, $5000, $5001, $5002, $5003, $5004, $5005, $5006, $5007, $5008, VersionRange($5009, $5010)), ($5011, $5012, $5013, $5014, $5015, $5016, $5017, $5018, $5019, $5020, $5021, $5022, $5023, $5024, $5025, $5026, $5027, $5028, $5029, $5030, $5031, $5032, $5033, $5034, $5035, $5036, $5037, $5038, VersionRange($5039, $5040)), ($5041, $5042, $5043, $5044, $5045, $5046, $5047, $5048, $5049, $5050, $5051, $5052, $5053, $5054, $5055, $5056, $5057, $5058, $5059, $5060, $5061, $5062, $5063, $5064, $5065, $5066, $5067, $5068, VersionRange($5069, $5070)), ($5071, $5072, $5073, $5074, $5075, $5076, $5077, $5078, $5079, $5080, $5081, $5082, $5083, $5084, $5085, $5086, $5087, $5088, $5089, $5090, $5091, $5092, $5093, $5094, $5095, $5096, $5097, $5098, VersionRange($5099, $5100)), ($5101, $5102, $5103, $5104, $5105, $5106, $5107, $5108, $5109, $5110, $5111, $5112, $5113, $5114, $5115, $5116, $5117, $5118, $5119, $5120, $5121, $5122, $5123, $5124, $5125, $5126, $5127, $5128, VersionRange($5129, $5130)), ($5131, $5132, $5133, $5134, $5135, $5136, $5137, $5138, $5139, $5140, $5141, $5142, $5143, $5144, $5145, $5146, $5147, $5148, $5149, $5150, $5151, $5152, $5153, $5154, $5155, $5156, $5157, $5158, VersionRange($5159, $5160)), ($5161, $5162, $5163, $5164, $5165, $5166, $5167, $5168, $5169, $5170, $5171, $5172, $5173, $5174, $5175, $5176, $5177, $5178, $5179, $5180, $5181, $5182, $5183, $5184, $5185, $5186, $5187, $5188, VersionRange($5189, $5190)), ($5191, $5192, $5193, $5194, $5195, $5196, $5197, $5198, $5199, $5200, $5201, $5202, $5203, $5204, $5205, $5206, $5207, $5208, $5209, $5210, $5211, $5212, $5213, $5214, $5215, $5216, $5217, $5218, VersionRange($5219, $5220)), ($5221, $5222, $5223, $5224, $5225, $5226, $5227, $5228, $5229, $5230, $5231, $5232, $5233, $5234, $5235, $5236, $5237, $5238, $5239, $5240, $5241, $5242, $5243, $5244, $5245, $5246, $5247, $5248, VersionRange($5249, $5250)), ($5251, $5252, $5253, $5254, $5255, $5256, $5257, $5258, $5259, $5260, $5261, $5262, $5263, $5264, $5265, $5266, $5267, $5268, $5269, $5270, $5271, $5272, $5273, $5274, $5275, $5276, $5277, $5278, VersionRange($5279, $5280)), ($5281, $5282, $5283, $5284, $5285, $5286, $5287, $5288, $5289, $5290, $5291, $5292, $5293, $5294, $5295, $5296, $5297, $5298, $5299, $5300, $5301, $5302, $5303, $5304, $5305, $5306, $5307, $5308, VersionRange($5309, $5310)), ($5311, $5312, $5313, $5314, $5315, $5316, $5317, $5318, $5319, $5320, $5321, $5322, $5323, $5324, $5325, $5326, $5327, $5328, $5329, $5330, $5331, $5332, $5333, $5334, $5335, $5336, $5337, $5338, VersionRange($5339, $5340)), ($5341, $5342, $5343, $5344, $5345, $5346, $5347, $5348, $5349, $5350, $5351, $5352, $5353, $5354, $5355, $5356, $5357, $5358, $5359, $5360, $5361, $5362, $5363, $5364, $5365, $5366, $5367, $5368, VersionRange($5369, $5370)), ($5371, $5372, $5373, $5374, $5375, $5376, $5377, $5378, $5379, $5380, $5381, $5382, $5383, $5384, $5385, $5386, $5387, $5388, $5389, $5390, $5391, $5392, $5393, $5394, $5395, $5396, $5397, $5398, VersionRange($5399, $5400)), ($5401, $5402, $5403, $5404, $5405, $5406, $5407, $5408, $5409, $5410, $5411, $5412, $5413, $5414, $5415, $5416, $5417, $5418, $5419, $5420, $5421, $5422, $5423, $5424, $5425, $5426, $5427, $5428, VersionRange($5429, $5430)), ($5431, $5432, $5433, $5434, $5435, $5436, $5437, $5438, $5439, $5440, $5441, $5442, $5443, $5444, $5445, $5446, $5447, $5448, $5449, $5450, $5451, $5452, $5453, $5454, $5455, $5456, $5457, $5458, VersionRange($5459, $5460)), ($5461, $5462, $5463, $5464, $5465, $5466, $5467, $5468, $5469, $5470, $5471, $5472, $5473, $5474, $5475, $5476, $5477, $5478, $5479, $5480, $5481, $5482, $5483, $5484, $5485, $5486, $5487, $5488, VersionRange($5489, $5490)), ($5491, $5492, $5493, $5494, $5495, $5496, $5497, $5498, $5499, $5500, $5501, $5502, $5503, $5504, $5505, $5506, $5507, $5508, $5509, $5510, $5511, $5512, $5513, $5514, $5515, $5516, $5517, $5518, VersionRange($5519, $5520)), ($5521, $5522, $5523, $5524, $5525, $5526, $5527, $5528, $5529, $5530, $5531, $5532, $5533, $5534, $5535, $5536, $5537, $5538, $5539, $5540, $5541, $5542, $5543, $5544, $5545, $5546, $5547, $5548, VersionRange($5549, $5550)), ($5551, $5552, $5553, $5554, $5555, $5556, $5557, $5558, $5559, $5560, $5561, $5562, $5563, $5564, $5565, $5566, $5567, $5568, $5569, $5570, $5571, $5572, $5573, $5574, $5575, $5576, $5577, $5578, VersionRange($5579, $5580)), ($5581, $5582, $5583, $5584, $5585, $5586, $5587, $5588, $5589, $5590, $5591, $5592, $5593, $5594, $5595, $5596, $5597, $5598, $5599, $5600, $5601, $5602, $5603, $5604, $5605, $5606, $5607, $5608, VersionRange($5609, $5610)), ($5611, $5612, $5613, $5614, $5615, $5616, $5617, $5618, $5619, $5620, $5621, $5622, $5623, $5624, $5625, $5626, $5627, $5628, $5629, $5630, $5631, $5632, $5633, $5634, $5635, $5636, $5637, $5638, VersionRange($5639, $5640)), ($5641, $5642, $5643, $5644, $5645, $5646, $5647, $5648, $5649, $5650, $5651, $5652, $5653, $5654, $5655, $5656, $5657, $5658, $5659, $5660, $5661, $5662, $5663, $5664, $5665, $5666, $5667, $5668, VersionRange($5669, $5670)), ($5671, $5672, $5673, $5674, $5675, $5676, $5677, $5678, $5679, $5680, $5681, $5682, $5683, $5684, $5685, $5686, $5687, $5688, $5689, $5690, $5691, $5692, $5693, $5694, $5695, $5696, $5697, $5698, VersionRange($5699, $5700)), ($5701, $5702, $5703, $5704, $5705, $5706, $5707, $5708, $5709, $5710, $5711, $5712, $5713, $5714, $5715, $5716, $5717, $5718, $5719, $5720, $5721, $5722, $5723, $5724, $5725, $5726, $5727, $5728, VersionRange($5729, $5730)), ($5731, $5732, $5733, $5734, $5735, $5736, $5737, $5738, $5739, $5740, $5741, $5742, $5743, $5744, $5745, $5746, $5747, $5748, $5749, $5750, $5751, $5752, $5753, $5754, $5755, $5756, $5757, $5758, VersionRange($5759, $5760)), ($5761, $5762, $5763, $5764, $5765, $5766, $5767, $5768, $5769, $5770, $5771, $5772, $5773, $5774, $5775, $5776, $5777, $5778, $5779, $5780, $5781, $5782, $5783, $5784, $5785, $5786, $5787, $5788, VersionRange($5789, $5790)), ($5791, $5792, $5793, $5794, $5795, $5796, $5797, $5798, $5799, $5800, $5801, $5802, $5803, $5804, $5805, $5806, $5807, $5808, $5809, $5810, $5811, $5812, $5813, $5814, $5815, $5816, $5817, $5818, VersionRange($5819, $5820)), ($5821, $5822, $5823, $5824, $5825, $5826, $5827, $5828, $5829, $5830, $5831, $5832, $5833, $5834, $5835, $5836, $5837, $5838, $5839, $5840, $5841, $5842, $5843, $5844, $5845, $5846, $5847, $5848, VersionRange($5849, $5850)), ($5851, $5852, $5853, $5854, $5855, $5856, $5857, $5858, $5859, $5860, $5861, $5862, $5863, $5864, $5865, $5866, $5867, $5868, $5869, $5870, $5871, $5872, $5873, $5874, $5875, $5876, $5877, $5878, VersionRange($5879, $5880)), ($5881, $5882, $5883, $5884, $5885, $5886, $5887, $5888, $5889, $5890, $5891, $5892, $5893, $5894, $5895, $5896, $5897, $5898, $5899, $5900, $5901, $5902, $5903, $5904, $5905, $5906, $5907, $5908, VersionRange($5909, $5910)), ($5911, $5912, $5913, $5914, $5915, $5916, $5917, $5918, $5919, $5920, $5921, $5922, $5923, $5924, $5925, $5926, $5927, $5928, $5929, $5930, $5931, $5932, $5933, $5934, $5935, $5936, $5937, $5938, VersionRange($5939, $5940)), ($5941, $5942, $5943, $5944, $5945, $5946, $5947, $5948, $5949, $5950, $5951, $5952, $5953, $5954, $5955, $5956, $5957, $5958, $5959, $5960, $5961, $5962, $5963, $5964, $5965, $5966, $5967, $5968, VersionRange($5969, $5970)), ($5971, $5972, $5973, $5974, $5975, $5976, $5977, $5978, $5979, $5980, $5981, $5982, $5983, $5984, $5985, $5986, $5987, $5988, $5989, $5990, $5991, $5992, $5993, $5994, $5995, $5996, $5997, $5998, VersionRange($5999, $6000)), ($6001, $6002, $6003, $6004, $6005, $6006, $6007, $6008, $6009, $6010, $6011, $6012, $6013, $6014, $6015, $6016, $6017, $6018, $6019, $6020, $6021, $6022, $6023, $6024, $6025, $6026, $6027, $6028, VersionRange($6029, $6030)), ($6031, $6032, $6033, $6034, $6035, $6036, $6037, $6038, $6039, $6040, $6041, $6042, $6043, $6044, $6045, $6046, $6047, $6048, $6049, $6050, $6051, $6052, $6053, $6054, $6055, $6056, $6057, $6058, VersionRange($6059, $6060)), ($6061, $6062, $6063, $6064, $6065, $6066, $6067, $6068, $6069, $6070, $6071, $6072, $6073, $6074, $6075, $6076, $6077, $6078, $6079, $6080, $6081, $6082, $6083, $6084, $6085, $6086, $6087, $6088, VersionRange($6089, $6090)), ($6091, $6092, $6093, $6094, $6095, $6096, $6097, $6098, $6099, $6100, $6101, $6102, $6103, $6104, $6105, $6106, $6107, $6108, $6109, $6110, $6111, $6112, $6113, $6114, $6115, $6116, $6117, $6118, VersionRange($6119, $6120)), ($6121, $6122, $6123, $6124, $6125, $6126, $6127, $6128, $6129, $6130, $6131, $6132, $6133, $6134, $6135, $6136, $6137, $6138, $6139, $6140, $6141, $6142, $6143, $6144, $6145, $6146, $6147, $6148, VersionRange($6149, $6150)), ($6151, $6152, $6153, $6154, $6155, $6156, $6157, $6158, $6159, $6160, $6161, $6162, $6163, $6164, $6165, $6166, $6167, $6168, $6169, $6170, $6171, $6172, $6173, $6174, $6175, $6176, $6177, $6178, VersionRange($6179, $6180)), ($6181, $6182, $6183, $6184, $6185, $6186, $6187, $6188, $6189, $6190, $6191, $6192, $6193, $6194, $6195, $6196, $6197, $6198, $6199, $6200, $6201, $6202, $6203, $6204, $6205, $6206, $6207, $6208, VersionRange($6209, $6210)), ($6211, $6212, $6213, $6214, $6215, $6216, $6217, $6218, $6219, $6220, $6221, $6222, $6223, $6224, $6225, $6226, $6227, $6228, $6229, $6230, $6231, $6232, $6233, $6234, $6235, $6236, $6237, $6238, VersionRange($6239, $6240)), ($6241, $6242, $6243, $6244, $6245, $6246, $6247, $6248, $6249, $6250, $6251, $6252, $6253, $6254, $6255, $6256, $6257, $6258, $6259, $6260, $6261, $6262, $6263, $6264, $6265, $6266, $6267, $6268, VersionRange($6269, $6270)), ($6271, $6272, $6273, $6274, $6275, $6276, $6277, $6278, $6279, $6280, $6281, $6282, $6283, $6284, $6285, $6286, $6287, $6288, $6289, $6290, $6291, $6292, $6293, $6294, $6295, $6296, $6297, $6298, VersionRange($6299, $6300)), ($6301, $6302, $6303, $6304, $6305, $6306, $6307, $6308, $6309, $6310, $6311, $6312, $6313, $6314, $6315, $6316, $6317, $6318, $6319, $6320, $6321, $6322, $6323, $6324, $6325, $6326, $6327, $6328, VersionRange($6329, $6330)), ($6331, $6332, $6333, $6334, $6335, $6336, $6337, $6338, $6339, $6340, $6341, $6342, $6343, $6344, $6345, $6346, $6347, $6348, $6349, $6350, $6351, $6352, $6353, $6354, $6355, $6356, $6357, $6358, VersionRange($6359, $6360)), ($6361, $6362, $6363, $6364, $6365, $6366, $6367, $6368, $6369, $6370, $6371, $6372, $6373, $6374, $6375, $6376, $6377, $6378, $6379, $6380, $6381, $6382, $6383, $6384, $6385, $6386, $6387, $6388, VersionRange($6389, $6390)), ($6391, $6392, $6393, $6394, $6395, $6396, $6397, $6398, $6399, $6400, $6401, $6402, $6403, $6404, $6405, $6406, $6407, $6408, $6409, $6410, $6411, $6412, $6413, $6414, $6415, $6416, $6417, $6418, VersionRange($6419, $6420)), ($6421, $6422, $6423, $6424, $6425, $6426, $6427, $6428, $6429, $6430, $6431, $6432, $6433, $6434, $6435, $6436, $6437, $6438, $6439, $6440, $6441, $6442, $6443, $6444, $6445, $6446, $6447, $6448, VersionRange($6449, $6450)), ($6451, $6452, $6453, $6454, $6455, $6456, $6457, $6458, $6459, $6460, $6461, $6462, $6463, $6464, $6465, $6466, $6467, $6468, $6469, $6470, $6471, $6472, $6473, $6474, $6475, $6476, $6477, $6478, VersionRange($6479, $6480)), ($6481, $6482, $6483, $6484, $6485, $6486, $6487, $6488, $6489, $6490, $6491, $6492, $6493, $6494, $6495, $6496, $6497, $6498, $6499, $6500, $6501, $6502, $6503, $6504, $6505, $6506, $6507, $6508, VersionRange($6509, $6510)), ($6511, $6512, $6513, $6514, $6515, $6516, $6517, $6518, $6519, $6520, $6521, $6522, $6523, $6524, $6525, $6526, $6527, $6528, $6529, $6530, $6531, $6532, $6533, $6534, $6535, $6536, $6537, $6538, VersionRange($6539, $6540)), ($6541, $6542, $6543, $6544, $6545, $6546, $6547, $6548, $6549, $6550, $6551, $6552, $6553, $6554, $6555, $6556, $6557, $6558, $6559, $6560, $6561, $6562, $6563, $6564, $6565, $6566, $6567, $6568, VersionRange($6569, $6570)), ($6571, $6572, $6573, $6574, $6575, $6576, $6577, $6578, $6579, $6580, $6581, $6582, $6583, $6584, $6585, $6586, $6587, $6588, $6589, $6590, $6591, $6592, $6593, $6594, $6595, $6596, $6597, $6598, VersionRange($6599, $6600)), ($6601, $6602, $6603, $6604, $6605, $6606, $6607, $6608, $6609, $6610, $6611, $6612, $6613, $6614, $6615, $6616, $6617, $6618, $6619, $6620, $6621, $6622, $6623, $6624, $6625, $6626, $6627, $6628, VersionRange($6629, $6630)), ($6631, $6632, $6633, $6634, $6635, $6636, $6637, $6638, $6639, $6640, $6641, $6642, $6643, $6644, $6645, $6646, $6647, $6648, $6649, $6650, $6651, $6652, $6653, $6654, $6655, $6656, $6657, $6658, VersionRange($6659, $6660)), ($6661, $6662, $6663, $6664, $6665, $6666, $6667, $6668, $6669, $6670, $6671, $6672, $6673, $6674, $6675, $6676, $6677, $6678, $6679, $6680, $6681, $6682, $6683, $6684, $6685, $6686, $6687, $6688, VersionRange($6689, $6690)), ($6691, $6692, $6693, $6694, $6695, $6696, $6697, $6698, $6699, $6700, $6701, $6702, $6703, $6704, $6705, $6706, $6707, $6708, $6709, $6710, $6711, $6712, $6713, $6714, $6715, $6716, $6717, $6718, VersionRange($6719, $6720)), ($6721, $6722, $6723, $6724, $6725, $6726, $6727, $6728, $6729, $6730, $6731, $6732, $6733, $6734, $6735, $6736, $6737, $6738, $6739, $6740, $6741, $6742, $6743, $6744, $6745, $6746, $6747, $6748, VersionRange($6749, $6750)), ($6751, $6752, $6753, $6754, $6755, $6756, $6757, $6758, $6759, $6760, $6761, $6762, $6763, $6764, $6765, $6766, $6767, $6768, $6769, $6770, $6771, $6772, $6773, $6774, $6775, $6776, $6777, $6778, VersionRange($6779, $6780)), ($6781, $6782, $6783, $6784, $6785, $6786, $6787, $6788, $6789, $6790, $6791, $6792, $6793, $6794, $6795, $6796, $6797, $6798, $6799, $6800, $6801, $6802, $6803, $6804, $6805, $6806, $6807, $6808, VersionRange($6809, $6810)), ($6811, $6812, $6813, $6814, $6815, $6816, $6817, $6818, $6819, $6820, $6821, $6822, $6823, $6824, $6825, $6826, $6827, $6828, $6829, $6830, $6831, $6832, $6833, $6834, $6835, $6836, $6837, $6838, VersionRange($6839, $6840)), ($6841, $6842, $6843, $6844, $6845, $6846, $6847, $6848, $6849, $6850, $6851, $6852, $6853, $6854, $6855, $6856, $6857, $6858, $6859, $6860, $6861, $6862, $6863, $6864, $6865, $6866, $6867, $6868, VersionRange($6869, $6870)), ($6871, $6872, $6873, $6874, $6875, $6876, $6877, $6878, $6879, $6880, $6881, $6882, $6883, $6884, $6885, $6886, $6887, $6888, $6889, $6890, $6891, $6892, $6893, $6894, $6895, $6896, $6897, $6898, VersionRange($6899, $6900)), ($6901, $6902, $6903, $6904, $6905, $6906, $6907, $6908, $6909, $6910, $6911, $6912, $6913, $6914, $6915, $6916, $6917, $6918, $6919, $6920, $6921, $6922, $6923, $6924, $6925, $6926, $6927, $6928, VersionRange($6929, $6930)), ($6931, $6932, $6933, $6934, $6935, $6936, $6937, $6938, $6939, $6940, $6941, $6942, $6943, $6944, $6945, $6946, $6947, $6948, $6949, $6950, $6951, $6952, $6953, $6954, $6955, $6956, $6957, $6958, VersionRange($6959, $6960)), ($6961, $6962, $6963, $6964, $6965, $6966, $6967, $6968, $6969, $6970, $6971, $6972, $6973, $6974, $6975, $6976, $6977, $6978, $6979, $6980, $6981, $6982, $6983, $6984, $6985, $6986, $6987, $6988, VersionRange($6989, $6990)), ($6991, $6992, $6993, $6994, $6995, $6996, $6997, $6998, $6999, $7000, $7001, $7002, $7003, $7004, $7005, $7006, $7007, $7008, $7009, $7010, $7011, $7012, $7013, $7014, $7015, $7016, $7017, $7018, VersionRange($7019, $7020)), ($7021, $7022, $7023, $7024, $7025, $7026, $7027, $7028, $7029, $7030, $7031, $7032, $7033, $7034, $7035, $7036, $7037, $7038, $7039, $7040, $7041, $7042, $7043, $7044, $7045, $7046, $7047, $7048, VersionRange($7049, $7050)), ($7051, $7052, $7053, $7054, $7055, $7056, $7057, $7058, $7059, $7060, $7061, $7062, $7063, $7064, $7065, $7066, $7067, $7068, $7069, $7070, $7071, $7072, $7073, $7074, $7075, $7076, $7077, $7078, VersionRange($7079, $7080)), ($7081, $7082, $7083, $7084, $7085, $7086, $7087, $7088, $7089, $7090, $7091, $7092, $7093, $7094, $7095, $7096, $7097, $7098, $7099, $7100, $7101, $7102, $7103, $7104, $7105, $7106, $7107, $7108, VersionRange($7109, $7110)), ($7111, $7112, $7113, $7114, $7115, $7116, $7117, $7118, $7119, $7120, $7121, $7122, $7123, $7124, $7125, $7126, $7127, $7128, $7129, $7130, $7131, $7132, $7133, $7134, $7135, $7136, $7137, $7138, VersionRange($7139, $7140)), ($7141, $7142, $7143, $7144, $7145, $7146, $7147, $7148, $7149, $7150, $7151, $7152, $7153, $7154, $7155, $7156, $7157, $7158, $7159, $7160, $7161, $7162, $7163, $7164, $7165, $7166, $7167, $7168, VersionRange($7169, $7170)), ($7171, $7172, $7173, $7174, $7175, $7176, $7177, $7178, $7179, $7180, $7181, $7182, $7183, $7184, $7185, $7186, $7187, $7188, $7189, $7190, $7191, $7192, $7193, $7194, $7195, $7196, $7197, $7198, VersionRange($7199, $7200)), ($7201, $7202, $7203, $7204, $7205, $7206, $7207, $7208, $7209, $7210, $7211, $7212, $7213, $7214, $7215, $7216, $7217, $7218, $7219, $7220, $7221, $7222, $7223, $7224, $7225, $7226, $7227, $7228, VersionRange($7229, $7230)), ($7231, $7232, $7233, $7234, $7235, $7236, $7237, $7238, $7239, $7240, $7241, $7242, $7243, $7244, $7245, $7246, $7247, $7248, $7249, $7250, $7251, $7252, $7253, $7254, $7255, $7256, $7257, $7258, VersionRange($7259, $7260)), ($7261, $7262, $7263, $7264, $7265, $7266, $7267, $7268, $7269, $7270, $7271, $7272, $7273, $7274, $7275, $7276, $7277, $7278, $7279, $7280, $7281, $7282, $7283, $7284, $7285, $7286, $7287, $7288, VersionRange($7289, $7290)), ($7291, $7292, $7293, $7294, $7295, $7296, $7297, $7298, $7299, $7300, $7301, $7302, $7303, $7304, $7305, $7306, $7307, $7308, $7309, $7310, $7311, $7312, $7313, $7314, $7315, $7316, $7317, $7318, VersionRange($7319, $7320)), ($7321, $7322, $7323, $7324, $7325, $7326, $7327, $7328, $7329, $7330, $7331, $7332, $7333, $7334, $7335, $7336, $7337, $7338, $7339, $7340, $7341, $7342, $7343, $7344, $7345, $7346, $7347, $7348, VersionRange($7349, $7350)), ($7351, $7352, $7353, $7354, $7355, $7356, $7357, $7358, $7359, $7360, $7361, $7362, $7363, $7364, $7365, $7366, $7367, $7368, $7369, $7370, $7371, $7372, $7373, $7374, $7375, $7376, $7377, $7378, VersionRange($7379, $7380)), ($7381, $7382, $7383, $7384, $7385, $7386, $7387, $7388, $7389, $7390, $7391, $7392, $7393, $7394, $7395, $7396, $7397, $7398, $7399, $7400, $7401, $7402, $7403, $7404, $7405, $7406, $7407, $7408, VersionRange($7409, $7410)), ($7411, $7412, $7413, $7414, $7415, $7416, $7417, $7418, $7419, $7420, $7421, $7422, $7423, $7424, $7425, $7426, $7427, $7428, $7429, $7430, $7431, $7432, $7433, $7434, $7435, $7436, $7437, $7438, VersionRange($7439, $7440)), ($7441, $7442, $7443, $7444, $7445, $7446, $7447, $7448, $7449, $7450, $7451, $7452, $7453, $7454, $7455, $7456, $7457, $7458, $7459, $7460, $7461, $7462, $7463, $7464, $7465, $7466, $7467, $7468, VersionRange($7469, $7470)), ($7471, $7472, $7473, $7474, $7475, $7476, $7477, $7478, $7479, $7480, $7481, $7482, $7483, $7484, $7485, $7486, $7487, $7488, $7489, $7490, $7491, $7492, $7493, $7494, $7495, $7496, $7497, $7498, VersionRange($7499, $7500)), ($7501, $7502, $7503, $7504, $7505, $7506, $7507, $7508, $7509, $7510, $7511, $7512, $7513, $7514, $7515, $7516, $7517, $7518, $7519, $7520, $7521, $7522, $7523, $7524, $7525, $7526, $7527, $7528, VersionRange($7529, $7530)), ($7531, $7532, $7533, $7534, $7535, $7536, $7537, $7538, $7539, $7540, $7541, $7542, $7543, $7544, $7545, $7546, $7547, $7548, $7549, $7550, $7551, $7552, $7553, $7554, $7555, $7556, $7557, $7558, VersionRange($7559, $7560)), ($7561, $7562, $7563, $7564, $7565, $7566, $7567, $7568, $7569, $7570, $7571, $7572, $7573, $7574, $7575, $7576, $7577, $7578, $7579, $7580, $7581, $7582, $7583, $7584, $7585, $7586, $7587, $7588, VersionRange($7589, $7590)), ($7591, $7592, $7593, $7594, $7595, $7596, $7597, $7598, $7599, $7600, $7601, $7602, $7603, $7604, $7605, $7606, $7607, $7608, $7609, $7610, $7611, $7612, $7613, $7614, $7615, $7616, $7617, $7618, VersionRange($7619, $7620)), ($7621, $7622, $7623, $7624, $7625, $7626, $7627, $7628, $7629, $7630, $7631, $7632, $7633, $7634, $7635, $7636, $7637, $7638, $7639, $7640, $7641, $7642, $7643, $7644, $7645, $7646, $7647, $7648, VersionRange($7649, $7650)), ($7651, $7652, $7653, $7654, $7655, $7656, $7657, $7658, $7659, $7660, $7661, $7662, $7663, $7664, $7665, $7666, $7667, $7668, $7669, $7670, $7671, $7672, $7673, $7674, $7675, $7676, $7677, $7678, VersionRange($7679, $7680)), ($7681, $7682, $7683, $7684, $7685, $7686, $7687, $7688, $7689, $7690, $7691, $7692, $7693, $7694, $7695, $7696, $7697, $7698, $7699, $7700, $7701, $7702, $7703, $7704, $7705, $7706, $7707, $7708, VersionRange($7709, $7710)), ($7711, $7712, $7713, $7714, $7715, $7716, $7717, $7718, $7719, $7720, $7721, $7722, $7723, $7724, $7725, $7726, $7727, $7728, $7729, $7730, $7731, $7732, $7733, $7734, $7735, $7736, $7737, $7738, VersionRange($7739, $7740)), ($7741, $7742, $7743, $7744, $7745, $7746, $7747, $7748, $7749, $7750, $7751, $7752, $7753, $7754, $7755, $7756, $7757, $7758, $7759, $7760, $7761, $7762, $7763, $7764, $7765, $7766, $7767, $7768, VersionRange($7769, $7770)), ($7771, $7772, $7773, $7774, $7775, $7776, $7777, $7778, $7779, $7780, $7781, $7782, $7783, $7784, $7785, $7786, $7787, $7788, $7789, $7790, $7791, $7792, $7793, $7794, $7795, $7796, $7797, $7798, VersionRange($7799, $7800)), ($7801, $7802, $7803, $7804, $7805, $7806, $7807, $7808, $7809, $7810, $7811, $7812, $7813, $7814, $7815, $7816, $7817, $7818, $7819, $7820, $7821, $7822, $7823, $7824, $7825, $7826, $7827, $7828, VersionRange($7829, $7830)), ($7831, $7832, $7833, $7834, $7835, $7836, $7837, $7838, $7839, $7840, $7841, $7842, $7843, $7844, $7845, $7846, $7847, $7848, $7849, $7850, $7851, $7852, $7853, $7854, $7855, $7856, $7857, $7858, VersionRange($7859, $7860)), ($7861, $7862, $7863, $7864, $7865, $7866, $7867, $7868, $7869, $7870, $7871, $7872, $7873, $7874, $7875, $7876, $7877, $7878, $7879, $7880, $7881, $7882, $7883, $7884, $7885, $7886, $7887, $7888, VersionRange($7889, $7890)), ($7891, $7892, $7893, $7894, $7895, $7896, $7897, $7898, $7899, $7900, $7901, $7902, $7903, $7904, $7905, $7906, $7907, $7908, $7909, $7910, $7911, $7912, $7913, $7914, $7915, $7916, $7917, $7918, VersionRange($7919, $7920)), ($7921, $7922, $7923, $7924, $7925, $7926, $7927, $7928, $7929, $7930, $7931, $7932, $7933, $7934, $7935, $7936, $7937, $7938, $7939, $7940, $7941, $7942, $7943, $7944, $7945, $7946, $7947, $7948, VersionRange($7949, $7950)), ($7951, $7952, $7953, $7954, $7955, $7956, $7957, $7958, $7959, $7960, $7961, $7962, $7963, $7964, $7965, $7966, $7967, $7968, $7969, $7970, $7971, $7972, $7973, $7974, $7975, $7976, $7977, $7978, VersionRange($7979, $7980)), ($7981, $7982, $7983, $7984, $7985, $7986, $7987, $7988, $7989, $7990, $7991, $7992, $7993, $7994, $7995, $7996, $7997, $7998, $7999, $8000, $8001, $8002, $8003, $8004, $8005, $8006, $8007, $8008, VersionRange($8009, $8010)), ($8011, $8012, $8013, $8014, $8015, $8016, $8017, $8018, $8019, $8020, $8021, $8022, $8023, $8024, $8025, $8026, $8027, $8028, $8029, $8030, $8031, $8032, $8033, $8034, $8035, $8036, $8037, $8038, VersionRange($8039, $8040)), ($8041, $8042, $8043, $8044, $8045, $8046, $8047, $8048, $8049, $8050, $8051, $8052, $8053, $8054, $8055, $8056, $8057, $8058, $8059, $8060, $8061, $8062, $8063, $8064, $8065, $8066, $8067, $8068, VersionRange($8069, $8070)), ($8071, $8072, $8073, $8074, $8075, $8076, $8077, $8078, $8079, $8080, $8081, $8082, $8083, $8084, $8085, $8086, $8087, $8088, $8089, $8090, $8091, $8092, $8093, $8094, $8095, $8096, $8097, $8098, VersionRange($8099, $8100)), ($8101, $8102, $8103, $8104, $8105, $8106, $8107, $8108, $8109, $8110, $8111, $8112, $8113, $8114, $8115, $8116, $8117, $8118, $8119, $8120, $8121, $8122, $8123, $8124, $8125, $8126, $8127, $8128, VersionRange($8129, $8130)), ($8131, $8132, $8133, $8134, $8135, $8136, $8137, $8138, $8139, $8140, $8141, $8142, $8143, $8144, $8145, $8146, $8147, $8148, $8149, $8150, $8151, $8152, $8153, $8154, $8155, $8156, $8157, $8158, VersionRange($8159, $8160)), ($8161, $8162, $8163, $8164, $8165, $8166, $8167, $8168, $8169, $8170, $8171, $8172, $8173, $8174, $8175, $8176, $8177, $8178, $8179, $8180, $8181, $8182, $8183, $8184, $8185, $8186, $8187, $8188, VersionRange($8189, $8190)), ($8191, $8192, $8193, $8194, $8195, $8196, $8197, $8198, $8199, $8200, $8201, $8202, $8203, $8204, $8205, $8206, $8207, $8208, $8209, $8210, $8211, $8212, $8213, $8214, $8215, $8216, $8217, $8218, VersionRange($8219, $8220)), ($8221, $8222, $8223, $8224, $8225, $8226, $8227, $8228, $8229, $8230, $8231, $8232, $8233, $8234, $8235, $8236, $8237, $8238, $8239, $8240, $8241, $8242, $8243, $8244, $8245, $8246, $8247, $8248, VersionRange($8249, $8250)), ($8251, $8252, $8253, $8254, $8255, $8256, $8257, $8258, $8259, $8260, $8261, $8262, $8263, $8264, $8265, $8266, $8267, $8268, $8269, $8270, $8271, $8272, $8273, $8274, $8275, $8276, $8277, $8278, VersionRange($8279, $8280)), ($8281, $8282, $8283, $8284, $8285, $8286, $8287, $8288, $8289, $8290, $8291, $8292, $8293, $8294, $8295, $8296, $8297, $8298, $8299, $8300, $8301, $8302, $8303, $8304, $8305, $8306, $8307, $8308, VersionRange($8309, $8310)), ($8311, $8312, $8313, $8314, $8315, $8316, $8317, $8318, $8319, $8320, $8321, $8322, $8323, $8324, $8325, $8326, $8327, $8328, $8329, $8330, $8331, $8332, $8333, $8334, $8335, $8336, $8337, $8338, VersionRange($8339, $8340)), ($8341, $8342, $8343, $8344, $8345, $8346, $8347, $8348, $8349, $8350, $8351, $8352, $8353, $8354, $8355, $8356, $8357, $8358, $8359, $8360, $8361, $8362, $8363, $8364, $8365, $8366, $8367, $8368, VersionRange($8369, $8370)), ($8371, $8372, $8373, $8374, $8375, $8376, $8377, $8378, $8379, $8380, $8381, $8382, $8383, $8384, $8385, $8386, $8387, $8388, $8389, $8390, $8391, $8392, $8393, $8394, $8395, $8396, $8397, $8398, VersionRange($8399, $8400)), ($8401, $8402, $8403, $8404, $8405, $8406, $8407, $8408, $8409, $8410, $8411, $8412, $8413, $8414, $8415, $8416, $8417, $8418, $8419, $8420, $8421, $8422, $8423, $8424, $8425, $8426, $8427, $8428, VersionRange($8429, $8430)), ($8431, $8432, $8433, $8434, $8435, $8436, $8437, $8438, $8439, $8440, $8441, $8442, $8443, $8444, $8445, $8446, $8447, $8448, $8449, $8450, $8451, $8452, $8453, $8454, $8455, $8456, $8457, $8458, VersionRange($8459, $8460)), ($8461, $8462, $8463, $8464, $8465, $8466, $8467, $8468, $8469, $8470, $8471, $8472, $8473, $8474, $8475, $8476, $8477, $8478, $8479, $8480, $8481, $8482, $8483, $8484, $8485, $8486, $8487, $8488, VersionRange($8489, $8490)), ($8491, $8492, $8493, $8494, $8495, $8496, $8497, $8498, $8499, $8500, $8501, $8502, $8503, $8504, $8505, $8506, $8507, $8508, $8509, $8510, $8511, $8512, $8513, $8514, $8515, $8516, $8517, $8518, VersionRange($8519, $8520)), ($8521, $8522, $8523, $8524, $8525, $8526, $8527, $8528, $8529, $8530, $8531, $8532, $8533, $8534, $8535, $8536, $8537, $8538, $8539, $8540, $8541, $8542, $8543, $8544, $8545, $8546, $8547, $8548, VersionRange($8549, $8550)), ($8551, $8552, $8553, $8554, $8555, $8556, $8557, $8558, $8559, $8560, $8561, $8562, $8563, $8564, $8565, $8566, $8567, $8568, $8569, $8570, $8571, $8572, $8573, $8574, $8575, $8576, $8577, $8578, VersionRange($8579, $8580)), ($8581, $8582, $8583, $8584, $8585, $8586, $8587, $8588, $8589, $8590, $8591, $8592, $8593, $8594, $8595, $8596, $8597, $8598, $8599, $8600, $8601, $8602, $8603, $8604, $8605, $8606, $8607, $8608, VersionRange($8609, $8610)), ($8611, $8612, $8613, $8614, $8615, $8616, $8617, $8618, $8619, $8620, $8621, $8622, $8623, $8624, $8625, $8626, $8627, $8628, $8629, $8630, $8631, $8632, $8633, $8634, $8635, $8636, $8637, $8638, VersionRange($8639, $8640)), ($8641, $8642, $8643, $8644, $8645, $8646, $8647, $8648, $8649, $8650, $8651, $8652, $8653, $8654, $8655, $8656, $8657, $8658, $8659, $8660, $8661, $8662, $8663, $8664, $8665, $8666, $8667, $8668, VersionRange($8669, $8670)), ($8671, $8672, $8673, $8674, $8675, $8676, $8677, $8678, $8679, $8680, $8681, $8682, $8683, $8684, $8685, $8686, $8687, $8688, $8689, $8690, $8691, $8692, $8693, $8694, $8695, $8696, $8697, $8698, VersionRange($8699, $8700)), ($8701, $8702, $8703, $8704, $8705, $8706, $8707, $8708, $8709, $8710, $8711, $8712, $8713, $8714, $8715, $8716, $8717, $8718, $8719, $8720, $8721, $8722, $8723, $8724, $8725, $8726, $8727, $8728, VersionRange($8729, $8730)), ($8731, $8732, $8733, $8734, $8735, $8736, $8737, $8738, $8739, $8740, $8741, $8742, $8743, $8744, $8745, $8746, $8747, $8748, $8749, $8750, $8751, $8752, $8753, $8754, $8755, $8756, $8757, $8758, VersionRange($8759, $8760)), ($8761, $8762, $8763, $8764, $8765, $8766, $8767, $8768, $8769, $8770, $8771, $8772, $8773, $8774, $8775, $8776, $8777, $8778, $8779, $8780, $8781, $8782, $8783, $8784, $8785, $8786, $8787, $8788, VersionRange($8789, $8790)), ($8791, $8792, $8793, $8794, $8795, $8796, $8797, $8798, $8799, $8800, $8801, $8802, $8803, $8804, $8805, $8806, $8807, $8808, $8809, $8810, $8811, $8812, $8813, $8814, $8815, $8816, $8817, $8818, VersionRange($8819, $8820)), ($8821, $8822, $8823, $8824, $8825, $8826, $8827, $8828, $8829, $8830, $8831, $8832, $8833, $8834, $8835, $8836, $8837, $8838, $8839, $8840, $8841, $8842, $8843, $8844, $8845, $8846, $8847, $8848, VersionRange($8849, $8850)), ($8851, $8852, $8853, $8854, $8855, $8856, $8857, $8858, $8859, $8860, $8861, $8862, $8863, $8864, $8865, $8866, $8867, $8868, $8869, $8870, $8871, $8872, $8873, $8874, $8875, $8876, $8877, $8878, VersionRange($8879, $8880)), ($8881, $8882, $8883, $8884, $8885, $8886, $8887, $8888, $8889, $8890, $8891, $8892, $8893, $8894, $8895, $8896, $8897, $8898, $8899, $8900, $8901, $8902, $8903, $8904, $8905, $8906, $8907, $8908, VersionRange($8909, $8910)), ($8911, $8912, $8913, $8914, $8915, $8916, $8917, $8918, $8919, $8920, $8921, $8922, $8923, $8924, $8925, $8926, $8927, $8928, $8929, $8930, $8931, $8932, $8933, $8934, $8935, $8936, $8937, $8938, VersionRange($8939, $8940)), ($8941, $8942, $8943, $8944, $8945, $8946, $8947, $8948, $8949, $8950, $8951, $8952, $8953, $8954, $8955, $8956, $8957, $8958, $8959, $8960, $8961, $8962, $8963, $8964, $8965, $8966, $8967, $8968, VersionRange($8969, $8970)), ($8971, $8972, $8973, $8974, $8975, $8976, $8977, $8978, $8979, $8980, $8981, $8982, $8983, $8984, $8985, $8986, $8987, $8988, $8989, $8990, $8991, $8992, $8993, $8994, $8995, $8996, $8997, $8998, VersionRange($8999, $9000)), ($9001, $9002, $9003, $9004, $9005, $9006, $9007, $9008, $9009, $9010, $9011, $9012, $9013, $9014, $9015, $9016, $9017, $9018, $9019, $9020, $9021, $9022, $9023, $9024, $9025, $9026, $9027, $9028, VersionRange($9029, $9030)), ($9031, $9032, $9033, $9034, $9035, $9036, $9037, $9038, $9039, $9040, $9041, $9042, $9043, $9044, $9045, $9046, $9047, $9048, $9049, $9050, $9051, $9052, $9053, $9054, $9055, $9056, $9057, $9058, VersionRange($9059, $9060)), ($9061, $9062, $9063, $9064, $9065, $9066, $9067, $9068, $9069, $9070, $9071, $9072, $9073, $9074, $9075, $9076, $9077, $9078, $9079, $9080, $9081, $9082, $9083, $9084, $9085, $9086, $9087, $9088, VersionRange($9089, $9090)), ($9091, $9092, $9093, $9094, $9095, $9096, $9097, $9098, $9099, $9100, $9101, $9102, $9103, $9104, $9105, $9106, $9107, $9108, $9109, $9110, $9111, $9112, $9113, $9114, $9115, $9116, $9117, $9118, VersionRange($9119, $9120)), ($9121, $9122, $9123, $9124, $9125, $9126, $9127, $9128, $9129, $9130, $9131, $9132, $9133, $9134, $9135, $9136, $9137, $9138, $9139, $9140, $9141, $9142, $9143, $9144, $9145, $9146, $9147, $9148, VersionRange($9149, $9150)), ($9151, $9152, $9153, $9154, $9155, $9156, $9157, $9158, $9159, $9160, $9161, $9162, $9163, $9164, $9165, $9166, $9167, $9168, $9169, $9170, $9171, $9172, $9173, $9174, $9175, $9176, $9177, $9178, VersionRange($9179, $9180)), ($9181, $9182, $9183, $9184, $9185, $9186, $9187, $9188, $9189, $9190, $9191, $9192, $9193, $9194, $9195, $9196, $9197, $9198, $9199, $9200, $9201, $9202, $9203, $9204, $9205, $9206, $9207, $9208, VersionRange($9209, $9210)), ($9211, $9212, $9213, $9214, $9215, $9216, $9217, $9218, $9219, $9220, $9221, $9222, $9223, $9224, $9225, $9226, $9227, $9228, $9229, $9230, $9231, $9232, $9233, $9234, $9235, $9236, $9237, $9238, VersionRange($9239, $9240)), ($9241, $9242, $9243, $9244, $9245, $9246, $9247, $9248, $9249, $9250, $9251, $9252, $9253, $9254, $9255, $9256, $9257, $9258, $9259, $9260, $9261, $9262, $9263, $9264, $9265, $9266, $9267, $9268, VersionRange($9269, $9270)), ($9271, $9272, $9273, $9274, $9275, $9276, $9277, $9278, $9279, $9280, $9281, $9282, $9283, $9284, $9285, $9286, $9287, $9288, $9289, $9290, $9291, $9292, $9293, $9294, $9295, $9296, $9297, $9298, VersionRange($9299, $9300)), ($9301, $9302, $9303, $9304, $9305, $9306, $9307, $9308, $9309, $9310, $9311, $9312, $9313, $9314, $9315, $9316, $9317, $9318, $9319, $9320, $9321, $9322, $9323, $9324, $9325, $9326, $9327, $9328, VersionRange($9329, $9330)), ($9331, $9332, $9333, $9334, $9335, $9336, $9337, $9338, $9339, $9340, $9341, $9342, $9343, $9344, $9345, $9346, $9347, $9348, $9349, $9350, $9351, $9352, $9353, $9354, $9355, $9356, $9357, $9358, VersionRange($9359, $9360)), ($9361, $9362, $9363, $9364, $9365, $9366, $9367, $9368, $9369, $9370, $9371, $9372, $9373, $9374, $9375, $9376, $9377, $9378, $9379, $9380, $9381, $9382, $9383, $9384, $9385, $9386, $9387, $9388, VersionRange($9389, $9390)), ($9391, $9392, $9393, $9394, $9395, $9396, $9397, $9398, $9399, $9400, $9401, $9402, $9403, $9404, $9405, $9406, $9407, $9408, $9409, $9410, $9411, $9412, $9413, $9414, $9415, $9416, $9417, $9418, VersionRange($9419, $9420)), ($9421, $9422, $9423, $9424, $9425, $9426, $9427, $9428, $9429, $9430, $9431, $9432, $9433, $9434, $9435, $9436, $9437, $9438, $9439, $9440, $9441, $9442, $9443, $9444, $9445, $9446, $9447, $9448, VersionRange($9449, $9450)), ($9451, $9452, $9453, $9454, $9455, $9456, $9457, $9458, $9459, $9460, $9461, $9462, $9463, $9464, $9465, $9466, $9467, $9468, $9469, $9470, $9471, $9472, $9473, $9474, $9475, $9476, $9477, $9478, VersionRange($9479, $9480)), ($9481, $9482, $9483, $9484, $9485, $9486, $9487, $9488, $9489, $9490, $9491, $9492, $9493, $9494, $9495, $9496, $9497, $9498, $9499, $9500, $9501, $9502, $9503, $9504, $9505, $9506, $9507, $9508, VersionRange($9509, $9510)), ($9511, $9512, $9513, $9514, $9515, $9516, $9517, $9518, $9519, $9520, $9521, $9522, $9523, $9524, $9525, $9526, $9527, $9528, $9529, $9530, $9531, $9532, $9533, $9534, $9535, $9536, $9537, $9538, VersionRange($9539, $9540)), ($9541, $9542, $9543, $9544, $9545, $9546, $9547, $9548, $9549, $9550, $9551, $9552, $9553, $9554, $9555, $9556, $9557, $9558, $9559, $9560, $9561, $9562, $9563, $9564, $9565, $9566, $9567, $9568, VersionRange($9569, $9570)), ($9571, $9572, $9573, $9574, $9575, $9576, $9577, $9578, $9579, $9580, $9581, $9582, $9583, $9584, $9585, $9586, $9587, $9588, $9589, $9590, $9591, $9592, $9593, $9594, $9595, $9596, $9597, $9598, VersionRange($9599, $9600)), ($9601, $9602, $9603, $9604, $9605, $9606, $9607, $9608, $9609, $9610, $9611, $9612, $9613, $9614, $9615, $9616, $9617, $9618, $9619, $9620, $9621, $9622, $9623, $9624, $9625, $9626, $9627, $9628, VersionRange($9629, $9630)), ($9631, $9632, $9633, $9634, $9635, $9636, $9637, $9638, $9639, $9640, $9641, $9642, $9643, $9644, $9645, $9646, $9647, $9648, $9649, $9650, $9651, $9652, $9653, $9654, $9655, $9656, $9657, $9658, VersionRange($9659, $9660)), ($9661, $9662, $9663, $9664, $9665, $9666, $9667, $9668, $9669, $9670, $9671, $9672, $9673, $9674, $9675, $9676, $9677, $9678, $9679, $9680, $9681, $9682, $9683, $9684, $9685, $9686, $9687, $9688, VersionRange($9689, $9690)), ($9691, $9692, $9693, $9694, $9695, $9696, $9697, $9698, $9699, $9700, $9701, $9702, $9703, $9704, $9705, $9706, $9707, $9708, $9709, $9710, $9711, $9712, $9713, $9714, $9715, $9716, $9717, $9718, VersionRange($9719, $9720)), ($9721, $9722, $9723, $9724, $9725, $9726, $9727, $9728, $9729, $9730, $9731, $9732, $9733, $9734, $9735, $9736, $9737, $9738, $9739, $9740, $9741, $9742, $9743, $9744, $9745, $9746, $9747, $9748, VersionRange($9749, $9750)), ($9751, $9752, $9753, $9754, $9755, $9756, $9757, $9758, $9759, $9760, $9761, $9762, $9763, $9764, $9765, $9766, $9767, $9768, $9769, $9770, $9771, $9772, $9773, $9774, $9775, $9776, $9777, $9778, VersionRange($9779, $9780)), ($9781, $9782, $9783, $9784, $9785, $9786, $9787, $9788, $9789, $9790, $9791, $9792, $9793, $9794, $9795, $9796, $9797, $9798, $9799, $9800, $9801, $9802, $9803, $9804, $9805, $9806, $9807, $9808, VersionRange($9809, $9810)), ($9811, $9812, $9813, $9814, $9815, $9816, $9817, $9818, $9819, $9820, $9821, $9822, $9823, $9824, $9825, $9826, $9827, $9828, $9829, $9830, $9831, $9832, $9833, $9834, $9835, $9836, $9837, $9838, VersionRange($9839, $9840)), ($9841, $9842, $9843, $9844, $9845, $9846, $9847, $9848, $9849, $9850, $9851, $9852, $9853, $9854, $9855, $9856, $9857, $9858, $9859, $9860, $9861, $9862, $9863, $9864, $9865, $9866, $9867, $9868, VersionRange($9869, $9870)), ($9871, $9872, $9873, $9874, $9875, $9876, $9877, $9878, $9879, $9880, $9881, $9882, $9883, $9884, $9885, $9886, $9887, $9888, $9889, $9890, $9891, $9892, $9893, $9894, $9895, $9896, $9897, $9898, VersionRange($9899, $9900)), ($9901, $9902, $9903, $9904, $9905, $9906, $9907, $9908, $9909, $9910, $9911, $9912, $9913, $9914, $9915, $9916, $9917, $9918, $9919, $9920, $9921, $9922, $9923, $9924, $9925, $9926, $9927, $9928, VersionRange($9929, $9930)), ($9931, $9932, $9933, $9934, $9935, $9936, $9937, $9938, $9939, $9940, $9941, $9942, $9943, $9944, $9945, $9946, $9947, $9948, $9949, $9950, $9951, $9952, $9953, $9954, $9955, $9956, $9957, $9958, VersionRange($9959, $9960)), ($9961, $9962, $9963, $9964, $9965, $9966, $9967, $9968, $9969, $9970, $9971, $9972, $9973, $9974, $9975, $9976, $9977, $9978, $9979, $9980, $9981, $9982, $9983, $9984, $9985, $9986, $9987, $9988, VersionRange($9989, $9990)), ($9991, $9992, $9993, $9994, $9995, $9996, $9997, $9998, $9999, $10000, $10001, $10002, $10003, $10004, $10005, $10006, $10007, $10008, $10009, $10010, $10011, $10012, $10013, $10014, $10015, $10016, $10017, $10018, VersionRange($10019, $10020)), ($10021, $10022, $10023, $10024, $10025, $10026, $10027, $10028, $10029, $10030, $10031, $10032, $10033, $10034, $10035, $10036, $10037, $10038, $10039, $10040, $10041, $10042, $10043, $10044, $10045, $10046, $10047, $10048, VersionRange($10049, $10050)), ($10051, $10052, $10053, $10054, $10055, $10056, $10057, $10058, $10059, $10060, $10061, $10062, $10063, $10064, $10065, $10066, $10067, $10068, $10069, $10070, $10071, $10072, $10073, $10074, $10075, $10076, $10077, $10078, VersionRange($10079, $10080)), ($10081, $10082, $10083, $10084, $10085, $10086, $10087, $10088, $10089, $10090, $10091, $10092, $10093, $10094, $10095, $10096, $10097, $10098, $10099, $10100, $10101, $10102, $10103, $10104, $10105, $10106, $10107, $10108, VersionRange($10109, $10110)), ($10111, $10112, $10113, $10114, $10115, $10116, $10117, $10118, $10119, $10120, $10121, $10122, $10123, $10124, $10125, $10126, $10127, $10128, $10129, $10130, $10131, $10132, $10133, $10134, $10135, $10136, $10137, $10138, VersionRange($10139, $10140)), ($10141, $10142, $10143, $10144, $10145, $10146, $10147, $10148, $10149, $10150, $10151, $10152, $10153, $10154, $10155, $10156, $10157, $10158, $10159, $10160, $10161, $10162, $10163, $10164, $10165, $10166, $10167, $10168, VersionRange($10169, $10170)), ($10171, $10172, $10173, $10174, $10175, $10176, $10177, $10178, $10179, $10180, $10181, $10182, $10183, $10184, $10185, $10186, $10187, $10188, $10189, $10190, $10191, $10192, $10193, $10194, $10195, $10196, $10197, $10198, VersionRange($10199, $10200)), ($10201, $10202, $10203, $10204, $10205, $10206, $10207, $10208, $10209, $10210, $10211, $10212, $10213, $10214, $10215, $10216, $10217, $10218, $10219, $10220, $10221, $10222, $10223, $10224, $10225, $10226, $10227, $10228, VersionRange($10229, $10230)), ($10231, $10232, $10233, $10234, $10235, $10236, $10237, $10238, $10239, $10240, $10241, $10242, $10243, $10244, $10245, $10246, $10247, $10248, $10249, $10250, $10251, $10252, $10253, $10254, $10255, $10256, $10257, $10258, VersionRange($10259, $10260)), ($10261, $10262, $10263, $10264, $10265, $10266, $10267, $10268, $10269, $10270, $10271, $10272, $10273, $10274, $10275, $10276, $10277, $10278, $10279, $10280, $10281, $10282, $10283, $10284, $10285, $10286, $10287, $10288, VersionRange($10289, $10290)), ($10291, $10292, $10293, $10294, $10295, $10296, $10297, $10298, $10299, $10300, $10301, $10302, $10303, $10304, $10305, $10306, $10307, $10308, $10309, $10310, $10311, $10312, $10313, $10314, $10315, $10316, $10317, $10318, VersionRange($10319, $10320)), ($10321, $10322, $10323, $10324, $10325, $10326, $10327, $10328, $10329, $10330, $10331, $10332, $10333, $10334, $10335, $10336, $10337, $10338, $10339, $10340, $10341, $10342, $10343, $10344, $10345, $10346, $10347, $10348, VersionRange($10349, $10350)), ($10351, $10352, $10353, $10354, $10355, $10356, $10357, $10358, $10359, $10360, $10361, $10362, $10363, $10364, $10365, $10366, $10367, $10368, $10369, $10370, $10371, $10372, $10373, $10374, $10375, $10376, $10377, $10378, VersionRange($10379, $10380)), ($10381, $10382, $10383, $10384, $10385, $10386, $10387, $10388, $10389, $10390, $10391, $10392, $10393, $10394, $10395, $10396, $10397, $10398, $10399, $10400, $10401, $10402, $10403, $10404, $10405, $10406, $10407, $10408, VersionRange($10409, $10410)), ($10411, $10412, $10413, $10414, $10415, $10416, $10417, $10418, $10419, $10420, $10421, $10422, $10423, $10424, $10425, $10426, $10427, $10428, $10429, $10430, $10431, $10432, $10433, $10434, $10435, $10436, $10437, $10438, VersionRange($10439, $10440)), ($10441, $10442, $10443, $10444, $10445, $10446, $10447, $10448, $10449, $10450, $10451, $10452, $10453, $10454, $10455, $10456, $10457, $10458, $10459, $10460, $10461, $10462, $10463, $10464, $10465, $10466, $10467, $10468, VersionRange($10469, $10470)), ($10471, $10472, $10473, $10474, $10475, $10476, $10477, $10478, $10479, $10480, $10481, $10482, $10483, $10484, $10485, $10486, $10487, $10488, $10489, $10490, $10491, $10492, $10493, $10494, $10495, $10496, $10497, $10498, VersionRange($10499, $10500)), ($10501, $10502, $10503, $10504, $10505, $10506, $10507, $10508, $10509, $10510, $10511, $10512, $10513, $10514, $10515, $10516, $10517, $10518, $10519, $10520, $10521, $10522, $10523, $10524, $10525, $10526, $10527, $10528, VersionRange($10529, $10530)), ($10531, $10532, $10533, $10534, $10535, $10536, $10537, $10538, $10539, $10540, $10541, $10542, $10543, $10544, $10545, $10546, $10547, $10548, $10549, $10550, $10551, $10552, $10553, $10554, $10555, $10556, $10557, $10558, VersionRange($10559, $10560)), ($10561, $10562, $10563, $10564, $10565, $10566, $10567, $10568, $10569, $10570, $10571, $10572, $10573, $10574, $10575, $10576, $10577, $10578, $10579, $10580, $10581, $10582, $10583, $10584, $10585, $10586, $10587, $10588, VersionRange($10589, $10590)), ($10591, $10592, $10593, $10594, $10595, $10596, $10597, $10598, $10599, $10600, $10601, $10602, $10603, $10604, $10605, $10606, $10607, $10608, $10609, $10610, $10611, $10612, $10613, $10614, $10615, $10616, $10617, $10618, VersionRange($10619, $10620)), ($10621, $10622, $10623, $10624, $10625, $10626, $10627, $10628, $10629, $10630, $10631, $10632, $10633, $10634, $10635, $10636, $10637, $10638, $10639, $10640, $10641, $10642, $10643, $10644, $10645, $10646, $10647, $10648, VersionRange($10649, $10650)), ($10651, $10652, $10653, $10654, $10655, $10656, $10657, $10658, $10659, $10660, $10661, $10662, $10663, $10664, $10665, $10666, $10667, $10668, $10669, $10670, $10671, $10672, $10673, $10674, $10675, $10676, $10677, $10678, VersionRange($10679, $10680)), ($10681, $10682, $10683, $10684, $10685, $10686, $10687, $10688, $10689, $10690, $10691, $10692, $10693, $10694, $10695, $10696, $10697, $10698, $10699, $10700, $10701, $10702, $10703, $10704, $10705, $10706, $10707, $10708, VersionRange($10709, $10710)), ($10711, $10712, $10713, $10714, $10715, $10716, $10717, $10718, $10719, $10720, $10721, $10722, $10723, $10724, $10725, $10726, $10727, $10728, $10729, $10730, $10731, $10732, $10733, $10734, $10735, $10736, $10737, $10738, VersionRange($10739, $10740)), ($10741, $10742, $10743, $10744, $10745, $10746, $10747, $10748, $10749, $10750, $10751, $10752, $10753, $10754, $10755, $10756, $10757, $10758, $10759, $10760, $10761, $10762, $10763, $10764, $10765, $10766, $10767, $10768, VersionRange($10769, $10770)), ($10771, $10772, $10773, $10774, $10775, $10776, $10777, $10778, $10779, $10780, $10781, $10782, $10783, $10784, $10785, $10786, $10787, $10788, $10789, $10790, $10791, $10792, $10793, $10794, $10795, $10796, $10797, $10798, VersionRange($10799, $10800)), ($10801, $10802, $10803, $10804, $10805, $10806, $10807, $10808, $10809, $10810, $10811, $10812, $10813, $10814, $10815, $10816, $10817, $10818, $10819, $10820, $10821, $10822, $10823, $10824, $10825, $10826, $10827, $10828, VersionRange($10829, $10830)), ($10831, $10832, $10833, $10834, $10835, $10836, $10837, $10838, $10839, $10840, $10841, $10842, $10843, $10844, $10845, $10846, $10847, $10848, $10849, $10850, $10851, $10852, $10853, $10854, $10855, $10856, $10857, $10858, VersionRange($10859, $10860)), ($10861, $10862, $10863, $10864, $10865, $10866, $10867, $10868, $10869, $10870, $10871, $10872, $10873, $10874, $10875, $10876, $10877, $10878, $10879, $10880, $10881, $10882, $10883, $10884, $10885, $10886, $10887, $10888, VersionRange($10889, $10890)), ($10891, $10892, $10893, $10894, $10895, $10896, $10897, $10898, $10899, $10900, $10901, $10902, $10903, $10904, $10905, $10906, $10907, $10908, $10909, $10910, $10911, $10912, $10913, $10914, $10915, $10916, $10917, $10918, VersionRange($10919, $10920)), ($10921, $10922, $10923, $10924, $10925, $10926, $10927, $10928, $10929, $10930, $10931, $10932, $10933, $10934, $10935, $10936, $10937, $10938, $10939, $10940, $10941, $10942, $10943, $10944, $10945, $10946, $10947, $10948, VersionRange($10949, $10950)), ($10951, $10952, $10953, $10954, $10955, $10956, $10957, $10958, $10959, $10960, $10961, $10962, $10963, $10964, $10965, $10966, $10967, $10968, $10969, $10970, $10971, $10972, $10973, $10974, $10975, $10976, $10977, $10978, VersionRange($10979, $10980)), ($10981, $10982, $10983, $10984, $10985, $10986, $10987, $10988, $10989, $10990, $10991, $10992, $10993, $10994, $10995, $10996, $10997, $10998, $10999, $11000, $11001, $11002, $11003, $11004, $11005, $11006, $11007, $11008, VersionRange($11009, $11010)), ($11011, $11012, $11013, $11014, $11015, $11016, $11017, $11018, $11019, $11020, $11021, $11022, $11023, $11024, $11025, $11026, $11027, $11028, $11029, $11030, $11031, $11032, $11033, $11034, $11035, $11036, $11037, $11038, VersionRange($11039, $11040)), ($11041, $11042, $11043, $11044, $11045, $11046, $11047, $11048, $11049, $11050, $11051, $11052, $11053, $11054, $11055, $11056, $11057, $11058, $11059, $11060, $11061, $11062, $11063, $11064, $11065, $11066, $11067, $11068, VersionRange($11069, $11070)), ($11071, $11072, $11073, $11074, $11075, $11076, $11077, $11078, $11079, $11080, $11081, $11082, $11083, $11084, $11085, $11086, $11087, $11088, $11089, $11090, $11091, $11092, $11093, $11094, $11095, $11096, $11097, $11098, VersionRange($11099, $11100)), ($11101, $11102, $11103, $11104, $11105, $11106, $11107, $11108, $11109, $11110, $11111, $11112, $11113, $11114, $11115, $11116, $11117, $11118, $11119, $11120, $11121, $11122, $11123, $11124, $11125, $11126, $11127, $11128, VersionRange($11129, $11130)), ($11131, $11132, $11133, $11134, $11135, $11136, $11137, $11138, $11139, $11140, $11141, $11142, $11143, $11144, $11145, $11146, $11147, $11148, $11149, $11150, $11151, $11152, $11153, $11154, $11155, $11156, $11157, $11158, VersionRange($11159, $11160)), ($11161, $11162, $11163, $11164, $11165, $11166, $11167, $11168, $11169, $11170, $11171, $11172, $11173, $11174, $11175, $11176, $11177, $11178, $11179, $11180, $11181, $11182, $11183, $11184, $11185, $11186, $11187, $11188, VersionRange($11189, $11190)), ($11191, $11192, $11193, $11194, $11195, $11196, $11197, $11198, $11199, $11200, $11201, $11202, $11203, $11204, $11205, $11206, $11207, $11208, $11209, $11210, $11211, $11212, $11213, $11214, $11215, $11216, $11217, $11218, VersionRange($11219, $11220)), ($11221, $11222, $11223, $11224, $11225, $11226, $11227, $11228, $11229, $11230, $11231, $11232, $11233, $11234, $11235, $11236, $11237, $11238, $11239, $11240, $11241, $11242, $11243, $11244, $11245, $11246, $11247, $11248, VersionRange($11249, $11250)), ($11251, $11252, $11253, $11254, $11255, $11256, $11257, $11258, $11259, $11260, $11261, $11262, $11263, $11264, $11265, $11266, $11267, $11268, $11269, $11270, $11271, $11272, $11273, $11274, $11275, $11276, $11277, $11278, VersionRange($11279, $11280)), ($11281, $11282, $11283, $11284, $11285, $11286, $11287, $11288, $11289, $11290, $11291, $11292, $11293, $11294, $11295, $11296, $11297, $11298, $11299, $11300, $11301, $11302, $11303, $11304, $11305, $11306, $11307, $11308, VersionRange($11309, $11310)), ($11311, $11312, $11313, $11314, $11315, $11316, $11317, $11318, $11319, $11320, $11321, $11322, $11323, $11324, $11325, $11326, $11327, $11328, $11329, $11330, $11331, $11332, $11333, $11334, $11335, $11336, $11337, $11338, VersionRange($11339, $11340)), ($11341, $11342, $11343, $11344, $11345, $11346, $11347, $11348, $11349, $11350, $11351, $11352, $11353, $11354, $11355, $11356, $11357, $11358, $11359, $11360, $11361, $11362, $11363, $11364, $11365, $11366, $11367, $11368, VersionRange($11369, $11370)), ($11371, $11372, $11373, $11374, $11375, $11376, $11377, $11378, $11379, $11380, $11381, $11382, $11383, $11384, $11385, $11386, $11387, $11388, $11389, $11390, $11391, $11392, $11393, $11394, $11395, $11396, $11397, $11398, VersionRange($11399, $11400)), ($11401, $11402, $11403, $11404, $11405, $11406, $11407, $11408, $11409, $11410, $11411, $11412, $11413, $11414, $11415, $11416, $11417, $11418, $11419, $11420, $11421, $11422, $11423, $11424, $11425, $11426, $11427, $11428, VersionRange($11429, $11430)), ($11431, $11432, $11433, $11434, $11435, $11436, $11437, $11438, $11439, $11440, $11441, $11442, $11443, $11444, $11445, $11446, $11447, $11448, $11449, $11450, $11451, $11452, $11453, $11454, $11455, $11456, $11457, $11458, VersionRange($11459, $11460)), ($11461, $11462, $11463, $11464, $11465, $11466, $11467, $11468, $11469, $11470, $11471, $11472, $11473, $11474, $11475, $11476, $11477, $11478, $11479, $11480, $11481, $11482, $11483, $11484, $11485, $11486, $11487, $11488, VersionRange($11489, $11490)), ($11491, $11492, $11493, $11494, $11495, $11496, $11497, $11498, $11499, $11500, $11501, $11502, $11503, $11504, $11505, $11506, $11507, $11508, $11509, $11510, $11511, $11512, $11513, $11514, $11515, $11516, $11517, $11518, VersionRange($11519, $11520)), ($11521, $11522, $11523, $11524, $11525, $11526, $11527, $11528, $11529, $11530, $11531, $11532, $11533, $11534, $11535, $11536, $11537, $11538, $11539, $11540, $11541, $11542, $11543, $11544, $11545, $11546, $11547, $11548, VersionRange($11549, $11550)), ($11551, $11552, $11553, $11554, $11555, $11556, $11557, $11558, $11559, $11560, $11561, $11562, $11563, $11564, $11565, $11566, $11567, $11568, $11569, $11570, $11571, $11572, $11573, $11574, $11575, $11576, $11577, $11578, VersionRange($11579, $11580)), ($11581, $11582, $11583, $11584, $11585, $11586, $11587, $11588, $11589, $11590, $11591, $11592, $11593, $11594, $11595, $11596, $11597, $11598, $11599, $11600, $11601, $11602, $11603, $11604, $11605, $11606, $11607, $11608, VersionRange($11609, $11610)), ($11611, $11612, $11613, $11614, $11615, $11616, $11617, $11618, $11619, $11620, $11621, $11622, $11623, $11624, $11625, $11626, $11627, $11628, $11629, $11630, $11631, $11632, $11633, $11634, $11635, $11636, $11637, $11638, VersionRange($11639, $11640)), ($11641, $11642, $11643, $11644, $11645, $11646, $11647, $11648, $11649, $11650, $11651, $11652, $11653, $11654, $11655, $11656, $11657, $11658, $11659, $11660, $11661, $11662, $11663, $11664, $11665, $11666, $11667, $11668, VersionRange($11669, $11670)), ($11671, $11672, $11673, $11674, $11675, $11676, $11677, $11678, $11679, $11680, $11681, $11682, $11683, $11684, $11685, $11686, $11687, $11688, $11689, $11690, $11691, $11692, $11693, $11694, $11695, $11696, $11697, $11698, VersionRange($11699, $11700)), ($11701, $11702, $11703, $11704, $11705, $11706, $11707, $11708, $11709, $11710, $11711, $11712, $11713, $11714, $11715, $11716, $11717, $11718, $11719, $11720, $11721, $11722, $11723, $11724, $11725, $11726, $11727, $11728, VersionRange($11729, $11730)), ($11731, $11732, $11733, $11734, $11735, $11736, $11737, $11738, $11739, $11740, $11741, $11742, $11743, $11744, $11745, $11746, $11747, $11748, $11749, $11750, $11751, $11752, $11753, $11754, $11755, $11756, $11757, $11758, VersionRange($11759, $11760)), ($11761, $11762, $11763, $11764, $11765, $11766, $11767, $11768, $11769, $11770, $11771, $11772, $11773, $11774, $11775, $11776, $11777, $11778, $11779, $11780, $11781, $11782, $11783, $11784, $11785, $11786, $11787, $11788, VersionRange($11789, $11790)), ($11791, $11792, $11793, $11794, $11795, $11796, $11797, $11798, $11799, $11800, $11801, $11802, $11803, $11804, $11805, $11806, $11807, $11808, $11809, $11810, $11811, $11812, $11813, $11814, $11815, $11816, $11817, $11818, VersionRange($11819, $11820)), ($11821, $11822, $11823, $11824, $11825, $11826, $11827, $11828, $11829, $11830, $11831, $11832, $11833, $11834, $11835, $11836, $11837, $11838, $11839, $11840, $11841, $11842, $11843, $11844, $11845, $11846, $11847, $11848, VersionRange($11849, $11850)), ($11851, $11852, $11853, $11854, $11855, $11856, $11857, $11858, $11859, $11860, $11861, $11862, $11863, $11864, $11865, $11866, $11867, $11868, $11869, $11870, $11871, $11872, $11873, $11874, $11875, $11876, $11877, $11878, VersionRange($11879, $11880)), ($11881, $11882, $11883, $11884, $11885, $11886, $11887, $11888, $11889, $11890, $11891, $11892, $11893, $11894, $11895, $11896, $11897, $11898, $11899, $11900, $11901, $11902, $11903, $11904, $11905, $11906, $11907, $11908, VersionRange($11909, $11910)), ($11911, $11912, $11913, $11914, $11915, $11916, $11917, $11918, $11919, $11920, $11921, $11922, $11923, $11924, $11925, $11926, $11927, $11928, $11929, $11930, $11931, $11932, $11933, $11934, $11935, $11936, $11937, $11938, VersionRange($11939, $11940)), ($11941, $11942, $11943, $11944, $11945, $11946, $11947, $11948, $11949, $11950, $11951, $11952, $11953, $11954, $11955, $11956, $11957, $11958, $11959, $11960, $11961, $11962, $11963, $11964, $11965, $11966, $11967, $11968, VersionRange($11969, $11970)), ($11971, $11972, $11973, $11974, $11975, $11976, $11977, $11978, $11979, $11980, $11981, $11982, $11983, $11984, $11985, $11986, $11987, $11988, $11989, $11990, $11991, $11992, $11993, $11994, $11995, $11996, $11997, $11998, VersionRange($11999, $12000)), ($12001, $12002, $12003, $12004, $12005, $12006, $12007, $12008, $12009, $12010, $12011, $12012, $12013, $12014, $12015, $12016, $12017, $12018, $12019, $12020, $12021, $12022, $12023, $12024, $12025, $12026, $12027, $12028, VersionRange($12029, $12030)), ($12031, $12032, $12033, $12034, $12035, $12036, $12037, $12038, $12039, $12040, $12041, $12042, $12043, $12044, $12045, $12046, $12047, $12048, $12049, $12050, $12051, $12052, $12053, $12054, $12055, $12056, $12057, $12058, VersionRange($12059, $12060)), ($12061, $12062, $12063, $12064, $12065, $12066, $12067, $12068, $12069, $12070, $12071, $12072, $12073, $12074, $12075, $12076, $12077, $12078, $12079, $12080, $12081, $12082, $12083, $12084, $12085, $12086, $12087, $12088, VersionRange($12089, $12090)), ($12091, $12092, $12093, $12094, $12095, $12096, $12097, $12098, $12099, $12100, $12101, $12102, $12103, $12104, $12105, $12106, $12107, $12108, $12109, $12110, $12111, $12112, $12113, $12114, $12115, $12116, $12117, $12118, VersionRange($12119, $12120)), ($12121, $12122, $12123, $12124, $12125, $12126, $12127, $12128, $12129, $12130, $12131, $12132, $12133, $12134, $12135, $12136, $12137, $12138, $12139, $12140, $12141, $12142, $12143, $12144, $12145, $12146, $12147, $12148, VersionRange($12149, $12150)), ($12151, $12152, $12153, $12154, $12155, $12156, $12157, $12158, $12159, $12160, $12161, $12162, $12163, $12164, $12165, $12166, $12167, $12168, $12169, $12170, $12171, $12172, $12173, $12174, $12175, $12176, $12177, $12178, VersionRange($12179, $12180)), ($12181, $12182, $12183, $12184, $12185, $12186, $12187, $12188, $12189, $12190, $12191, $12192, $12193, $12194, $12195, $12196, $12197, $12198, $12199, $12200, $12201, $12202, $12203, $12204, $12205, $12206, $12207, $12208, VersionRange($12209, $12210)), ($12211, $12212, $12213, $12214, $12215, $12216, $12217, $12218, $12219, $12220, $12221, $12222, $12223, $12224, $12225, $12226, $12227, $12228, $12229, $12230, $12231, $12232, $12233, $12234, $12235, $12236, $12237, $12238, VersionRange($12239, $12240)), ($12241, $12242, $12243, $12244, $12245, $12246, $12247, $12248, $12249, $12250, $12251, $12252, $12253, $12254, $12255, $12256, $12257, $12258, $12259, $12260, $12261, $12262, $12263, $12264, $12265, $12266, $12267, $12268, VersionRange($12269, $12270)), ($12271, $12272, $12273, $12274, $12275, $12276, $12277, $12278, $12279, $12280, $12281, $12282, $12283, $12284, $12285, $12286, $12287, $12288, $12289, $12290, $12291, $12292, $12293, $12294, $12295, $12296, $12297, $12298, VersionRange($12299, $12300)), ($12301, $12302, $12303, $12304, $12305, $12306, $12307, $12308, $12309, $12310, $12311, $12312, $12313, $12314, $12315, $12316, $12317, $12318, $12319, $12320, $12321, $12322, $12323, $12324, $12325, $12326, $12327, $12328, VersionRange($12329, $12330)), ($12331, $12332, $12333, $12334, $12335, $12336, $12337, $12338, $12339, $12340, $12341, $12342, $12343, $12344, $12345, $12346, $12347, $12348, $12349, $12350, $12351, $12352, $12353, $12354, $12355, $12356, $12357, $12358, VersionRange($12359, $12360)), ($12361, $12362, $12363, $12364, $12365, $12366, $12367, $12368, $12369, $12370, $12371, $12372, $12373, $12374, $12375, $12376, $12377, $12378, $12379, $12380, $12381, $12382, $12383, $12384, $12385, $12386, $12387, $12388, VersionRange($12389, $12390)), ($12391, $12392, $12393, $12394, $12395, $12396, $12397, $12398, $12399, $12400, $12401, $12402, $12403, $12404, $12405, $12406, $12407, $12408, $12409, $12410, $12411, $12412, $12413, $12414, $12415, $12416, $12417, $12418, VersionRange($12419, $12420)), ($12421, $12422, $12423, $12424, $12425, $12426, $12427, $12428, $12429, $12430, $12431, $12432, $12433, $12434, $12435, $12436, $12437, $12438, $12439, $12440, $12441, $12442, $12443, $12444, $12445, $12446, $12447, $12448, VersionRange($12449, $12450)), ($12451, $12452, $12453, $12454, $12455, $12456, $12457, $12458, $12459, $12460, $12461, $12462, $12463, $12464, $12465, $12466, $12467, $12468, $12469, $12470, $12471, $12472, $12473, $12474, $12475, $12476, $12477, $12478, VersionRange($12479, $12480)), ($12481, $12482, $12483, $12484, $12485, $12486, $12487, $12488, $12489, $12490, $12491, $12492, $12493, $12494, $12495, $12496, $12497, $12498, $12499, $12500, $12501, $12502, $12503, $12504, $12505, $12506, $12507, $12508, VersionRange($12509, $12510)), ($12511, $12512, $12513, $12514, $12515, $12516, $12517, $12518, $12519, $12520, $12521, $12522, $12523, $12524, $12525, $12526, $12527, $12528, $12529, $12530, $12531, $12532, $12533, $12534, $12535, $12536, $12537, $12538, VersionRange($12539, $12540)), ($12541, $12542, $12543, $12544, $12545, $12546, $12547, $12548, $12549, $12550, $12551, $12552, $12553, $12554, $12555, $12556, $12557, $12558, $12559, $12560, $12561, $12562, $12563, $12564, $12565, $12566, $12567, $12568, VersionRange($12569, $12570)), ($12571, $12572, $12573, $12574, $12575, $12576, $12577, $12578, $12579, $12580, $12581, $12582, $12583, $12584, $12585, $12586, $12587, $12588, $12589, $12590, $12591, $12592, $12593, $12594, $12595, $12596, $12597, $12598, VersionRange($12599, $12600)), ($12601, $12602, $12603, $12604, $12605, $12606, $12607, $12608, $12609, $12610, $12611, $12612, $12613, $12614, $12615, $12616, $12617, $12618, $12619, $12620, $12621, $12622, $12623, $12624, $12625, $12626, $12627, $12628, VersionRange($12629, $12630)), ($12631, $12632, $12633, $12634, $12635, $12636, $12637, $12638, $12639, $12640, $12641, $12642, $12643, $12644, $12645, $12646, $12647, $12648, $12649, $12650, $12651, $12652, $12653, $12654, $12655, $12656, $12657, $12658, VersionRange($12659, $12660)), ($12661, $12662, $12663, $12664, $12665, $12666, $12667, $12668, $12669, $12670, $12671, $12672, $12673, $12674, $12675, $12676, $12677, $12678, $12679, $12680, $12681, $12682, $12683, $12684, $12685, $12686, $12687, $12688, VersionRange($12689, $12690)), ($12691, $12692, $12693, $12694, $12695, $12696, $12697, $12698, $12699, $12700, $12701, $12702, $12703, $12704, $12705, $12706, $12707, $12708, $12709, $12710, $12711, $12712, $12713, $12714, $12715, $12716, $12717, $12718, VersionRange($12719, $12720)), ($12721, $12722, $12723, $12724, $12725, $12726, $12727, $12728, $12729, $12730, $12731, $12732, $12733, $12734, $12735, $12736, $12737, $12738, $12739, $12740, $12741, $12742, $12743, $12744, $12745, $12746, $12747, $12748, VersionRange($12749, $12750)), ($12751, $12752, $12753, $12754, $12755, $12756, $12757, $12758, $12759, $12760, $12761, $12762, $12763, $12764, $12765, $12766, $12767, $12768, $12769, $12770, $12771, $12772, $12773, $12774, $12775, $12776, $12777, $12778, VersionRange($12779, $12780)), ($12781, $12782, $12783, $12784, $12785, $12786, $12787, $12788, $12789, $12790, $12791, $12792, $12793, $12794, $12795, $12796, $12797, $12798, $12799, $12800, $12801, $12802, $12803, $12804, $12805, $12806, $12807, $12808, VersionRange($12809, $12810)), ($12811, $12812, $12813, $12814, $12815, $12816, $12817, $12818, $12819, $12820, $12821, $12822, $12823, $12824, $12825, $12826, $12827, $12828, $12829, $12830, $12831, $12832, $12833, $12834, $12835, $12836, $12837, $12838, VersionRange($12839, $12840)), ($12841, $12842, $12843, $12844, $12845, $12846, $12847, $12848, $12849, $12850, $12851, $12852, $12853, $12854, $12855, $12856, $12857, $12858, $12859, $12860, $12861, $12862, $12863, $12864, $12865, $12866, $12867, $12868, VersionRange($12869, $12870)), ($12871, $12872, $12873, $12874, $12875, $12876, $12877, $12878, $12879, $12880, $12881, $12882, $12883, $12884, $12885, $12886, $12887, $12888, $12889, $12890, $12891, $12892, $12893, $12894, $12895, $12896, $12897, $12898, VersionRange($12899, $12900)), ($12901, $12902, $12903, $12904, $12905, $12906, $12907, $12908, $12909, $12910, $12911, $12912, $12913, $12914, $12915, $12916, $12917, $12918, $12919, $12920, $12921, $12922, $12923, $12924, $12925, $12926, $12927, $12928, VersionRange($12929, $12930)), ($12931, $12932, $12933, $12934, $12935, $12936, $12937, $12938, $12939, $12940, $12941, $12942, $12943, $12944, $12945, $12946, $12947, $12948, $12949, $12950, $12951, $12952, $12953, $12954, $12955, $12956, $12957, $12958, VersionRange($12959, $12960)), ($12961, $12962, $12963, $12964, $12965, $12966, $12967, $12968, $12969, $12970[...][ Date: 2023-07-04 18:39:25 ]
18 3s609ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30)), ($31, $32, $33, $34, $35, $36, $37, $38, $39, $40, $41, $42, $43, $44, $45, $46, $47, $48, $49, $50, $51, $52, $53, $54, $55, $56, $57, $58, VersionRange($59, $60)), ($61, $62, $63, $64, $65, $66, $67, $68, $69, $70, $71, $72, $73, $74, $75, $76, $77, $78, $79, $80, $81, $82, $83, $84, $85, $86, $87, $88, VersionRange($89, $90)), ($91, $92, $93, $94, $95, $96, $97, $98, $99, $100, $101, $102, $103, $104, $105, $106, $107, $108, $109, $110, $111, $112, $113, $114, $115, $116, $117, $118, VersionRange($119, $120)), ($121, $122, $123, $124, $125, $126, $127, $128, $129, $130, $131, $132, $133, $134, $135, $136, $137, $138, $139, $140, $141, $142, $143, $144, $145, $146, $147, $148, VersionRange($149, $150)), ($151, $152, $153, $154, $155, $156, $157, $158, $159, $160, $161, $162, $163, $164, $165, $166, $167, $168, $169, $170, $171, $172, $173, $174, $175, $176, $177, $178, VersionRange($179, $180)), ($181, $182, $183, $184, $185, $186, $187, $188, $189, $190, $191, $192, $193, $194, $195, $196, $197, $198, $199, $200, $201, $202, $203, $204, $205, $206, $207, $208, VersionRange($209, $210)), ($211, $212, $213, $214, $215, $216, $217, $218, $219, $220, $221, $222, $223, $224, $225, $226, $227, $228, $229, $230, $231, $232, $233, $234, $235, $236, $237, $238, VersionRange($239, $240)), ($241, $242, $243, $244, $245, $246, $247, $248, $249, $250, $251, $252, $253, $254, $255, $256, $257, $258, $259, $260, $261, $262, $263, $264, $265, $266, $267, $268, VersionRange($269, $270)), ($271, $272, $273, $274, $275, $276, $277, $278, $279, $280, $281, $282, $283, $284, $285, $286, $287, $288, $289, $290, $291, $292, $293, $294, $295, $296, $297, $298, VersionRange($299, $300)), ($301, $302, $303, $304, $305, $306, $307, $308, $309, $310, $311, $312, $313, $314, $315, $316, $317, $318, $319, $320, $321, $322, $323, $324, $325, $326, $327, $328, VersionRange($329, $330)), ($331, $332, $333, $334, $335, $336, $337, $338, $339, $340, $341, $342, $343, $344, $345, $346, $347, $348, $349, $350, $351, $352, $353, $354, $355, $356, $357, $358, VersionRange($359, $360)), ($361, $362, $363, $364, $365, $366, $367, $368, $369, $370, $371, $372, $373, $374, $375, $376, $377, $378, $379, $380, $381, $382, $383, $384, $385, $386, $387, $388, VersionRange($389, $390)), ($391, $392, $393, $394, $395, $396, $397, $398, $399, $400, $401, $402, $403, $404, $405, $406, $407, $408, $409, $410, $411, $412, $413, $414, $415, $416, $417, $418, VersionRange($419, $420)), ($421, $422, $423, $424, $425, $426, $427, $428, $429, $430, $431, $432, $433, $434, $435, $436, $437, $438, $439, $440, $441, $442, $443, $444, $445, $446, $447, $448, VersionRange($449, $450)), ($451, $452, $453, $454, $455, $456, $457, $458, $459, $460, $461, $462, $463, $464, $465, $466, $467, $468, $469, $470, $471, $472, $473, $474, $475, $476, $477, $478, VersionRange($479, $480)), ($481, $482, $483, $484, $485, $486, $487, $488, $489, $490, $491, $492, $493, $494, $495, $496, $497, $498, $499, $500, $501, $502, $503, $504, $505, $506, $507, $508, VersionRange($509, $510)), ($511, $512, $513, $514, $515, $516, $517, $518, $519, $520, $521, $522, $523, $524, $525, $526, $527, $528, $529, $530, $531, $532, $533, $534, $535, $536, $537, $538, VersionRange($539, $540)), ($541, $542, $543, $544, $545, $546, $547, $548, $549, $550, $551, $552, $553, $554, $555, $556, $557, $558, $559, $560, $561, $562, $563, $564, $565, $566, $567, $568, VersionRange($569, $570)), ($571, $572, $573, $574, $575, $576, $577, $578, $579, $580, $581, $582, $583, $584, $585, $586, $587, $588, $589, $590, $591, $592, $593, $594, $595, $596, $597, $598, VersionRange($599, $600)), ($601, $602, $603, $604, $605, $606, $607, $608, $609, $610, $611, $612, $613, $614, $615, $616, $617, $618, $619, $620, $621, $622, $623, $624, $625, $626, $627, $628, VersionRange($629, $630)), ($631, $632, $633, $634, $635, $636, $637, $638, $639, $640, $641, $642, $643, $644, $645, $646, $647, $648, $649, $650, $651, $652, $653, $654, $655, $656, $657, $658, VersionRange($659, $660)), ($661, $662, $663, $664, $665, $666, $667, $668, $669, $670, $671, $672, $673, $674, $675, $676, $677, $678, $679, $680, $681, $682, $683, $684, $685, $686, $687, $688, VersionRange($689, $690)), ($691, $692, $693, $694, $695, $696, $697, $698, $699, $700, $701, $702, $703, $704, $705, $706, $707, $708, $709, $710, $711, $712, $713, $714, $715, $716, $717, $718, VersionRange($719, $720)), ($721, $722, $723, $724, $725, $726, $727, $728, $729, $730, $731, $732, $733, $734, $735, $736, $737, $738, $739, $740, $741, $742, $743, $744, $745, $746, $747, $748, VersionRange($749, $750)), ($751, $752, $753, $754, $755, $756, $757, $758, $759, $760, $761, $762, $763, $764, $765, $766, $767, $768, $769, $770, $771, $772, $773, $774, $775, $776, $777, $778, VersionRange($779, $780)), ($781, $782, $783, $784, $785, $786, $787, $788, $789, $790, $791, $792, $793, $794, $795, $796, $797, $798, $799, $800, $801, $802, $803, $804, $805, $806, $807, $808, VersionRange($809, $810)), ($811, $812, $813, $814, $815, $816, $817, $818, $819, $820, $821, $822, $823, $824, $825, $826, $827, $828, $829, $830, $831, $832, $833, $834, $835, $836, $837, $838, VersionRange($839, $840)), ($841, $842, $843, $844, $845, $846, $847, $848, $849, $850, $851, $852, $853, $854, $855, $856, $857, $858, $859, $860, $861, $862, $863, $864, $865, $866, $867, $868, VersionRange($869, $870)), ($871, $872, $873, $874, $875, $876, $877, $878, $879, $880, $881, $882, $883, $884, $885, $886, $887, $888, $889, $890, $891, $892, $893, $894, $895, $896, $897, $898, VersionRange($899, $900)), ($901, $902, $903, $904, $905, $906, $907, $908, $909, $910, $911, $912, $913, $914, $915, $916, $917, $918, $919, $920, $921, $922, $923, $924, $925, $926, $927, $928, VersionRange($929, $930)), ($931, $932, $933, $934, $935, $936, $937, $938, $939, $940, $941, $942, $943, $944, $945, $946, $947, $948, $949, $950, $951, $952, $953, $954, $955, $956, $957, $958, VersionRange($959, $960)), ($961, $962, $963, $964, $965, $966, $967, $968, $969, $970, $971, $972, $973, $974, $975, $976, $977, $978, $979, $980, $981, $982, $983, $984, $985, $986, $987, $988, VersionRange($989, $990)), ($991, $992, $993, $994, $995, $996, $997, $998, $999, $1000, $1001, $1002, $1003, $1004, $1005, $1006, $1007, $1008, $1009, $1010, $1011, $1012, $1013, $1014, $1015, $1016, $1017, $1018, VersionRange($1019, $1020)), ($1021, $1022, $1023, $1024, $1025, $1026, $1027, $1028, $1029, $1030, $1031, $1032, $1033, $1034, $1035, $1036, $1037, $1038, $1039, $1040, $1041, $1042, $1043, $1044, $1045, $1046, $1047, $1048, VersionRange($1049, $1050)), ($1051, $1052, $1053, $1054, $1055, $1056, $1057, $1058, $1059, $1060, $1061, $1062, $1063, $1064, $1065, $1066, $1067, $1068, $1069, $1070, $1071, $1072, $1073, $1074, $1075, $1076, $1077, $1078, VersionRange($1079, $1080)), ($1081, $1082, $1083, $1084, $1085, $1086, $1087, $1088, $1089, $1090, $1091, $1092, $1093, $1094, $1095, $1096, $1097, $1098, $1099, $1100, $1101, $1102, $1103, $1104, $1105, $1106, $1107, $1108, VersionRange($1109, $1110)), ($1111, $1112, $1113, $1114, $1115, $1116, $1117, $1118, $1119, $1120, $1121, $1122, $1123, $1124, $1125, $1126, $1127, $1128, $1129, $1130, $1131, $1132, $1133, $1134, $1135, $1136, $1137, $1138, VersionRange($1139, $1140)), ($1141, $1142, $1143, $1144, $1145, $1146, $1147, $1148, $1149, $1150, $1151, $1152, $1153, $1154, $1155, $1156, $1157, $1158, $1159, $1160, $1161, $1162, $1163, $1164, $1165, $1166, $1167, $1168, VersionRange($1169, $1170)), ($1171, $1172, $1173, $1174, $1175, $1176, $1177, $1178, $1179, $1180, $1181, $1182, $1183, $1184, $1185, $1186, $1187, $1188, $1189, $1190, $1191, $1192, $1193, $1194, $1195, $1196, $1197, $1198, VersionRange($1199, $1200)), ($1201, $1202, $1203, $1204, $1205, $1206, $1207, $1208, $1209, $1210, $1211, $1212, $1213, $1214, $1215, $1216, $1217, $1218, $1219, $1220, $1221, $1222, $1223, $1224, $1225, $1226, $1227, $1228, VersionRange($1229, $1230)), ($1231, $1232, $1233, $1234, $1235, $1236, $1237, $1238, $1239, $1240, $1241, $1242, $1243, $1244, $1245, $1246, $1247, $1248, $1249, $1250, $1251, $1252, $1253, $1254, $1255, $1256, $1257, $1258, VersionRange($1259, $1260)), ($1261, $1262, $1263, $1264, $1265, $1266, $1267, $1268, $1269, $1270, $1271, $1272, $1273, $1274, $1275, $1276, $1277, $1278, $1279, $1280, $1281, $1282, $1283, $1284, $1285, $1286, $1287, $1288, VersionRange($1289, $1290)), ($1291, $1292, $1293, $1294, $1295, $1296, $1297, $1298, $1299, $1300, $1301, $1302, $1303, $1304, $1305, $1306, $1307, $1308, $1309, $1310, $1311, $1312, $1313, $1314, $1315, $1316, $1317, $1318, VersionRange($1319, $1320)), ($1321, $1322, $1323, $1324, $1325, $1326, $1327, $1328, $1329, $1330, $1331, $1332, $1333, $1334, $1335, $1336, $1337, $1338, $1339, $1340, $1341, $1342, $1343, $1344, $1345, $1346, $1347, $1348, VersionRange($1349, $1350)), ($1351, $1352, $1353, $1354, $1355, $1356, $1357, $1358, $1359, $1360, $1361, $1362, $1363, $1364, $1365, $1366, $1367, $1368, $1369, $1370, $1371, $1372, $1373, $1374, $1375, $1376, $1377, $1378, VersionRange($1379, $1380)), ($1381, $1382, $1383, $1384, $1385, $1386, $1387, $1388, $1389, $1390, $1391, $1392, $1393, $1394, $1395, $1396, $1397, $1398, $1399, $1400, $1401, $1402, $1403, $1404, $1405, $1406, $1407, $1408, VersionRange($1409, $1410)), ($1411, $1412, $1413, $1414, $1415, $1416, $1417, $1418, $1419, $1420, $1421, $1422, $1423, $1424, $1425, $1426, $1427, $1428, $1429, $1430, $1431, $1432, $1433, $1434, $1435, $1436, $1437, $1438, VersionRange($1439, $1440)), ($1441, $1442, $1443, $1444, $1445, $1446, $1447, $1448, $1449, $1450, $1451, $1452, $1453, $1454, $1455, $1456, $1457, $1458, $1459, $1460, $1461, $1462, $1463, $1464, $1465, $1466, $1467, $1468, VersionRange($1469, $1470)), ($1471, $1472, $1473, $1474, $1475, $1476, $1477, $1478, $1479, $1480, $1481, $1482, $1483, $1484, $1485, $1486, $1487, $1488, $1489, $1490, $1491, $1492, $1493, $1494, $1495, $1496, $1497, $1498, VersionRange($1499, $1500)), ($1501, $1502, $1503, $1504, $1505, $1506, $1507, $1508, $1509, $1510, $1511, $1512, $1513, $1514, $1515, $1516, $1517, $1518, $1519, $1520, $1521, $1522, $1523, $1524, $1525, $1526, $1527, $1528, VersionRange($1529, $1530)), ($1531, $1532, $1533, $1534, $1535, $1536, $1537, $1538, $1539, $1540, $1541, $1542, $1543, $1544, $1545, $1546, $1547, $1548, $1549, $1550, $1551, $1552, $1553, $1554, $1555, $1556, $1557, $1558, VersionRange($1559, $1560)), ($1561, $1562, $1563, $1564, $1565, $1566, $1567, $1568, $1569, $1570, $1571, $1572, $1573, $1574, $1575, $1576, $1577, $1578, $1579, $1580, $1581, $1582, $1583, $1584, $1585, $1586, $1587, $1588, VersionRange($1589, $1590)), ($1591, $1592, $1593, $1594, $1595, $1596, $1597, $1598, $1599, $1600, $1601, $1602, $1603, $1604, $1605, $1606, $1607, $1608, $1609, $1610, $1611, $1612, $1613, $1614, $1615, $1616, $1617, $1618, VersionRange($1619, $1620)), ($1621, $1622, $1623, $1624, $1625, $1626, $1627, $1628, $1629, $1630, $1631, $1632, $1633, $1634, $1635, $1636, $1637, $1638, $1639, $1640, $1641, $1642, $1643, $1644, $1645, $1646, $1647, $1648, VersionRange($1649, $1650)), ($1651, $1652, $1653, $1654, $1655, $1656, $1657, $1658, $1659, $1660, $1661, $1662, $1663, $1664, $1665, $1666, $1667, $1668, $1669, $1670, $1671, $1672, $1673, $1674, $1675, $1676, $1677, $1678, VersionRange($1679, $1680)), ($1681, $1682, $1683, $1684, $1685, $1686, $1687, $1688, $1689, $1690, $1691, $1692, $1693, $1694, $1695, $1696, $1697, $1698, $1699, $1700, $1701, $1702, $1703, $1704, $1705, $1706, $1707, $1708, VersionRange($1709, $1710)), ($1711, $1712, $1713, $1714, $1715, $1716, $1717, $1718, $1719, $1720, $1721, $1722, $1723, $1724, $1725, $1726, $1727, $1728, $1729, $1730, $1731, $1732, $1733, $1734, $1735, $1736, $1737, $1738, VersionRange($1739, $1740)), ($1741, $1742, $1743, $1744, $1745, $1746, $1747, $1748, $1749, $1750, $1751, $1752, $1753, $1754, $1755, $1756, $1757, $1758, $1759, $1760, $1761, $1762, $1763, $1764, $1765, $1766, $1767, $1768, VersionRange($1769, $1770)), ($1771, $1772, $1773, $1774, $1775, $1776, $1777, $1778, $1779, $1780, $1781, $1782, $1783, $1784, $1785, $1786, $1787, $1788, $1789, $1790, $1791, $1792, $1793, $1794, $1795, $1796, $1797, $1798, VersionRange($1799, $1800)), ($1801, $1802, $1803, $1804, $1805, $1806, $1807, $1808, $1809, $1810, $1811, $1812, $1813, $1814, $1815, $1816, $1817, $1818, $1819, $1820, $1821, $1822, $1823, $1824, $1825, $1826, $1827, $1828, VersionRange($1829, $1830)), ($1831, $1832, $1833, $1834, $1835, $1836, $1837, $1838, $1839, $1840, $1841, $1842, $1843, $1844, $1845, $1846, $1847, $1848, $1849, $1850, $1851, $1852, $1853, $1854, $1855, $1856, $1857, $1858, VersionRange($1859, $1860)), ($1861, $1862, $1863, $1864, $1865, $1866, $1867, $1868, $1869, $1870, $1871, $1872, $1873, $1874, $1875, $1876, $1877, $1878, $1879, $1880, $1881, $1882, $1883, $1884, $1885, $1886, $1887, $1888, VersionRange($1889, $1890)), ($1891, $1892, $1893, $1894, $1895, $1896, $1897, $1898, $1899, $1900, $1901, $1902, $1903, $1904, $1905, $1906, $1907, $1908, $1909, $1910, $1911, $1912, $1913, $1914, $1915, $1916, $1917, $1918, VersionRange($1919, $1920)), ($1921, $1922, $1923, $1924, $1925, $1926, $1927, $1928, $1929, $1930, $1931, $1932, $1933, $1934, $1935, $1936, $1937, $1938, $1939, $1940, $1941, $1942, $1943, $1944, $1945, $1946, $1947, $1948, VersionRange($1949, $1950)), ($1951, $1952, $1953, $1954, $1955, $1956, $1957, $1958, $1959, $1960, $1961, $1962, $1963, $1964, $1965, $1966, $1967, $1968, $1969, $1970, $1971, $1972, $1973, $1974, $1975, $1976, $1977, $1978, VersionRange($1979, $1980)), ($1981, $1982, $1983, $1984, $1985, $1986, $1987, $1988, $1989, $1990, $1991, $1992, $1993, $1994, $1995, $1996, $1997, $1998, $1999, $2000, $2001, $2002, $2003, $2004, $2005, $2006, $2007, $2008, VersionRange($2009, $2010)), ($2011, $2012, $2013, $2014, $2015, $2016, $2017, $2018, $2019, $2020, $2021, $2022, $2023, $2024, $2025, $2026, $2027, $2028, $2029, $2030, $2031, $2032, $2033, $2034, $2035, $2036, $2037, $2038, VersionRange($2039, $2040)), ($2041, $2042, $2043, $2044, $2045, $2046, $2047, $2048, $2049, $2050, $2051, $2052, $2053, $2054, $2055, $2056, $2057, $2058, $2059, $2060, $2061, $2062, $2063, $2064, $2065, $2066, $2067, $2068, VersionRange($2069, $2070)), ($2071, $2072, $2073, $2074, $2075, $2076, $2077, $2078, $2079, $2080, $2081, $2082, $2083, $2084, $2085, $2086, $2087, $2088, $2089, $2090, $2091, $2092, $2093, $2094, $2095, $2096, $2097, $2098, VersionRange($2099, $2100)), ($2101, $2102, $2103, $2104, $2105, $2106, $2107, $2108, $2109, $2110, $2111, $2112, $2113, $2114, $2115, $2116, $2117, $2118, $2119, $2120, $2121, $2122, $2123, $2124, $2125, $2126, $2127, $2128, VersionRange($2129, $2130)), ($2131, $2132, $2133, $2134, $2135, $2136, $2137, $2138, $2139, $2140, $2141, $2142, $2143, $2144, $2145, $2146, $2147, $2148, $2149, $2150, $2151, $2152, $2153, $2154, $2155, $2156, $2157, $2158, VersionRange($2159, $2160)), ($2161, $2162, $2163, $2164, $2165, $2166, $2167, $2168, $2169, $2170, $2171, $2172, $2173, $2174, $2175, $2176, $2177, $2178, $2179, $2180, $2181, $2182, $2183, $2184, $2185, $2186, $2187, $2188, VersionRange($2189, $2190)), ($2191, $2192, $2193, $2194, $2195, $2196, $2197, $2198, $2199, $2200, $2201, $2202, $2203, $2204, $2205, $2206, $2207, $2208, $2209, $2210, $2211, $2212, $2213, $2214, $2215, $2216, $2217, $2218, VersionRange($2219, $2220)), ($2221, $2222, $2223, $2224, $2225, $2226, $2227, $2228, $2229, $2230, $2231, $2232, $2233, $2234, $2235, $2236, $2237, $2238, $2239, $2240, $2241, $2242, $2243, $2244, $2245, $2246, $2247, $2248, VersionRange($2249, $2250)), ($2251, $2252, $2253, $2254, $2255, $2256, $2257, $2258, $2259, $2260, $2261, $2262, $2263, $2264, $2265, $2266, $2267, $2268, $2269, $2270, $2271, $2272, $2273, $2274, $2275, $2276, $2277, $2278, VersionRange($2279, $2280)), ($2281, $2282, $2283, $2284, $2285, $2286, $2287, $2288, $2289, $2290, $2291, $2292, $2293, $2294, $2295, $2296, $2297, $2298, $2299, $2300, $2301, $2302, $2303, $2304, $2305, $2306, $2307, $2308, VersionRange($2309, $2310)), ($2311, $2312, $2313, $2314, $2315, $2316, $2317, $2318, $2319, $2320, $2321, $2322, $2323, $2324, $2325, $2326, $2327, $2328, $2329, $2330, $2331, $2332, $2333, $2334, $2335, $2336, $2337, $2338, VersionRange($2339, $2340)), ($2341, $2342, $2343, $2344, $2345, $2346, $2347, $2348, $2349, $2350, $2351, $2352, $2353, $2354, $2355, $2356, $2357, $2358, $2359, $2360, $2361, $2362, $2363, $2364, $2365, $2366, $2367, $2368, VersionRange($2369, $2370)), ($2371, $2372, $2373, $2374, $2375, $2376, $2377, $2378, $2379, $2380, $2381, $2382, $2383, $2384, $2385, $2386, $2387, $2388, $2389, $2390, $2391, $2392, $2393, $2394, $2395, $2396, $2397, $2398, VersionRange($2399, $2400)), ($2401, $2402, $2403, $2404, $2405, $2406, $2407, $2408, $2409, $2410, $2411, $2412, $2413, $2414, $2415, $2416, $2417, $2418, $2419, $2420, $2421, $2422, $2423, $2424, $2425, $2426, $2427, $2428, VersionRange($2429, $2430)), ($2431, $2432, $2433, $2434, $2435, $2436, $2437, $2438, $2439, $2440, $2441, $2442, $2443, $2444, $2445, $2446, $2447, $2448, $2449, $2450, $2451, $2452, $2453, $2454, $2455, $2456, $2457, $2458, VersionRange($2459, $2460)), ($2461, $2462, $2463, $2464, $2465, $2466, $2467, $2468, $2469, $2470, $2471, $2472, $2473, $2474, $2475, $2476, $2477, $2478, $2479, $2480, $2481, $2482, $2483, $2484, $2485, $2486, $2487, $2488, VersionRange($2489, $2490)), ($2491, $2492, $2493, $2494, $2495, $2496, $2497, $2498, $2499, $2500, $2501, $2502, $2503, $2504, $2505, $2506, $2507, $2508, $2509, $2510, $2511, $2512, $2513, $2514, $2515, $2516, $2517, $2518, VersionRange($2519, $2520)), ($2521, $2522, $2523, $2524, $2525, $2526, $2527, $2528, $2529, $2530, $2531, $2532, $2533, $2534, $2535, $2536, $2537, $2538, $2539, $2540, $2541, $2542, $2543, $2544, $2545, $2546, $2547, $2548, VersionRange($2549, $2550)), ($2551, $2552, $2553, $2554, $2555, $2556, $2557, $2558, $2559, $2560, $2561, $2562, $2563, $2564, $2565, $2566, $2567, $2568, $2569, $2570, $2571, $2572, $2573, $2574, $2575, $2576, $2577, $2578, VersionRange($2579, $2580)), ($2581, $2582, $2583, $2584, $2585, $2586, $2587, $2588, $2589, $2590, $2591, $2592, $2593, $2594, $2595, $2596, $2597, $2598, $2599, $2600, $2601, $2602, $2603, $2604, $2605, $2606, $2607, $2608, VersionRange($2609, $2610)), ($2611, $2612, $2613, $2614, $2615, $2616, $2617, $2618, $2619, $2620, $2621, $2622, $2623, $2624, $2625, $2626, $2627, $2628, $2629, $2630, $2631, $2632, $2633, $2634, $2635, $2636, $2637, $2638, VersionRange($2639, $2640)), ($2641, $2642, $2643, $2644, $2645, $2646, $2647, $2648, $2649, $2650, $2651, $2652, $2653, $2654, $2655, $2656, $2657, $2658, $2659, $2660, $2661, $2662, $2663, $2664, $2665, $2666, $2667, $2668, VersionRange($2669, $2670)), ($2671, $2672, $2673, $2674, $2675, $2676, $2677, $2678, $2679, $2680, $2681, $2682, $2683, $2684, $2685, $2686, $2687, $2688, $2689, $2690, $2691, $2692, $2693, $2694, $2695, $2696, $2697, $2698, VersionRange($2699, $2700)), ($2701, $2702, $2703, $2704, $2705, $2706, $2707, $2708, $2709, $2710, $2711, $2712, $2713, $2714, $2715, $2716, $2717, $2718, $2719, $2720, $2721, $2722, $2723, $2724, $2725, $2726, $2727, $2728, VersionRange($2729, $2730)), ($2731, $2732, $2733, $2734, $2735, $2736, $2737, $2738, $2739, $2740, $2741, $2742, $2743, $2744, $2745, $2746, $2747, $2748, $2749, $2750, $2751, $2752, $2753, $2754, $2755, $2756, $2757, $2758, VersionRange($2759, $2760)), ($2761, $2762, $2763, $2764, $2765, $2766, $2767, $2768, $2769, $2770, $2771, $2772, $2773, $2774, $2775, $2776, $2777, $2778, $2779, $2780, $2781, $2782, $2783, $2784, $2785, $2786, $2787, $2788, VersionRange($2789, $2790)), ($2791, $2792, $2793, $2794, $2795, $2796, $2797, $2798, $2799, $2800, $2801, $2802, $2803, $2804, $2805, $2806, $2807, $2808, $2809, $2810, $2811, $2812, $2813, $2814, $2815, $2816, $2817, $2818, VersionRange($2819, $2820)), ($2821, $2822, $2823, $2824, $2825, $2826, $2827, $2828, $2829, $2830, $2831, $2832, $2833, $2834, $2835, $2836, $2837, $2838, $2839, $2840, $2841, $2842, $2843, $2844, $2845, $2846, $2847, $2848, VersionRange($2849, $2850)), ($2851, $2852, $2853, $2854, $2855, $2856, $2857, $2858, $2859, $2860, $2861, $2862, $2863, $2864, $2865, $2866, $2867, $2868, $2869, $2870, $2871, $2872, $2873, $2874, $2875, $2876, $2877, $2878, VersionRange($2879, $2880)), ($2881, $2882, $2883, $2884, $2885, $2886, $2887, $2888, $2889, $2890, $2891, $2892, $2893, $2894, $2895, $2896, $2897, $2898, $2899, $2900, $2901, $2902, $2903, $2904, $2905, $2906, $2907, $2908, VersionRange($2909, $2910)), ($2911, $2912, $2913, $2914, $2915, $2916, $2917, $2918, $2919, $2920, $2921, $2922, $2923, $2924, $2925, $2926, $2927, $2928, $2929, $2930, $2931, $2932, $2933, $2934, $2935, $2936, $2937, $2938, VersionRange($2939, $2940)), ($2941, $2942, $2943, $2944, $2945, $2946, $2947, $2948, $2949, $2950, $2951, $2952, $2953, $2954, $2955, $2956, $2957, $2958, $2959, $2960, $2961, $2962, $2963, $2964, $2965, $2966, $2967, $2968, VersionRange($2969, $2970)), ($2971, $2972, $2973, $2974, $2975, $2976, $2977, $2978, $2979, $2980, $2981, $2982, $2983, $2984, $2985, $2986, $2987, $2988, $2989, $2990, $2991, $2992, $2993, $2994, $2995, $2996, $2997, $2998, VersionRange($2999, $3000)), ($3001, $3002, $3003, $3004, $3005, $3006, $3007, $3008, $3009, $3010, $3011, $3012, $3013, $3014, $3015, $3016, $3017, $3018, $3019, $3020, $3021, $3022, $3023, $3024, $3025, $3026, $3027, $3028, VersionRange($3029, $3030)), ($3031, $3032, $3033, $3034, $3035, $3036, $3037, $3038, $3039, $3040, $3041, $3042, $3043, $3044, $3045, $3046, $3047, $3048, $3049, $3050, $3051, $3052, $3053, $3054, $3055, $3056, $3057, $3058, VersionRange($3059, $3060)), ($3061, $3062, $3063, $3064, $3065, $3066, $3067, $3068, $3069, $3070, $3071, $3072, $3073, $3074, $3075, $3076, $3077, $3078, $3079, $3080, $3081, $3082, $3083, $3084, $3085, $3086, $3087, $3088, VersionRange($3089, $3090)), ($3091, $3092, $3093, $3094, $3095, $3096, $3097, $3098, $3099, $3100, $3101, $3102, $3103, $3104, $3105, $3106, $3107, $3108, $3109, $3110, $3111, $3112, $3113, $3114, $3115, $3116, $3117, $3118, VersionRange($3119, $3120)), ($3121, $3122, $3123, $3124, $3125, $3126, $3127, $3128, $3129, $3130, $3131, $3132, $3133, $3134, $3135, $3136, $3137, $3138, $3139, $3140, $3141, $3142, $3143, $3144, $3145, $3146, $3147, $3148, VersionRange($3149, $3150)), ($3151, $3152, $3153, $3154, $3155, $3156, $3157, $3158, $3159, $3160, $3161, $3162, $3163, $3164, $3165, $3166, $3167, $3168, $3169, $3170, $3171, $3172, $3173, $3174, $3175, $3176, $3177, $3178, VersionRange($3179, $3180)), ($3181, $3182, $3183, $3184, $3185, $3186, $3187, $3188, $3189, $3190, $3191, $3192, $3193, $3194, $3195, $3196, $3197, $3198, $3199, $3200, $3201, $3202, $3203, $3204, $3205, $3206, $3207, $3208, VersionRange($3209, $3210)), ($3211, $3212, $3213, $3214, $3215, $3216, $3217, $3218, $3219, $3220, $3221, $3222, $3223, $3224, $3225, $3226, $3227, $3228, $3229, $3230, $3231, $3232, $3233, $3234, $3235, $3236, $3237, $3238, VersionRange($3239, $3240)), ($3241, $3242, $3243, $3244, $3245, $3246, $3247, $3248, $3249, $3250, $3251, $3252, $3253, $3254, $3255, $3256, $3257, $3258, $3259, $3260, $3261, $3262, $3263, $3264, $3265, $3266, $3267, $3268, VersionRange($3269, $3270)), ($3271, $3272, $3273, $3274, $3275, $3276, $3277, $3278, $3279, $3280, $3281, $3282, $3283, $3284, $3285, $3286, $3287, $3288, $3289, $3290, $3291, $3292, $3293, $3294, $3295, $3296, $3297, $3298, VersionRange($3299, $3300)), ($3301, $3302, $3303, $3304, $3305, $3306, $3307, $3308, $3309, $3310, $3311, $3312, $3313, $3314, $3315, $3316, $3317, $3318, $3319, $3320, $3321, $3322, $3323, $3324, $3325, $3326, $3327, $3328, VersionRange($3329, $3330)), ($3331, $3332, $3333, $3334, $3335, $3336, $3337, $3338, $3339, $3340, $3341, $3342, $3343, $3344, $3345, $3346, $3347, $3348, $3349, $3350, $3351, $3352, $3353, $3354, $3355, $3356, $3357, $3358, VersionRange($3359, $3360)), ($3361, $3362, $3363, $3364, $3365, $3366, $3367, $3368, $3369, $3370, $3371, $3372, $3373, $3374, $3375, $3376, $3377, $3378, $3379, $3380, $3381, $3382, $3383, $3384, $3385, $3386, $3387, $3388, VersionRange($3389, $3390)), ($3391, $3392, $3393, $3394, $3395, $3396, $3397, $3398, $3399, $3400, $3401, $3402, $3403, $3404, $3405, $3406, $3407, $3408, $3409, $3410, $3411, $3412, $3413, $3414, $3415, $3416, $3417, $3418, VersionRange($3419, $3420)), ($3421, $3422, $3423, $3424, $3425, $3426, $3427, $3428, $3429, $3430, $3431, $3432, $3433, $3434, $3435, $3436, $3437, $3438, $3439, $3440, $3441, $3442, $3443, $3444, $3445, $3446, $3447, $3448, VersionRange($3449, $3450)), ($3451, $3452, $3453, $3454, $3455, $3456, $3457, $3458, $3459, $3460, $3461, $3462, $3463, $3464, $3465, $3466, $3467, $3468, $3469, $3470, $3471, $3472, $3473, $3474, $3475, $3476, $3477, $3478, VersionRange($3479, $3480)), ($3481, $3482, $3483, $3484, $3485, $3486, $3487, $3488, $3489, $3490, $3491, $3492, $3493, $3494, $3495, $3496, $3497, $3498, $3499, $3500, $3501, $3502, $3503, $3504, $3505, $3506, $3507, $3508, VersionRange($3509, $3510)), ($3511, $3512, $3513, $3514, $3515, $3516, $3517, $3518, $3519, $3520, $3521, $3522, $3523, $3524, $3525, $3526, $3527, $3528, $3529, $3530, $3531, $3532, $3533, $3534, $3535, $3536, $3537, $3538, VersionRange($3539, $3540)), ($3541, $3542, $3543, $3544, $3545, $3546, $3547, $3548, $3549, $3550, $3551, $3552, $3553, $3554, $3555, $3556, $3557, $3558, $3559, $3560, $3561, $3562, $3563, $3564, $3565, $3566, $3567, $3568, VersionRange($3569, $3570)), ($3571, $3572, $3573, $3574, $3575, $3576, $3577, $3578, $3579, $3580, $3581, $3582, $3583, $3584, $3585, $3586, $3587, $3588, $3589, $3590, $3591, $3592, $3593, $3594, $3595, $3596, $3597, $3598, VersionRange($3599, $3600)), ($3601, $3602, $3603, $3604, $3605, $3606, $3607, $3608, $3609, $3610, $3611, $3612, $3613, $3614, $3615, $3616, $3617, $3618, $3619, $3620, $3621, $3622, $3623, $3624, $3625, $3626, $3627, $3628, VersionRange($3629, $3630)), ($3631, $3632, $3633, $3634, $3635, $3636, $3637, $3638, $3639, $3640, $3641, $3642, $3643, $3644, $3645, $3646, $3647, $3648, $3649, $3650, $3651, $3652, $3653, $3654, $3655, $3656, $3657, $3658, VersionRange($3659, $3660)), ($3661, $3662, $3663, $3664, $3665, $3666, $3667, $3668, $3669, $3670, $3671, $3672, $3673, $3674, $3675, $3676, $3677, $3678, $3679, $3680, $3681, $3682, $3683, $3684, $3685, $3686, $3687, $3688, VersionRange($3689, $3690)), ($3691, $3692, $3693, $3694, $3695, $3696, $3697, $3698, $3699, $3700, $3701, $3702, $3703, $3704, $3705, $3706, $3707, $3708, $3709, $3710, $3711, $3712, $3713, $3714, $3715, $3716, $3717, $3718, VersionRange($3719, $3720)), ($3721, $3722, $3723, $3724, $3725, $3726, $3727, $3728, $3729, $3730, $3731, $3732, $3733, $3734, $3735, $3736, $3737, $3738, $3739, $3740, $3741, $3742, $3743, $3744, $3745, $3746, $3747, $3748, VersionRange($3749, $3750)), ($3751, $3752, $3753, $3754, $3755, $3756, $3757, $3758, $3759, $3760, $3761, $3762, $3763, $3764, $3765, $3766, $3767, $3768, $3769, $3770, $3771, $3772, $3773, $3774, $3775, $3776, $3777, $3778, VersionRange($3779, $3780)), ($3781, $3782, $3783, $3784, $3785, $3786, $3787, $3788, $3789, $3790, $3791, $3792, $3793, $3794, $3795, $3796, $3797, $3798, $3799, $3800, $3801, $3802, $3803, $3804, $3805, $3806, $3807, $3808, VersionRange($3809, $3810)), ($3811, $3812, $3813, $3814, $3815, $3816, $3817, $3818, $3819, $3820, $3821, $3822, $3823, $3824, $3825, $3826, $3827, $3828, $3829, $3830, $3831, $3832, $3833, $3834, $3835, $3836, $3837, $3838, VersionRange($3839, $3840)), ($3841, $3842, $3843, $3844, $3845, $3846, $3847, $3848, $3849, $3850, $3851, $3852, $3853, $3854, $3855, $3856, $3857, $3858, $3859, $3860, $3861, $3862, $3863, $3864, $3865, $3866, $3867, $3868, VersionRange($3869, $3870)), ($3871, $3872, $3873, $3874, $3875, $3876, $3877, $3878, $3879, $3880, $3881, $3882, $3883, $3884, $3885, $3886, $3887, $3888, $3889, $3890, $3891, $3892, $3893, $3894, $3895, $3896, $3897, $3898, VersionRange($3899, $3900)), ($3901, $3902, $3903, $3904, $3905, $3906, $3907, $3908, $3909, $3910, $3911, $3912, $3913, $3914, $3915, $3916, $3917, $3918, $3919, $3920, $3921, $3922, $3923, $3924, $3925, $3926, $3927, $3928, VersionRange($3929, $3930)), ($3931, $3932, $3933, $3934, $3935, $3936, $3937, $3938, $3939, $3940, $3941, $3942, $3943, $3944, $3945, $3946, $3947, $3948, $3949, $3950, $3951, $3952, $3953, $3954, $3955, $3956, $3957, $3958, VersionRange($3959, $3960)), ($3961, $3962, $3963, $3964, $3965, $3966, $3967, $3968, $3969, $3970, $3971, $3972, $3973, $3974, $3975, $3976, $3977, $3978, $3979, $3980, $3981, $3982, $3983, $3984, $3985, $3986, $3987, $3988, VersionRange($3989, $3990)), ($3991, $3992, $3993, $3994, $3995, $3996, $3997, $3998, $3999, $4000, $4001, $4002, $4003, $4004, $4005, $4006, $4007, $4008, $4009, $4010, $4011, $4012, $4013, $4014, $4015, $4016, $4017, $4018, VersionRange($4019, $4020)), ($4021, $4022, $4023, $4024, $4025, $4026, $4027, $4028, $4029, $4030, $4031, $4032, $4033, $4034, $4035, $4036, $4037, $4038, $4039, $4040, $4041, $4042, $4043, $4044, $4045, $4046, $4047, $4048, VersionRange($4049, $4050)), ($4051, $4052, $4053, $4054, $4055, $4056, $4057, $4058, $4059, $4060, $4061, $4062, $4063, $4064, $4065, $4066, $4067, $4068, $4069, $4070, $4071, $4072, $4073, $4074, $4075, $4076, $4077, $4078, VersionRange($4079, $4080)), ($4081, $4082, $4083, $4084, $4085, $4086, $4087, $4088, $4089, $4090, $4091, $4092, $4093, $4094, $4095, $4096, $4097, $4098, $4099, $4100, $4101, $4102, $4103, $4104, $4105, $4106, $4107, $4108, VersionRange($4109, $4110)), ($4111, $4112, $4113, $4114, $4115, $4116, $4117, $4118, $4119, $4120, $4121, $4122, $4123, $4124, $4125, $4126, $4127, $4128, $4129, $4130, $4131, $4132, $4133, $4134, $4135, $4136, $4137, $4138, VersionRange($4139, $4140)), ($4141, $4142, $4143, $4144, $4145, $4146, $4147, $4148, $4149, $4150, $4151, $4152, $4153, $4154, $4155, $4156, $4157, $4158, $4159, $4160, $4161, $4162, $4163, $4164, $4165, $4166, $4167, $4168, VersionRange($4169, $4170)), ($4171, $4172, $4173, $4174, $4175, $4176, $4177, $4178, $4179, $4180, $4181, $4182, $4183, $4184, $4185, $4186, $4187, $4188, $4189, $4190, $4191, $4192, $4193, $4194, $4195, $4196, $4197, $4198, VersionRange($4199, $4200)), ($4201, $4202, $4203, $4204, $4205, $4206, $4207, $4208, $4209, $4210, $4211, $4212, $4213, $4214, $4215, $4216, $4217, $4218, $4219, $4220, $4221, $4222, $4223, $4224, $4225, $4226, $4227, $4228, VersionRange($4229, $4230)), ($4231, $4232, $4233, $4234, $4235, $4236, $4237, $4238, $4239, $4240, $4241, $4242, $4243, $4244, $4245, $4246, $4247, $4248, $4249, $4250, $4251, $4252, $4253, $4254, $4255, $4256, $4257, $4258, VersionRange($4259, $4260)), ($4261, $4262, $4263, $4264, $4265, $4266, $4267, $4268, $4269, $4270, $4271, $4272, $4273, $4274, $4275, $4276, $4277, $4278, $4279, $4280, $4281, $4282, $4283, $4284, $4285, $4286, $4287, $4288, VersionRange($4289, $4290)), ($4291, $4292, $4293, $4294, $4295, $4296, $4297, $4298, $4299, $4300, $4301, $4302, $4303, $4304, $4305, $4306, $4307, $4308, $4309, $4310, $4311, $4312, $4313, $4314, $4315, $4316, $4317, $4318, VersionRange($4319, $4320)), ($4321, $4322, $4323, $4324, $4325, $4326, $4327, $4328, $4329, $4330, $4331, $4332, $4333, $4334, $4335, $4336, $4337, $4338, $4339, $4340, $4341, $4342, $4343, $4344, $4345, $4346, $4347, $4348, VersionRange($4349, $4350)), ($4351, $4352, $4353, $4354, $4355, $4356, $4357, $4358, $4359, $4360, $4361, $4362, $4363, $4364, $4365, $4366, $4367, $4368, $4369, $4370, $4371, $4372, $4373, $4374, $4375, $4376, $4377, $4378, VersionRange($4379, $4380)), ($4381, $4382, $4383, $4384, $4385, $4386, $4387, $4388, $4389, $4390, $4391, $4392, $4393, $4394, $4395, $4396, $4397, $4398, $4399, $4400, $4401, $4402, $4403, $4404, $4405, $4406, $4407, $4408, VersionRange($4409, $4410)), ($4411, $4412, $4413, $4414, $4415, $4416, $4417, $4418, $4419, $4420, $4421, $4422, $4423, $4424, $4425, $4426, $4427, $4428, $4429, $4430, $4431, $4432, $4433, $4434, $4435, $4436, $4437, $4438, VersionRange($4439, $4440)), ($4441, $4442, $4443, $4444, $4445, $4446, $4447, $4448, $4449, $4450, $4451, $4452, $4453, $4454, $4455, $4456, $4457, $4458, $4459, $4460, $4461, $4462, $4463, $4464, $4465, $4466, $4467, $4468, VersionRange($4469, $4470)), ($4471, $4472, $4473, $4474, $4475, $4476, $4477, $4478, $4479, $4480, $4481, $4482, $4483, $4484, $4485, $4486, $4487, $4488, $4489, $4490, $4491, $4492, $4493, $4494, $4495, $4496, $4497, $4498, VersionRange($4499, $4500)), ($4501, $4502, $4503, $4504, $4505, $4506, $4507, $4508, $4509, $4510, $4511, $4512, $4513, $4514, $4515, $4516, $4517, $4518, $4519, $4520, $4521, $4522, $4523, $4524, $4525, $4526, $4527, $4528, VersionRange($4529, $4530)), ($4531, $4532, $4533, $4534, $4535, $4536, $4537, $4538, $4539, $4540, $4541, $4542, $4543, $4544, $4545, $4546, $4547, $4548, $4549, $4550, $4551, $4552, $4553, $4554, $4555, $4556, $4557, $4558, VersionRange($4559, $4560)), ($4561, $4562, $4563, $4564, $4565, $4566, $4567, $4568, $4569, $4570, $4571, $4572, $4573, $4574, $4575, $4576, $4577, $4578, $4579, $4580, $4581, $4582, $4583, $4584, $4585, $4586, $4587, $4588, VersionRange($4589, $4590)), ($4591, $4592, $4593, $4594, $4595, $4596, $4597, $4598, $4599, $4600, $4601, $4602, $4603, $4604, $4605, $4606, $4607, $4608, $4609, $4610, $4611, $4612, $4613, $4614, $4615, $4616, $4617, $4618, VersionRange($4619, $4620)), ($4621, $4622, $4623, $4624, $4625, $4626, $4627, $4628, $4629, $4630, $4631, $4632, $4633, $4634, $4635, $4636, $4637, $4638, $4639, $4640, $4641, $4642, $4643, $4644, $4645, $4646, $4647, $4648, VersionRange($4649, $4650)), ($4651, $4652, $4653, $4654, $4655, $4656, $4657, $4658, $4659, $4660, $4661, $4662, $4663, $4664, $4665, $4666, $4667, $4668, $4669, $4670, $4671, $4672, $4673, $4674, $4675, $4676, $4677, $4678, VersionRange($4679, $4680)), ($4681, $4682, $4683, $4684, $4685, $4686, $4687, $4688, $4689, $4690, $4691, $4692, $4693, $4694, $4695, $4696, $4697, $4698, $4699, $4700, $4701, $4702, $4703, $4704, $4705, $4706, $4707, $4708, VersionRange($4709, $4710)), ($4711, $4712, $4713, $4714, $4715, $4716, $4717, $4718, $4719, $4720, $4721, $4722, $4723, $4724, $4725, $4726, $4727, $4728, $4729, $4730, $4731, $4732, $4733, $4734, $4735, $4736, $4737, $4738, VersionRange($4739, $4740)), ($4741, $4742, $4743, $4744, $4745, $4746, $4747, $4748, $4749, $4750, $4751, $4752, $4753, $4754, $4755, $4756, $4757, $4758, $4759, $4760, $4761, $4762, $4763, $4764, $4765, $4766, $4767, $4768, VersionRange($4769, $4770)), ($4771, $4772, $4773, $4774, $4775, $4776, $4777, $4778, $4779, $4780, $4781, $4782, $4783, $4784, $4785, $4786, $4787, $4788, $4789, $4790, $4791, $4792, $4793, $4794, $4795, $4796, $4797, $4798, VersionRange($4799, $4800)), ($4801, $4802, $4803, $4804, $4805, $4806, $4807, $4808, $4809, $4810, $4811, $4812, $4813, $4814, $4815, $4816, $4817, $4818, $4819, $4820, $4821, $4822, $4823, $4824, $4825, $4826, $4827, $4828, VersionRange($4829, $4830)), ($4831, $4832, $4833, $4834, $4835, $4836, $4837, $4838, $4839, $4840, $4841, $4842, $4843, $4844, $4845, $4846, $4847, $4848, $4849, $4850, $4851, $4852, $4853, $4854, $4855, $4856, $4857, $4858, VersionRange($4859, $4860)), ($4861, $4862, $4863, $4864, $4865, $4866, $4867, $4868, $4869, $4870, $4871, $4872, $4873, $4874, $4875, $4876, $4877, $4878, $4879, $4880, $4881, $4882, $4883, $4884, $4885, $4886, $4887, $4888, VersionRange($4889, $4890)), ($4891, $4892, $4893, $4894, $4895, $4896, $4897, $4898, $4899, $4900, $4901, $4902, $4903, $4904, $4905, $4906, $4907, $4908, $4909, $4910, $4911, $4912, $4913, $4914, $4915, $4916, $4917, $4918, VersionRange($4919, $4920)), ($4921, $4922, $4923, $4924, $4925, $4926, $4927, $4928, $4929, $4930, $4931, $4932, $4933, $4934, $4935, $4936, $4937, $4938, $4939, $4940, $4941, $4942, $4943, $4944, $4945, $4946, $4947, $4948, VersionRange($4949, $4950)), ($4951, $4952, $4953, $4954, $4955, $4956, $4957, $4958, $4959, $4960, $4961, $4962, $4963, $4964, $4965, $4966, $4967, $4968, $4969, $4970, $4971, $4972, $4973, $4974, $4975, $4976, $4977, $4978, VersionRange($4979, $4980)), ($4981, $4982, $4983, $4984, $4985, $4986, $4987, $4988, $4989, $4990, $4991, $4992, $4993, $4994, $4995, $4996, $4997, $4998, $4999, $5000, $5001, $5002, $5003, $5004, $5005, $5006, $5007, $5008, VersionRange($5009, $5010)), ($5011, $5012, $5013, $5014, $5015, $5016, $5017, $5018, $5019, $5020, $5021, $5022, $5023, $5024, $5025, $5026, $5027, $5028, $5029, $5030, $5031, $5032, $5033, $5034, $5035, $5036, $5037, $5038, VersionRange($5039, $5040)), ($5041, $5042, $5043, $5044, $5045, $5046, $5047, $5048, $5049, $5050, $5051, $5052, $5053, $5054, $5055, $5056, $5057, $5058, $5059, $5060, $5061, $5062, $5063, $5064, $5065, $5066, $5067, $5068, VersionRange($5069, $5070)), ($5071, $5072, $5073, $5074, $5075, $5076, $5077, $5078, $5079, $5080, $5081, $5082, $5083, $5084, $5085, $5086, $5087, $5088, $5089, $5090, $5091, $5092, $5093, $5094, $5095, $5096, $5097, $5098, VersionRange($5099, $5100)), ($5101, $5102, $5103, $5104, $5105, $5106, $5107, $5108, $5109, $5110, $5111, $5112, $5113, $5114, $5115, $5116, $5117, $5118, $5119, $5120, $5121, $5122, $5123, $5124, $5125, $5126, $5127, $5128, VersionRange($5129, $5130)), ($5131, $5132, $5133, $5134, $5135, $5136, $5137, $5138, $5139, $5140, $5141, $5142, $5143, $5144, $5145, $5146, $5147, $5148, $5149, $5150, $5151, $5152, $5153, $5154, $5155, $5156, $5157, $5158, VersionRange($5159, $5160)), ($5161, $5162, $5163, $5164, $5165, $5166, $5167, $5168, $5169, $5170, $5171, $5172, $5173, $5174, $5175, $5176, $5177, $5178, $5179, $5180, $5181, $5182, $5183, $5184, $5185, $5186, $5187, $5188, VersionRange($5189, $5190)), ($5191, $5192, $5193, $5194, $5195, $5196, $5197, $5198, $5199, $5200, $5201, $5202, $5203, $5204, $5205, $5206, $5207, $5208, $5209, $5210, $5211, $5212, $5213, $5214, $5215, $5216, $5217, $5218, VersionRange($5219, $5220)), ($5221, $5222, $5223, $5224, $5225, $5226, $5227, $5228, $5229, $5230, $5231, $5232, $5233, $5234, $5235, $5236, $5237, $5238, $5239, $5240, $5241, $5242, $5243, $5244, $5245, $5246, $5247, $5248, VersionRange($5249, $5250)), ($5251, $5252, $5253, $5254, $5255, $5256, $5257, $5258, $5259, $5260, $5261, $5262, $5263, $5264, $5265, $5266, $5267, $5268, $5269, $5270, $5271, $5272, $5273, $5274, $5275, $5276, $5277, $5278, VersionRange($5279, $5280)), ($5281, $5282, $5283, $5284, $5285, $5286, $5287, $5288, $5289, $5290, $5291, $5292, $5293, $5294, $5295, $5296, $5297, $5298, $5299, $5300, $5301, $5302, $5303, $5304, $5305, $5306, $5307, $5308, VersionRange($5309, $5310)), ($5311, $5312, $5313, $5314, $5315, $5316, $5317, $5318, $5319, $5320, $5321, $5322, $5323, $5324, $5325, $5326, $5327, $5328, $5329, $5330, $5331, $5332, $5333, $5334, $5335, $5336, $5337, $5338, VersionRange($5339, $5340)), ($5341, $5342, $5343, $5344, $5345, $5346, $5347, $5348, $5349, $5350, $5351, $5352, $5353, $5354, $5355, $5356, $5357, $5358, $5359, $5360, $5361, $5362, $5363, $5364, $5365, $5366, $5367, $5368, VersionRange($5369, $5370)), ($5371, $5372, $5373, $5374, $5375, $5376, $5377, $5378, $5379, $5380, $5381, $5382, $5383, $5384, $5385, $5386, $5387, $5388, $5389, $5390, $5391, $5392, $5393, $5394, $5395, $5396, $5397, $5398, VersionRange($5399, $5400)), ($5401, $5402, $5403, $5404, $5405, $5406, $5407, $5408, $5409, $5410, $5411, $5412, $5413, $5414, $5415, $5416, $5417, $5418, $5419, $5420, $5421, $5422, $5423, $5424, $5425, $5426, $5427, $5428, VersionRange($5429, $5430)), ($5431, $5432, $5433, $5434, $5435, $5436, $5437, $5438, $5439, $5440, $5441, $5442, $5443, $5444, $5445, $5446, $5447, $5448, $5449, $5450, $5451, $5452, $5453, $5454, $5455, $5456, $5457, $5458, VersionRange($5459, $5460)), ($5461, $5462, $5463, $5464, $5465, $5466, $5467, $5468, $5469, $5470, $5471, $5472, $5473, $5474, $5475, $5476, $5477, $5478, $5479, $5480, $5481, $5482, $5483, $5484, $5485, $5486, $5487, $5488, VersionRange($5489, $5490)), ($5491, $5492, $5493, $5494, $5495, $5496, $5497, $5498, $5499, $5500, $5501, $5502, $5503, $5504, $5505, $5506, $5507, $5508, $5509, $5510, $5511, $5512, $5513, $5514, $5515, $5516, $5517, $5518, VersionRange($5519, $5520)), ($5521, $5522, $5523, $5524, $5525, $5526, $5527, $5528, $5529, $5530, $5531, $5532, $5533, $5534, $5535, $5536, $5537, $5538, $5539, $5540, $5541, $5542, $5543, $5544, $5545, $5546, $5547, $5548, VersionRange($5549, $5550)), ($5551, $5552, $5553, $5554, $5555, $5556, $5557, $5558, $5559, $5560, $5561, $5562, $5563, $5564, $5565, $5566, $5567, $5568, $5569, $5570, $5571, $5572, $5573, $5574, $5575, $5576, $5577, $5578, VersionRange($5579, $5580)), ($5581, $5582, $5583, $5584, $5585, $5586, $5587, $5588, $5589, $5590, $5591, $5592, $5593, $5594, $5595, $5596, $5597, $5598, $5599, $5600, $5601, $5602, $5603, $5604, $5605, $5606, $5607, $5608, VersionRange($5609, $5610)), ($5611, $5612, $5613, $5614, $5615, $5616, $5617, $5618, $5619, $5620, $5621, $5622, $5623, $5624, $5625, $5626, $5627, $5628, $5629, $5630, $5631, $5632, $5633, $5634, $5635, $5636, $5637, $5638, VersionRange($5639, $5640)), ($5641, $5642, $5643, $5644, $5645, $5646, $5647, $5648, $5649, $5650, $5651, $5652, $5653, $5654, $5655, $5656, $5657, $5658, $5659, $5660, $5661, $5662, $5663, $5664, $5665, $5666, $5667, $5668, VersionRange($5669, $5670)), ($5671, $5672, $5673, $5674, $5675, $5676, $5677, $5678, $5679, $5680, $5681, $5682, $5683, $5684, $5685, $5686, $5687, $5688, $5689, $5690, $5691, $5692, $5693, $5694, $5695, $5696, $5697, $5698, VersionRange($5699, $5700)), ($5701, $5702, $5703, $5704, $5705, $5706, $5707, $5708, $5709, $5710, $5711, $5712, $5713, $5714, $5715, $5716, $5717, $5718, $5719, $5720, $5721, $5722, $5723, $5724, $5725, $5726, $5727, $5728, VersionRange($5729, $5730)), ($5731, $5732, $5733, $5734, $5735, $5736, $5737, $5738, $5739, $5740, $5741, $5742, $5743, $5744, $5745, $5746, $5747, $5748, $5749, $5750, $5751, $5752, $5753, $5754, $5755, $5756, $5757, $5758, VersionRange($5759, $5760)), ($5761, $5762, $5763, $5764, $5765, $5766, $5767, $5768, $5769, $5770, $5771, $5772, $5773, $5774, $5775, $5776, $5777, $5778, $5779, $5780, $5781, $5782, $5783, $5784, $5785, $5786, $5787, $5788, VersionRange($5789, $5790)), ($5791, $5792, $5793, $5794, $5795, $5796, $5797, $5798, $5799, $5800, $5801, $5802, $5803, $5804, $5805, $5806, $5807, $5808, $5809, $5810, $5811, $5812, $5813, $5814, $5815, $5816, $5817, $5818, VersionRange($5819, $5820)), ($5821, $5822, $5823, $5824, $5825, $5826, $5827, $5828, $5829, $5830, $5831, $5832, $5833, $5834, $5835, $5836, $5837, $5838, $5839, $5840, $5841, $5842, $5843, $5844, $5845, $5846, $5847, $5848, VersionRange($5849, $5850)), ($5851, $5852, $5853, $5854, $5855, $5856, $5857, $5858, $5859, $5860, $5861, $5862, $5863, $5864, $5865, $5866, $5867, $5868, $5869, $5870, $5871, $5872, $5873, $5874, $5875, $5876, $5877, $5878, VersionRange($5879, $5880)), ($5881, $5882, $5883, $5884, $5885, $5886, $5887, $5888, $5889, $5890, $5891, $5892, $5893, $5894, $5895, $5896, $5897, $5898, $5899, $5900, $5901, $5902, $5903, $5904, $5905, $5906, $5907, $5908, VersionRange($5909, $5910)), ($5911, $5912, $5913, $5914, $5915, $5916, $5917, $5918, $5919, $5920, $5921, $5922, $5923, $5924, $5925, $5926, $5927, $5928, $5929, $5930, $5931, $5932, $5933, $5934, $5935, $5936, $5937, $5938, VersionRange($5939, $5940)), ($5941, $5942, $5943, $5944, $5945, $5946, $5947, $5948, $5949, $5950, $5951, $5952, $5953, $5954, $5955, $5956, $5957, $5958, $5959, $5960, $5961, $5962, $5963, $5964, $5965, $5966, $5967, $5968, VersionRange($5969, $5970)), ($5971, $5972, $5973, $5974, $5975, $5976, $5977, $5978, $5979, $5980, $5981, $5982, $5983, $5984, $5985, $5986, $5987, $5988, $5989, $5990, $5991, $5992, $5993, $5994, $5995, $5996, $5997, $5998, VersionRange($5999, $6000)), ($6001, $6002, $6003, $6004, $6005, $6006, $6007, $6008, $6009, $6010, $6011, $6012, $6013, $6014, $6015, $6016, $6017, $6018, $6019, $6020, $6021, $6022, $6023, $6024, $6025, $6026, $6027, $6028, VersionRange($6029, $6030)), ($6031, $6032, $6033, $6034, $6035, $6036, $6037, $6038, $6039, $6040, $6041, $6042, $6043, $6044, $6045, $6046, $6047, $6048, $6049, $6050, $6051, $6052, $6053, $6054, $6055, $6056, $6057, $6058, VersionRange($6059, $6060)), ($6061, $6062, $6063, $6064, $6065, $6066, $6067, $6068, $6069, $6070, $6071, $6072, $6073, $6074, $6075, $6076, $6077, $6078, $6079, $6080, $6081, $6082, $6083, $6084, $6085, $6086, $6087, $6088, VersionRange($6089, $6090)), ($6091, $6092, $6093, $6094, $6095, $6096, $6097, $6098, $6099, $6100, $6101, $6102, $6103, $6104, $6105, $6106, $6107, $6108, $6109, $6110, $6111, $6112, $6113, $6114, $6115, $6116, $6117, $6118, VersionRange($6119, $6120)), ($6121, $6122, $6123, $6124, $6125, $6126, $6127, $6128, $6129, $6130, $6131, $6132, $6133, $6134, $6135, $6136, $6137, $6138, $6139, $6140, $6141, $6142, $6143, $6144, $6145, $6146, $6147, $6148, VersionRange($6149, $6150)), ($6151, $6152, $6153, $6154, $6155, $6156, $6157, $6158, $6159, $6160, $6161, $6162, $6163, $6164, $6165, $6166, $6167, $6168, $6169, $6170, $6171, $6172, $6173, $6174, $6175, $6176, $6177, $6178, VersionRange($6179, $6180)), ($6181, $6182, $6183, $6184, $6185, $6186, $6187, $6188, $6189, $6190, $6191, $6192, $6193, $6194, $6195, $6196, $6197, $6198, $6199, $6200, $6201, $6202, $6203, $6204, $6205, $6206, $6207, $6208, VersionRange($6209, $6210)), ($6211, $6212, $6213, $6214, $6215, $6216, $6217, $6218, $6219, $6220, $6221, $6222, $6223, $6224, $6225, $6226, $6227, $6228, $6229, $6230, $6231, $6232, $6233, $6234, $6235, $6236, $6237, $6238, VersionRange($6239, $6240)), ($6241, $6242, $6243, $6244, $6245, $6246, $6247, $6248, $6249, $6250, $6251, $6252, $6253, $6254, $6255, $6256, $6257, $6258, $6259, $6260, $6261, $6262, $6263, $6264, $6265, $6266, $6267, $6268, VersionRange($6269, $6270)), ($6271, $6272, $6273, $6274, $6275, $6276, $6277, $6278, $6279, $6280, $6281, $6282, $6283, $6284, $6285, $6286, $6287, $6288, $6289, $6290, $6291, $6292, $6293, $6294, $6295, $6296, $6297, $6298, VersionRange($6299, $6300)), ($6301, $6302, $6303, $6304, $6305, $6306, $6307, $6308, $6309, $6310, $6311, $6312, $6313, $6314, $6315, $6316, $6317, $6318, $6319, $6320, $6321, $6322, $6323, $6324, $6325, $6326, $6327, $6328, VersionRange($6329, $6330)), ($6331, $6332, $6333, $6334, $6335, $6336, $6337, $6338, $6339, $6340, $6341, $6342, $6343, $6344, $6345, $6346, $6347, $6348, $6349, $6350, $6351, $6352, $6353, $6354, $6355, $6356, $6357, $6358, VersionRange($6359, $6360)), ($6361, $6362, $6363, $6364, $6365, $6366, $6367, $6368, $6369, $6370, $6371, $6372, $6373, $6374, $6375, $6376, $6377, $6378, $6379, $6380, $6381, $6382, $6383, $6384, $6385, $6386, $6387, $6388, VersionRange($6389, $6390)), ($6391, $6392, $6393, $6394, $6395, $6396, $6397, $6398, $6399, $6400, $6401, $6402, $6403, $6404, $6405, $6406, $6407, $6408, $6409, $6410, $6411, $6412, $6413, $6414, $6415, $6416, $6417, $6418, VersionRange($6419, $6420)), ($6421, $6422, $6423, $6424, $6425, $6426, $6427, $6428, $6429, $6430, $6431, $6432, $6433, $6434, $6435, $6436, $6437, $6438, $6439, $6440, $6441, $6442, $6443, $6444, $6445, $6446, $6447, $6448, VersionRange($6449, $6450)), ($6451, $6452, $6453, $6454, $6455, $6456, $6457, $6458, $6459, $6460, $6461, $6462, $6463, $6464, $6465, $6466, $6467, $6468, $6469, $6470, $6471, $6472, $6473, $6474, $6475, $6476, $6477, $6478, VersionRange($6479, $6480)), ($6481, $6482, $6483, $6484, $6485, $6486, $6487, $6488, $6489, $6490, $6491, $6492, $6493, $6494, $6495, $6496, $6497, $6498, $6499, $6500, $6501, $6502, $6503, $6504, $6505, $6506, $6507, $6508, VersionRange($6509, $6510)), ($6511, $6512, $6513, $6514, $6515, $6516, $6517, $6518, $6519, $6520, $6521, $6522, $6523, $6524, $6525, $6526, $6527, $6528, $6529, $6530, $6531, $6532, $6533, $6534, $6535, $6536, $6537, $6538, VersionRange($6539, $6540)), ($6541, $6542, $6543, $6544, $6545, $6546, $6547, $6548, $6549, $6550, $6551, $6552, $6553, $6554, $6555, $6556, $6557, $6558, $6559, $6560, $6561, $6562, $6563, $6564, $6565, $6566, $6567, $6568, VersionRange($6569, $6570)), ($6571, $6572, $6573, $6574, $6575, $6576, $6577, $6578, $6579, $6580, $6581, $6582, $6583, $6584, $6585, $6586, $6587, $6588, $6589, $6590, $6591, $6592, $6593, $6594, $6595, $6596, $6597, $6598, VersionRange($6599, $6600)), ($6601, $6602, $6603, $6604, $6605, $6606, $6607, $6608, $6609, $6610, $6611, $6612, $6613, $6614, $6615, $6616, $6617, $6618, $6619, $6620, $6621, $6622, $6623, $6624, $6625, $6626, $6627, $6628, VersionRange($6629, $6630)), ($6631, $6632, $6633, $6634, $6635, $6636, $6637, $6638, $6639, $6640, $6641, $6642, $6643, $6644, $6645, $6646, $6647, $6648, $6649, $6650, $6651, $6652, $6653, $6654, $6655, $6656, $6657, $6658, VersionRange($6659, $6660)), ($6661, $6662, $6663, $6664, $6665, $6666, $6667, $6668, $6669, $6670, $6671, $6672, $6673, $6674, $6675, $6676, $6677, $6678, $6679, $6680, $6681, $6682, $6683, $6684, $6685, $6686, $6687, $6688, VersionRange($6689, $6690)), ($6691, $6692, $6693, $6694, $6695, $6696, $6697, $6698, $6699, $6700, $6701, $6702, $6703, $6704, $6705, $6706, $6707, $6708, $6709, $6710, $6711, $6712, $6713, $6714, $6715, $6716, $6717, $6718, VersionRange($6719, $6720)), ($6721, $6722, $6723, $6724, $6725, $6726, $6727, $6728, $6729, $6730, $6731, $6732, $6733, $6734, $6735, $6736, $6737, $6738, $6739, $6740, $6741, $6742, $6743, $6744, $6745, $6746, $6747, $6748, VersionRange($6749, $6750)), ($6751, $6752, $6753, $6754, $6755, $6756, $6757, $6758, $6759, $6760, $6761, $6762, $6763, $6764, $6765, $6766, $6767, $6768, $6769, $6770, $6771, $6772, $6773, $6774, $6775, $6776, $6777, $6778, VersionRange($6779, $6780)), ($6781, $6782, $6783, $6784, $6785, $6786, $6787, $6788, $6789, $6790, $6791, $6792, $6793, $6794, $6795, $6796, $6797, $6798, $6799, $6800, $6801, $6802, $6803, $6804, $6805, $6806, $6807, $6808, VersionRange($6809, $6810)), ($6811, $6812, $6813, $6814, $6815, $6816, $6817, $6818, $6819, $6820, $6821, $6822, $6823, $6824, $6825, $6826, $6827, $6828, $6829, $6830, $6831, $6832, $6833, $6834, $6835, $6836, $6837, $6838, VersionRange($6839, $6840)), ($6841, $6842, $6843, $6844, $6845, $6846, $6847, $6848, $6849, $6850, $6851, $6852, $6853, $6854, $6855, $6856, $6857, $6858, $6859, $6860, $6861, $6862, $6863, $6864, $6865, $6866, $6867, $6868, VersionRange($6869, $6870)), ($6871, $6872, $6873, $6874, $6875, $6876, $6877, $6878, $6879, $6880, $6881, $6882, $6883, $6884, $6885, $6886, $6887, $6888, $6889, $6890, $6891, $6892, $6893, $6894, $6895, $6896, $6897, $6898, VersionRange($6899, $6900)), ($6901, $6902, $6903, $6904, $6905, $6906, $6907, $6908, $6909, $6910, $6911, $6912, $6913, $6914, $6915, $6916, $6917, $6918, $6919, $6920, $6921, $6922, $6923, $6924, $6925, $6926, $6927, $6928, VersionRange($6929, $6930)), ($6931, $6932, $6933, $6934, $6935, $6936, $6937, $6938, $6939, $6940, $6941, $6942, $6943, $6944, $6945, $6946, $6947, $6948, $6949, $6950, $6951, $6952, $6953, $6954, $6955, $6956, $6957, $6958, VersionRange($6959, $6960)), ($6961, $6962, $6963, $6964, $6965, $6966, $6967, $6968, $6969, $6970, $6971, $6972, $6973, $6974, $6975, $6976, $6977, $6978, $6979, $6980, $6981, $6982, $6983, $6984, $6985, $6986, $6987, $6988, VersionRange($6989, $6990)), ($6991, $6992, $6993, $6994, $6995, $6996, $6997, $6998, $6999, $7000, $7001, $7002, $7003, $7004, $7005, $7006, $7007, $7008, $7009, $7010, $7011, $7012, $7013, $7014, $7015, $7016, $7017, $7018, VersionRange($7019, $7020)), ($7021, $7022, $7023, $7024, $7025, $7026, $7027, $7028, $7029, $7030, $7031, $7032, $7033, $7034, $7035, $7036, $7037, $7038, $7039, $7040, $7041, $7042, $7043, $7044, $7045, $7046, $7047, $7048, VersionRange($7049, $7050)), ($7051, $7052, $7053, $7054, $7055, $7056, $7057, $7058, $7059, $7060, $7061, $7062, $7063, $7064, $7065, $7066, $7067, $7068, $7069, $7070, $7071, $7072, $7073, $7074, $7075, $7076, $7077, $7078, VersionRange($7079, $7080)), ($7081, $7082, $7083, $7084, $7085, $7086, $7087, $7088, $7089, $7090, $7091, $7092, $7093, $7094, $7095, $7096, $7097, $7098, $7099, $7100, $7101, $7102, $7103, $7104, $7105, $7106, $7107, $7108, VersionRange($7109, $7110)), ($7111, $7112, $7113, $7114, $7115, $7116, $7117, $7118, $7119, $7120, $7121, $7122, $7123, $7124, $7125, $7126, $7127, $7128, $7129, $7130, $7131, $7132, $7133, $7134, $7135, $7136, $7137, $7138, VersionRange($7139, $7140)), ($7141, $7142, $7143, $7144, $7145, $7146, $7147, $7148, $7149, $7150, $7151, $7152, $7153, $7154, $7155, $7156, $7157, $7158, $7159, $7160, $7161, $7162, $7163, $7164, $7165, $7166, $7167, $7168, VersionRange($7169, $7170)), ($7171, $7172, $7173, $7174, $7175, $7176, $7177, $7178, $7179, $7180, $7181, $7182, $7183, $7184, $7185, $7186, $7187, $7188, $7189, $7190, $7191, $7192, $7193, $7194, $7195, $7196, $7197, $7198, VersionRange($7199, $7200)), ($7201, $7202, $7203, $7204, $7205, $7206, $7207, $7208, $7209, $7210, $7211, $7212, $7213, $7214, $7215, $7216, $7217, $7218, $7219, $7220, $7221, $7222, $7223, $7224, $7225, $7226, $7227, $7228, VersionRange($7229, $7230)), ($7231, $7232, $7233, $7234, $7235, $7236, $7237, $7238, $7239, $7240, $7241, $7242, $7243, $7244, $7245, $7246, $7247, $7248, $7249, $7250, $7251, $7252, $7253, $7254, $7255, $7256, $7257, $7258, VersionRange($7259, $7260)), ($7261, $7262, $7263, $7264, $7265, $7266, $7267, $7268, $7269, $7270, $7271, $7272, $7273, $7274, $7275, $7276, $7277, $7278, $7279, $7280, $7281, $7282, $7283, $7284, $7285, $7286, $7287, $7288, VersionRange($7289, $7290)), ($7291, $7292, $7293, $7294, $7295, $7296, $7297, $7298, $7299, $7300, $7301, $7302, $7303, $7304, $7305, $7306, $7307, $7308, $7309, $7310, $7311, $7312, $7313, $7314, $7315, $7316, $7317, $7318, VersionRange($7319, $7320)), ($7321, $7322, $7323, $7324, $7325, $7326, $7327, $7328, $7329, $7330, $7331, $7332, $7333, $7334, $7335, $7336, $7337, $7338, $7339, $7340, $7341, $7342, $7343, $7344, $7345, $7346, $7347, $7348, VersionRange($7349, $7350)), ($7351, $7352, $7353, $7354, $7355, $7356, $7357, $7358, $7359, $7360, $7361, $7362, $7363, $7364, $7365, $7366, $7367, $7368, $7369, $7370, $7371, $7372, $7373, $7374, $7375, $7376, $7377, $7378, VersionRange($7379, $7380)), ($7381, $7382, $7383, $7384, $7385, $7386, $7387, $7388, $7389, $7390, $7391, $7392, $7393, $7394, $7395, $7396, $7397, $7398, $7399, $7400, $7401, $7402, $7403, $7404, $7405, $7406, $7407, $7408, VersionRange($7409, $7410)), ($7411, $7412, $7413, $7414, $7415, $7416, $7417, $7418, $7419, $7420, $7421, $7422, $7423, $7424, $7425, $7426, $7427, $7428, $7429, $7430, $7431, $7432, $7433, $7434, $7435, $7436, $7437, $7438, VersionRange($7439, $7440)), ($7441, $7442, $7443, $7444, $7445, $7446, $7447, $7448, $7449, $7450, $7451, $7452, $7453, $7454, $7455, $7456, $7457, $7458, $7459, $7460, $7461, $7462, $7463, $7464, $7465, $7466, $7467, $7468, VersionRange($7469, $7470)), ($7471, $7472, $7473, $7474, $7475, $7476, $7477, $7478, $7479, $7480, $7481, $7482, $7483, $7484, $7485, $7486, $7487, $7488, $7489, $7490, $7491, $7492, $7493, $7494, $7495, $7496, $7497, $7498, VersionRange($7499, $7500)), ($7501, $7502, $7503, $7504, $7505, $7506, $7507, $7508, $7509, $7510, $7511, $7512, $7513, $7514, $7515, $7516, $7517, $7518, $7519, $7520, $7521, $7522, $7523, $7524, $7525, $7526, $7527, $7528, VersionRange($7529, $7530)), ($7531, $7532, $7533, $7534, $7535, $7536, $7537, $7538, $7539, $7540, $7541, $7542, $7543, $7544, $7545, $7546, $7547, $7548, $7549, $7550, $7551, $7552, $7553, $7554, $7555, $7556, $7557, $7558, VersionRange($7559, $7560)), ($7561, $7562, $7563, $7564, $7565, $7566, $7567, $7568, $7569, $7570, $7571, $7572, $7573, $7574, $7575, $7576, $7577, $7578, $7579, $7580, $7581, $7582, $7583, $7584, $7585, $7586, $7587, $7588, VersionRange($7589, $7590)), ($7591, $7592, $7593, $7594, $7595, $7596, $7597, $7598, $7599, $7600, $7601, $7602, $7603, $7604, $7605, $7606, $7607, $7608, $7609, $7610, $7611, $7612, $7613, $7614, $7615, $7616, $7617, $7618, VersionRange($7619, $7620)), ($7621, $7622, $7623, $7624, $7625, $7626, $7627, $7628, $7629, $7630, $7631, $7632, $7633, $7634, $7635, $7636, $7637, $7638, $7639, $7640, $7641, $7642, $7643, $7644, $7645, $7646, $7647, $7648, VersionRange($7649, $7650)), ($7651, $7652, $7653, $7654, $7655, $7656, $7657, $7658, $7659, $7660, $7661, $7662, $7663, $7664, $7665, $7666, $7667, $7668, $7669, $7670, $7671, $7672, $7673, $7674, $7675, $7676, $7677, $7678, VersionRange($7679, $7680)), ($7681, $7682, $7683, $7684, $7685, $7686, $7687, $7688, $7689, $7690, $7691, $7692, $7693, $7694, $7695, $7696, $7697, $7698, $7699, $7700, $7701, $7702, $7703, $7704, $7705, $7706, $7707, $7708, VersionRange($7709, $7710)), ($7711, $7712, $7713, $7714, $7715, $7716, $7717, $7718, $7719, $7720, $7721, $7722, $7723, $7724, $7725, $7726, $7727, $7728, $7729, $7730, $7731, $7732, $7733, $7734, $7735, $7736, $7737, $7738, VersionRange($7739, $7740)), ($7741, $7742, $7743, $7744, $7745, $7746, $7747, $7748, $7749, $7750, $7751, $7752, $7753, $7754, $7755, $7756, $7757, $7758, $7759, $7760, $7761, $7762, $7763, $7764, $7765, $7766, $7767, $7768, VersionRange($7769, $7770)), ($7771, $7772, $7773, $7774, $7775, $7776, $7777, $7778, $7779, $7780, $7781, $7782, $7783, $7784, $7785, $7786, $7787, $7788, $7789, $7790, $7791, $7792, $7793, $7794, $7795, $7796, $7797, $7798, VersionRange($7799, $7800)), ($7801, $7802, $7803, $7804, $7805, $7806, $7807, $7808, $7809, $7810, $7811, $7812, $7813, $7814, $7815, $7816, $7817, $7818, $7819, $7820, $7821, $7822, $7823, $7824, $7825, $7826, $7827, $7828, VersionRange($7829, $7830)), ($7831, $7832, $7833, $7834, $7835, $7836, $7837, $7838, $7839, $7840, $7841, $7842, $7843, $7844, $7845, $7846, $7847, $7848, $7849, $7850, $7851, $7852, $7853, $7854, $7855, $7856, $7857, $7858, VersionRange($7859, $7860)), ($7861, $7862, $7863, $7864, $7865, $7866, $7867, $7868, $7869, $7870, $7871, $7872, $7873, $7874, $7875, $7876, $7877, $7878, $7879, $7880, $7881, $7882, $7883, $7884, $7885, $7886, $7887, $7888, VersionRange($7889, $7890)), ($7891, $7892, $7893, $7894, $7895, $7896, $7897, $7898, $7899, $7900, $7901, $7902, $7903, $7904, $7905, $7906, $7907, $7908, $7909, $7910, $7911, $7912, $7913, $7914, $7915, $7916, $7917, $7918, VersionRange($7919, $7920)), ($7921, $7922, $7923, $7924, $7925, $7926, $7927, $7928, $7929, $7930, $7931, $7932, $7933, $7934, $7935, $7936, $7937, $7938, $7939, $7940, $7941, $7942, $7943, $7944, $7945, $7946, $7947, $7948, VersionRange($7949, $7950)), ($7951, $7952, $7953, $7954, $7955, $7956, $7957, $7958, $7959, $7960, $7961, $7962, $7963, $7964, $7965, $7966, $7967, $7968, $7969, $7970, $7971, $7972, $7973, $7974, $7975, $7976, $7977, $7978, VersionRange($7979, $7980)), ($7981, $7982, $7983, $7984, $7985, $7986, $7987, $7988, $7989, $7990, $7991, $7992, $7993, $7994, $7995, $7996, $7997, $7998, $7999, $8000, $8001, $8002, $8003, $8004, $8005, $8006, $8007, $8008, VersionRange($8009, $8010)), ($8011, $8012, $8013, $8014, $8015, $8016, $8017, $8018, $8019, $8020, $8021, $8022, $8023, $8024, $8025, $8026, $8027, $8028, $8029, $8030, $8031, $8032, $8033, $8034, $8035, $8036, $8037, $8038, VersionRange($8039, $8040)), ($8041, $8042, $8043, $8044, $8045, $8046, $8047, $8048, $8049, $8050, $8051, $8052, $8053, $8054, $8055, $8056, $8057, $8058, $8059, $8060, $8061, $8062, $8063, $8064, $8065, $8066, $8067, $8068, VersionRange($8069, $8070)), ($8071, $8072, $8073, $8074, $8075, $8076, $8077, $8078, $8079, $8080, $8081, $8082, $8083, $8084, $8085, $8086, $8087, $8088, $8089, $8090, $8091, $8092, $8093, $8094, $8095, $8096, $8097, $8098, VersionRange($8099, $8100)), ($8101, $8102, $8103, $8104, $8105, $8106, $8107, $8108, $8109, $8110, $8111, $8112, $8113, $8114, $8115, $8116, $8117, $8118, $8119, $8120, $8121, $8122, $8123, $8124, $8125, $8126, $8127, $8128, VersionRange($8129, $8130)), ($8131, $8132, $8133, $8134, $8135, $8136, $8137, $8138, $8139, $8140, $8141, $8142, $8143, $8144, $8145, $8146, $8147, $8148, $8149, $8150, $8151, $8152, $8153, $8154, $8155, $8156, $8157, $8158, VersionRange($8159, $8160)), ($8161, $8162, $8163, $8164, $8165, $8166, $8167, $8168, $8169, $8170, $8171, $8172, $8173, $8174, $8175, $8176, $8177, $8178, $8179, $8180, $8181, $8182, $8183, $8184, $8185, $8186, $8187, $8188, VersionRange($8189, $8190)), ($8191, $8192, $8193, $8194, $8195, $8196, $8197, $8198, $8199, $8200, $8201, $8202, $8203, $8204, $8205, $8206, $8207, $8208, $8209, $8210, $8211, $8212, $8213, $8214, $8215, $8216, $8217, $8218, VersionRange($8219, $8220)), ($8221, $8222, $8223, $8224, $8225, $8226, $8227, $8228, $8229, $8230, $8231, $8232, $8233, $8234, $8235, $8236, $8237, $8238, $8239, $8240, $8241, $8242, $8243, $8244, $8245, $8246, $8247, $8248, VersionRange($8249, $8250)), ($8251, $8252, $8253, $8254, $8255, $8256, $8257, $8258, $8259, $8260, $8261, $8262, $8263, $8264, $8265, $8266, $8267, $8268, $8269, $8270, $8271, $8272, $8273, $8274, $8275, $8276, $8277, $8278, VersionRange($8279, $8280)), ($8281, $8282, $8283, $8284, $8285, $8286, $8287, $8288, $8289, $8290, $8291, $8292, $8293, $8294, $8295, $8296, $8297, $8298, $8299, $8300, $8301, $8302, $8303, $8304, $8305, $8306, $8307, $8308, VersionRange($8309, $8310)), ($8311, $8312, $8313, $8314, $8315, $8316, $8317, $8318, $8319, $8320, $8321, $8322, $8323, $8324, $8325, $8326, $8327, $8328, $8329, $8330, $8331, $8332, $8333, $8334, $8335, $8336, $8337, $8338, VersionRange($8339, $8340)), ($8341, $8342, $8343, $8344, $8345, $8346, $8347, $8348, $8349, $8350, $8351, $8352, $8353, $8354, $8355, $8356, $8357, $8358, $8359, $8360, $8361, $8362, $8363, $8364, $8365, $8366, $8367, $8368, VersionRange($8369, $8370)), ($8371, $8372, $8373, $8374, $8375, $8376, $8377, $8378, $8379, $8380, $8381, $8382, $8383, $8384, $8385, $8386, $8387, $8388, $8389, $8390, $8391, $8392, $8393, $8394, $8395, $8396, $8397, $8398, VersionRange($8399, $8400)), ($8401, $8402, $8403, $8404, $8405, $8406, $8407, $8408, $8409, $8410, $8411, $8412, $8413, $8414, $8415, $8416, $8417, $8418, $8419, $8420, $8421, $8422, $8423, $8424, $8425, $8426, $8427, $8428, VersionRange($8429, $8430)), ($8431, $8432, $8433, $8434, $8435, $8436, $8437, $8438, $8439, $8440, $8441, $8442, $8443, $8444, $8445, $8446, $8447, $8448, $8449, $8450, $8451, $8452, $8453, $8454, $8455, $8456, $8457, $8458, VersionRange($8459, $8460)), ($8461, $8462, $8463, $8464, $8465, $8466, $8467, $8468, $8469, $8470, $8471, $8472, $8473, $8474, $8475, $8476, $8477, $8478, $8479, $8480, $8481, $8482, $8483, $8484, $8485, $8486, $8487, $8488, VersionRange($8489, $8490)), ($8491, $8492, $8493, $8494, $8495, $8496, $8497, $8498, $8499, $8500, $8501, $8502, $8503, $8504, $8505, $8506, $8507, $8508, $8509, $8510, $8511, $8512, $8513, $8514, $8515, $8516, $8517, $8518, VersionRange($8519, $8520)), ($8521, $8522, $8523, $8524, $8525, $8526, $8527, $8528, $8529, $8530, $8531, $8532, $8533, $8534, $8535, $8536, $8537, $8538, $8539, $8540, $8541, $8542, $8543, $8544, $8545, $8546, $8547, $8548, VersionRange($8549, $8550)), ($8551, $8552, $8553, $8554, $8555, $8556, $8557, $8558, $8559, $8560, $8561, $8562, $8563, $8564, $8565, $8566, $8567, $8568, $8569, $8570, $8571, $8572, $8573, $8574, $8575, $8576, $8577, $8578, VersionRange($8579, $8580)), ($8581, $8582, $8583, $8584, $8585, $8586, $8587, $8588, $8589, $8590, $8591, $8592, $8593, $8594, $8595, $8596, $8597, $8598, $8599, $8600, $8601, $8602, $8603, $8604, $8605, $8606, $8607, $8608, VersionRange($8609, $8610)), ($8611, $8612, $8613, $8614, $8615, $8616, $8617, $8618, $8619, $8620, $8621, $8622, $8623, $8624, $8625, $8626, $8627, $8628, $8629, $8630, $8631, $8632, $8633, $8634, $8635, $8636, $8637, $8638, VersionRange($8639, $8640)), ($8641, $8642, $8643, $8644, $8645, $8646, $8647, $8648, $8649, $8650, $8651, $8652, $8653, $8654, $8655, $8656, $8657, $8658, $8659, $8660, $8661, $8662, $8663, $8664, $8665, $8666, $8667, $8668, VersionRange($8669, $8670)), ($8671, $8672, $8673, $8674, $8675, $8676, $8677, $8678, $8679, $8680, $8681, $8682, $8683, $8684, $8685, $8686, $8687, $8688, $8689, $8690, $8691, $8692, $8693, $8694, $8695, $8696, $8697, $8698, VersionRange($8699, $8700)), ($8701, $8702, $8703, $8704, $8705, $8706, $8707, $8708, $8709, $8710, $8711, $8712, $8713, $8714, $8715, $8716, $8717, $8718, $8719, $8720, $8721, $8722, $8723, $8724, $8725, $8726, $8727, $8728, VersionRange($8729, $8730)), ($8731, $8732, $8733, $8734, $8735, $8736, $8737, $8738, $8739, $8740, $8741, $8742, $8743, $8744, $8745, $8746, $8747, $8748, $8749, $8750, $8751, $8752, $8753, $8754, $8755, $8756, $8757, $8758, VersionRange($8759, $8760)), ($8761, $8762, $8763, $8764, $8765, $8766, $8767, $8768, $8769, $8770, $8771, $8772, $8773, $8774, $8775, $8776, $8777, $8778, $8779, $8780, $8781, $8782, $8783, $8784, $8785, $8786, $8787, $8788, VersionRange($8789, $8790)), ($8791, $8792, $8793, $8794, $8795, $8796, $8797, $8798, $8799, $8800, $8801, $8802, $8803, $8804, $8805, $8806, $8807, $8808, $8809, $8810, $8811, $8812, $8813, $8814, $8815, $8816, $8817, $8818, VersionRange($8819, $8820)), ($8821, $8822, $8823, $8824, $8825, $8826, $8827, $8828, $8829, $8830, $8831, $8832, $8833, $8834, $8835, $8836, $8837, $8838, $8839, $8840, $8841, $8842, $8843, $8844, $8845, $8846, $8847, $8848, VersionRange($8849, $8850)), ($8851, $8852, $8853, $8854, $8855, $8856, $8857, $8858, $8859, $8860, $8861, $8862, $8863, $8864, $8865, $8866, $8867, $8868, $8869, $8870, $8871, $8872, $8873, $8874, $8875, $8876, $8877, $8878, VersionRange($8879, $8880)), ($8881, $8882, $8883, $8884, $8885, $8886, $8887, $8888, $8889, $8890, $8891, $8892, $8893, $8894, $8895, $8896, $8897, $8898, $8899, $8900, $8901, $8902, $8903, $8904, $8905, $8906, $8907, $8908, VersionRange($8909, $8910)), ($8911, $8912, $8913, $8914, $8915, $8916, $8917, $8918, $8919, $8920, $8921, $8922, $8923, $8924, $8925, $8926, $8927, $8928, $8929, $8930, $8931, $8932, $8933, $8934, $8935, $8936, $8937, $8938, VersionRange($8939, $8940)), ($8941, $8942, $8943, $8944, $8945, $8946, $8947, $8948, $8949, $8950, $8951, $8952, $8953, $8954, $8955, $8956, $8957, $8958, $8959, $8960, $8961, $8962, $8963, $8964, $8965, $8966, $8967, $8968, VersionRange($8969, $8970)), ($8971, $8972, $8973, $8974, $8975, $8976, $8977, $8978, $8979, $8980, $8981, $8982, $8983, $8984, $8985, $8986, $8987, $8988, $8989, $8990, $8991, $8992, $8993, $8994, $8995, $8996, $8997, $8998, VersionRange($8999, $9000)), ($9001, $9002, $9003, $9004, $9005, $9006, $9007, $9008, $9009, $9010, $9011, $9012, $9013, $9014, $9015, $9016, $9017, $9018, $9019, $9020, $9021, $9022, $9023, $9024, $9025, $9026, $9027, $9028, VersionRange($9029, $9030)), ($9031, $9032, $9033, $9034, $9035, $9036, $9037, $9038, $9039, $9040, $9041, $9042, $9043, $9044, $9045, $9046, $9047, $9048, $9049, $9050, $9051, $9052, $9053, $9054, $9055, $9056, $9057, $9058, VersionRange($9059, $9060)), ($9061, $9062, $9063, $9064, $9065, $9066, $9067, $9068, $9069, $9070, $9071, $9072, $9073, $9074, $9075, $9076, $9077, $9078, $9079, $9080, $9081, $9082, $9083, $9084, $9085, $9086, $9087, $9088, VersionRange($9089, $9090)), ($9091, $9092, $9093, $9094, $9095, $9096, $9097, $9098, $9099, $9100, $9101, $9102, $9103, $9104, $9105, $9106, $9107, $9108, $9109, $9110, $9111, $9112, $9113, $9114, $9115, $9116, $9117, $9118, VersionRange($9119, $9120)), ($9121, $9122, $9123, $9124, $9125, $9126, $9127, $9128, $9129, $9130, $9131, $9132, $9133, $9134, $9135, $9136, $9137, $9138, $9139, $9140, $9141, $9142, $9143, $9144, $9145, $9146, $9147, $9148, VersionRange($9149, $9150)), ($9151, $9152, $9153, $9154, $9155, $9156, $9157, $9158, $9159, $9160, $9161, $9162, $9163, $9164, $9165, $9166, $9167, $9168, $9169, $9170, $9171, $9172, $9173, $9174, $9175, $9176, $9177, $9178, VersionRange($9179, $9180)), ($9181, $9182, $9183, $9184, $9185, $9186, $9187, $9188, $9189, $9190, $9191, $9192, $9193, $9194, $9195, $9196, $9197, $9198, $9199, $9200, $9201, $9202, $9203, $9204, $9205, $9206, $9207, $9208, VersionRange($9209, $9210)), ($9211, $9212, $9213, $9214, $9215, $9216, $9217, $9218, $9219, $9220, $9221, $9222, $9223, $9224, $9225, $9226, $9227, $9228, $9229, $9230, $9231, $9232, $9233, $9234, $9235, $9236, $9237, $9238, VersionRange($9239, $9240)), ($9241, $9242, $9243, $9244, $9245, $9246, $9247, $9248, $9249, $9250, $9251, $9252, $9253, $9254, $9255, $9256, $9257, $9258, $9259, $9260, $9261, $9262, $9263, $9264, $9265, $9266, $9267, $9268, VersionRange($9269, $9270)), ($9271, $9272, $9273, $9274, $9275, $9276, $9277, $9278, $9279, $9280, $9281, $9282, $9283, $9284, $9285, $9286, $9287, $9288, $9289, $9290, $9291, $9292, $9293, $9294, $9295, $9296, $9297, $9298, VersionRange($9299, $9300)), ($9301, $9302, $9303, $9304, $9305, $9306, $9307, $9308, $9309, $9310, $9311, $9312, $9313, $9314, $9315, $9316, $9317, $9318, $9319, $9320, $9321, $9322, $9323, $9324, $9325, $9326, $9327, $9328, VersionRange($9329, $9330)), ($9331, $9332, $9333, $9334, $9335, $9336, $9337, $9338, $9339, $9340, $9341, $9342, $9343, $9344, $9345, $9346, $9347, $9348, $9349, $9350, $9351, $9352, $9353, $9354, $9355, $9356, $9357, $9358, VersionRange($9359, $9360)), ($9361, $9362, $9363, $9364, $9365, $9366, $9367, $9368, $9369, $9370, $9371, $9372, $9373, $9374, $9375, $9376, $9377, $9378, $9379, $9380, $9381, $9382, $9383, $9384, $9385, $9386, $9387, $9388, VersionRange($9389, $9390)), ($9391, $9392, $9393, $9394, $9395, $9396, $9397, $9398, $9399, $9400, $9401, $9402, $9403, $9404, $9405, $9406, $9407, $9408, $9409, $9410, $9411, $9412, $9413, $9414, $9415, $9416, $9417, $9418, VersionRange($9419, $9420)), ($9421, $9422, $9423, $9424, $9425, $9426, $9427, $9428, $9429, $9430, $9431, $9432, $9433, $9434, $9435, $9436, $9437, $9438, $9439, $9440, $9441, $9442, $9443, $9444, $9445, $9446, $9447, $9448, VersionRange($9449, $9450)), ($9451, $9452, $9453, $9454, $9455, $9456, $9457, $9458, $9459, $9460, $9461, $9462, $9463, $9464, $9465, $9466, $9467, $9468, $9469, $9470, $9471, $9472, $9473, $9474, $9475, $9476, $9477, $9478, VersionRange($9479, $9480)), ($9481, $9482, $9483, $9484, $9485, $9486, $9487, $9488, $9489, $9490, $9491, $9492, $9493, $9494, $9495, $9496, $9497, $9498, $9499, $9500, $9501, $9502, $9503, $9504, $9505, $9506, $9507, $9508, VersionRange($9509, $9510)), ($9511, $9512, $9513, $9514, $9515, $9516, $9517, $9518, $9519, $9520, $9521, $9522, $9523, $9524, $9525, $9526, $9527, $9528, $9529, $9530, $9531, $9532, $9533, $9534, $9535, $9536, $9537, $9538, VersionRange($9539, $9540)), ($9541, $9542, $9543, $9544, $9545, $9546, $9547, $9548, $9549, $9550, $9551, $9552, $9553, $9554, $9555, $9556, $9557, $9558, $9559, $9560, $9561, $9562, $9563, $9564, $9565, $9566, $9567, $9568, VersionRange($9569, $9570)), ($9571, $9572, $9573, $9574, $9575, $9576, $9577, $9578, $9579, $9580, $9581, $9582, $9583, $9584, $9585, $9586, $9587, $9588, $9589, $9590, $9591, $9592, $9593, $9594, $9595, $9596, $9597, $9598, VersionRange($9599, $9600)), ($9601, $9602, $9603, $9604, $9605, $9606, $9607, $9608, $9609, $9610, $9611, $9612, $9613, $9614, $9615, $9616, $9617, $9618, $9619, $9620, $9621, $9622, $9623, $9624, $9625, $9626, $9627, $9628, VersionRange($9629, $9630)), ($9631, $9632, $9633, $9634, $9635, $9636, $9637, $9638, $9639, $9640, $9641, $9642, $9643, $9644, $9645, $9646, $9647, $9648, $9649, $9650, $9651, $9652, $9653, $9654, $9655, $9656, $9657, $9658, VersionRange($9659, $9660)), ($9661, $9662, $9663, $9664, $9665, $9666, $9667, $9668, $9669, $9670, $9671, $9672, $9673, $9674, $9675, $9676, $9677, $9678, $9679, $9680, $9681, $9682, $9683, $9684, $9685, $9686, $9687, $9688, VersionRange($9689, $9690)), ($9691, $9692, $9693, $9694, $9695, $9696, $9697, $9698, $9699, $9700, $9701, $9702, $9703, $9704, $9705, $9706, $9707, $9708, $9709, $9710, $9711, $9712, $9713, $9714, $9715, $9716, $9717, $9718, VersionRange($9719, $9720)), ($9721, $9722, $9723, $9724, $9725, $9726, $9727, $9728, $9729, $9730, $9731, $9732, $9733, $9734, $9735, $9736, $9737, $9738, $9739, $9740, $9741, $9742, $9743, $9744, $9745, $9746, $9747, $9748, VersionRange($9749, $9750)), ($9751, $9752, $9753, $9754, $9755, $9756, $9757, $9758, $9759, $9760, $9761, $9762, $9763, $9764, $9765, $9766, $9767, $9768, $9769, $9770, $9771, $9772, $9773, $9774, $9775, $9776, $9777, $9778, VersionRange($9779, $9780)), ($9781, $9782, $9783, $9784, $9785, $9786, $9787, $9788, $9789, $9790, $9791, $9792, $9793, $9794, $9795, $9796, $9797, $9798, $9799, $9800, $9801, $9802, $9803, $9804, $9805, $9806, $9807, $9808, VersionRange($9809, $9810)), ($9811, $9812, $9813, $9814, $9815, $9816, $9817, $9818, $9819, $9820, $9821, $9822, $9823, $9824, $9825, $9826, $9827, $9828, $9829, $9830, $9831, $9832, $9833, $9834, $9835, $9836, $9837, $9838, VersionRange($9839, $9840)), ($9841, $9842, $9843, $9844, $9845, $9846, $9847, $9848, $9849, $9850, $9851, $9852, $9853, $9854, $9855, $9856, $9857, $9858, $9859, $9860, $9861, $9862, $9863, $9864, $9865, $9866, $9867, $9868, VersionRange($9869, $9870)), ($9871, $9872, $9873, $9874, $9875, $9876, $9877, $9878, $9879, $9880, $9881, $9882, $9883, $9884, $9885, $9886, $9887, $9888, $9889, $9890, $9891, $9892, $9893, $9894, $9895, $9896, $9897, $9898, VersionRange($9899, $9900)), ($9901, $9902, $9903, $9904, $9905, $9906, $9907, $9908, $9909, $9910, $9911, $9912, $9913, $9914, $9915, $9916, $9917, $9918, $9919, $9920, $9921, $9922, $9923, $9924, $9925, $9926, $9927, $9928, VersionRange($9929, $9930)), ($9931, $9932, $9933, $9934, $9935, $9936, $9937, $9938, $9939, $9940, $9941, $9942, $9943, $9944, $9945, $9946, $9947, $9948, $9949, $9950, $9951, $9952, $9953, $9954, $9955, $9956, $9957, $9958, VersionRange($9959, $9960)), ($9961, $9962, $9963, $9964, $9965, $9966, $9967, $9968, $9969, $9970, $9971, $9972, $9973, $9974, $9975, $9976, $9977, $9978, $9979, $9980, $9981, $9982, $9983, $9984, $9985, $9986, $9987, $9988, VersionRange($9989, $9990)), ($9991, $9992, $9993, $9994, $9995, $9996, $9997, $9998, $9999, $10000, $10001, $10002, $10003, $10004, $10005, $10006, $10007, $10008, $10009, $10010, $10011, $10012, $10013, $10014, $10015, $10016, $10017, $10018, VersionRange($10019, $10020)), ($10021, $10022, $10023, $10024, $10025, $10026, $10027, $10028, $10029, $10030, $10031, $10032, $10033, $10034, $10035, $10036, $10037, $10038, $10039, $10040, $10041, $10042, $10043, $10044, $10045, $10046, $10047, $10048, VersionRange($10049, $10050)), ($10051, $10052, $10053, $10054, $10055, $10056, $10057, $10058, $10059, $10060, $10061, $10062, $10063, $10064, $10065, $10066, $10067, $10068, $10069, $10070, $10071, $10072, $10073, $10074, $10075, $10076, $10077, $10078, VersionRange($10079, $10080)), ($10081, $10082, $10083, $10084, $10085, $10086, $10087, $10088, $10089, $10090, $10091, $10092, $10093, $10094, $10095, $10096, $10097, $10098, $10099, $10100, $10101, $10102, $10103, $10104, $10105, $10106, $10107, $10108, VersionRange($10109, $10110)), ($10111, $10112, $10113, $10114, $10115, $10116, $10117, $10118, $10119, $10120, $10121, $10122, $10123, $10124, $10125, $10126, $10127, $10128, $10129, $10130, $10131, $10132, $10133, $10134, $10135, $10136, $10137, $10138, VersionRange($10139, $10140)), ($10141, $10142, $10143, $10144, $10145, $10146, $10147, $10148, $10149, $10150, $10151, $10152, $10153, $10154, $10155, $10156, $10157, $10158, $10159, $10160, $10161, $10162, $10163, $10164, $10165, $10166, $10167, $10168, VersionRange($10169, $10170)), ($10171, $10172, $10173, $10174, $10175, $10176, $10177, $10178, $10179, $10180, $10181, $10182, $10183, $10184, $10185, $10186, $10187, $10188, $10189, $10190, $10191, $10192, $10193, $10194, $10195, $10196, $10197, $10198, VersionRange($10199, $10200)), ($10201, $10202, $10203, $10204, $10205, $10206, $10207, $10208, $10209, $10210, $10211, $10212, $10213, $10214, $10215, $10216, $10217, $10218, $10219, $10220, $10221, $10222, $10223, $10224, $10225, $10226, $10227, $10228, VersionRange($10229, $10230)), ($10231, $10232, $10233, $10234, $10235, $10236, $10237, $10238, $10239, $10240, $10241, $10242, $10243, $10244, $10245, $10246, $10247, $10248, $10249, $10250, $10251, $10252, $10253, $10254, $10255, $10256, $10257, $10258, VersionRange($10259, $10260)), ($10261, $10262, $10263, $10264, $10265, $10266, $10267, $10268, $10269, $10270, $10271, $10272, $10273, $10274, $10275, $10276, $10277, $10278, $10279, $10280, $10281, $10282, $10283, $10284, $10285, $10286, $10287, $10288, VersionRange($10289, $10290)), ($10291, $10292, $10293, $10294, $10295, $10296, $10297, $10298, $10299, $10300, $10301, $10302, $10303, $10304, $10305, $10306, $10307, $10308, $10309, $10310, $10311, $10312, $10313, $10314, $10315, $10316, $10317, $10318, VersionRange($10319, $10320)), ($10321, $10322, $10323, $10324, $10325, $10326, $10327, $10328, $10329, $10330, $10331, $10332, $10333, $10334, $10335, $10336, $10337, $10338, $10339, $10340, $10341, $10342, $10343, $10344, $10345, $10346, $10347, $10348, VersionRange($10349, $10350)), ($10351, $10352, $10353, $10354, $10355, $10356, $10357, $10358, $10359, $10360, $10361, $10362, $10363, $10364, $10365, $10366, $10367, $10368, $10369, $10370, $10371, $10372, $10373, $10374, $10375, $10376, $10377, $10378, VersionRange($10379, $10380)), ($10381, $10382, $10383, $10384, $10385, $10386, $10387, $10388, $10389, $10390, $10391, $10392, $10393, $10394, $10395, $10396, $10397, $10398, $10399, $10400, $10401, $10402, $10403, $10404, $10405, $10406, $10407, $10408, VersionRange($10409, $10410)), ($10411, $10412, $10413, $10414, $10415, $10416, $10417, $10418, $10419, $10420, $10421, $10422, $10423, $10424, $10425, $10426, $10427, $10428, $10429, $10430, $10431, $10432, $10433, $10434, $10435, $10436, $10437, $10438, VersionRange($10439, $10440)), ($10441, $10442, $10443, $10444, $10445, $10446, $10447, $10448, $10449, $10450, $10451, $10452, $10453, $10454, $10455, $10456, $10457, $10458, $10459, $10460, $10461, $10462, $10463, $10464, $10465, $10466, $10467, $10468, VersionRange($10469, $10470)), ($10471, $10472, $10473, $10474, $10475, $10476, $10477, $10478, $10479, $10480, $10481, $10482, $10483, $10484, $10485, $10486, $10487, $10488, $10489, $10490, $10491, $10492, $10493, $10494, $10495, $10496, $10497, $10498, VersionRange($10499, $10500)), ($10501, $10502, $10503, $10504, $10505, $10506, $10507, $10508, $10509, $10510, $10511, $10512, $10513, $10514, $10515, $10516, $10517, $10518, $10519, $10520, $10521, $10522, $10523, $10524, $10525, $10526, $10527, $10528, VersionRange($10529, $10530)), ($10531, $10532, $10533, $10534, $10535, $10536, $10537, $10538, $10539, $10540, $10541, $10542, $10543, $10544, $10545, $10546, $10547, $10548, $10549, $10550, $10551, $10552, $10553, $10554, $10555, $10556, $10557, $10558, VersionRange($10559, $10560)), ($10561, $10562, $10563, $10564, $10565, $10566, $10567, $10568, $10569, $10570, $10571, $10572, $10573, $10574, $10575, $10576, $10577, $10578, $10579, $10580, $10581, $10582, $10583, $10584, $10585, $10586, $10587, $10588, VersionRange($10589, $10590)), ($10591, $10592, $10593, $10594, $10595, $10596, $10597, $10598, $10599, $10600, $10601, $10602, $10603, $10604, $10605, $10606, $10607, $10608, $10609, $10610, $10611, $10612, $10613, $10614, $10615, $10616, $10617, $10618, VersionRange($10619, $10620)), ($10621, $10622, $10623, $10624, $10625, $10626, $10627, $10628, $10629, $10630, $10631, $10632, $10633, $10634, $10635, $10636, $10637, $10638, $10639, $10640, $10641, $10642, $10643, $10644, $10645, $10646, $10647, $10648, VersionRange($10649, $10650)), ($10651, $10652, $10653, $10654, $10655, $10656, $10657, $10658, $10659, $10660, $10661, $10662, $10663, $10664, $10665, $10666, $10667, $10668, $10669, $10670, $10671, $10672, $10673, $10674, $10675, $10676, $10677, $10678, VersionRange($10679, $10680)), ($10681, $10682, $10683, $10684, $10685, $10686, $10687, $10688, $10689, $10690, $10691, $10692, $10693, $10694, $10695, $10696, $10697, $10698, $10699, $10700, $10701, $10702, $10703, $10704, $10705, $10706, $10707, $10708, VersionRange($10709, $10710)), ($10711, $10712, $10713, $10714, $10715, $10716, $10717, $10718, $10719, $10720, $10721, $10722, $10723, $10724, $10725, $10726, $10727, $10728, $10729, $10730, $10731, $10732, $10733, $10734, $10735, $10736, $10737, $10738, VersionRange($10739, $10740)), ($10741, $10742, $10743, $10744, $10745, $10746, $10747, $10748, $10749, $10750, $10751, $10752, $10753, $10754, $10755, $10756, $10757, $10758, $10759, $10760, $10761, $10762, $10763, $10764, $10765, $10766, $10767, $10768, VersionRange($10769, $10770)), ($10771, $10772, $10773, $10774, $10775, $10776, $10777, $10778, $10779, $10780, $10781, $10782, $10783, $10784, $10785, $10786, $10787, $10788, $10789, $10790, $10791, $10792, $10793, $10794, $10795, $10796, $10797, $10798, VersionRange($10799, $10800)), ($10801, $10802, $10803, $10804, $10805, $10806, $10807, $10808, $10809, $10810, $10811, $10812, $10813, $10814, $10815, $10816, $10817, $10818, $10819, $10820, $10821, $10822, $10823, $10824, $10825, $10826, $10827, $10828, VersionRange($10829, $10830)), ($10831, $10832, $10833, $10834, $10835, $10836, $10837, $10838, $10839, $10840, $10841, $10842, $10843, $10844, $10845, $10846, $10847, $10848, $10849, $10850, $10851, $10852, $10853, $10854, $10855, $10856, $10857, $10858, VersionRange($10859, $10860)), ($10861, $10862, $10863, $10864, $10865, $10866, $10867, $10868, $10869, $10870, $10871, $10872, $10873, $10874, $10875, $10876, $10877, $10878, $10879, $10880, $10881, $10882, $10883, $10884, $10885, $10886, $10887, $10888, VersionRange($10889, $10890)), ($10891, $10892, $10893, $10894, $10895, $10896, $10897, $10898, $10899, $10900, $10901, $10902, $10903, $10904, $10905, $10906, $10907, $10908, $10909, $10910, $10911, $10912, $10913, $10914, $10915, $10916, $10917, $10918, VersionRange($10919, $10920)), ($10921, $10922, $10923, $10924, $10925, $10926, $10927, $10928, $10929, $10930, $10931, $10932, $10933, $10934, $10935, $10936, $10937, $10938, $10939, $10940, $10941, $10942, $10943, $10944, $10945, $10946, $10947, $10948, VersionRange($10949, $10950)), ($10951, $10952, $10953, $10954, $10955, $10956, $10957, $10958, $10959, $10960, $10961, $10962, $10963, $10964, $10965, $10966, $10967, $10968, $10969, $10970, $10971, $10972, $10973, $10974, $10975, $10976, $10977, $10978, VersionRange($10979, $10980)), ($10981, $10982, $10983, $10984, $10985, $10986, $10987, $10988, $10989, $10990, $10991, $10992, $10993, $10994, $10995, $10996, $10997, $10998, $10999, $11000, $11001, $11002, $11003, $11004, $11005, $11006, $11007, $11008, VersionRange($11009, $11010)), ($11011, $11012, $11013, $11014, $11015, $11016, $11017, $11018, $11019, $11020, $11021, $11022, $11023, $11024, $11025, $11026, $11027, $11028, $11029, $11030, $11031, $11032, $11033, $11034, $11035, $11036, $11037, $11038, VersionRange($11039, $11040)), ($11041, $11042, $11043, $11044, $11045, $11046, $11047, $11048, $11049, $11050, $11051, $11052, $11053, $11054, $11055, $11056, $11057, $11058, $11059, $11060, $11061, $11062, $11063, $11064, $11065, $11066, $11067, $11068, VersionRange($11069, $11070)), ($11071, $11072, $11073, $11074, $11075, $11076, $11077, $11078, $11079, $11080, $11081, $11082, $11083, $11084, $11085, $11086, $11087, $11088, $11089, $11090, $11091, $11092, $11093, $11094, $11095, $11096, $11097, $11098, VersionRange($11099, $11100)), ($11101, $11102, $11103, $11104, $11105, $11106, $11107, $11108, $11109, $11110, $11111, $11112, $11113, $11114, $11115, $11116, $11117, $11118, $11119, $11120, $11121, $11122, $11123, $11124, $11125, $11126, $11127, $11128, VersionRange($11129, $11130)), ($11131, $11132, $11133, $11134, $11135, $11136, $11137, $11138, $11139, $11140, $11141, $11142, $11143, $11144, $11145, $11146, $11147, $11148, $11149, $11150, $11151, $11152, $11153, $11154, $11155, $11156, $11157, $11158, VersionRange($11159, $11160)), ($11161, $11162, $11163, $11164, $11165, $11166, $11167, $11168, $11169, $11170, $11171, $11172, $11173, $11174, $11175, $11176, $11177, $11178, $11179, $11180, $11181, $11182, $11183, $11184, $11185, $11186, $11187, $11188, VersionRange($11189, $11190)), ($11191, $11192, $11193, $11194, $11195, $11196, $11197, $11198, $11199, $11200, $11201, $11202, $11203, $11204, $11205, $11206, $11207, $11208, $11209, $11210, $11211, $11212, $11213, $11214, $11215, $11216, $11217, $11218, VersionRange($11219, $11220)), ($11221, $11222, $11223, $11224, $11225, $11226, $11227, $11228, $11229, $11230, $11231, $11232, $11233, $11234, $11235, $11236, $11237, $11238, $11239, $11240, $11241, $11242, $11243, $11244, $11245, $11246, $11247, $11248, VersionRange($11249, $11250)), ($11251, $11252, $11253, $11254, $11255, $11256, $11257, $11258, $11259, $11260, $11261, $11262, $11263, $11264, $11265, $11266, $11267, $11268, $11269, $11270, $11271, $11272, $11273, $11274, $11275, $11276, $11277, $11278, VersionRange($11279, $11280)), ($11281, $11282, $11283, $11284, $11285, $11286, $11287, $11288, $11289, $11290, $11291, $11292, $11293, $11294, $11295, $11296, $11297, $11298, $11299, $11300, $11301, $11302, $11303, $11304, $11305, $11306, $11307, $11308, VersionRange($11309, $11310)), ($11311, $11312, $11313, $11314, $11315, $11316, $11317, $11318, $11319, $11320, $11321, $11322, $11323, $11324, $11325, $11326, $11327, $11328, $11329, $11330, $11331, $11332, $11333, $11334, $11335, $11336, $11337, $11338, VersionRange($11339, $11340)), ($11341, $11342, $11343, $11344, $11345, $11346, $11347, $11348, $11349, $11350, $11351, $11352, $11353, $11354, $11355, $11356, $11357, $11358, $11359, $11360, $11361, $11362, $11363, $11364, $11365, $11366, $11367, $11368, VersionRange($11369, $11370)), ($11371, $11372, $11373, $11374, $11375, $11376, $11377, $11378, $11379, $11380, $11381, $11382, $11383, $11384, $11385, $11386, $11387, $11388, $11389, $11390, $11391, $11392, $11393, $11394, $11395, $11396, $11397, $11398, VersionRange($11399, $11400)), ($11401, $11402, $11403, $11404, $11405, $11406, $11407, $11408, $11409, $11410, $11411, $11412, $11413, $11414, $11415, $11416, $11417, $11418, $11419, $11420, $11421, $11422, $11423, $11424, $11425, $11426, $11427, $11428, VersionRange($11429, $11430)), ($11431, $11432, $11433, $11434, $11435, $11436, $11437, $11438, $11439, $11440, $11441, $11442, $11443, $11444, $11445, $11446, $11447, $11448, $11449, $11450, $11451, $11452, $11453, $11454, $11455, $11456, $11457, $11458, VersionRange($11459, $11460)), ($11461, $11462, $11463, $11464, $11465, $11466, $11467, $11468, $11469, $11470, $11471, $11472, $11473, $11474, $11475, $11476, $11477, $11478, $11479, $11480, $11481, $11482, $11483, $11484, $11485, $11486, $11487, $11488, VersionRange($11489, $11490)), ($11491, $11492, $11493, $11494, $11495, $11496, $11497, $11498, $11499, $11500, $11501, $11502, $11503, $11504, $11505, $11506, $11507, $11508, $11509, $11510, $11511, $11512, $11513, $11514, $11515, $11516, $11517, $11518, VersionRange($11519, $11520)), ($11521, $11522, $11523, $11524, $11525, $11526, $11527, $11528, $11529, $11530, $11531, $11532, $11533, $11534, $11535, $11536, $11537, $11538, $11539, $11540, $11541, $11542, $11543, $11544, $11545, $11546, $11547, $11548, VersionRange($11549, $11550)), ($11551, $11552, $11553, $11554, $11555, $11556, $11557, $11558, $11559, $11560, $11561, $11562, $11563, $11564, $11565, $11566, $11567, $11568, $11569, $11570, $11571, $11572, $11573, $11574, $11575, $11576, $11577, $11578, VersionRange($11579, $11580)), ($11581, $11582, $11583, $11584, $11585, $11586, $11587, $11588, $11589, $11590, $11591, $11592, $11593, $11594, $11595, $11596, $11597, $11598, $11599, $11600, $11601, $11602, $11603, $11604, $11605, $11606, $11607, $11608, VersionRange($11609, $11610)), ($11611, $11612, $11613, $11614, $11615, $11616, $11617, $11618, $11619, $11620, $11621, $11622, $11623, $11624, $11625, $11626, $11627, $11628, $11629, $11630, $11631, $11632, $11633, $11634, $11635, $11636, $11637, $11638, VersionRange($11639, $11640)), ($11641, $11642, $11643, $11644, $11645, $11646, $11647, $11648, $11649, $11650, $11651, $11652, $11653, $11654, $11655, $11656, $11657, $11658, $11659, $11660, $11661, $11662, $11663, $11664, $11665, $11666, $11667, $11668, VersionRange($11669, $11670)), ($11671, $11672, $11673, $11674, $11675, $11676, $11677, $11678, $11679, $11680, $11681, $11682, $11683, $11684, $11685, $11686, $11687, $11688, $11689, $11690, $11691, $11692, $11693, $11694, $11695, $11696, $11697, $11698, VersionRange($11699, $11700)), ($11701, $11702, $11703, $11704, $11705, $11706, $11707, $11708, $11709, $11710, $11711, $11712, $11713, $11714, $11715, $11716, $11717, $11718, $11719, $11720, $11721, $11722, $11723, $11724, $11725, $11726, $11727, $11728, VersionRange($11729, $11730)), ($11731, $11732, $11733, $11734, $11735, $11736, $11737, $11738, $11739, $11740, $11741, $11742, $11743, $11744, $11745, $11746, $11747, $11748, $11749, $11750, $11751, $11752, $11753, $11754, $11755, $11756, $11757, $11758, VersionRange($11759, $11760)), ($11761, $11762, $11763, $11764, $11765, $11766, $11767, $11768, $11769, $11770, $11771, $11772, $11773, $11774, $11775, $11776, $11777, $11778, $11779, $11780, $11781, $11782, $11783, $11784, $11785, $11786, $11787, $11788, VersionRange($11789, $11790)), ($11791, $11792, $11793, $11794, $11795, $11796, $11797, $11798, $11799, $11800, $11801, $11802, $11803, $11804, $11805, $11806, $11807, $11808, $11809, $11810, $11811, $11812, $11813, $11814, $11815, $11816, $11817, $11818, VersionRange($11819, $11820)), ($11821, $11822, $11823, $11824, $11825, $11826, $11827, $11828, $11829, $11830, $11831, $11832, $11833, $11834, $11835, $11836, $11837, $11838, $11839, $11840, $11841, $11842, $11843, $11844, $11845, $11846, $11847, $11848, VersionRange($11849, $11850)), ($11851, $11852, $11853, $11854, $11855, $11856, $11857, $11858, $11859, $11860, $11861, $11862, $11863, $11864, $11865, $11866, $11867, $11868, $11869, $11870, $11871, $11872, $11873, $11874, $11875, $11876, $11877, $11878, VersionRange($11879, $11880)), ($11881, $11882, $11883, $11884, $11885, $11886, $11887, $11888, $11889, $11890, $11891, $11892, $11893, $11894, $11895, $11896, $11897, $11898, $11899, $11900, $11901, $11902, $11903, $11904, $11905, $11906, $11907, $11908, VersionRange($11909, $11910)), ($11911, $11912, $11913, $11914, $11915, $11916, $11917, $11918, $11919, $11920, $11921, $11922, $11923, $11924, $11925, $11926, $11927, $11928, $11929, $11930, $11931, $11932, $11933, $11934, $11935, $11936, $11937, $11938, VersionRange($11939, $11940)), ($11941, $11942, $11943, $11944, $11945, $11946, $11947, $11948, $11949, $11950, $11951, $11952, $11953, $11954, $11955, $11956, $11957, $11958, $11959, $11960, $11961, $11962, $11963, $11964, $11965, $11966, $11967, $11968, VersionRange($11969, $11970)), ($11971, $11972, $11973, $11974, $11975, $11976, $11977, $11978, $11979, $11980, $11981, $11982, $11983, $11984, $11985, $11986, $11987, $11988, $11989, $11990, $11991, $11992, $11993, $11994, $11995, $11996, $11997, $11998, VersionRange($11999, $12000)), ($12001, $12002, $12003, $12004, $12005, $12006, $12007, $12008, $12009, $12010, $12011, $12012, $12013, $12014, $12015, $12016, $12017, $12018, $12019, $12020, $12021, $12022, $12023, $12024, $12025, $12026, $12027, $12028, VersionRange($12029, $12030)), ($12031, $12032, $12033, $12034, $12035, $12036, $12037, $12038, $12039, $12040, $12041, $12042, $12043, $12044, $12045, $12046, $12047, $12048, $12049, $12050, $12051, $12052, $12053, $12054, $12055, $12056, $12057, $12058, VersionRange($12059, $12060)), ($12061, $12062, $12063, $12064, $12065, $12066, $12067, $12068, $12069, $12070, $12071, $12072, $12073, $12074, $12075, $12076, $12077, $12078, $12079, $12080, $12081, $12082, $12083, $12084, $12085, $12086, $12087, $12088, VersionRange($12089, $12090)), ($12091, $12092, $12093, $12094, $12095, $12096, $12097, $12098, $12099, $12100, $12101, $12102, $12103, $12104, $12105, $12106, $12107, $12108, $12109, $12110, $12111, $12112, $12113, $12114, $12115, $12116, $12117, $12118, VersionRange($12119, $12120)), ($12121, $12122, $12123, $12124, $12125, $12126, $12127, $12128, $12129, $12130, $12131, $12132, $12133, $12134, $12135, $12136, $12137, $12138, $12139, $12140, $12141, $12142, $12143, $12144, $12145, $12146, $12147, $12148, VersionRange($12149, $12150)), ($12151, $12152, $12153, $12154, $12155, $12156, $12157, $12158, $12159, $12160, $12161, $12162, $12163, $12164, $12165, $12166, $12167, $12168, $12169, $12170, $12171, $12172, $12173, $12174, $12175, $12176, $12177, $12178, VersionRange($12179, $12180)), ($12181, $12182, $12183, $12184, $12185, $12186, $12187, $12188, $12189, $12190, $12191, $12192, $12193, $12194, $12195, $12196, $12197, $12198, $12199, $12200, $12201, $12202, $12203, $12204, $12205, $12206, $12207, $12208, VersionRange($12209, $12210)), ($12211, $12212, $12213, $12214, $12215, $12216, $12217, $12218, $12219, $12220, $12221, $12222, $12223, $12224, $12225, $12226, $12227, $12228, $12229, $12230, $12231, $12232, $12233, $12234, $12235, $12236, $12237, $12238, VersionRange($12239, $12240)), ($12241, $12242, $12243, $12244, $12245, $12246, $12247, $12248, $12249, $12250, $12251, $12252, $12253, $12254, $12255, $12256, $12257, $12258, $12259, $12260, $12261, $12262, $12263, $12264, $12265, $12266, $12267, $12268, VersionRange($12269, $12270)), ($12271, $12272, $12273, $12274, $12275, $12276, $12277, $12278, $12279, $12280, $12281, $12282, $12283, $12284, $12285, $12286, $12287, $12288, $12289, $12290, $12291, $12292, $12293, $12294, $12295, $12296, $12297, $12298, VersionRange($12299, $12300)), ($12301, $12302, $12303, $12304, $12305, $12306, $12307, $12308, $12309, $12310, $12311, $12312, $12313, $12314, $12315, $12316, $12317, $12318, $12319, $12320, $12321, $12322, $12323, $12324, $12325, $12326, $12327, $12328, VersionRange($12329, $12330)), ($12331, $12332, $12333, $12334, $12335, $12336, $12337, $12338, $12339, $12340, $12341, $12342, $12343, $12344, $12345, $12346, $12347, $12348, $12349, $12350, $12351, $12352, $12353, $12354, $12355, $12356, $12357, $12358, VersionRange($12359, $12360)), ($12361, $12362, $12363, $12364, $12365, $12366, $12367, $12368, $12369, $12370, $12371, $12372, $12373, $12374, $12375, $12376, $12377, $12378, $12379, $12380, $12381, $12382, $12383, $12384, $12385, $12386, $12387, $12388, VersionRange($12389, $12390)), ($12391, $12392, $12393, $12394, $12395, $12396, $12397, $12398, $12399, $12400, $12401, $12402, $12403, $12404, $12405, $12406, $12407, $12408, $12409, $12410, $12411, $12412, $12413, $12414, $12415, $12416, $12417, $12418, VersionRange($12419, $12420)), ($12421, $12422, $12423, $12424, $12425, $12426, $12427, $12428, $12429, $12430, $12431, $12432, $12433, $12434, $12435, $12436, $12437, $12438, $12439, $12440, $12441, $12442, $12443, $12444, $12445, $12446, $12447, $12448, VersionRange($12449, $12450)), ($12451, $12452, $12453, $12454, $12455, $12456, $12457, $12458, $12459, $12460, $12461, $12462, $12463, $12464, $12465, $12466, $12467, $12468, $12469, $12470, $12471, $12472, $12473, $12474, $12475, $12476, $12477, $12478, VersionRange($12479, $12480)), ($12481, $12482, $12483, $12484, $12485, $12486, $12487, $12488, $12489, $12490, $12491, $12492, $12493, $12494, $12495, $12496, $12497, $12498, $12499, $12500, $12501, $12502, $12503, $12504, $12505, $12506, $12507, $12508, VersionRange($12509, $12510)), ($12511, $12512, $12513, $12514, $12515, $12516, $12517, $12518, $12519, $12520, $12521, $12522, $12523, $12524, $12525, $12526, $12527, $12528, $12529, $12530, $12531, $12532, $12533, $12534, $12535, $12536, $12537, $12538, VersionRange($12539, $12540)), ($12541, $12542, $12543, $12544, $12545, $12546, $12547, $12548, $12549, $12550, $12551, $12552, $12553, $12554, $12555, $12556, $12557, $12558, $12559, $12560, $12561, $12562, $12563, $12564, $12565, $12566, $12567, $12568, VersionRange($12569, $12570)), ($12571, $12572, $12573, $12574, $12575, $12576, $12577, $12578, $12579, $12580, $12581, $12582, $12583, $12584, $12585, $12586, $12587, $12588, $12589, $12590, $12591, $12592, $12593, $12594, $12595, $12596, $12597, $12598, VersionRange($12599, $12600)), ($12601, $12602, $12603, $12604, $12605, $12606, $12607, $12608, $12609, $12610, $12611, $12612, $12613, $12614, $12615, $12616, $12617, $12618, $12619, $12620, $12621, $12622, $12623, $12624, $12625, $12626, $12627, $12628, VersionRange($12629, $12630)), ($12631, $12632, $12633, $12634, $12635, $12636, $12637, $12638, $12639, $12640, $12641, $12642, $12643, $12644, $12645, $12646, $12647, $12648, $12649, $12650, $12651, $12652, $12653, $12654, $12655, $12656, $12657, $12658, VersionRange($12659, $12660)), ($12661, $12662, $12663, $12664, $12665, $12666, $12667, $12668, $12669, $12670, $12671, $12672, $12673, $12674, $12675, $12676, $12677, $12678, $12679, $12680, $12681, $12682, $12683, $12684, $12685, $12686, $12687, $12688, VersionRange($12689, $12690)), ($12691, $12692, $12693, $12694, $12695, $12696, $12697, $12698, $12699, $12700, $12701, $12702, $12703, $12704, $12705, $12706, $12707, $12708, $12709, $12710, $12711, $12712, $12713, $12714, $12715, $12716, $12717, $12718, VersionRange($12719, $12720)), ($12721, $12722, $12723, $12724, $12725, $12726, $12727, $12728, $12729, $12730, $12731, $12732, $12733, $12734, $12735, $12736, $12737, $12738, $12739, $12740, $12741, $12742, $12743, $12744, $12745, $12746, $12747, $12748, VersionRange($12749, $12750)), ($12751, $12752, $12753, $12754, $12755, $12756, $12757, $12758, $12759, $12760, $12761, $12762, $12763, $12764, $12765, $12766, $12767, $12768, $12769, $12770, $12771, $12772, $12773, $12774, $12775, $12776, $12777, $12778, VersionRange($12779, $12780)), ($12781, $12782, $12783, $12784, $12785, $12786, $12787, $12788, $12789, $12790, $12791, $12792, $12793, $12794, $12795, $12796, $12797, $12798, $12799, $12800, $12801, $12802, $12803, $12804, $12805, $12806, $12807, $12808, VersionRange($12809, $12810)), ($12811, $12812, $12813, $12814, $12815, $12816, $12817, $12818, $12819, $12820, $12821, $12822, $12823, $12824, $12825, $12826, $12827, $12828, $12829, $12830, $12831, $12832, $12833, $12834, $12835, $12836, $12837, $12838, VersionRange($12839, $12840)), ($12841, $12842, $12843, $12844, $12845, $12846, $12847, $12848, $12849, $12850, $12851, $12852, $12853, $12854, $12855, $12856, $12857, $12858, $12859, $12860, $12861, $12862, $12863, $12864, $12865, $12866, $12867, $12868, VersionRange($12869, $12870)), ($12871, $12872, $12873, $12874, $12875, $12876, $12877, $12878, $12879, $12880, $12881, $12882, $12883, $12884, $12885, $12886, $12887, $12888, $12889, $12890, $12891, $12892, $12893, $12894, $12895, $12896, $12897, $12898, VersionRange($12899, $12900)), ($12901, $12902, $12903, $12904, $12905, $12906, $12907, $12908, $12909, $12910, $12911, $12912, $12913, $12914, $12915, $12916, $12917, $12918, $12919, $12920, $12921, $12922, $12923, $12924, $12925, $12926, $12927, $12928, VersionRange($12929, $12930)), ($12931, $12932, $12933, $12934, $12935, $12936, $12937, $12938, $12939, $12940, $12941, $12942, $12943, $12944, $12945, $12946, $12947, $12948, $12949, $12950, $12951, $12952, $12953, $12954, $12955, $12956, $12957, $12958, VersionRange($12959, $12960)), ($12961, $12962, $12963, $12964, $12965, $12966, $12967, $12968, $12969, $12970[...][ Date: 2023-07-04 18:39:59 ]
19 3s357ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30)), ($31, $32, $33, $34, $35, $36, $37, $38, $39, $40, $41, $42, $43, $44, $45, $46, $47, $48, $49, $50, $51, $52, $53, $54, $55, $56, $57, $58, VersionRange($59, $60)), ($61, $62, $63, $64, $65, $66, $67, $68, $69, $70, $71, $72, $73, $74, $75, $76, $77, $78, $79, $80, $81, $82, $83, $84, $85, $86, $87, $88, VersionRange($89, $90)), ($91, $92, $93, $94, $95, $96, $97, $98, $99, $100, $101, $102, $103, $104, $105, $106, $107, $108, $109, $110, $111, $112, $113, $114, $115, $116, $117, $118, VersionRange($119, $120)), ($121, $122, $123, $124, $125, $126, $127, $128, $129, $130, $131, $132, $133, $134, $135, $136, $137, $138, $139, $140, $141, $142, $143, $144, $145, $146, $147, $148, VersionRange($149, $150)), ($151, $152, $153, $154, $155, $156, $157, $158, $159, $160, $161, $162, $163, $164, $165, $166, $167, $168, $169, $170, $171, $172, $173, $174, $175, $176, $177, $178, VersionRange($179, $180)), ($181, $182, $183, $184, $185, $186, $187, $188, $189, $190, $191, $192, $193, $194, $195, $196, $197, $198, $199, $200, $201, $202, $203, $204, $205, $206, $207, $208, VersionRange($209, $210)), ($211, $212, $213, $214, $215, $216, $217, $218, $219, $220, $221, $222, $223, $224, $225, $226, $227, $228, $229, $230, $231, $232, $233, $234, $235, $236, $237, $238, VersionRange($239, $240)), ($241, $242, $243, $244, $245, $246, $247, $248, $249, $250, $251, $252, $253, $254, $255, $256, $257, $258, $259, $260, $261, $262, $263, $264, $265, $266, $267, $268, VersionRange($269, $270)), ($271, $272, $273, $274, $275, $276, $277, $278, $279, $280, $281, $282, $283, $284, $285, $286, $287, $288, $289, $290, $291, $292, $293, $294, $295, $296, $297, $298, VersionRange($299, $300)), ($301, $302, $303, $304, $305, $306, $307, $308, $309, $310, $311, $312, $313, $314, $315, $316, $317, $318, $319, $320, $321, $322, $323, $324, $325, $326, $327, $328, VersionRange($329, $330)), ($331, $332, $333, $334, $335, $336, $337, $338, $339, $340, $341, $342, $343, $344, $345, $346, $347, $348, $349, $350, $351, $352, $353, $354, $355, $356, $357, $358, VersionRange($359, $360)), ($361, $362, $363, $364, $365, $366, $367, $368, $369, $370, $371, $372, $373, $374, $375, $376, $377, $378, $379, $380, $381, $382, $383, $384, $385, $386, $387, $388, VersionRange($389, $390)), ($391, $392, $393, $394, $395, $396, $397, $398, $399, $400, $401, $402, $403, $404, $405, $406, $407, $408, $409, $410, $411, $412, $413, $414, $415, $416, $417, $418, VersionRange($419, $420)), ($421, $422, $423, $424, $425, $426, $427, $428, $429, $430, $431, $432, $433, $434, $435, $436, $437, $438, $439, $440, $441, $442, $443, $444, $445, $446, $447, $448, VersionRange($449, $450)), ($451, $452, $453, $454, $455, $456, $457, $458, $459, $460, $461, $462, $463, $464, $465, $466, $467, $468, $469, $470, $471, $472, $473, $474, $475, $476, $477, $478, VersionRange($479, $480)), ($481, $482, $483, $484, $485, $486, $487, $488, $489, $490, $491, $492, $493, $494, $495, $496, $497, $498, $499, $500, $501, $502, $503, $504, $505, $506, $507, $508, VersionRange($509, $510)), ($511, $512, $513, $514, $515, $516, $517, $518, $519, $520, $521, $522, $523, $524, $525, $526, $527, $528, $529, $530, $531, $532, $533, $534, $535, $536, $537, $538, VersionRange($539, $540)), ($541, $542, $543, $544, $545, $546, $547, $548, $549, $550, $551, $552, $553, $554, $555, $556, $557, $558, $559, $560, $561, $562, $563, $564, $565, $566, $567, $568, VersionRange($569, $570)), ($571, $572, $573, $574, $575, $576, $577, $578, $579, $580, $581, $582, $583, $584, $585, $586, $587, $588, $589, $590, $591, $592, $593, $594, $595, $596, $597, $598, VersionRange($599, $600)), ($601, $602, $603, $604, $605, $606, $607, $608, $609, $610, $611, $612, $613, $614, $615, $616, $617, $618, $619, $620, $621, $622, $623, $624, $625, $626, $627, $628, VersionRange($629, $630)), ($631, $632, $633, $634, $635, $636, $637, $638, $639, $640, $641, $642, $643, $644, $645, $646, $647, $648, $649, $650, $651, $652, $653, $654, $655, $656, $657, $658, VersionRange($659, $660)), ($661, $662, $663, $664, $665, $666, $667, $668, $669, $670, $671, $672, $673, $674, $675, $676, $677, $678, $679, $680, $681, $682, $683, $684, $685, $686, $687, $688, VersionRange($689, $690)), ($691, $692, $693, $694, $695, $696, $697, $698, $699, $700, $701, $702, $703, $704, $705, $706, $707, $708, $709, $710, $711, $712, $713, $714, $715, $716, $717, $718, VersionRange($719, $720)), ($721, $722, $723, $724, $725, $726, $727, $728, $729, $730, $731, $732, $733, $734, $735, $736, $737, $738, $739, $740, $741, $742, $743, $744, $745, $746, $747, $748, VersionRange($749, $750)), ($751, $752, $753, $754, $755, $756, $757, $758, $759, $760, $761, $762, $763, $764, $765, $766, $767, $768, $769, $770, $771, $772, $773, $774, $775, $776, $777, $778, VersionRange($779, $780)), ($781, $782, $783, $784, $785, $786, $787, $788, $789, $790, $791, $792, $793, $794, $795, $796, $797, $798, $799, $800, $801, $802, $803, $804, $805, $806, $807, $808, VersionRange($809, $810)), ($811, $812, $813, $814, $815, $816, $817, $818, $819, $820, $821, $822, $823, $824, $825, $826, $827, $828, $829, $830, $831, $832, $833, $834, $835, $836, $837, $838, VersionRange($839, $840)), ($841, $842, $843, $844, $845, $846, $847, $848, $849, $850, $851, $852, $853, $854, $855, $856, $857, $858, $859, $860, $861, $862, $863, $864, $865, $866, $867, $868, VersionRange($869, $870)), ($871, $872, $873, $874, $875, $876, $877, $878, $879, $880, $881, $882, $883, $884, $885, $886, $887, $888, $889, $890, $891, $892, $893, $894, $895, $896, $897, $898, VersionRange($899, $900)), ($901, $902, $903, $904, $905, $906, $907, $908, $909, $910, $911, $912, $913, $914, $915, $916, $917, $918, $919, $920, $921, $922, $923, $924, $925, $926, $927, $928, VersionRange($929, $930)), ($931, $932, $933, $934, $935, $936, $937, $938, $939, $940, $941, $942, $943, $944, $945, $946, $947, $948, $949, $950, $951, $952, $953, $954, $955, $956, $957, $958, VersionRange($959, $960)), ($961, $962, $963, $964, $965, $966, $967, $968, $969, $970, $971, $972, $973, $974, $975, $976, $977, $978, $979, $980, $981, $982, $983, $984, $985, $986, $987, $988, VersionRange($989, $990)), ($991, $992, $993, $994, $995, $996, $997, $998, $999, $1000, $1001, $1002, $1003, $1004, $1005, $1006, $1007, $1008, $1009, $1010, $1011, $1012, $1013, $1014, $1015, $1016, $1017, $1018, VersionRange($1019, $1020)), ($1021, $1022, $1023, $1024, $1025, $1026, $1027, $1028, $1029, $1030, $1031, $1032, $1033, $1034, $1035, $1036, $1037, $1038, $1039, $1040, $1041, $1042, $1043, $1044, $1045, $1046, $1047, $1048, VersionRange($1049, $1050)), ($1051, $1052, $1053, $1054, $1055, $1056, $1057, $1058, $1059, $1060, $1061, $1062, $1063, $1064, $1065, $1066, $1067, $1068, $1069, $1070, $1071, $1072, $1073, $1074, $1075, $1076, $1077, $1078, VersionRange($1079, $1080)), ($1081, $1082, $1083, $1084, $1085, $1086, $1087, $1088, $1089, $1090, $1091, $1092, $1093, $1094, $1095, $1096, $1097, $1098, $1099, $1100, $1101, $1102, $1103, $1104, $1105, $1106, $1107, $1108, VersionRange($1109, $1110)), ($1111, $1112, $1113, $1114, $1115, $1116, $1117, $1118, $1119, $1120, $1121, $1122, $1123, $1124, $1125, $1126, $1127, $1128, $1129, $1130, $1131, $1132, $1133, $1134, $1135, $1136, $1137, $1138, VersionRange($1139, $1140)), ($1141, $1142, $1143, $1144, $1145, $1146, $1147, $1148, $1149, $1150, $1151, $1152, $1153, $1154, $1155, $1156, $1157, $1158, $1159, $1160, $1161, $1162, $1163, $1164, $1165, $1166, $1167, $1168, VersionRange($1169, $1170)), ($1171, $1172, $1173, $1174, $1175, $1176, $1177, $1178, $1179, $1180, $1181, $1182, $1183, $1184, $1185, $1186, $1187, $1188, $1189, $1190, $1191, $1192, $1193, $1194, $1195, $1196, $1197, $1198, VersionRange($1199, $1200)), ($1201, $1202, $1203, $1204, $1205, $1206, $1207, $1208, $1209, $1210, $1211, $1212, $1213, $1214, $1215, $1216, $1217, $1218, $1219, $1220, $1221, $1222, $1223, $1224, $1225, $1226, $1227, $1228, VersionRange($1229, $1230)), ($1231, $1232, $1233, $1234, $1235, $1236, $1237, $1238, $1239, $1240, $1241, $1242, $1243, $1244, $1245, $1246, $1247, $1248, $1249, $1250, $1251, $1252, $1253, $1254, $1255, $1256, $1257, $1258, VersionRange($1259, $1260)), ($1261, $1262, $1263, $1264, $1265, $1266, $1267, $1268, $1269, $1270, $1271, $1272, $1273, $1274, $1275, $1276, $1277, $1278, $1279, $1280, $1281, $1282, $1283, $1284, $1285, $1286, $1287, $1288, VersionRange($1289, $1290)), ($1291, $1292, $1293, $1294, $1295, $1296, $1297, $1298, $1299, $1300, $1301, $1302, $1303, $1304, $1305, $1306, $1307, $1308, $1309, $1310, $1311, $1312, $1313, $1314, $1315, $1316, $1317, $1318, VersionRange($1319, $1320)), ($1321, $1322, $1323, $1324, $1325, $1326, $1327, $1328, $1329, $1330, $1331, $1332, $1333, $1334, $1335, $1336, $1337, $1338, $1339, $1340, $1341, $1342, $1343, $1344, $1345, $1346, $1347, $1348, VersionRange($1349, $1350)), ($1351, $1352, $1353, $1354, $1355, $1356, $1357, $1358, $1359, $1360, $1361, $1362, $1363, $1364, $1365, $1366, $1367, $1368, $1369, $1370, $1371, $1372, $1373, $1374, $1375, $1376, $1377, $1378, VersionRange($1379, $1380)), ($1381, $1382, $1383, $1384, $1385, $1386, $1387, $1388, $1389, $1390, $1391, $1392, $1393, $1394, $1395, $1396, $1397, $1398, $1399, $1400, $1401, $1402, $1403, $1404, $1405, $1406, $1407, $1408, VersionRange($1409, $1410)), ($1411, $1412, $1413, $1414, $1415, $1416, $1417, $1418, $1419, $1420, $1421, $1422, $1423, $1424, $1425, $1426, $1427, $1428, $1429, $1430, $1431, $1432, $1433, $1434, $1435, $1436, $1437, $1438, VersionRange($1439, $1440)), ($1441, $1442, $1443, $1444, $1445, $1446, $1447, $1448, $1449, $1450, $1451, $1452, $1453, $1454, $1455, $1456, $1457, $1458, $1459, $1460, $1461, $1462, $1463, $1464, $1465, $1466, $1467, $1468, VersionRange($1469, $1470)), ($1471, $1472, $1473, $1474, $1475, $1476, $1477, $1478, $1479, $1480, $1481, $1482, $1483, $1484, $1485, $1486, $1487, $1488, $1489, $1490, $1491, $1492, $1493, $1494, $1495, $1496, $1497, $1498, VersionRange($1499, $1500)), ($1501, $1502, $1503, $1504, $1505, $1506, $1507, $1508, $1509, $1510, $1511, $1512, $1513, $1514, $1515, $1516, $1517, $1518, $1519, $1520, $1521, $1522, $1523, $1524, $1525, $1526, $1527, $1528, VersionRange($1529, $1530)), ($1531, $1532, $1533, $1534, $1535, $1536, $1537, $1538, $1539, $1540, $1541, $1542, $1543, $1544, $1545, $1546, $1547, $1548, $1549, $1550, $1551, $1552, $1553, $1554, $1555, $1556, $1557, $1558, VersionRange($1559, $1560)), ($1561, $1562, $1563, $1564, $1565, $1566, $1567, $1568, $1569, $1570, $1571, $1572, $1573, $1574, $1575, $1576, $1577, $1578, $1579, $1580, $1581, $1582, $1583, $1584, $1585, $1586, $1587, $1588, VersionRange($1589, $1590)), ($1591, $1592, $1593, $1594, $1595, $1596, $1597, $1598, $1599, $1600, $1601, $1602, $1603, $1604, $1605, $1606, $1607, $1608, $1609, $1610, $1611, $1612, $1613, $1614, $1615, $1616, $1617, $1618, VersionRange($1619, $1620)), ($1621, $1622, $1623, $1624, $1625, $1626, $1627, $1628, $1629, $1630, $1631, $1632, $1633, $1634, $1635, $1636, $1637, $1638, $1639, $1640, $1641, $1642, $1643, $1644, $1645, $1646, $1647, $1648, VersionRange($1649, $1650)), ($1651, $1652, $1653, $1654, $1655, $1656, $1657, $1658, $1659, $1660, $1661, $1662, $1663, $1664, $1665, $1666, $1667, $1668, $1669, $1670, $1671, $1672, $1673, $1674, $1675, $1676, $1677, $1678, VersionRange($1679, $1680)), ($1681, $1682, $1683, $1684, $1685, $1686, $1687, $1688, $1689, $1690, $1691, $1692, $1693, $1694, $1695, $1696, $1697, $1698, $1699, $1700, $1701, $1702, $1703, $1704, $1705, $1706, $1707, $1708, VersionRange($1709, $1710)), ($1711, $1712, $1713, $1714, $1715, $1716, $1717, $1718, $1719, $1720, $1721, $1722, $1723, $1724, $1725, $1726, $1727, $1728, $1729, $1730, $1731, $1732, $1733, $1734, $1735, $1736, $1737, $1738, VersionRange($1739, $1740)), ($1741, $1742, $1743, $1744, $1745, $1746, $1747, $1748, $1749, $1750, $1751, $1752, $1753, $1754, $1755, $1756, $1757, $1758, $1759, $1760, $1761, $1762, $1763, $1764, $1765, $1766, $1767, $1768, VersionRange($1769, $1770)), ($1771, $1772, $1773, $1774, $1775, $1776, $1777, $1778, $1779, $1780, $1781, $1782, $1783, $1784, $1785, $1786, $1787, $1788, $1789, $1790, $1791, $1792, $1793, $1794, $1795, $1796, $1797, $1798, VersionRange($1799, $1800)), ($1801, $1802, $1803, $1804, $1805, $1806, $1807, $1808, $1809, $1810, $1811, $1812, $1813, $1814, $1815, $1816, $1817, $1818, $1819, $1820, $1821, $1822, $1823, $1824, $1825, $1826, $1827, $1828, VersionRange($1829, $1830)), ($1831, $1832, $1833, $1834, $1835, $1836, $1837, $1838, $1839, $1840, $1841, $1842, $1843, $1844, $1845, $1846, $1847, $1848, $1849, $1850, $1851, $1852, $1853, $1854, $1855, $1856, $1857, $1858, VersionRange($1859, $1860)), ($1861, $1862, $1863, $1864, $1865, $1866, $1867, $1868, $1869, $1870, $1871, $1872, $1873, $1874, $1875, $1876, $1877, $1878, $1879, $1880, $1881, $1882, $1883, $1884, $1885, $1886, $1887, $1888, VersionRange($1889, $1890)), ($1891, $1892, $1893, $1894, $1895, $1896, $1897, $1898, $1899, $1900, $1901, $1902, $1903, $1904, $1905, $1906, $1907, $1908, $1909, $1910, $1911, $1912, $1913, $1914, $1915, $1916, $1917, $1918, VersionRange($1919, $1920)), ($1921, $1922, $1923, $1924, $1925, $1926, $1927, $1928, $1929, $1930, $1931, $1932, $1933, $1934, $1935, $1936, $1937, $1938, $1939, $1940, $1941, $1942, $1943, $1944, $1945, $1946, $1947, $1948, VersionRange($1949, $1950)), ($1951, $1952, $1953, $1954, $1955, $1956, $1957, $1958, $1959, $1960, $1961, $1962, $1963, $1964, $1965, $1966, $1967, $1968, $1969, $1970, $1971, $1972, $1973, $1974, $1975, $1976, $1977, $1978, VersionRange($1979, $1980)), ($1981, $1982, $1983, $1984, $1985, $1986, $1987, $1988, $1989, $1990, $1991, $1992, $1993, $1994, $1995, $1996, $1997, $1998, $1999, $2000, $2001, $2002, $2003, $2004, $2005, $2006, $2007, $2008, VersionRange($2009, $2010)), ($2011, $2012, $2013, $2014, $2015, $2016, $2017, $2018, $2019, $2020, $2021, $2022, $2023, $2024, $2025, $2026, $2027, $2028, $2029, $2030, $2031, $2032, $2033, $2034, $2035, $2036, $2037, $2038, VersionRange($2039, $2040)), ($2041, $2042, $2043, $2044, $2045, $2046, $2047, $2048, $2049, $2050, $2051, $2052, $2053, $2054, $2055, $2056, $2057, $2058, $2059, $2060, $2061, $2062, $2063, $2064, $2065, $2066, $2067, $2068, VersionRange($2069, $2070)), ($2071, $2072, $2073, $2074, $2075, $2076, $2077, $2078, $2079, $2080, $2081, $2082, $2083, $2084, $2085, $2086, $2087, $2088, $2089, $2090, $2091, $2092, $2093, $2094, $2095, $2096, $2097, $2098, VersionRange($2099, $2100)), ($2101, $2102, $2103, $2104, $2105, $2106, $2107, $2108, $2109, $2110, $2111, $2112, $2113, $2114, $2115, $2116, $2117, $2118, $2119, $2120, $2121, $2122, $2123, $2124, $2125, $2126, $2127, $2128, VersionRange($2129, $2130)), ($2131, $2132, $2133, $2134, $2135, $2136, $2137, $2138, $2139, $2140, $2141, $2142, $2143, $2144, $2145, $2146, $2147, $2148, $2149, $2150, $2151, $2152, $2153, $2154, $2155, $2156, $2157, $2158, VersionRange($2159, $2160)), ($2161, $2162, $2163, $2164, $2165, $2166, $2167, $2168, $2169, $2170, $2171, $2172, $2173, $2174, $2175, $2176, $2177, $2178, $2179, $2180, $2181, $2182, $2183, $2184, $2185, $2186, $2187, $2188, VersionRange($2189, $2190)), ($2191, $2192, $2193, $2194, $2195, $2196, $2197, $2198, $2199, $2200, $2201, $2202, $2203, $2204, $2205, $2206, $2207, $2208, $2209, $2210, $2211, $2212, $2213, $2214, $2215, $2216, $2217, $2218, VersionRange($2219, $2220)), ($2221, $2222, $2223, $2224, $2225, $2226, $2227, $2228, $2229, $2230, $2231, $2232, $2233, $2234, $2235, $2236, $2237, $2238, $2239, $2240, $2241, $2242, $2243, $2244, $2245, $2246, $2247, $2248, VersionRange($2249, $2250)), ($2251, $2252, $2253, $2254, $2255, $2256, $2257, $2258, $2259, $2260, $2261, $2262, $2263, $2264, $2265, $2266, $2267, $2268, $2269, $2270, $2271, $2272, $2273, $2274, $2275, $2276, $2277, $2278, VersionRange($2279, $2280)), ($2281, $2282, $2283, $2284, $2285, $2286, $2287, $2288, $2289, $2290, $2291, $2292, $2293, $2294, $2295, $2296, $2297, $2298, $2299, $2300, $2301, $2302, $2303, $2304, $2305, $2306, $2307, $2308, VersionRange($2309, $2310)), ($2311, $2312, $2313, $2314, $2315, $2316, $2317, $2318, $2319, $2320, $2321, $2322, $2323, $2324, $2325, $2326, $2327, $2328, $2329, $2330, $2331, $2332, $2333, $2334, $2335, $2336, $2337, $2338, VersionRange($2339, $2340)), ($2341, $2342, $2343, $2344, $2345, $2346, $2347, $2348, $2349, $2350, $2351, $2352, $2353, $2354, $2355, $2356, $2357, $2358, $2359, $2360, $2361, $2362, $2363, $2364, $2365, $2366, $2367, $2368, VersionRange($2369, $2370)), ($2371, $2372, $2373, $2374, $2375, $2376, $2377, $2378, $2379, $2380, $2381, $2382, $2383, $2384, $2385, $2386, $2387, $2388, $2389, $2390, $2391, $2392, $2393, $2394, $2395, $2396, $2397, $2398, VersionRange($2399, $2400)), ($2401, $2402, $2403, $2404, $2405, $2406, $2407, $2408, $2409, $2410, $2411, $2412, $2413, $2414, $2415, $2416, $2417, $2418, $2419, $2420, $2421, $2422, $2423, $2424, $2425, $2426, $2427, $2428, VersionRange($2429, $2430)), ($2431, $2432, $2433, $2434, $2435, $2436, $2437, $2438, $2439, $2440, $2441, $2442, $2443, $2444, $2445, $2446, $2447, $2448, $2449, $2450, $2451, $2452, $2453, $2454, $2455, $2456, $2457, $2458, VersionRange($2459, $2460)), ($2461, $2462, $2463, $2464, $2465, $2466, $2467, $2468, $2469, $2470, $2471, $2472, $2473, $2474, $2475, $2476, $2477, $2478, $2479, $2480, $2481, $2482, $2483, $2484, $2485, $2486, $2487, $2488, VersionRange($2489, $2490)), ($2491, $2492, $2493, $2494, $2495, $2496, $2497, $2498, $2499, $2500, $2501, $2502, $2503, $2504, $2505, $2506, $2507, $2508, $2509, $2510, $2511, $2512, $2513, $2514, $2515, $2516, $2517, $2518, VersionRange($2519, $2520)), ($2521, $2522, $2523, $2524, $2525, $2526, $2527, $2528, $2529, $2530, $2531, $2532, $2533, $2534, $2535, $2536, $2537, $2538, $2539, $2540, $2541, $2542, $2543, $2544, $2545, $2546, $2547, $2548, VersionRange($2549, $2550)), ($2551, $2552, $2553, $2554, $2555, $2556, $2557, $2558, $2559, $2560, $2561, $2562, $2563, $2564, $2565, $2566, $2567, $2568, $2569, $2570, $2571, $2572, $2573, $2574, $2575, $2576, $2577, $2578, VersionRange($2579, $2580)), ($2581, $2582, $2583, $2584, $2585, $2586, $2587, $2588, $2589, $2590, $2591, $2592, $2593, $2594, $2595, $2596, $2597, $2598, $2599, $2600, $2601, $2602, $2603, $2604, $2605, $2606, $2607, $2608, VersionRange($2609, $2610)), ($2611, $2612, $2613, $2614, $2615, $2616, $2617, $2618, $2619, $2620, $2621, $2622, $2623, $2624, $2625, $2626, $2627, $2628, $2629, $2630, $2631, $2632, $2633, $2634, $2635, $2636, $2637, $2638, VersionRange($2639, $2640)), ($2641, $2642, $2643, $2644, $2645, $2646, $2647, $2648, $2649, $2650, $2651, $2652, $2653, $2654, $2655, $2656, $2657, $2658, $2659, $2660, $2661, $2662, $2663, $2664, $2665, $2666, $2667, $2668, VersionRange($2669, $2670)), ($2671, $2672, $2673, $2674, $2675, $2676, $2677, $2678, $2679, $2680, $2681, $2682, $2683, $2684, $2685, $2686, $2687, $2688, $2689, $2690, $2691, $2692, $2693, $2694, $2695, $2696, $2697, $2698, VersionRange($2699, $2700)), ($2701, $2702, $2703, $2704, $2705, $2706, $2707, $2708, $2709, $2710, $2711, $2712, $2713, $2714, $2715, $2716, $2717, $2718, $2719, $2720, $2721, $2722, $2723, $2724, $2725, $2726, $2727, $2728, VersionRange($2729, $2730)), ($2731, $2732, $2733, $2734, $2735, $2736, $2737, $2738, $2739, $2740, $2741, $2742, $2743, $2744, $2745, $2746, $2747, $2748, $2749, $2750, $2751, $2752, $2753, $2754, $2755, $2756, $2757, $2758, VersionRange($2759, $2760)), ($2761, $2762, $2763, $2764, $2765, $2766, $2767, $2768, $2769, $2770, $2771, $2772, $2773, $2774, $2775, $2776, $2777, $2778, $2779, $2780, $2781, $2782, $2783, $2784, $2785, $2786, $2787, $2788, VersionRange($2789, $2790)), ($2791, $2792, $2793, $2794, $2795, $2796, $2797, $2798, $2799, $2800, $2801, $2802, $2803, $2804, $2805, $2806, $2807, $2808, $2809, $2810, $2811, $2812, $2813, $2814, $2815, $2816, $2817, $2818, VersionRange($2819, $2820)), ($2821, $2822, $2823, $2824, $2825, $2826, $2827, $2828, $2829, $2830, $2831, $2832, $2833, $2834, $2835, $2836, $2837, $2838, $2839, $2840, $2841, $2842, $2843, $2844, $2845, $2846, $2847, $2848, VersionRange($2849, $2850)), ($2851, $2852, $2853, $2854, $2855, $2856, $2857, $2858, $2859, $2860, $2861, $2862, $2863, $2864, $2865, $2866, $2867, $2868, $2869, $2870, $2871, $2872, $2873, $2874, $2875, $2876, $2877, $2878, VersionRange($2879, $2880)), ($2881, $2882, $2883, $2884, $2885, $2886, $2887, $2888, $2889, $2890, $2891, $2892, $2893, $2894, $2895, $2896, $2897, $2898, $2899, $2900, $2901, $2902, $2903, $2904, $2905, $2906, $2907, $2908, VersionRange($2909, $2910)), ($2911, $2912, $2913, $2914, $2915, $2916, $2917, $2918, $2919, $2920, $2921, $2922, $2923, $2924, $2925, $2926, $2927, $2928, $2929, $2930, $2931, $2932, $2933, $2934, $2935, $2936, $2937, $2938, VersionRange($2939, $2940)), ($2941, $2942, $2943, $2944, $2945, $2946, $2947, $2948, $2949, $2950, $2951, $2952, $2953, $2954, $2955, $2956, $2957, $2958, $2959, $2960, $2961, $2962, $2963, $2964, $2965, $2966, $2967, $2968, VersionRange($2969, $2970)), ($2971, $2972, $2973, $2974, $2975, $2976, $2977, $2978, $2979, $2980, $2981, $2982, $2983, $2984, $2985, $2986, $2987, $2988, $2989, $2990, $2991, $2992, $2993, $2994, $2995, $2996, $2997, $2998, VersionRange($2999, $3000)), ($3001, $3002, $3003, $3004, $3005, $3006, $3007, $3008, $3009, $3010, $3011, $3012, $3013, $3014, $3015, $3016, $3017, $3018, $3019, $3020, $3021, $3022, $3023, $3024, $3025, $3026, $3027, $3028, VersionRange($3029, $3030)), ($3031, $3032, $3033, $3034, $3035, $3036, $3037, $3038, $3039, $3040, $3041, $3042, $3043, $3044, $3045, $3046, $3047, $3048, $3049, $3050, $3051, $3052, $3053, $3054, $3055, $3056, $3057, $3058, VersionRange($3059, $3060)), ($3061, $3062, $3063, $3064, $3065, $3066, $3067, $3068, $3069, $3070, $3071, $3072, $3073, $3074, $3075, $3076, $3077, $3078, $3079, $3080, $3081, $3082, $3083, $3084, $3085, $3086, $3087, $3088, VersionRange($3089, $3090)), ($3091, $3092, $3093, $3094, $3095, $3096, $3097, $3098, $3099, $3100, $3101, $3102, $3103, $3104, $3105, $3106, $3107, $3108, $3109, $3110, $3111, $3112, $3113, $3114, $3115, $3116, $3117, $3118, VersionRange($3119, $3120)), ($3121, $3122, $3123, $3124, $3125, $3126, $3127, $3128, $3129, $3130, $3131, $3132, $3133, $3134, $3135, $3136, $3137, $3138, $3139, $3140, $3141, $3142, $3143, $3144, $3145, $3146, $3147, $3148, VersionRange($3149, $3150)), ($3151, $3152, $3153, $3154, $3155, $3156, $3157, $3158, $3159, $3160, $3161, $3162, $3163, $3164, $3165, $3166, $3167, $3168, $3169, $3170, $3171, $3172, $3173, $3174, $3175, $3176, $3177, $3178, VersionRange($3179, $3180)), ($3181, $3182, $3183, $3184, $3185, $3186, $3187, $3188, $3189, $3190, $3191, $3192, $3193, $3194, $3195, $3196, $3197, $3198, $3199, $3200, $3201, $3202, $3203, $3204, $3205, $3206, $3207, $3208, VersionRange($3209, $3210)), ($3211, $3212, $3213, $3214, $3215, $3216, $3217, $3218, $3219, $3220, $3221, $3222, $3223, $3224, $3225, $3226, $3227, $3228, $3229, $3230, $3231, $3232, $3233, $3234, $3235, $3236, $3237, $3238, VersionRange($3239, $3240)), ($3241, $3242, $3243, $3244, $3245, $3246, $3247, $3248, $3249, $3250, $3251, $3252, $3253, $3254, $3255, $3256, $3257, $3258, $3259, $3260, $3261, $3262, $3263, $3264, $3265, $3266, $3267, $3268, VersionRange($3269, $3270)), ($3271, $3272, $3273, $3274, $3275, $3276, $3277, $3278, $3279, $3280, $3281, $3282, $3283, $3284, $3285, $3286, $3287, $3288, $3289, $3290, $3291, $3292, $3293, $3294, $3295, $3296, $3297, $3298, VersionRange($3299, $3300)), ($3301, $3302, $3303, $3304, $3305, $3306, $3307, $3308, $3309, $3310, $3311, $3312, $3313, $3314, $3315, $3316, $3317, $3318, $3319, $3320, $3321, $3322, $3323, $3324, $3325, $3326, $3327, $3328, VersionRange($3329, $3330)), ($3331, $3332, $3333, $3334, $3335, $3336, $3337, $3338, $3339, $3340, $3341, $3342, $3343, $3344, $3345, $3346, $3347, $3348, $3349, $3350, $3351, $3352, $3353, $3354, $3355, $3356, $3357, $3358, VersionRange($3359, $3360)), ($3361, $3362, $3363, $3364, $3365, $3366, $3367, $3368, $3369, $3370, $3371, $3372, $3373, $3374, $3375, $3376, $3377, $3378, $3379, $3380, $3381, $3382, $3383, $3384, $3385, $3386, $3387, $3388, VersionRange($3389, $3390)), ($3391, $3392, $3393, $3394, $3395, $3396, $3397, $3398, $3399, $3400, $3401, $3402, $3403, $3404, $3405, $3406, $3407, $3408, $3409, $3410, $3411, $3412, $3413, $3414, $3415, $3416, $3417, $3418, VersionRange($3419, $3420)), ($3421, $3422, $3423, $3424, $3425, $3426, $3427, $3428, $3429, $3430, $3431, $3432, $3433, $3434, $3435, $3436, $3437, $3438, $3439, $3440, $3441, $3442, $3443, $3444, $3445, $3446, $3447, $3448, VersionRange($3449, $3450)), ($3451, $3452, $3453, $3454, $3455, $3456, $3457, $3458, $3459, $3460, $3461, $3462, $3463, $3464, $3465, $3466, $3467, $3468, $3469, $3470, $3471, $3472, $3473, $3474, $3475, $3476, $3477, $3478, VersionRange($3479, $3480)), ($3481, $3482, $3483, $3484, $3485, $3486, $3487, $3488, $3489, $3490, $3491, $3492, $3493, $3494, $3495, $3496, $3497, $3498, $3499, $3500, $3501, $3502, $3503, $3504, $3505, $3506, $3507, $3508, VersionRange($3509, $3510)), ($3511, $3512, $3513, $3514, $3515, $3516, $3517, $3518, $3519, $3520, $3521, $3522, $3523, $3524, $3525, $3526, $3527, $3528, $3529, $3530, $3531, $3532, $3533, $3534, $3535, $3536, $3537, $3538, VersionRange($3539, $3540)), ($3541, $3542, $3543, $3544, $3545, $3546, $3547, $3548, $3549, $3550, $3551, $3552, $3553, $3554, $3555, $3556, $3557, $3558, $3559, $3560, $3561, $3562, $3563, $3564, $3565, $3566, $3567, $3568, VersionRange($3569, $3570)), ($3571, $3572, $3573, $3574, $3575, $3576, $3577, $3578, $3579, $3580, $3581, $3582, $3583, $3584, $3585, $3586, $3587, $3588, $3589, $3590, $3591, $3592, $3593, $3594, $3595, $3596, $3597, $3598, VersionRange($3599, $3600)), ($3601, $3602, $3603, $3604, $3605, $3606, $3607, $3608, $3609, $3610, $3611, $3612, $3613, $3614, $3615, $3616, $3617, $3618, $3619, $3620, $3621, $3622, $3623, $3624, $3625, $3626, $3627, $3628, VersionRange($3629, $3630)), ($3631, $3632, $3633, $3634, $3635, $3636, $3637, $3638, $3639, $3640, $3641, $3642, $3643, $3644, $3645, $3646, $3647, $3648, $3649, $3650, $3651, $3652, $3653, $3654, $3655, $3656, $3657, $3658, VersionRange($3659, $3660)), ($3661, $3662, $3663, $3664, $3665, $3666, $3667, $3668, $3669, $3670, $3671, $3672, $3673, $3674, $3675, $3676, $3677, $3678, $3679, $3680, $3681, $3682, $3683, $3684, $3685, $3686, $3687, $3688, VersionRange($3689, $3690)), ($3691, $3692, $3693, $3694, $3695, $3696, $3697, $3698, $3699, $3700, $3701, $3702, $3703, $3704, $3705, $3706, $3707, $3708, $3709, $3710, $3711, $3712, $3713, $3714, $3715, $3716, $3717, $3718, VersionRange($3719, $3720)), ($3721, $3722, $3723, $3724, $3725, $3726, $3727, $3728, $3729, $3730, $3731, $3732, $3733, $3734, $3735, $3736, $3737, $3738, $3739, $3740, $3741, $3742, $3743, $3744, $3745, $3746, $3747, $3748, VersionRange($3749, $3750)), ($3751, $3752, $3753, $3754, $3755, $3756, $3757, $3758, $3759, $3760, $3761, $3762, $3763, $3764, $3765, $3766, $3767, $3768, $3769, $3770, $3771, $3772, $3773, $3774, $3775, $3776, $3777, $3778, VersionRange($3779, $3780)), ($3781, $3782, $3783, $3784, $3785, $3786, $3787, $3788, $3789, $3790, $3791, $3792, $3793, $3794, $3795, $3796, $3797, $3798, $3799, $3800, $3801, $3802, $3803, $3804, $3805, $3806, $3807, $3808, VersionRange($3809, $3810)), ($3811, $3812, $3813, $3814, $3815, $3816, $3817, $3818, $3819, $3820, $3821, $3822, $3823, $3824, $3825, $3826, $3827, $3828, $3829, $3830, $3831, $3832, $3833, $3834, $3835, $3836, $3837, $3838, VersionRange($3839, $3840)), ($3841, $3842, $3843, $3844, $3845, $3846, $3847, $3848, $3849, $3850, $3851, $3852, $3853, $3854, $3855, $3856, $3857, $3858, $3859, $3860, $3861, $3862, $3863, $3864, $3865, $3866, $3867, $3868, VersionRange($3869, $3870)), ($3871, $3872, $3873, $3874, $3875, $3876, $3877, $3878, $3879, $3880, $3881, $3882, $3883, $3884, $3885, $3886, $3887, $3888, $3889, $3890, $3891, $3892, $3893, $3894, $3895, $3896, $3897, $3898, VersionRange($3899, $3900)), ($3901, $3902, $3903, $3904, $3905, $3906, $3907, $3908, $3909, $3910, $3911, $3912, $3913, $3914, $3915, $3916, $3917, $3918, $3919, $3920, $3921, $3922, $3923, $3924, $3925, $3926, $3927, $3928, VersionRange($3929, $3930)), ($3931, $3932, $3933, $3934, $3935, $3936, $3937, $3938, $3939, $3940, $3941, $3942, $3943, $3944, $3945, $3946, $3947, $3948, $3949, $3950, $3951, $3952, $3953, $3954, $3955, $3956, $3957, $3958, VersionRange($3959, $3960)), ($3961, $3962, $3963, $3964, $3965, $3966, $3967, $3968, $3969, $3970, $3971, $3972, $3973, $3974, $3975, $3976, $3977, $3978, $3979, $3980, $3981, $3982, $3983, $3984, $3985, $3986, $3987, $3988, VersionRange($3989, $3990)), ($3991, $3992, $3993, $3994, $3995, $3996, $3997, $3998, $3999, $4000, $4001, $4002, $4003, $4004, $4005, $4006, $4007, $4008, $4009, $4010, $4011, $4012, $4013, $4014, $4015, $4016, $4017, $4018, VersionRange($4019, $4020)), ($4021, $4022, $4023, $4024, $4025, $4026, $4027, $4028, $4029, $4030, $4031, $4032, $4033, $4034, $4035, $4036, $4037, $4038, $4039, $4040, $4041, $4042, $4043, $4044, $4045, $4046, $4047, $4048, VersionRange($4049, $4050)), ($4051, $4052, $4053, $4054, $4055, $4056, $4057, $4058, $4059, $4060, $4061, $4062, $4063, $4064, $4065, $4066, $4067, $4068, $4069, $4070, $4071, $4072, $4073, $4074, $4075, $4076, $4077, $4078, VersionRange($4079, $4080)), ($4081, $4082, $4083, $4084, $4085, $4086, $4087, $4088, $4089, $4090, $4091, $4092, $4093, $4094, $4095, $4096, $4097, $4098, $4099, $4100, $4101, $4102, $4103, $4104, $4105, $4106, $4107, $4108, VersionRange($4109, $4110)), ($4111, $4112, $4113, $4114, $4115, $4116, $4117, $4118, $4119, $4120, $4121, $4122, $4123, $4124, $4125, $4126, $4127, $4128, $4129, $4130, $4131, $4132, $4133, $4134, $4135, $4136, $4137, $4138, VersionRange($4139, $4140)), ($4141, $4142, $4143, $4144, $4145, $4146, $4147, $4148, $4149, $4150, $4151, $4152, $4153, $4154, $4155, $4156, $4157, $4158, $4159, $4160, $4161, $4162, $4163, $4164, $4165, $4166, $4167, $4168, VersionRange($4169, $4170)), ($4171, $4172, $4173, $4174, $4175, $4176, $4177, $4178, $4179, $4180, $4181, $4182, $4183, $4184, $4185, $4186, $4187, $4188, $4189, $4190, $4191, $4192, $4193, $4194, $4195, $4196, $4197, $4198, VersionRange($4199, $4200)), ($4201, $4202, $4203, $4204, $4205, $4206, $4207, $4208, $4209, $4210, $4211, $4212, $4213, $4214, $4215, $4216, $4217, $4218, $4219, $4220, $4221, $4222, $4223, $4224, $4225, $4226, $4227, $4228, VersionRange($4229, $4230)), ($4231, $4232, $4233, $4234, $4235, $4236, $4237, $4238, $4239, $4240, $4241, $4242, $4243, $4244, $4245, $4246, $4247, $4248, $4249, $4250, $4251, $4252, $4253, $4254, $4255, $4256, $4257, $4258, VersionRange($4259, $4260)), ($4261, $4262, $4263, $4264, $4265, $4266, $4267, $4268, $4269, $4270, $4271, $4272, $4273, $4274, $4275, $4276, $4277, $4278, $4279, $4280, $4281, $4282, $4283, $4284, $4285, $4286, $4287, $4288, VersionRange($4289, $4290)), ($4291, $4292, $4293, $4294, $4295, $4296, $4297, $4298, $4299, $4300, $4301, $4302, $4303, $4304, $4305, $4306, $4307, $4308, $4309, $4310, $4311, $4312, $4313, $4314, $4315, $4316, $4317, $4318, VersionRange($4319, $4320)), ($4321, $4322, $4323, $4324, $4325, $4326, $4327, $4328, $4329, $4330, $4331, $4332, $4333, $4334, $4335, $4336, $4337, $4338, $4339, $4340, $4341, $4342, $4343, $4344, $4345, $4346, $4347, $4348, VersionRange($4349, $4350)), ($4351, $4352, $4353, $4354, $4355, $4356, $4357, $4358, $4359, $4360, $4361, $4362, $4363, $4364, $4365, $4366, $4367, $4368, $4369, $4370, $4371, $4372, $4373, $4374, $4375, $4376, $4377, $4378, VersionRange($4379, $4380)), ($4381, $4382, $4383, $4384, $4385, $4386, $4387, $4388, $4389, $4390, $4391, $4392, $4393, $4394, $4395, $4396, $4397, $4398, $4399, $4400, $4401, $4402, $4403, $4404, $4405, $4406, $4407, $4408, VersionRange($4409, $4410)), ($4411, $4412, $4413, $4414, $4415, $4416, $4417, $4418, $4419, $4420, $4421, $4422, $4423, $4424, $4425, $4426, $4427, $4428, $4429, $4430, $4431, $4432, $4433, $4434, $4435, $4436, $4437, $4438, VersionRange($4439, $4440)), ($4441, $4442, $4443, $4444, $4445, $4446, $4447, $4448, $4449, $4450, $4451, $4452, $4453, $4454, $4455, $4456, $4457, $4458, $4459, $4460, $4461, $4462, $4463, $4464, $4465, $4466, $4467, $4468, VersionRange($4469, $4470)), ($4471, $4472, $4473, $4474, $4475, $4476, $4477, $4478, $4479, $4480, $4481, $4482, $4483, $4484, $4485, $4486, $4487, $4488, $4489, $4490, $4491, $4492, $4493, $4494, $4495, $4496, $4497, $4498, VersionRange($4499, $4500)), ($4501, $4502, $4503, $4504, $4505, $4506, $4507, $4508, $4509, $4510, $4511, $4512, $4513, $4514, $4515, $4516, $4517, $4518, $4519, $4520, $4521, $4522, $4523, $4524, $4525, $4526, $4527, $4528, VersionRange($4529, $4530)), ($4531, $4532, $4533, $4534, $4535, $4536, $4537, $4538, $4539, $4540, $4541, $4542, $4543, $4544, $4545, $4546, $4547, $4548, $4549, $4550, $4551, $4552, $4553, $4554, $4555, $4556, $4557, $4558, VersionRange($4559, $4560)), ($4561, $4562, $4563, $4564, $4565, $4566, $4567, $4568, $4569, $4570, $4571, $4572, $4573, $4574, $4575, $4576, $4577, $4578, $4579, $4580, $4581, $4582, $4583, $4584, $4585, $4586, $4587, $4588, VersionRange($4589, $4590)), ($4591, $4592, $4593, $4594, $4595, $4596, $4597, $4598, $4599, $4600, $4601, $4602, $4603, $4604, $4605, $4606, $4607, $4608, $4609, $4610, $4611, $4612, $4613, $4614, $4615, $4616, $4617, $4618, VersionRange($4619, $4620)), ($4621, $4622, $4623, $4624, $4625, $4626, $4627, $4628, $4629, $4630, $4631, $4632, $4633, $4634, $4635, $4636, $4637, $4638, $4639, $4640, $4641, $4642, $4643, $4644, $4645, $4646, $4647, $4648, VersionRange($4649, $4650)), ($4651, $4652, $4653, $4654, $4655, $4656, $4657, $4658, $4659, $4660, $4661, $4662, $4663, $4664, $4665, $4666, $4667, $4668, $4669, $4670, $4671, $4672, $4673, $4674, $4675, $4676, $4677, $4678, VersionRange($4679, $4680)), ($4681, $4682, $4683, $4684, $4685, $4686, $4687, $4688, $4689, $4690, $4691, $4692, $4693, $4694, $4695, $4696, $4697, $4698, $4699, $4700, $4701, $4702, $4703, $4704, $4705, $4706, $4707, $4708, VersionRange($4709, $4710)), ($4711, $4712, $4713, $4714, $4715, $4716, $4717, $4718, $4719, $4720, $4721, $4722, $4723, $4724, $4725, $4726, $4727, $4728, $4729, $4730, $4731, $4732, $4733, $4734, $4735, $4736, $4737, $4738, VersionRange($4739, $4740)), ($4741, $4742, $4743, $4744, $4745, $4746, $4747, $4748, $4749, $4750, $4751, $4752, $4753, $4754, $4755, $4756, $4757, $4758, $4759, $4760, $4761, $4762, $4763, $4764, $4765, $4766, $4767, $4768, VersionRange($4769, $4770)), ($4771, $4772, $4773, $4774, $4775, $4776, $4777, $4778, $4779, $4780, $4781, $4782, $4783, $4784, $4785, $4786, $4787, $4788, $4789, $4790, $4791, $4792, $4793, $4794, $4795, $4796, $4797, $4798, VersionRange($4799, $4800)), ($4801, $4802, $4803, $4804, $4805, $4806, $4807, $4808, $4809, $4810, $4811, $4812, $4813, $4814, $4815, $4816, $4817, $4818, $4819, $4820, $4821, $4822, $4823, $4824, $4825, $4826, $4827, $4828, VersionRange($4829, $4830)), ($4831, $4832, $4833, $4834, $4835, $4836, $4837, $4838, $4839, $4840, $4841, $4842, $4843, $4844, $4845, $4846, $4847, $4848, $4849, $4850, $4851, $4852, $4853, $4854, $4855, $4856, $4857, $4858, VersionRange($4859, $4860)), ($4861, $4862, $4863, $4864, $4865, $4866, $4867, $4868, $4869, $4870, $4871, $4872, $4873, $4874, $4875, $4876, $4877, $4878, $4879, $4880, $4881, $4882, $4883, $4884, $4885, $4886, $4887, $4888, VersionRange($4889, $4890)), ($4891, $4892, $4893, $4894, $4895, $4896, $4897, $4898, $4899, $4900, $4901, $4902, $4903, $4904, $4905, $4906, $4907, $4908, $4909, $4910, $4911, $4912, $4913, $4914, $4915, $4916, $4917, $4918, VersionRange($4919, $4920)), ($4921, $4922, $4923, $4924, $4925, $4926, $4927, $4928, $4929, $4930, $4931, $4932, $4933, $4934, $4935, $4936, $4937, $4938, $4939, $4940, $4941, $4942, $4943, $4944, $4945, $4946, $4947, $4948, VersionRange($4949, $4950)), ($4951, $4952, $4953, $4954, $4955, $4956, $4957, $4958, $4959, $4960, $4961, $4962, $4963, $4964, $4965, $4966, $4967, $4968, $4969, $4970, $4971, $4972, $4973, $4974, $4975, $4976, $4977, $4978, VersionRange($4979, $4980)), ($4981, $4982, $4983, $4984, $4985, $4986, $4987, $4988, $4989, $4990, $4991, $4992, $4993, $4994, $4995, $4996, $4997, $4998, $4999, $5000, $5001, $5002, $5003, $5004, $5005, $5006, $5007, $5008, VersionRange($5009, $5010)), ($5011, $5012, $5013, $5014, $5015, $5016, $5017, $5018, $5019, $5020, $5021, $5022, $5023, $5024, $5025, $5026, $5027, $5028, $5029, $5030, $5031, $5032, $5033, $5034, $5035, $5036, $5037, $5038, VersionRange($5039, $5040)), ($5041, $5042, $5043, $5044, $5045, $5046, $5047, $5048, $5049, $5050, $5051, $5052, $5053, $5054, $5055, $5056, $5057, $5058, $5059, $5060, $5061, $5062, $5063, $5064, $5065, $5066, $5067, $5068, VersionRange($5069, $5070)), ($5071, $5072, $5073, $5074, $5075, $5076, $5077, $5078, $5079, $5080, $5081, $5082, $5083, $5084, $5085, $5086, $5087, $5088, $5089, $5090, $5091, $5092, $5093, $5094, $5095, $5096, $5097, $5098, VersionRange($5099, $5100)), ($5101, $5102, $5103, $5104, $5105, $5106, $5107, $5108, $5109, $5110, $5111, $5112, $5113, $5114, $5115, $5116, $5117, $5118, $5119, $5120, $5121, $5122, $5123, $5124, $5125, $5126, $5127, $5128, VersionRange($5129, $5130)), ($5131, $5132, $5133, $5134, $5135, $5136, $5137, $5138, $5139, $5140, $5141, $5142, $5143, $5144, $5145, $5146, $5147, $5148, $5149, $5150, $5151, $5152, $5153, $5154, $5155, $5156, $5157, $5158, VersionRange($5159, $5160)), ($5161, $5162, $5163, $5164, $5165, $5166, $5167, $5168, $5169, $5170, $5171, $5172, $5173, $5174, $5175, $5176, $5177, $5178, $5179, $5180, $5181, $5182, $5183, $5184, $5185, $5186, $5187, $5188, VersionRange($5189, $5190)), ($5191, $5192, $5193, $5194, $5195, $5196, $5197, $5198, $5199, $5200, $5201, $5202, $5203, $5204, $5205, $5206, $5207, $5208, $5209, $5210, $5211, $5212, $5213, $5214, $5215, $5216, $5217, $5218, VersionRange($5219, $5220)), ($5221, $5222, $5223, $5224, $5225, $5226, $5227, $5228, $5229, $5230, $5231, $5232, $5233, $5234, $5235, $5236, $5237, $5238, $5239, $5240, $5241, $5242, $5243, $5244, $5245, $5246, $5247, $5248, VersionRange($5249, $5250)), ($5251, $5252, $5253, $5254, $5255, $5256, $5257, $5258, $5259, $5260, $5261, $5262, $5263, $5264, $5265, $5266, $5267, $5268, $5269, $5270, $5271, $5272, $5273, $5274, $5275, $5276, $5277, $5278, VersionRange($5279, $5280)), ($5281, $5282, $5283, $5284, $5285, $5286, $5287, $5288, $5289, $5290, $5291, $5292, $5293, $5294, $5295, $5296, $5297, $5298, $5299, $5300, $5301, $5302, $5303, $5304, $5305, $5306, $5307, $5308, VersionRange($5309, $5310)), ($5311, $5312, $5313, $5314, $5315, $5316, $5317, $5318, $5319, $5320, $5321, $5322, $5323, $5324, $5325, $5326, $5327, $5328, $5329, $5330, $5331, $5332, $5333, $5334, $5335, $5336, $5337, $5338, VersionRange($5339, $5340)), ($5341, $5342, $5343, $5344, $5345, $5346, $5347, $5348, $5349, $5350, $5351, $5352, $5353, $5354, $5355, $5356, $5357, $5358, $5359, $5360, $5361, $5362, $5363, $5364, $5365, $5366, $5367, $5368, VersionRange($5369, $5370)), ($5371, $5372, $5373, $5374, $5375, $5376, $5377, $5378, $5379, $5380, $5381, $5382, $5383, $5384, $5385, $5386, $5387, $5388, $5389, $5390, $5391, $5392, $5393, $5394, $5395, $5396, $5397, $5398, VersionRange($5399, $5400)), ($5401, $5402, $5403, $5404, $5405, $5406, $5407, $5408, $5409, $5410, $5411, $5412, $5413, $5414, $5415, $5416, $5417, $5418, $5419, $5420, $5421, $5422, $5423, $5424, $5425, $5426, $5427, $5428, VersionRange($5429, $5430)), ($5431, $5432, $5433, $5434, $5435, $5436, $5437, $5438, $5439, $5440, $5441, $5442, $5443, $5444, $5445, $5446, $5447, $5448, $5449, $5450, $5451, $5452, $5453, $5454, $5455, $5456, $5457, $5458, VersionRange($5459, $5460)), ($5461, $5462, $5463, $5464, $5465, $5466, $5467, $5468, $5469, $5470, $5471, $5472, $5473, $5474, $5475, $5476, $5477, $5478, $5479, $5480, $5481, $5482, $5483, $5484, $5485, $5486, $5487, $5488, VersionRange($5489, $5490)), ($5491, $5492, $5493, $5494, $5495, $5496, $5497, $5498, $5499, $5500, $5501, $5502, $5503, $5504, $5505, $5506, $5507, $5508, $5509, $5510, $5511, $5512, $5513, $5514, $5515, $5516, $5517, $5518, VersionRange($5519, $5520)), ($5521, $5522, $5523, $5524, $5525, $5526, $5527, $5528, $5529, $5530, $5531, $5532, $5533, $5534, $5535, $5536, $5537, $5538, $5539, $5540, $5541, $5542, $5543, $5544, $5545, $5546, $5547, $5548, VersionRange($5549, $5550)), ($5551, $5552, $5553, $5554, $5555, $5556, $5557, $5558, $5559, $5560, $5561, $5562, $5563, $5564, $5565, $5566, $5567, $5568, $5569, $5570, $5571, $5572, $5573, $5574, $5575, $5576, $5577, $5578, VersionRange($5579, $5580)), ($5581, $5582, $5583, $5584, $5585, $5586, $5587, $5588, $5589, $5590, $5591, $5592, $5593, $5594, $5595, $5596, $5597, $5598, $5599, $5600, $5601, $5602, $5603, $5604, $5605, $5606, $5607, $5608, VersionRange($5609, $5610)), ($5611, $5612, $5613, $5614, $5615, $5616, $5617, $5618, $5619, $5620, $5621, $5622, $5623, $5624, $5625, $5626, $5627, $5628, $5629, $5630, $5631, $5632, $5633, $5634, $5635, $5636, $5637, $5638, VersionRange($5639, $5640)), ($5641, $5642, $5643, $5644, $5645, $5646, $5647, $5648, $5649, $5650, $5651, $5652, $5653, $5654, $5655, $5656, $5657, $5658, $5659, $5660, $5661, $5662, $5663, $5664, $5665, $5666, $5667, $5668, VersionRange($5669, $5670)), ($5671, $5672, $5673, $5674, $5675, $5676, $5677, $5678, $5679, $5680, $5681, $5682, $5683, $5684, $5685, $5686, $5687, $5688, $5689, $5690, $5691, $5692, $5693, $5694, $5695, $5696, $5697, $5698, VersionRange($5699, $5700)), ($5701, $5702, $5703, $5704, $5705, $5706, $5707, $5708, $5709, $5710, $5711, $5712, $5713, $5714, $5715, $5716, $5717, $5718, $5719, $5720, $5721, $5722, $5723, $5724, $5725, $5726, $5727, $5728, VersionRange($5729, $5730)), ($5731, $5732, $5733, $5734, $5735, $5736, $5737, $5738, $5739, $5740, $5741, $5742, $5743, $5744, $5745, $5746, $5747, $5748, $5749, $5750, $5751, $5752, $5753, $5754, $5755, $5756, $5757, $5758, VersionRange($5759, $5760)), ($5761, $5762, $5763, $5764, $5765, $5766, $5767, $5768, $5769, $5770, $5771, $5772, $5773, $5774, $5775, $5776, $5777, $5778, $5779, $5780, $5781, $5782, $5783, $5784, $5785, $5786, $5787, $5788, VersionRange($5789, $5790)), ($5791, $5792, $5793, $5794, $5795, $5796, $5797, $5798, $5799, $5800, $5801, $5802, $5803, $5804, $5805, $5806, $5807, $5808, $5809, $5810, $5811, $5812, $5813, $5814, $5815, $5816, $5817, $5818, VersionRange($5819, $5820)), ($5821, $5822, $5823, $5824, $5825, $5826, $5827, $5828, $5829, $5830, $5831, $5832, $5833, $5834, $5835, $5836, $5837, $5838, $5839, $5840, $5841, $5842, $5843, $5844, $5845, $5846, $5847, $5848, VersionRange($5849, $5850)), ($5851, $5852, $5853, $5854, $5855, $5856, $5857, $5858, $5859, $5860, $5861, $5862, $5863, $5864, $5865, $5866, $5867, $5868, $5869, $5870, $5871, $5872, $5873, $5874, $5875, $5876, $5877, $5878, VersionRange($5879, $5880)), ($5881, $5882, $5883, $5884, $5885, $5886, $5887, $5888, $5889, $5890, $5891, $5892, $5893, $5894, $5895, $5896, $5897, $5898, $5899, $5900, $5901, $5902, $5903, $5904, $5905, $5906, $5907, $5908, VersionRange($5909, $5910)), ($5911, $5912, $5913, $5914, $5915, $5916, $5917, $5918, $5919, $5920, $5921, $5922, $5923, $5924, $5925, $5926, $5927, $5928, $5929, $5930, $5931, $5932, $5933, $5934, $5935, $5936, $5937, $5938, VersionRange($5939, $5940)), ($5941, $5942, $5943, $5944, $5945, $5946, $5947, $5948, $5949, $5950, $5951, $5952, $5953, $5954, $5955, $5956, $5957, $5958, $5959, $5960, $5961, $5962, $5963, $5964, $5965, $5966, $5967, $5968, VersionRange($5969, $5970)), ($5971, $5972, $5973, $5974, $5975, $5976, $5977, $5978, $5979, $5980, $5981, $5982, $5983, $5984, $5985, $5986, $5987, $5988, $5989, $5990, $5991, $5992, $5993, $5994, $5995, $5996, $5997, $5998, VersionRange($5999, $6000)), ($6001, $6002, $6003, $6004, $6005, $6006, $6007, $6008, $6009, $6010, $6011, $6012, $6013, $6014, $6015, $6016, $6017, $6018, $6019, $6020, $6021, $6022, $6023, $6024, $6025, $6026, $6027, $6028, VersionRange($6029, $6030)), ($6031, $6032, $6033, $6034, $6035, $6036, $6037, $6038, $6039, $6040, $6041, $6042, $6043, $6044, $6045, $6046, $6047, $6048, $6049, $6050, $6051, $6052, $6053, $6054, $6055, $6056, $6057, $6058, VersionRange($6059, $6060)), ($6061, $6062, $6063, $6064, $6065, $6066, $6067, $6068, $6069, $6070, $6071, $6072, $6073, $6074, $6075, $6076, $6077, $6078, $6079, $6080, $6081, $6082, $6083, $6084, $6085, $6086, $6087, $6088, VersionRange($6089, $6090)), ($6091, $6092, $6093, $6094, $6095, $6096, $6097, $6098, $6099, $6100, $6101, $6102, $6103, $6104, $6105, $6106, $6107, $6108, $6109, $6110, $6111, $6112, $6113, $6114, $6115, $6116, $6117, $6118, VersionRange($6119, $6120)), ($6121, $6122, $6123, $6124, $6125, $6126, $6127, $6128, $6129, $6130, $6131, $6132, $6133, $6134, $6135, $6136, $6137, $6138, $6139, $6140, $6141, $6142, $6143, $6144, $6145, $6146, $6147, $6148, VersionRange($6149, $6150)), ($6151, $6152, $6153, $6154, $6155, $6156, $6157, $6158, $6159, $6160, $6161, $6162, $6163, $6164, $6165, $6166, $6167, $6168, $6169, $6170, $6171, $6172, $6173, $6174, $6175, $6176, $6177, $6178, VersionRange($6179, $6180)), ($6181, $6182, $6183, $6184, $6185, $6186, $6187, $6188, $6189, $6190, $6191, $6192, $6193, $6194, $6195, $6196, $6197, $6198, $6199, $6200, $6201, $6202, $6203, $6204, $6205, $6206, $6207, $6208, VersionRange($6209, $6210)), ($6211, $6212, $6213, $6214, $6215, $6216, $6217, $6218, $6219, $6220, $6221, $6222, $6223, $6224, $6225, $6226, $6227, $6228, $6229, $6230, $6231, $6232, $6233, $6234, $6235, $6236, $6237, $6238, VersionRange($6239, $6240)), ($6241, $6242, $6243, $6244, $6245, $6246, $6247, $6248, $6249, $6250, $6251, $6252, $6253, $6254, $6255, $6256, $6257, $6258, $6259, $6260, $6261, $6262, $6263, $6264, $6265, $6266, $6267, $6268, VersionRange($6269, $6270)), ($6271, $6272, $6273, $6274, $6275, $6276, $6277, $6278, $6279, $6280, $6281, $6282, $6283, $6284, $6285, $6286, $6287, $6288, $6289, $6290, $6291, $6292, $6293, $6294, $6295, $6296, $6297, $6298, VersionRange($6299, $6300)), ($6301, $6302, $6303, $6304, $6305, $6306, $6307, $6308, $6309, $6310, $6311, $6312, $6313, $6314, $6315, $6316, $6317, $6318, $6319, $6320, $6321, $6322, $6323, $6324, $6325, $6326, $6327, $6328, VersionRange($6329, $6330)), ($6331, $6332, $6333, $6334, $6335, $6336, $6337, $6338, $6339, $6340, $6341, $6342, $6343, $6344, $6345, $6346, $6347, $6348, $6349, $6350, $6351, $6352, $6353, $6354, $6355, $6356, $6357, $6358, VersionRange($6359, $6360)), ($6361, $6362, $6363, $6364, $6365, $6366, $6367, $6368, $6369, $6370, $6371, $6372, $6373, $6374, $6375, $6376, $6377, $6378, $6379, $6380, $6381, $6382, $6383, $6384, $6385, $6386, $6387, $6388, VersionRange($6389, $6390)), ($6391, $6392, $6393, $6394, $6395, $6396, $6397, $6398, $6399, $6400, $6401, $6402, $6403, $6404, $6405, $6406, $6407, $6408, $6409, $6410, $6411, $6412, $6413, $6414, $6415, $6416, $6417, $6418, VersionRange($6419, $6420)), ($6421, $6422, $6423, $6424, $6425, $6426, $6427, $6428, $6429, $6430, $6431, $6432, $6433, $6434, $6435, $6436, $6437, $6438, $6439, $6440, $6441, $6442, $6443, $6444, $6445, $6446, $6447, $6448, VersionRange($6449, $6450)), ($6451, $6452, $6453, $6454, $6455, $6456, $6457, $6458, $6459, $6460, $6461, $6462, $6463, $6464, $6465, $6466, $6467, $6468, $6469, $6470, $6471, $6472, $6473, $6474, $6475, $6476, $6477, $6478, VersionRange($6479, $6480)), ($6481, $6482, $6483, $6484, $6485, $6486, $6487, $6488, $6489, $6490, $6491, $6492, $6493, $6494, $6495, $6496, $6497, $6498, $6499, $6500, $6501, $6502, $6503, $6504, $6505, $6506, $6507, $6508, VersionRange($6509, $6510)), ($6511, $6512, $6513, $6514, $6515, $6516, $6517, $6518, $6519, $6520, $6521, $6522, $6523, $6524, $6525, $6526, $6527, $6528, $6529, $6530, $6531, $6532, $6533, $6534, $6535, $6536, $6537, $6538, VersionRange($6539, $6540)), ($6541, $6542, $6543, $6544, $6545, $6546, $6547, $6548, $6549, $6550, $6551, $6552, $6553, $6554, $6555, $6556, $6557, $6558, $6559, $6560, $6561, $6562, $6563, $6564, $6565, $6566, $6567, $6568, VersionRange($6569, $6570)), ($6571, $6572, $6573, $6574, $6575, $6576, $6577, $6578, $6579, $6580, $6581, $6582, $6583, $6584, $6585, $6586, $6587, $6588, $6589, $6590, $6591, $6592, $6593, $6594, $6595, $6596, $6597, $6598, VersionRange($6599, $6600)), ($6601, $6602, $6603, $6604, $6605, $6606, $6607, $6608, $6609, $6610, $6611, $6612, $6613, $6614, $6615, $6616, $6617, $6618, $6619, $6620, $6621, $6622, $6623, $6624, $6625, $6626, $6627, $6628, VersionRange($6629, $6630)), ($6631, $6632, $6633, $6634, $6635, $6636, $6637, $6638, $6639, $6640, $6641, $6642, $6643, $6644, $6645, $6646, $6647, $6648, $6649, $6650, $6651, $6652, $6653, $6654, $6655, $6656, $6657, $6658, VersionRange($6659, $6660)), ($6661, $6662, $6663, $6664, $6665, $6666, $6667, $6668, $6669, $6670, $6671, $6672, $6673, $6674, $6675, $6676, $6677, $6678, $6679, $6680, $6681, $6682, $6683, $6684, $6685, $6686, $6687, $6688, VersionRange($6689, $6690)), ($6691, $6692, $6693, $6694, $6695, $6696, $6697, $6698, $6699, $6700, $6701, $6702, $6703, $6704, $6705, $6706, $6707, $6708, $6709, $6710, $6711, $6712, $6713, $6714, $6715, $6716, $6717, $6718, VersionRange($6719, $6720)), ($6721, $6722, $6723, $6724, $6725, $6726, $6727, $6728, $6729, $6730, $6731, $6732, $6733, $6734, $6735, $6736, $6737, $6738, $6739, $6740, $6741, $6742, $6743, $6744, $6745, $6746, $6747, $6748, VersionRange($6749, $6750)), ($6751, $6752, $6753, $6754, $6755, $6756, $6757, $6758, $6759, $6760, $6761, $6762, $6763, $6764, $6765, $6766, $6767, $6768, $6769, $6770, $6771, $6772, $6773, $6774, $6775, $6776, $6777, $6778, VersionRange($6779, $6780)), ($6781, $6782, $6783, $6784, $6785, $6786, $6787, $6788, $6789, $6790, $6791, $6792, $6793, $6794, $6795, $6796, $6797, $6798, $6799, $6800, $6801, $6802, $6803, $6804, $6805, $6806, $6807, $6808, VersionRange($6809, $6810)), ($6811, $6812, $6813, $6814, $6815, $6816, $6817, $6818, $6819, $6820, $6821, $6822, $6823, $6824, $6825, $6826, $6827, $6828, $6829, $6830, $6831, $6832, $6833, $6834, $6835, $6836, $6837, $6838, VersionRange($6839, $6840)), ($6841, $6842, $6843, $6844, $6845, $6846, $6847, $6848, $6849, $6850, $6851, $6852, $6853, $6854, $6855, $6856, $6857, $6858, $6859, $6860, $6861, $6862, $6863, $6864, $6865, $6866, $6867, $6868, VersionRange($6869, $6870)), ($6871, $6872, $6873, $6874, $6875, $6876, $6877, $6878, $6879, $6880, $6881, $6882, $6883, $6884, $6885, $6886, $6887, $6888, $6889, $6890, $6891, $6892, $6893, $6894, $6895, $6896, $6897, $6898, VersionRange($6899, $6900)), ($6901, $6902, $6903, $6904, $6905, $6906, $6907, $6908, $6909, $6910, $6911, $6912, $6913, $6914, $6915, $6916, $6917, $6918, $6919, $6920, $6921, $6922, $6923, $6924, $6925, $6926, $6927, $6928, VersionRange($6929, $6930)), ($6931, $6932, $6933, $6934, $6935, $6936, $6937, $6938, $6939, $6940, $6941, $6942, $6943, $6944, $6945, $6946, $6947, $6948, $6949, $6950, $6951, $6952, $6953, $6954, $6955, $6956, $6957, $6958, VersionRange($6959, $6960)), ($6961, $6962, $6963, $6964, $6965, $6966, $6967, $6968, $6969, $6970, $6971, $6972, $6973, $6974, $6975, $6976, $6977, $6978, $6979, $6980, $6981, $6982, $6983, $6984, $6985, $6986, $6987, $6988, VersionRange($6989, $6990)), ($6991, $6992, $6993, $6994, $6995, $6996, $6997, $6998, $6999, $7000, $7001, $7002, $7003, $7004, $7005, $7006, $7007, $7008, $7009, $7010, $7011, $7012, $7013, $7014, $7015, $7016, $7017, $7018, VersionRange($7019, $7020)), ($7021, $7022, $7023, $7024, $7025, $7026, $7027, $7028, $7029, $7030, $7031, $7032, $7033, $7034, $7035, $7036, $7037, $7038, $7039, $7040, $7041, $7042, $7043, $7044, $7045, $7046, $7047, $7048, VersionRange($7049, $7050)), ($7051, $7052, $7053, $7054, $7055, $7056, $7057, $7058, $7059, $7060, $7061, $7062, $7063, $7064, $7065, $7066, $7067, $7068, $7069, $7070, $7071, $7072, $7073, $7074, $7075, $7076, $7077, $7078, VersionRange($7079, $7080)), ($7081, $7082, $7083, $7084, $7085, $7086, $7087, $7088, $7089, $7090, $7091, $7092, $7093, $7094, $7095, $7096, $7097, $7098, $7099, $7100, $7101, $7102, $7103, $7104, $7105, $7106, $7107, $7108, VersionRange($7109, $7110)), ($7111, $7112, $7113, $7114, $7115, $7116, $7117, $7118, $7119, $7120, $7121, $7122, $7123, $7124, $7125, $7126, $7127, $7128, $7129, $7130, $7131, $7132, $7133, $7134, $7135, $7136, $7137, $7138, VersionRange($7139, $7140)), ($7141, $7142, $7143, $7144, $7145, $7146, $7147, $7148, $7149, $7150, $7151, $7152, $7153, $7154, $7155, $7156, $7157, $7158, $7159, $7160, $7161, $7162, $7163, $7164, $7165, $7166, $7167, $7168, VersionRange($7169, $7170)), ($7171, $7172, $7173, $7174, $7175, $7176, $7177, $7178, $7179, $7180, $7181, $7182, $7183, $7184, $7185, $7186, $7187, $7188, $7189, $7190, $7191, $7192, $7193, $7194, $7195, $7196, $7197, $7198, VersionRange($7199, $7200)), ($7201, $7202, $7203, $7204, $7205, $7206, $7207, $7208, $7209, $7210, $7211, $7212, $7213, $7214, $7215, $7216, $7217, $7218, $7219, $7220, $7221, $7222, $7223, $7224, $7225, $7226, $7227, $7228, VersionRange($7229, $7230)), ($7231, $7232, $7233, $7234, $7235, $7236, $7237, $7238, $7239, $7240, $7241, $7242, $7243, $7244, $7245, $7246, $7247, $7248, $7249, $7250, $7251, $7252, $7253, $7254, $7255, $7256, $7257, $7258, VersionRange($7259, $7260)), ($7261, $7262, $7263, $7264, $7265, $7266, $7267, $7268, $7269, $7270, $7271, $7272, $7273, $7274, $7275, $7276, $7277, $7278, $7279, $7280, $7281, $7282, $7283, $7284, $7285, $7286, $7287, $7288, VersionRange($7289, $7290)), ($7291, $7292, $7293, $7294, $7295, $7296, $7297, $7298, $7299, $7300, $7301, $7302, $7303, $7304, $7305, $7306, $7307, $7308, $7309, $7310, $7311, $7312, $7313, $7314, $7315, $7316, $7317, $7318, VersionRange($7319, $7320)), ($7321, $7322, $7323, $7324, $7325, $7326, $7327, $7328, $7329, $7330, $7331, $7332, $7333, $7334, $7335, $7336, $7337, $7338, $7339, $7340, $7341, $7342, $7343, $7344, $7345, $7346, $7347, $7348, VersionRange($7349, $7350)), ($7351, $7352, $7353, $7354, $7355, $7356, $7357, $7358, $7359, $7360, $7361, $7362, $7363, $7364, $7365, $7366, $7367, $7368, $7369, $7370, $7371, $7372, $7373, $7374, $7375, $7376, $7377, $7378, VersionRange($7379, $7380)), ($7381, $7382, $7383, $7384, $7385, $7386, $7387, $7388, $7389, $7390, $7391, $7392, $7393, $7394, $7395, $7396, $7397, $7398, $7399, $7400, $7401, $7402, $7403, $7404, $7405, $7406, $7407, $7408, VersionRange($7409, $7410)), ($7411, $7412, $7413, $7414, $7415, $7416, $7417, $7418, $7419, $7420, $7421, $7422, $7423, $7424, $7425, $7426, $7427, $7428, $7429, $7430, $7431, $7432, $7433, $7434, $7435, $7436, $7437, $7438, VersionRange($7439, $7440)), ($7441, $7442, $7443, $7444, $7445, $7446, $7447, $7448, $7449, $7450, $7451, $7452, $7453, $7454, $7455, $7456, $7457, $7458, $7459, $7460, $7461, $7462, $7463, $7464, $7465, $7466, $7467, $7468, VersionRange($7469, $7470)), ($7471, $7472, $7473, $7474, $7475, $7476, $7477, $7478, $7479, $7480, $7481, $7482, $7483, $7484, $7485, $7486, $7487, $7488, $7489, $7490, $7491, $7492, $7493, $7494, $7495, $7496, $7497, $7498, VersionRange($7499, $7500)), ($7501, $7502, $7503, $7504, $7505, $7506, $7507, $7508, $7509, $7510, $7511, $7512, $7513, $7514, $7515, $7516, $7517, $7518, $7519, $7520, $7521, $7522, $7523, $7524, $7525, $7526, $7527, $7528, VersionRange($7529, $7530)), ($7531, $7532, $7533, $7534, $7535, $7536, $7537, $7538, $7539, $7540, $7541, $7542, $7543, $7544, $7545, $7546, $7547, $7548, $7549, $7550, $7551, $7552, $7553, $7554, $7555, $7556, $7557, $7558, VersionRange($7559, $7560)), ($7561, $7562, $7563, $7564, $7565, $7566, $7567, $7568, $7569, $7570, $7571, $7572, $7573, $7574, $7575, $7576, $7577, $7578, $7579, $7580, $7581, $7582, $7583, $7584, $7585, $7586, $7587, $7588, VersionRange($7589, $7590)), ($7591, $7592, $7593, $7594, $7595, $7596, $7597, $7598, $7599, $7600, $7601, $7602, $7603, $7604, $7605, $7606, $7607, $7608, $7609, $7610, $7611, $7612, $7613, $7614, $7615, $7616, $7617, $7618, VersionRange($7619, $7620)), ($7621, $7622, $7623, $7624, $7625, $7626, $7627, $7628, $7629, $7630, $7631, $7632, $7633, $7634, $7635, $7636, $7637, $7638, $7639, $7640, $7641, $7642, $7643, $7644, $7645, $7646, $7647, $7648, VersionRange($7649, $7650)), ($7651, $7652, $7653, $7654, $7655, $7656, $7657, $7658, $7659, $7660, $7661, $7662, $7663, $7664, $7665, $7666, $7667, $7668, $7669, $7670, $7671, $7672, $7673, $7674, $7675, $7676, $7677, $7678, VersionRange($7679, $7680)), ($7681, $7682, $7683, $7684, $7685, $7686, $7687, $7688, $7689, $7690, $7691, $7692, $7693, $7694, $7695, $7696, $7697, $7698, $7699, $7700, $7701, $7702, $7703, $7704, $7705, $7706, $7707, $7708, VersionRange($7709, $7710)), ($7711, $7712, $7713, $7714, $7715, $7716, $7717, $7718, $7719, $7720, $7721, $7722, $7723, $7724, $7725, $7726, $7727, $7728, $7729, $7730, $7731, $7732, $7733, $7734, $7735, $7736, $7737, $7738, VersionRange($7739, $7740)), ($7741, $7742, $7743, $7744, $7745, $7746, $7747, $7748, $7749, $7750, $7751, $7752, $7753, $7754, $7755, $7756, $7757, $7758, $7759, $7760, $7761, $7762, $7763, $7764, $7765, $7766, $7767, $7768, VersionRange($7769, $7770)), ($7771, $7772, $7773, $7774, $7775, $7776, $7777, $7778, $7779, $7780, $7781, $7782, $7783, $7784, $7785, $7786, $7787, $7788, $7789, $7790, $7791, $7792, $7793, $7794, $7795, $7796, $7797, $7798, VersionRange($7799, $7800)), ($7801, $7802, $7803, $7804, $7805, $7806, $7807, $7808, $7809, $7810, $7811, $7812, $7813, $7814, $7815, $7816, $7817, $7818, $7819, $7820, $7821, $7822, $7823, $7824, $7825, $7826, $7827, $7828, VersionRange($7829, $7830)), ($7831, $7832, $7833, $7834, $7835, $7836, $7837, $7838, $7839, $7840, $7841, $7842, $7843, $7844, $7845, $7846, $7847, $7848, $7849, $7850, $7851, $7852, $7853, $7854, $7855, $7856, $7857, $7858, VersionRange($7859, $7860)), ($7861, $7862, $7863, $7864, $7865, $7866, $7867, $7868, $7869, $7870, $7871, $7872, $7873, $7874, $7875, $7876, $7877, $7878, $7879, $7880, $7881, $7882, $7883, $7884, $7885, $7886, $7887, $7888, VersionRange($7889, $7890)), ($7891, $7892, $7893, $7894, $7895, $7896, $7897, $7898, $7899, $7900, $7901, $7902, $7903, $7904, $7905, $7906, $7907, $7908, $7909, $7910, $7911, $7912, $7913, $7914, $7915, $7916, $7917, $7918, VersionRange($7919, $7920)), ($7921, $7922, $7923, $7924, $7925, $7926, $7927, $7928, $7929, $7930, $7931, $7932, $7933, $7934, $7935, $7936, $7937, $7938, $7939, $7940, $7941, $7942, $7943, $7944, $7945, $7946, $7947, $7948, VersionRange($7949, $7950)), ($7951, $7952, $7953, $7954, $7955, $7956, $7957, $7958, $7959, $7960, $7961, $7962, $7963, $7964, $7965, $7966, $7967, $7968, $7969, $7970, $7971, $7972, $7973, $7974, $7975, $7976, $7977, $7978, VersionRange($7979, $7980)), ($7981, $7982, $7983, $7984, $7985, $7986, $7987, $7988, $7989, $7990, $7991, $7992, $7993, $7994, $7995, $7996, $7997, $7998, $7999, $8000, $8001, $8002, $8003, $8004, $8005, $8006, $8007, $8008, VersionRange($8009, $8010)), ($8011, $8012, $8013, $8014, $8015, $8016, $8017, $8018, $8019, $8020, $8021, $8022, $8023, $8024, $8025, $8026, $8027, $8028, $8029, $8030, $8031, $8032, $8033, $8034, $8035, $8036, $8037, $8038, VersionRange($8039, $8040)), ($8041, $8042, $8043, $8044, $8045, $8046, $8047, $8048, $8049, $8050, $8051, $8052, $8053, $8054, $8055, $8056, $8057, $8058, $8059, $8060, $8061, $8062, $8063, $8064, $8065, $8066, $8067, $8068, VersionRange($8069, $8070)), ($8071, $8072, $8073, $8074, $8075, $8076, $8077, $8078, $8079, $8080, $8081, $8082, $8083, $8084, $8085, $8086, $8087, $8088, $8089, $8090, $8091, $8092, $8093, $8094, $8095, $8096, $8097, $8098, VersionRange($8099, $8100)), ($8101, $8102, $8103, $8104, $8105, $8106, $8107, $8108, $8109, $8110, $8111, $8112, $8113, $8114, $8115, $8116, $8117, $8118, $8119, $8120, $8121, $8122, $8123, $8124, $8125, $8126, $8127, $8128, VersionRange($8129, $8130)), ($8131, $8132, $8133, $8134, $8135, $8136, $8137, $8138, $8139, $8140, $8141, $8142, $8143, $8144, $8145, $8146, $8147, $8148, $8149, $8150, $8151, $8152, $8153, $8154, $8155, $8156, $8157, $8158, VersionRange($8159, $8160)), ($8161, $8162, $8163, $8164, $8165, $8166, $8167, $8168, $8169, $8170, $8171, $8172, $8173, $8174, $8175, $8176, $8177, $8178, $8179, $8180, $8181, $8182, $8183, $8184, $8185, $8186, $8187, $8188, VersionRange($8189, $8190)), ($8191, $8192, $8193, $8194, $8195, $8196, $8197, $8198, $8199, $8200, $8201, $8202, $8203, $8204, $8205, $8206, $8207, $8208, $8209, $8210, $8211, $8212, $8213, $8214, $8215, $8216, $8217, $8218, VersionRange($8219, $8220)), ($8221, $8222, $8223, $8224, $8225, $8226, $8227, $8228, $8229, $8230, $8231, $8232, $8233, $8234, $8235, $8236, $8237, $8238, $8239, $8240, $8241, $8242, $8243, $8244, $8245, $8246, $8247, $8248, VersionRange($8249, $8250)), ($8251, $8252, $8253, $8254, $8255, $8256, $8257, $8258, $8259, $8260, $8261, $8262, $8263, $8264, $8265, $8266, $8267, $8268, $8269, $8270, $8271, $8272, $8273, $8274, $8275, $8276, $8277, $8278, VersionRange($8279, $8280)), ($8281, $8282, $8283, $8284, $8285, $8286, $8287, $8288, $8289, $8290, $8291, $8292, $8293, $8294, $8295, $8296, $8297, $8298, $8299, $8300, $8301, $8302, $8303, $8304, $8305, $8306, $8307, $8308, VersionRange($8309, $8310)), ($8311, $8312, $8313, $8314, $8315, $8316, $8317, $8318, $8319, $8320, $8321, $8322, $8323, $8324, $8325, $8326, $8327, $8328, $8329, $8330, $8331, $8332, $8333, $8334, $8335, $8336, $8337, $8338, VersionRange($8339, $8340)), ($8341, $8342, $8343, $8344, $8345, $8346, $8347, $8348, $8349, $8350, $8351, $8352, $8353, $8354, $8355, $8356, $8357, $8358, $8359, $8360, $8361, $8362, $8363, $8364, $8365, $8366, $8367, $8368, VersionRange($8369, $8370)), ($8371, $8372, $8373, $8374, $8375, $8376, $8377, $8378, $8379, $8380, $8381, $8382, $8383, $8384, $8385, $8386, $8387, $8388, $8389, $8390, $8391, $8392, $8393, $8394, $8395, $8396, $8397, $8398, VersionRange($8399, $8400)), ($8401, $8402, $8403, $8404, $8405, $8406, $8407, $8408, $8409, $8410, $8411, $8412, $8413, $8414, $8415, $8416, $8417, $8418, $8419, $8420, $8421, $8422, $8423, $8424, $8425, $8426, $8427, $8428, VersionRange($8429, $8430)), ($8431, $8432, $8433, $8434, $8435, $8436, $8437, $8438, $8439, $8440, $8441, $8442, $8443, $8444, $8445, $8446, $8447, $8448, $8449, $8450, $8451, $8452, $8453, $8454, $8455, $8456, $8457, $8458, VersionRange($8459, $8460)), ($8461, $8462, $8463, $8464, $8465, $8466, $8467, $8468, $8469, $8470, $8471, $8472, $8473, $8474, $8475, $8476, $8477, $8478, $8479, $8480, $8481, $8482, $8483, $8484, $8485, $8486, $8487, $8488, VersionRange($8489, $8490)), ($8491, $8492, $8493, $8494, $8495, $8496, $8497, $8498, $8499, $8500, $8501, $8502, $8503, $8504, $8505, $8506, $8507, $8508, $8509, $8510, $8511, $8512, $8513, $8514, $8515, $8516, $8517, $8518, VersionRange($8519, $8520)), ($8521, $8522, $8523, $8524, $8525, $8526, $8527, $8528, $8529, $8530, $8531, $8532, $8533, $8534, $8535, $8536, $8537, $8538, $8539, $8540, $8541, $8542, $8543, $8544, $8545, $8546, $8547, $8548, VersionRange($8549, $8550)), ($8551, $8552, $8553, $8554, $8555, $8556, $8557, $8558, $8559, $8560, $8561, $8562, $8563, $8564, $8565, $8566, $8567, $8568, $8569, $8570, $8571, $8572, $8573, $8574, $8575, $8576, $8577, $8578, VersionRange($8579, $8580)), ($8581, $8582, $8583, $8584, $8585, $8586, $8587, $8588, $8589, $8590, $8591, $8592, $8593, $8594, $8595, $8596, $8597, $8598, $8599, $8600, $8601, $8602, $8603, $8604, $8605, $8606, $8607, $8608, VersionRange($8609, $8610)), ($8611, $8612, $8613, $8614, $8615, $8616, $8617, $8618, $8619, $8620, $8621, $8622, $8623, $8624, $8625, $8626, $8627, $8628, $8629, $8630, $8631, $8632, $8633, $8634, $8635, $8636, $8637, $8638, VersionRange($8639, $8640)), ($8641, $8642, $8643, $8644, $8645, $8646, $8647, $8648, $8649, $8650, $8651, $8652, $8653, $8654, $8655, $8656, $8657, $8658, $8659, $8660, $8661, $8662, $8663, $8664, $8665, $8666, $8667, $8668, VersionRange($8669, $8670)), ($8671, $8672, $8673, $8674, $8675, $8676, $8677, $8678, $8679, $8680, $8681, $8682, $8683, $8684, $8685, $8686, $8687, $8688, $8689, $8690, $8691, $8692, $8693, $8694, $8695, $8696, $8697, $8698, VersionRange($8699, $8700)), ($8701, $8702, $8703, $8704, $8705, $8706, $8707, $8708, $8709, $8710, $8711, $8712, $8713, $8714, $8715, $8716, $8717, $8718, $8719, $8720, $8721, $8722, $8723, $8724, $8725, $8726, $8727, $8728, VersionRange($8729, $8730)), ($8731, $8732, $8733, $8734, $8735, $8736, $8737, $8738, $8739, $8740, $8741, $8742, $8743, $8744, $8745, $8746, $8747, $8748, $8749, $8750, $8751, $8752, $8753, $8754, $8755, $8756, $8757, $8758, VersionRange($8759, $8760)), ($8761, $8762, $8763, $8764, $8765, $8766, $8767, $8768, $8769, $8770, $8771, $8772, $8773, $8774, $8775, $8776, $8777, $8778, $8779, $8780, $8781, $8782, $8783, $8784, $8785, $8786, $8787, $8788, VersionRange($8789, $8790)), ($8791, $8792, $8793, $8794, $8795, $8796, $8797, $8798, $8799, $8800, $8801, $8802, $8803, $8804, $8805, $8806, $8807, $8808, $8809, $8810, $8811, $8812, $8813, $8814, $8815, $8816, $8817, $8818, VersionRange($8819, $8820)), ($8821, $8822, $8823, $8824, $8825, $8826, $8827, $8828, $8829, $8830, $8831, $8832, $8833, $8834, $8835, $8836, $8837, $8838, $8839, $8840, $8841, $8842, $8843, $8844, $8845, $8846, $8847, $8848, VersionRange($8849, $8850)), ($8851, $8852, $8853, $8854, $8855, $8856, $8857, $8858, $8859, $8860, $8861, $8862, $8863, $8864, $8865, $8866, $8867, $8868, $8869, $8870, $8871, $8872, $8873, $8874, $8875, $8876, $8877, $8878, VersionRange($8879, $8880)), ($8881, $8882, $8883, $8884, $8885, $8886, $8887, $8888, $8889, $8890, $8891, $8892, $8893, $8894, $8895, $8896, $8897, $8898, $8899, $8900, $8901, $8902, $8903, $8904, $8905, $8906, $8907, $8908, VersionRange($8909, $8910)), ($8911, $8912, $8913, $8914, $8915, $8916, $8917, $8918, $8919, $8920, $8921, $8922, $8923, $8924, $8925, $8926, $8927, $8928, $8929, $8930, $8931, $8932, $8933, $8934, $8935, $8936, $8937, $8938, VersionRange($8939, $8940)), ($8941, $8942, $8943, $8944, $8945, $8946, $8947, $8948, $8949, $8950, $8951, $8952, $8953, $8954, $8955, $8956, $8957, $8958, $8959, $8960, $8961, $8962, $8963, $8964, $8965, $8966, $8967, $8968, VersionRange($8969, $8970)), ($8971, $8972, $8973, $8974, $8975, $8976, $8977, $8978, $8979, $8980, $8981, $8982, $8983, $8984, $8985, $8986, $8987, $8988, $8989, $8990, $8991, $8992, $8993, $8994, $8995, $8996, $8997, $8998, VersionRange($8999, $9000)), ($9001, $9002, $9003, $9004, $9005, $9006, $9007, $9008, $9009, $9010, $9011, $9012, $9013, $9014, $9015, $9016, $9017, $9018, $9019, $9020, $9021, $9022, $9023, $9024, $9025, $9026, $9027, $9028, VersionRange($9029, $9030)), ($9031, $9032, $9033, $9034, $9035, $9036, $9037, $9038, $9039, $9040, $9041, $9042, $9043, $9044, $9045, $9046, $9047, $9048, $9049, $9050, $9051, $9052, $9053, $9054, $9055, $9056, $9057, $9058, VersionRange($9059, $9060)), ($9061, $9062, $9063, $9064, $9065, $9066, $9067, $9068, $9069, $9070, $9071, $9072, $9073, $9074, $9075, $9076, $9077, $9078, $9079, $9080, $9081, $9082, $9083, $9084, $9085, $9086, $9087, $9088, VersionRange($9089, $9090)), ($9091, $9092, $9093, $9094, $9095, $9096, $9097, $9098, $9099, $9100, $9101, $9102, $9103, $9104, $9105, $9106, $9107, $9108, $9109, $9110, $9111, $9112, $9113, $9114, $9115, $9116, $9117, $9118, VersionRange($9119, $9120)), ($9121, $9122, $9123, $9124, $9125, $9126, $9127, $9128, $9129, $9130, $9131, $9132, $9133, $9134, $9135, $9136, $9137, $9138, $9139, $9140, $9141, $9142, $9143, $9144, $9145, $9146, $9147, $9148, VersionRange($9149, $9150)), ($9151, $9152, $9153, $9154, $9155, $9156, $9157, $9158, $9159, $9160, $9161, $9162, $9163, $9164, $9165, $9166, $9167, $9168, $9169, $9170, $9171, $9172, $9173, $9174, $9175, $9176, $9177, $9178, VersionRange($9179, $9180)), ($9181, $9182, $9183, $9184, $9185, $9186, $9187, $9188, $9189, $9190, $9191, $9192, $9193, $9194, $9195, $9196, $9197, $9198, $9199, $9200, $9201, $9202, $9203, $9204, $9205, $9206, $9207, $9208, VersionRange($9209, $9210)), ($9211, $9212, $9213, $9214, $9215, $9216, $9217, $9218, $9219, $9220, $9221, $9222, $9223, $9224, $9225, $9226, $9227, $9228, $9229, $9230, $9231, $9232, $9233, $9234, $9235, $9236, $9237, $9238, VersionRange($9239, $9240)), ($9241, $9242, $9243, $9244, $9245, $9246, $9247, $9248, $9249, $9250, $9251, $9252, $9253, $9254, $9255, $9256, $9257, $9258, $9259, $9260, $9261, $9262, $9263, $9264, $9265, $9266, $9267, $9268, VersionRange($9269, $9270)), ($9271, $9272, $9273, $9274, $9275, $9276, $9277, $9278, $9279, $9280, $9281, $9282, $9283, $9284, $9285, $9286, $9287, $9288, $9289, $9290, $9291, $9292, $9293, $9294, $9295, $9296, $9297, $9298, VersionRange($9299, $9300)), ($9301, $9302, $9303, $9304, $9305, $9306, $9307, $9308, $9309, $9310, $9311, $9312, $9313, $9314, $9315, $9316, $9317, $9318, $9319, $9320, $9321, $9322, $9323, $9324, $9325, $9326, $9327, $9328, VersionRange($9329, $9330)), ($9331, $9332, $9333, $9334, $9335, $9336, $9337, $9338, $9339, $9340, $9341, $9342, $9343, $9344, $9345, $9346, $9347, $9348, $9349, $9350, $9351, $9352, $9353, $9354, $9355, $9356, $9357, $9358, VersionRange($9359, $9360)), ($9361, $9362, $9363, $9364, $9365, $9366, $9367, $9368, $9369, $9370, $9371, $9372, $9373, $9374, $9375, $9376, $9377, $9378, $9379, $9380, $9381, $9382, $9383, $9384, $9385, $9386, $9387, $9388, VersionRange($9389, $9390)), ($9391, $9392, $9393, $9394, $9395, $9396, $9397, $9398, $9399, $9400, $9401, $9402, $9403, $9404, $9405, $9406, $9407, $9408, $9409, $9410, $9411, $9412, $9413, $9414, $9415, $9416, $9417, $9418, VersionRange($9419, $9420)), ($9421, $9422, $9423, $9424, $9425, $9426, $9427, $9428, $9429, $9430, $9431, $9432, $9433, $9434, $9435, $9436, $9437, $9438, $9439, $9440, $9441, $9442, $9443, $9444, $9445, $9446, $9447, $9448, VersionRange($9449, $9450)), ($9451, $9452, $9453, $9454, $9455, $9456, $9457, $9458, $9459, $9460, $9461, $9462, $9463, $9464, $9465, $9466, $9467, $9468, $9469, $9470, $9471, $9472, $9473, $9474, $9475, $9476, $9477, $9478, VersionRange($9479, $9480)), ($9481, $9482, $9483, $9484, $9485, $9486, $9487, $9488, $9489, $9490, $9491, $9492, $9493, $9494, $9495, $9496, $9497, $9498, $9499, $9500, $9501, $9502, $9503, $9504, $9505, $9506, $9507, $9508, VersionRange($9509, $9510)), ($9511, $9512, $9513, $9514, $9515, $9516, $9517, $9518, $9519, $9520, $9521, $9522, $9523, $9524, $9525, $9526, $9527, $9528, $9529, $9530, $9531, $9532, $9533, $9534, $9535, $9536, $9537, $9538, VersionRange($9539, $9540)), ($9541, $9542, $9543, $9544, $9545, $9546, $9547, $9548, $9549, $9550, $9551, $9552, $9553, $9554, $9555, $9556, $9557, $9558, $9559, $9560, $9561, $9562, $9563, $9564, $9565, $9566, $9567, $9568, VersionRange($9569, $9570)), ($9571, $9572, $9573, $9574, $9575, $9576, $9577, $9578, $9579, $9580, $9581, $9582, $9583, $9584, $9585, $9586, $9587, $9588, $9589, $9590, $9591, $9592, $9593, $9594, $9595, $9596, $9597, $9598, VersionRange($9599, $9600)), ($9601, $9602, $9603, $9604, $9605, $9606, $9607, $9608, $9609, $9610, $9611, $9612, $9613, $9614, $9615, $9616, $9617, $9618, $9619, $9620, $9621, $9622, $9623, $9624, $9625, $9626, $9627, $9628, VersionRange($9629, $9630)), ($9631, $9632, $9633, $9634, $9635, $9636, $9637, $9638, $9639, $9640, $9641, $9642, $9643, $9644, $9645, $9646, $9647, $9648, $9649, $9650, $9651, $9652, $9653, $9654, $9655, $9656, $9657, $9658, VersionRange($9659, $9660)), ($9661, $9662, $9663, $9664, $9665, $9666, $9667, $9668, $9669, $9670, $9671, $9672, $9673, $9674, $9675, $9676, $9677, $9678, $9679, $9680, $9681, $9682, $9683, $9684, $9685, $9686, $9687, $9688, VersionRange($9689, $9690)), ($9691, $9692, $9693, $9694, $9695, $9696, $9697, $9698, $9699, $9700, $9701, $9702, $9703, $9704, $9705, $9706, $9707, $9708, $9709, $9710, $9711, $9712, $9713, $9714, $9715, $9716, $9717, $9718, VersionRange($9719, $9720)), ($9721, $9722, $9723, $9724, $9725, $9726, $9727, $9728, $9729, $9730, $9731, $9732, $9733, $9734, $9735, $9736, $9737, $9738, $9739, $9740, $9741, $9742, $9743, $9744, $9745, $9746, $9747, $9748, VersionRange($9749, $9750)), ($9751, $9752, $9753, $9754, $9755, $9756, $9757, $9758, $9759, $9760, $9761, $9762, $9763, $9764, $9765, $9766, $9767, $9768, $9769, $9770, $9771, $9772, $9773, $9774, $9775, $9776, $9777, $9778, VersionRange($9779, $9780)), ($9781, $9782, $9783, $9784, $9785, $9786, $9787, $9788, $9789, $9790, $9791, $9792, $9793, $9794, $9795, $9796, $9797, $9798, $9799, $9800, $9801, $9802, $9803, $9804, $9805, $9806, $9807, $9808, VersionRange($9809, $9810)), ($9811, $9812, $9813, $9814, $9815, $9816, $9817, $9818, $9819, $9820, $9821, $9822, $9823, $9824, $9825, $9826, $9827, $9828, $9829, $9830, $9831, $9832, $9833, $9834, $9835, $9836, $9837, $9838, VersionRange($9839, $9840)), ($9841, $9842, $9843, $9844, $9845, $9846, $9847, $9848, $9849, $9850, $9851, $9852, $9853, $9854, $9855, $9856, $9857, $9858, $9859, $9860, $9861, $9862, $9863, $9864, $9865, $9866, $9867, $9868, VersionRange($9869, $9870)), ($9871, $9872, $9873, $9874, $9875, $9876, $9877, $9878, $9879, $9880, $9881, $9882, $9883, $9884, $9885, $9886, $9887, $9888, $9889, $9890, $9891, $9892, $9893, $9894, $9895, $9896, $9897, $9898, VersionRange($9899, $9900)), ($9901, $9902, $9903, $9904, $9905, $9906, $9907, $9908, $9909, $9910, $9911, $9912, $9913, $9914, $9915, $9916, $9917, $9918, $9919, $9920, $9921, $9922, $9923, $9924, $9925, $9926, $9927, $9928, VersionRange($9929, $9930)), ($9931, $9932, $9933, $9934, $9935, $9936, $9937, $9938, $9939, $9940, $9941, $9942, $9943, $9944, $9945, $9946, $9947, $9948, $9949, $9950, $9951, $9952, $9953, $9954, $9955, $9956, $9957, $9958, VersionRange($9959, $9960)), ($9961, $9962, $9963, $9964, $9965, $9966, $9967, $9968, $9969, $9970, $9971, $9972, $9973, $9974, $9975, $9976, $9977, $9978, $9979, $9980, $9981, $9982, $9983, $9984, $9985, $9986, $9987, $9988, VersionRange($9989, $9990)), ($9991, $9992, $9993, $9994, $9995, $9996, $9997, $9998, $9999, $10000, $10001, $10002, $10003, $10004, $10005, $10006, $10007, $10008, $10009, $10010, $10011, $10012, $10013, $10014, $10015, $10016, $10017, $10018, VersionRange($10019, $10020)), ($10021, $10022, $10023, $10024, $10025, $10026, $10027, $10028, $10029, $10030, $10031, $10032, $10033, $10034, $10035, $10036, $10037, $10038, $10039, $10040, $10041, $10042, $10043, $10044, $10045, $10046, $10047, $10048, VersionRange($10049, $10050)), ($10051, $10052, $10053, $10054, $10055, $10056, $10057, $10058, $10059, $10060, $10061, $10062, $10063, $10064, $10065, $10066, $10067, $10068, $10069, $10070, $10071, $10072, $10073, $10074, $10075, $10076, $10077, $10078, VersionRange($10079, $10080)), ($10081, $10082, $10083, $10084, $10085, $10086, $10087, $10088, $10089, $10090, $10091, $10092, $10093, $10094, $10095, $10096, $10097, $10098, $10099, $10100, $10101, $10102, $10103, $10104, $10105, $10106, $10107, $10108, VersionRange($10109, $10110)), ($10111, $10112, $10113, $10114, $10115, $10116, $10117, $10118, $10119, $10120, $10121, $10122, $10123, $10124, $10125, $10126, $10127, $10128, $10129, $10130, $10131, $10132, $10133, $10134, $10135, $10136, $10137, $10138, VersionRange($10139, $10140)), ($10141, $10142, $10143, $10144, $10145, $10146, $10147, $10148, $10149, $10150, $10151, $10152, $10153, $10154, $10155, $10156, $10157, $10158, $10159, $10160, $10161, $10162, $10163, $10164, $10165, $10166, $10167, $10168, VersionRange($10169, $10170)), ($10171, $10172, $10173, $10174, $10175, $10176, $10177, $10178, $10179, $10180, $10181, $10182, $10183, $10184, $10185, $10186, $10187, $10188, $10189, $10190, $10191, $10192, $10193, $10194, $10195, $10196, $10197, $10198, VersionRange($10199, $10200)), ($10201, $10202, $10203, $10204, $10205, $10206, $10207, $10208, $10209, $10210, $10211, $10212, $10213, $10214, $10215, $10216, $10217, $10218, $10219, $10220, $10221, $10222, $10223, $10224, $10225, $10226, $10227, $10228, VersionRange($10229, $10230)), ($10231, $10232, $10233, $10234, $10235, $10236, $10237, $10238, $10239, $10240, $10241, $10242, $10243, $10244, $10245, $10246, $10247, $10248, $10249, $10250, $10251, $10252, $10253, $10254, $10255, $10256, $10257, $10258, VersionRange($10259, $10260)), ($10261, $10262, $10263, $10264, $10265, $10266, $10267, $10268, $10269, $10270, $10271, $10272, $10273, $10274, $10275, $10276, $10277, $10278, $10279, $10280, $10281, $10282, $10283, $10284, $10285, $10286, $10287, $10288, VersionRange($10289, $10290)), ($10291, $10292, $10293, $10294, $10295, $10296, $10297, $10298, $10299, $10300, $10301, $10302, $10303, $10304, $10305, $10306, $10307, $10308, $10309, $10310, $10311, $10312, $10313, $10314, $10315, $10316, $10317, $10318, VersionRange($10319, $10320)), ($10321, $10322, $10323, $10324, $10325, $10326, $10327, $10328, $10329, $10330, $10331, $10332, $10333, $10334, $10335, $10336, $10337, $10338, $10339, $10340, $10341, $10342, $10343, $10344, $10345, $10346, $10347, $10348, VersionRange($10349, $10350)), ($10351, $10352, $10353, $10354, $10355, $10356, $10357, $10358, $10359, $10360, $10361, $10362, $10363, $10364, $10365, $10366, $10367, $10368, $10369, $10370, $10371, $10372, $10373, $10374, $10375, $10376, $10377, $10378, VersionRange($10379, $10380)), ($10381, $10382, $10383, $10384, $10385, $10386, $10387, $10388, $10389, $10390, $10391, $10392, $10393, $10394, $10395, $10396, $10397, $10398, $10399, $10400, $10401, $10402, $10403, $10404, $10405, $10406, $10407, $10408, VersionRange($10409, $10410)), ($10411, $10412, $10413, $10414, $10415, $10416, $10417, $10418, $10419, $10420, $10421, $10422, $10423, $10424, $10425, $10426, $10427, $10428, $10429, $10430, $10431, $10432, $10433, $10434, $10435, $10436, $10437, $10438, VersionRange($10439, $10440)), ($10441, $10442, $10443, $10444, $10445, $10446, $10447, $10448, $10449, $10450, $10451, $10452, $10453, $10454, $10455, $10456, $10457, $10458, $10459, $10460, $10461, $10462, $10463, $10464, $10465, $10466, $10467, $10468, VersionRange($10469, $10470)), ($10471, $10472, $10473, $10474, $10475, $10476, $10477, $10478, $10479, $10480, $10481, $10482, $10483, $10484, $10485, $10486, $10487, $10488, $10489, $10490, $10491, $10492, $10493, $10494, $10495, $10496, $10497, $10498, VersionRange($10499, $10500)), ($10501, $10502, $10503, $10504, $10505, $10506, $10507, $10508, $10509, $10510, $10511, $10512, $10513, $10514, $10515, $10516, $10517, $10518, $10519, $10520, $10521, $10522, $10523, $10524, $10525, $10526, $10527, $10528, VersionRange($10529, $10530)), ($10531, $10532, $10533, $10534, $10535, $10536, $10537, $10538, $10539, $10540, $10541, $10542, $10543, $10544, $10545, $10546, $10547, $10548, $10549, $10550, $10551, $10552, $10553, $10554, $10555, $10556, $10557, $10558, VersionRange($10559, $10560)), ($10561, $10562, $10563, $10564, $10565, $10566, $10567, $10568, $10569, $10570, $10571, $10572, $10573, $10574, $10575, $10576, $10577, $10578, $10579, $10580, $10581, $10582, $10583, $10584, $10585, $10586, $10587, $10588, VersionRange($10589, $10590)), ($10591, $10592, $10593, $10594, $10595, $10596, $10597, $10598, $10599, $10600, $10601, $10602, $10603, $10604, $10605, $10606, $10607, $10608, $10609, $10610, $10611, $10612, $10613, $10614, $10615, $10616, $10617, $10618, VersionRange($10619, $10620)), ($10621, $10622, $10623, $10624, $10625, $10626, $10627, $10628, $10629, $10630, $10631, $10632, $10633, $10634, $10635, $10636, $10637, $10638, $10639, $10640, $10641, $10642, $10643, $10644, $10645, $10646, $10647, $10648, VersionRange($10649, $10650)), ($10651, $10652, $10653, $10654, $10655, $10656, $10657, $10658, $10659, $10660, $10661, $10662, $10663, $10664, $10665, $10666, $10667, $10668, $10669, $10670, $10671, $10672, $10673, $10674, $10675, $10676, $10677, $10678, VersionRange($10679, $10680)), ($10681, $10682, $10683, $10684, $10685, $10686, $10687, $10688, $10689, $10690, $10691, $10692, $10693, $10694, $10695, $10696, $10697, $10698, $10699, $10700, $10701, $10702, $10703, $10704, $10705, $10706, $10707, $10708, VersionRange($10709, $10710)), ($10711, $10712, $10713, $10714, $10715, $10716, $10717, $10718, $10719, $10720, $10721, $10722, $10723, $10724, $10725, $10726, $10727, $10728, $10729, $10730, $10731, $10732, $10733, $10734, $10735, $10736, $10737, $10738, VersionRange($10739, $10740)), ($10741, $10742, $10743, $10744, $10745, $10746, $10747, $10748, $10749, $10750, $10751, $10752, $10753, $10754, $10755, $10756, $10757, $10758, $10759, $10760, $10761, $10762, $10763, $10764, $10765, $10766, $10767, $10768, VersionRange($10769, $10770)), ($10771, $10772, $10773, $10774, $10775, $10776, $10777, $10778, $10779, $10780, $10781, $10782, $10783, $10784, $10785, $10786, $10787, $10788, $10789, $10790, $10791, $10792, $10793, $10794, $10795, $10796, $10797, $10798, VersionRange($10799, $10800)), ($10801, $10802, $10803, $10804, $10805, $10806, $10807, $10808, $10809, $10810, $10811, $10812, $10813, $10814, $10815, $10816, $10817, $10818, $10819, $10820, $10821, $10822, $10823, $10824, $10825, $10826, $10827, $10828, VersionRange($10829, $10830)), ($10831, $10832, $10833, $10834, $10835, $10836, $10837, $10838, $10839, $10840, $10841, $10842, $10843, $10844, $10845, $10846, $10847, $10848, $10849, $10850, $10851, $10852, $10853, $10854, $10855, $10856, $10857, $10858, VersionRange($10859, $10860)), ($10861, $10862, $10863, $10864, $10865, $10866, $10867, $10868, $10869, $10870, $10871, $10872, $10873, $10874, $10875, $10876, $10877, $10878, $10879, $10880, $10881, $10882, $10883, $10884, $10885, $10886, $10887, $10888, VersionRange($10889, $10890)), ($10891, $10892, $10893, $10894, $10895, $10896, $10897, $10898, $10899, $10900, $10901, $10902, $10903, $10904, $10905, $10906, $10907, $10908, $10909, $10910, $10911, $10912, $10913, $10914, $10915, $10916, $10917, $10918, VersionRange($10919, $10920)), ($10921, $10922, $10923, $10924, $10925, $10926, $10927, $10928, $10929, $10930, $10931, $10932, $10933, $10934, $10935, $10936, $10937, $10938, $10939, $10940, $10941, $10942, $10943, $10944, $10945, $10946, $10947, $10948, VersionRange($10949, $10950)), ($10951, $10952, $10953, $10954, $10955, $10956, $10957, $10958, $10959, $10960, $10961, $10962, $10963, $10964, $10965, $10966, $10967, $10968, $10969, $10970, $10971, $10972, $10973, $10974, $10975, $10976, $10977, $10978, VersionRange($10979, $10980)), ($10981, $10982, $10983, $10984, $10985, $10986, $10987, $10988, $10989, $10990, $10991, $10992, $10993, $10994, $10995, $10996, $10997, $10998, $10999, $11000, $11001, $11002, $11003, $11004, $11005, $11006, $11007, $11008, VersionRange($11009, $11010)), ($11011, $11012, $11013, $11014, $11015, $11016, $11017, $11018, $11019, $11020, $11021, $11022, $11023, $11024, $11025, $11026, $11027, $11028, $11029, $11030, $11031, $11032, $11033, $11034, $11035, $11036, $11037, $11038, VersionRange($11039, $11040)), ($11041, $11042, $11043, $11044, $11045, $11046, $11047, $11048, $11049, $11050, $11051, $11052, $11053, $11054, $11055, $11056, $11057, $11058, $11059, $11060, $11061, $11062, $11063, $11064, $11065, $11066, $11067, $11068, VersionRange($11069, $11070)), ($11071, $11072, $11073, $11074, $11075, $11076, $11077, $11078, $11079, $11080, $11081, $11082, $11083, $11084, $11085, $11086, $11087, $11088, $11089, $11090, $11091, $11092, $11093, $11094, $11095, $11096, $11097, $11098, VersionRange($11099, $11100)), ($11101, $11102, $11103, $11104, $11105, $11106, $11107, $11108, $11109, $11110, $11111, $11112, $11113, $11114, $11115, $11116, $11117, $11118, $11119, $11120, $11121, $11122, $11123, $11124, $11125, $11126, $11127, $11128, VersionRange($11129, $11130)), ($11131, $11132, $11133, $11134, $11135, $11136, $11137, $11138, $11139, $11140, $11141, $11142, $11143, $11144, $11145, $11146, $11147, $11148, $11149, $11150, $11151, $11152, $11153, $11154, $11155, $11156, $11157, $11158, VersionRange($11159, $11160)), ($11161, $11162, $11163, $11164, $11165, $11166, $11167, $11168, $11169, $11170, $11171, $11172, $11173, $11174, $11175, $11176, $11177, $11178, $11179, $11180, $11181, $11182, $11183, $11184, $11185, $11186, $11187, $11188, VersionRange($11189, $11190)), ($11191, $11192, $11193, $11194, $11195, $11196, $11197, $11198, $11199, $11200, $11201, $11202, $11203, $11204, $11205, $11206, $11207, $11208, $11209, $11210, $11211, $11212, $11213, $11214, $11215, $11216, $11217, $11218, VersionRange($11219, $11220)), ($11221, $11222, $11223, $11224, $11225, $11226, $11227, $11228, $11229, $11230, $11231, $11232, $11233, $11234, $11235, $11236, $11237, $11238, $11239, $11240, $11241, $11242, $11243, $11244, $11245, $11246, $11247, $11248, VersionRange($11249, $11250)), ($11251, $11252, $11253, $11254, $11255, $11256, $11257, $11258, $11259, $11260, $11261, $11262, $11263, $11264, $11265, $11266, $11267, $11268, $11269, $11270, $11271, $11272, $11273, $11274, $11275, $11276, $11277, $11278, VersionRange($11279, $11280)), ($11281, $11282, $11283, $11284, $11285, $11286, $11287, $11288, $11289, $11290, $11291, $11292, $11293, $11294, $11295, $11296, $11297, $11298, $11299, $11300, $11301, $11302, $11303, $11304, $11305, $11306, $11307, $11308, VersionRange($11309, $11310)), ($11311, $11312, $11313, $11314, $11315, $11316, $11317, $11318, $11319, $11320, $11321, $11322, $11323, $11324, $11325, $11326, $11327, $11328, $11329, $11330, $11331, $11332, $11333, $11334, $11335, $11336, $11337, $11338, VersionRange($11339, $11340)), ($11341, $11342, $11343, $11344, $11345, $11346, $11347, $11348, $11349, $11350, $11351, $11352, $11353, $11354, $11355, $11356, $11357, $11358, $11359, $11360, $11361, $11362, $11363, $11364, $11365, $11366, $11367, $11368, VersionRange($11369, $11370)), ($11371, $11372, $11373, $11374, $11375, $11376, $11377, $11378, $11379, $11380, $11381, $11382, $11383, $11384, $11385, $11386, $11387, $11388, $11389, $11390, $11391, $11392, $11393, $11394, $11395, $11396, $11397, $11398, VersionRange($11399, $11400)), ($11401, $11402, $11403, $11404, $11405, $11406, $11407, $11408, $11409, $11410, $11411, $11412, $11413, $11414, $11415, $11416, $11417, $11418, $11419, $11420, $11421, $11422, $11423, $11424, $11425, $11426, $11427, $11428, VersionRange($11429, $11430)), ($11431, $11432, $11433, $11434, $11435, $11436, $11437, $11438, $11439, $11440, $11441, $11442, $11443, $11444, $11445, $11446, $11447, $11448, $11449, $11450, $11451, $11452, $11453, $11454, $11455, $11456, $11457, $11458, VersionRange($11459, $11460)), ($11461, $11462, $11463, $11464, $11465, $11466, $11467, $11468, $11469, $11470, $11471, $11472, $11473, $11474, $11475, $11476, $11477, $11478, $11479, $11480, $11481, $11482, $11483, $11484, $11485, $11486, $11487, $11488, VersionRange($11489, $11490)), ($11491, $11492, $11493, $11494, $11495, $11496, $11497, $11498, $11499, $11500, $11501, $11502, $11503, $11504, $11505, $11506, $11507, $11508, $11509, $11510, $11511, $11512, $11513, $11514, $11515, $11516, $11517, $11518, VersionRange($11519, $11520)), ($11521, $11522, $11523, $11524, $11525, $11526, $11527, $11528, $11529, $11530, $11531, $11532, $11533, $11534, $11535, $11536, $11537, $11538, $11539, $11540, $11541, $11542, $11543, $11544, $11545, $11546, $11547, $11548, VersionRange($11549, $11550)), ($11551, $11552, $11553, $11554, $11555, $11556, $11557, $11558, $11559, $11560, $11561, $11562, $11563, $11564, $11565, $11566, $11567, $11568, $11569, $11570, $11571, $11572, $11573, $11574, $11575, $11576, $11577, $11578, VersionRange($11579, $11580)), ($11581, $11582, $11583, $11584, $11585, $11586, $11587, $11588, $11589, $11590, $11591, $11592, $11593, $11594, $11595, $11596, $11597, $11598, $11599, $11600, $11601, $11602, $11603, $11604, $11605, $11606, $11607, $11608, VersionRange($11609, $11610)), ($11611, $11612, $11613, $11614, $11615, $11616, $11617, $11618, $11619, $11620, $11621, $11622, $11623, $11624, $11625, $11626, $11627, $11628, $11629, $11630, $11631, $11632, $11633, $11634, $11635, $11636, $11637, $11638, VersionRange($11639, $11640)), ($11641, $11642, $11643, $11644, $11645, $11646, $11647, $11648, $11649, $11650, $11651, $11652, $11653, $11654, $11655, $11656, $11657, $11658, $11659, $11660, $11661, $11662, $11663, $11664, $11665, $11666, $11667, $11668, VersionRange($11669, $11670)), ($11671, $11672, $11673, $11674, $11675, $11676, $11677, $11678, $11679, $11680, $11681, $11682, $11683, $11684, $11685, $11686, $11687, $11688, $11689, $11690, $11691, $11692, $11693, $11694, $11695, $11696, $11697, $11698, VersionRange($11699, $11700)), ($11701, $11702, $11703, $11704, $11705, $11706, $11707, $11708, $11709, $11710, $11711, $11712, $11713, $11714, $11715, $11716, $11717, $11718, $11719, $11720, $11721, $11722, $11723, $11724, $11725, $11726, $11727, $11728, VersionRange($11729, $11730)), ($11731, $11732, $11733, $11734, $11735, $11736, $11737, $11738, $11739, $11740, $11741, $11742, $11743, $11744, $11745, $11746, $11747, $11748, $11749, $11750, $11751, $11752, $11753, $11754, $11755, $11756, $11757, $11758, VersionRange($11759, $11760)), ($11761, $11762, $11763, $11764, $11765, $11766, $11767, $11768, $11769, $11770, $11771, $11772, $11773, $11774, $11775, $11776, $11777, $11778, $11779, $11780, $11781, $11782, $11783, $11784, $11785, $11786, $11787, $11788, VersionRange($11789, $11790)), ($11791, $11792, $11793, $11794, $11795, $11796, $11797, $11798, $11799, $11800, $11801, $11802, $11803, $11804, $11805, $11806, $11807, $11808, $11809, $11810, $11811, $11812, $11813, $11814, $11815, $11816, $11817, $11818, VersionRange($11819, $11820)), ($11821, $11822, $11823, $11824, $11825, $11826, $11827, $11828, $11829, $11830, $11831, $11832, $11833, $11834, $11835, $11836, $11837, $11838, $11839, $11840, $11841, $11842, $11843, $11844, $11845, $11846, $11847, $11848, VersionRange($11849, $11850)), ($11851, $11852, $11853, $11854, $11855, $11856, $11857, $11858, $11859, $11860, $11861, $11862, $11863, $11864, $11865, $11866, $11867, $11868, $11869, $11870, $11871, $11872, $11873, $11874, $11875, $11876, $11877, $11878, VersionRange($11879, $11880)), ($11881, $11882, $11883, $11884, $11885, $11886, $11887, $11888, $11889, $11890, $11891, $11892, $11893, $11894, $11895, $11896, $11897, $11898, $11899, $11900, $11901, $11902, $11903, $11904, $11905, $11906, $11907, $11908, VersionRange($11909, $11910)), ($11911, $11912, $11913, $11914, $11915, $11916, $11917, $11918, $11919, $11920, $11921, $11922, $11923, $11924, $11925, $11926, $11927, $11928, $11929, $11930, $11931, $11932, $11933, $11934, $11935, $11936, $11937, $11938, VersionRange($11939, $11940)), ($11941, $11942, $11943, $11944, $11945, $11946, $11947, $11948, $11949, $11950, $11951, $11952, $11953, $11954, $11955, $11956, $11957, $11958, $11959, $11960, $11961, $11962, $11963, $11964, $11965, $11966, $11967, $11968, VersionRange($11969, $11970)), ($11971, $11972, $11973, $11974, $11975, $11976, $11977, $11978, $11979, $11980, $11981, $11982, $11983, $11984, $11985, $11986, $11987, $11988, $11989, $11990, $11991, $11992, $11993, $11994, $11995, $11996, $11997, $11998, VersionRange($11999, $12000)), ($12001, $12002, $12003, $12004, $12005, $12006, $12007, $12008, $12009, $12010, $12011, $12012, $12013, $12014, $12015, $12016, $12017, $12018, $12019, $12020, $12021, $12022, $12023, $12024, $12025, $12026, $12027, $12028, VersionRange($12029, $12030)), ($12031, $12032, $12033, $12034, $12035, $12036, $12037, $12038, $12039, $12040, $12041, $12042, $12043, $12044, $12045, $12046, $12047, $12048, $12049, $12050, $12051, $12052, $12053, $12054, $12055, $12056, $12057, $12058, VersionRange($12059, $12060)), ($12061, $12062, $12063, $12064, $12065, $12066, $12067, $12068, $12069, $12070, $12071, $12072, $12073, $12074, $12075, $12076, $12077, $12078, $12079, $12080, $12081, $12082, $12083, $12084, $12085, $12086, $12087, $12088, VersionRange($12089, $12090)), ($12091, $12092, $12093, $12094, $12095, $12096, $12097, $12098, $12099, $12100, $12101, $12102, $12103, $12104, $12105, $12106, $12107, $12108, $12109, $12110, $12111, $12112, $12113, $12114, $12115, $12116, $12117, $12118, VersionRange($12119, $12120)), ($12121, $12122, $12123, $12124, $12125, $12126, $12127, $12128, $12129, $12130, $12131, $12132, $12133, $12134, $12135, $12136, $12137, $12138, $12139, $12140, $12141, $12142, $12143, $12144, $12145, $12146, $12147, $12148, VersionRange($12149, $12150)), ($12151, $12152, $12153, $12154, $12155, $12156, $12157, $12158, $12159, $12160, $12161, $12162, $12163, $12164, $12165, $12166, $12167, $12168, $12169, $12170, $12171, $12172, $12173, $12174, $12175, $12176, $12177, $12178, VersionRange($12179, $12180)), ($12181, $12182, $12183, $12184, $12185, $12186, $12187, $12188, $12189, $12190, $12191, $12192, $12193, $12194, $12195, $12196, $12197, $12198, $12199, $12200, $12201, $12202, $12203, $12204, $12205, $12206, $12207, $12208, VersionRange($12209, $12210)), ($12211, $12212, $12213, $12214, $12215, $12216, $12217, $12218, $12219, $12220, $12221, $12222, $12223, $12224, $12225, $12226, $12227, $12228, $12229, $12230, $12231, $12232, $12233, $12234, $12235, $12236, $12237, $12238, VersionRange($12239, $12240)), ($12241, $12242, $12243, $12244, $12245, $12246, $12247, $12248, $12249, $12250, $12251, $12252, $12253, $12254, $12255, $12256, $12257, $12258, $12259, $12260, $12261, $12262, $12263, $12264, $12265, $12266, $12267, $12268, VersionRange($12269, $12270)), ($12271, $12272, $12273, $12274, $12275, $12276, $12277, $12278, $12279, $12280, $12281, $12282, $12283, $12284, $12285, $12286, $12287, $12288, $12289, $12290, $12291, $12292, $12293, $12294, $12295, $12296, $12297, $12298, VersionRange($12299, $12300)), ($12301, $12302, $12303, $12304, $12305, $12306, $12307, $12308, $12309, $12310, $12311, $12312, $12313, $12314, $12315, $12316, $12317, $12318, $12319, $12320, $12321, $12322, $12323, $12324, $12325, $12326, $12327, $12328, VersionRange($12329, $12330)), ($12331, $12332, $12333, $12334, $12335, $12336, $12337, $12338, $12339, $12340, $12341, $12342, $12343, $12344, $12345, $12346, $12347, $12348, $12349, $12350, $12351, $12352, $12353, $12354, $12355, $12356, $12357, $12358, VersionRange($12359, $12360)), ($12361, $12362, $12363, $12364, $12365, $12366, $12367, $12368, $12369, $12370, $12371, $12372, $12373, $12374, $12375, $12376, $12377, $12378, $12379, $12380, $12381, $12382, $12383, $12384, $12385, $12386, $12387, $12388, VersionRange($12389, $12390)), ($12391, $12392, $12393, $12394, $12395, $12396, $12397, $12398, $12399, $12400, $12401, $12402, $12403, $12404, $12405, $12406, $12407, $12408, $12409, $12410, $12411, $12412, $12413, $12414, $12415, $12416, $12417, $12418, VersionRange($12419, $12420)), ($12421, $12422, $12423, $12424, $12425, $12426, $12427, $12428, $12429, $12430, $12431, $12432, $12433, $12434, $12435, $12436, $12437, $12438, $12439, $12440, $12441, $12442, $12443, $12444, $12445, $12446, $12447, $12448, VersionRange($12449, $12450)), ($12451, $12452, $12453, $12454, $12455, $12456, $12457, $12458, $12459, $12460, $12461, $12462, $12463, $12464, $12465, $12466, $12467, $12468, $12469, $12470, $12471, $12472, $12473, $12474, $12475, $12476, $12477, $12478, VersionRange($12479, $12480)), ($12481, $12482, $12483, $12484, $12485, $12486, $12487, $12488, $12489, $12490, $12491, $12492, $12493, $12494, $12495, $12496, $12497, $12498, $12499, $12500, $12501, $12502, $12503, $12504, $12505, $12506, $12507, $12508, VersionRange($12509, $12510)), ($12511, $12512, $12513, $12514, $12515, $12516, $12517, $12518, $12519, $12520, $12521, $12522, $12523, $12524, $12525, $12526, $12527, $12528, $12529, $12530, $12531, $12532, $12533, $12534, $12535, $12536, $12537, $12538, VersionRange($12539, $12540)), ($12541, $12542, $12543, $12544, $12545, $12546, $12547, $12548, $12549, $12550, $12551, $12552, $12553, $12554, $12555, $12556, $12557, $12558, $12559, $12560, $12561, $12562, $12563, $12564, $12565, $12566, $12567, $12568, VersionRange($12569, $12570)), ($12571, $12572, $12573, $12574, $12575, $12576, $12577, $12578, $12579, $12580, $12581, $12582, $12583, $12584, $12585, $12586, $12587, $12588, $12589, $12590, $12591, $12592, $12593, $12594, $12595, $12596, $12597, $12598, VersionRange($12599, $12600)), ($12601, $12602, $12603, $12604, $12605, $12606, $12607, $12608, $12609, $12610, $12611, $12612, $12613, $12614, $12615, $12616, $12617, $12618, $12619, $12620, $12621, $12622, $12623, $12624, $12625, $12626, $12627, $12628, VersionRange($12629, $12630)), ($12631, $12632, $12633, $12634, $12635, $12636, $12637, $12638, $12639, $12640, $12641, $12642, $12643, $12644, $12645, $12646, $12647, $12648, $12649, $12650, $12651, $12652, $12653, $12654, $12655, $12656, $12657, $12658, VersionRange($12659, $12660)), ($12661, $12662, $12663, $12664, $12665, $12666, $12667, $12668, $12669, $12670, $12671, $12672, $12673, $12674, $12675, $12676, $12677, $12678, $12679, $12680, $12681, $12682, $12683, $12684, $12685, $12686, $12687, $12688, VersionRange($12689, $12690)), ($12691, $12692, $12693, $12694, $12695, $12696, $12697, $12698, $12699, $12700, $12701, $12702, $12703, $12704, $12705, $12706, $12707, $12708, $12709, $12710, $12711, $12712, $12713, $12714, $12715, $12716, $12717, $12718, VersionRange($12719, $12720)), ($12721, $12722, $12723, $12724, $12725, $12726, $12727, $12728, $12729, $12730, $12731, $12732, $12733, $12734, $12735, $12736, $12737, $12738, $12739, $12740, $12741, $12742, $12743, $12744, $12745, $12746, $12747, $12748, VersionRange($12749, $12750)), ($12751, $12752, $12753, $12754, $12755, $12756, $12757, $12758, $12759, $12760, $12761, $12762, $12763, $12764, $12765, $12766, $12767, $12768, $12769, $12770, $12771, $12772, $12773, $12774, $12775, $12776, $12777, $12778, VersionRange($12779, $12780)), ($12781, $12782, $12783, $12784, $12785, $12786, $12787, $12788, $12789, $12790, $12791, $12792, $12793, $12794, $12795, $12796, $12797, $12798, $12799, $12800, $12801, $12802, $12803, $12804, $12805, $12806, $12807, $12808, VersionRange($12809, $12810)), ($12811, $12812, $12813, $12814, $12815, $12816, $12817, $12818, $12819, $12820, $12821, $12822, $12823, $12824, $12825, $12826, $12827, $12828, $12829, $12830, $12831, $12832, $12833, $12834, $12835, $12836, $12837, $12838, VersionRange($12839, $12840)), ($12841, $12842, $12843, $12844, $12845, $12846, $12847, $12848, $12849, $12850, $12851, $12852, $12853, $12854, $12855, $12856, $12857, $12858, $12859, $12860, $12861, $12862, $12863, $12864, $12865, $12866, $12867, $12868, VersionRange($12869, $12870)), ($12871, $12872, $12873, $12874, $12875, $12876, $12877, $12878, $12879, $12880, $12881, $12882, $12883, $12884, $12885, $12886, $12887, $12888, $12889, $12890, $12891, $12892, $12893, $12894, $12895, $12896, $12897, $12898, VersionRange($12899, $12900)), ($12901, $12902, $12903, $12904, $12905, $12906, $12907, $12908, $12909, $12910, $12911, $12912, $12913, $12914, $12915, $12916, $12917, $12918, $12919, $12920, $12921, $12922, $12923, $12924, $12925, $12926, $12927, $12928, VersionRange($12929, $12930)), ($12931, $12932, $12933, $12934, $12935, $12936, $12937, $12938, $12939, $12940, $12941, $12942, $12943, $12944, $12945, $12946, $12947, $12948, $12949, $12950, $12951, $12952, $12953, $12954, $12955, $12956, $12957, $12958, VersionRange($12959, $12960)), ($12961, $12962, $12963, $12964, $12965, $12966, $12967, $12968, $12969, $12970[...][ Date: 2023-07-04 18:40:03 ]
20 3s329ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30)), ($31, $32, $33, $34, $35, $36, $37, $38, $39, $40, $41, $42, $43, $44, $45, $46, $47, $48, $49, $50, $51, $52, $53, $54, $55, $56, $57, $58, VersionRange($59, $60)), ($61, $62, $63, $64, $65, $66, $67, $68, $69, $70, $71, $72, $73, $74, $75, $76, $77, $78, $79, $80, $81, $82, $83, $84, $85, $86, $87, $88, VersionRange($89, $90)), ($91, $92, $93, $94, $95, $96, $97, $98, $99, $100, $101, $102, $103, $104, $105, $106, $107, $108, $109, $110, $111, $112, $113, $114, $115, $116, $117, $118, VersionRange($119, $120)), ($121, $122, $123, $124, $125, $126, $127, $128, $129, $130, $131, $132, $133, $134, $135, $136, $137, $138, $139, $140, $141, $142, $143, $144, $145, $146, $147, $148, VersionRange($149, $150)), ($151, $152, $153, $154, $155, $156, $157, $158, $159, $160, $161, $162, $163, $164, $165, $166, $167, $168, $169, $170, $171, $172, $173, $174, $175, $176, $177, $178, VersionRange($179, $180)), ($181, $182, $183, $184, $185, $186, $187, $188, $189, $190, $191, $192, $193, $194, $195, $196, $197, $198, $199, $200, $201, $202, $203, $204, $205, $206, $207, $208, VersionRange($209, $210)), ($211, $212, $213, $214, $215, $216, $217, $218, $219, $220, $221, $222, $223, $224, $225, $226, $227, $228, $229, $230, $231, $232, $233, $234, $235, $236, $237, $238, VersionRange($239, $240)), ($241, $242, $243, $244, $245, $246, $247, $248, $249, $250, $251, $252, $253, $254, $255, $256, $257, $258, $259, $260, $261, $262, $263, $264, $265, $266, $267, $268, VersionRange($269, $270)), ($271, $272, $273, $274, $275, $276, $277, $278, $279, $280, $281, $282, $283, $284, $285, $286, $287, $288, $289, $290, $291, $292, $293, $294, $295, $296, $297, $298, VersionRange($299, $300)), ($301, $302, $303, $304, $305, $306, $307, $308, $309, $310, $311, $312, $313, $314, $315, $316, $317, $318, $319, $320, $321, $322, $323, $324, $325, $326, $327, $328, VersionRange($329, $330)), ($331, $332, $333, $334, $335, $336, $337, $338, $339, $340, $341, $342, $343, $344, $345, $346, $347, $348, $349, $350, $351, $352, $353, $354, $355, $356, $357, $358, VersionRange($359, $360)), ($361, $362, $363, $364, $365, $366, $367, $368, $369, $370, $371, $372, $373, $374, $375, $376, $377, $378, $379, $380, $381, $382, $383, $384, $385, $386, $387, $388, VersionRange($389, $390)), ($391, $392, $393, $394, $395, $396, $397, $398, $399, $400, $401, $402, $403, $404, $405, $406, $407, $408, $409, $410, $411, $412, $413, $414, $415, $416, $417, $418, VersionRange($419, $420)), ($421, $422, $423, $424, $425, $426, $427, $428, $429, $430, $431, $432, $433, $434, $435, $436, $437, $438, $439, $440, $441, $442, $443, $444, $445, $446, $447, $448, VersionRange($449, $450)), ($451, $452, $453, $454, $455, $456, $457, $458, $459, $460, $461, $462, $463, $464, $465, $466, $467, $468, $469, $470, $471, $472, $473, $474, $475, $476, $477, $478, VersionRange($479, $480)), ($481, $482, $483, $484, $485, $486, $487, $488, $489, $490, $491, $492, $493, $494, $495, $496, $497, $498, $499, $500, $501, $502, $503, $504, $505, $506, $507, $508, VersionRange($509, $510)), ($511, $512, $513, $514, $515, $516, $517, $518, $519, $520, $521, $522, $523, $524, $525, $526, $527, $528, $529, $530, $531, $532, $533, $534, $535, $536, $537, $538, VersionRange($539, $540)), ($541, $542, $543, $544, $545, $546, $547, $548, $549, $550, $551, $552, $553, $554, $555, $556, $557, $558, $559, $560, $561, $562, $563, $564, $565, $566, $567, $568, VersionRange($569, $570)), ($571, $572, $573, $574, $575, $576, $577, $578, $579, $580, $581, $582, $583, $584, $585, $586, $587, $588, $589, $590, $591, $592, $593, $594, $595, $596, $597, $598, VersionRange($599, $600)), ($601, $602, $603, $604, $605, $606, $607, $608, $609, $610, $611, $612, $613, $614, $615, $616, $617, $618, $619, $620, $621, $622, $623, $624, $625, $626, $627, $628, VersionRange($629, $630)), ($631, $632, $633, $634, $635, $636, $637, $638, $639, $640, $641, $642, $643, $644, $645, $646, $647, $648, $649, $650, $651, $652, $653, $654, $655, $656, $657, $658, VersionRange($659, $660)), ($661, $662, $663, $664, $665, $666, $667, $668, $669, $670, $671, $672, $673, $674, $675, $676, $677, $678, $679, $680, $681, $682, $683, $684, $685, $686, $687, $688, VersionRange($689, $690)), ($691, $692, $693, $694, $695, $696, $697, $698, $699, $700, $701, $702, $703, $704, $705, $706, $707, $708, $709, $710, $711, $712, $713, $714, $715, $716, $717, $718, VersionRange($719, $720)), ($721, $722, $723, $724, $725, $726, $727, $728, $729, $730, $731, $732, $733, $734, $735, $736, $737, $738, $739, $740, $741, $742, $743, $744, $745, $746, $747, $748, VersionRange($749, $750)), ($751, $752, $753, $754, $755, $756, $757, $758, $759, $760, $761, $762, $763, $764, $765, $766, $767, $768, $769, $770, $771, $772, $773, $774, $775, $776, $777, $778, VersionRange($779, $780)), ($781, $782, $783, $784, $785, $786, $787, $788, $789, $790, $791, $792, $793, $794, $795, $796, $797, $798, $799, $800, $801, $802, $803, $804, $805, $806, $807, $808, VersionRange($809, $810)), ($811, $812, $813, $814, $815, $816, $817, $818, $819, $820, $821, $822, $823, $824, $825, $826, $827, $828, $829, $830, $831, $832, $833, $834, $835, $836, $837, $838, VersionRange($839, $840)), ($841, $842, $843, $844, $845, $846, $847, $848, $849, $850, $851, $852, $853, $854, $855, $856, $857, $858, $859, $860, $861, $862, $863, $864, $865, $866, $867, $868, VersionRange($869, $870)), ($871, $872, $873, $874, $875, $876, $877, $878, $879, $880, $881, $882, $883, $884, $885, $886, $887, $888, $889, $890, $891, $892, $893, $894, $895, $896, $897, $898, VersionRange($899, $900)), ($901, $902, $903, $904, $905, $906, $907, $908, $909, $910, $911, $912, $913, $914, $915, $916, $917, $918, $919, $920, $921, $922, $923, $924, $925, $926, $927, $928, VersionRange($929, $930)), ($931, $932, $933, $934, $935, $936, $937, $938, $939, $940, $941, $942, $943, $944, $945, $946, $947, $948, $949, $950, $951, $952, $953, $954, $955, $956, $957, $958, VersionRange($959, $960)), ($961, $962, $963, $964, $965, $966, $967, $968, $969, $970, $971, $972, $973, $974, $975, $976, $977, $978, $979, $980, $981, $982, $983, $984, $985, $986, $987, $988, VersionRange($989, $990)), ($991, $992, $993, $994, $995, $996, $997, $998, $999, $1000, $1001, $1002, $1003, $1004, $1005, $1006, $1007, $1008, $1009, $1010, $1011, $1012, $1013, $1014, $1015, $1016, $1017, $1018, VersionRange($1019, $1020)), ($1021, $1022, $1023, $1024, $1025, $1026, $1027, $1028, $1029, $1030, $1031, $1032, $1033, $1034, $1035, $1036, $1037, $1038, $1039, $1040, $1041, $1042, $1043, $1044, $1045, $1046, $1047, $1048, VersionRange($1049, $1050)), ($1051, $1052, $1053, $1054, $1055, $1056, $1057, $1058, $1059, $1060, $1061, $1062, $1063, $1064, $1065, $1066, $1067, $1068, $1069, $1070, $1071, $1072, $1073, $1074, $1075, $1076, $1077, $1078, VersionRange($1079, $1080)), ($1081, $1082, $1083, $1084, $1085, $1086, $1087, $1088, $1089, $1090, $1091, $1092, $1093, $1094, $1095, $1096, $1097, $1098, $1099, $1100, $1101, $1102, $1103, $1104, $1105, $1106, $1107, $1108, VersionRange($1109, $1110)), ($1111, $1112, $1113, $1114, $1115, $1116, $1117, $1118, $1119, $1120, $1121, $1122, $1123, $1124, $1125, $1126, $1127, $1128, $1129, $1130, $1131, $1132, $1133, $1134, $1135, $1136, $1137, $1138, VersionRange($1139, $1140)), ($1141, $1142, $1143, $1144, $1145, $1146, $1147, $1148, $1149, $1150, $1151, $1152, $1153, $1154, $1155, $1156, $1157, $1158, $1159, $1160, $1161, $1162, $1163, $1164, $1165, $1166, $1167, $1168, VersionRange($1169, $1170)), ($1171, $1172, $1173, $1174, $1175, $1176, $1177, $1178, $1179, $1180, $1181, $1182, $1183, $1184, $1185, $1186, $1187, $1188, $1189, $1190, $1191, $1192, $1193, $1194, $1195, $1196, $1197, $1198, VersionRange($1199, $1200)), ($1201, $1202, $1203, $1204, $1205, $1206, $1207, $1208, $1209, $1210, $1211, $1212, $1213, $1214, $1215, $1216, $1217, $1218, $1219, $1220, $1221, $1222, $1223, $1224, $1225, $1226, $1227, $1228, VersionRange($1229, $1230)), ($1231, $1232, $1233, $1234, $1235, $1236, $1237, $1238, $1239, $1240, $1241, $1242, $1243, $1244, $1245, $1246, $1247, $1248, $1249, $1250, $1251, $1252, $1253, $1254, $1255, $1256, $1257, $1258, VersionRange($1259, $1260)), ($1261, $1262, $1263, $1264, $1265, $1266, $1267, $1268, $1269, $1270, $1271, $1272, $1273, $1274, $1275, $1276, $1277, $1278, $1279, $1280, $1281, $1282, $1283, $1284, $1285, $1286, $1287, $1288, VersionRange($1289, $1290)), ($1291, $1292, $1293, $1294, $1295, $1296, $1297, $1298, $1299, $1300, $1301, $1302, $1303, $1304, $1305, $1306, $1307, $1308, $1309, $1310, $1311, $1312, $1313, $1314, $1315, $1316, $1317, $1318, VersionRange($1319, $1320)), ($1321, $1322, $1323, $1324, $1325, $1326, $1327, $1328, $1329, $1330, $1331, $1332, $1333, $1334, $1335, $1336, $1337, $1338, $1339, $1340, $1341, $1342, $1343, $1344, $1345, $1346, $1347, $1348, VersionRange($1349, $1350)), ($1351, $1352, $1353, $1354, $1355, $1356, $1357, $1358, $1359, $1360, $1361, $1362, $1363, $1364, $1365, $1366, $1367, $1368, $1369, $1370, $1371, $1372, $1373, $1374, $1375, $1376, $1377, $1378, VersionRange($1379, $1380)), ($1381, $1382, $1383, $1384, $1385, $1386, $1387, $1388, $1389, $1390, $1391, $1392, $1393, $1394, $1395, $1396, $1397, $1398, $1399, $1400, $1401, $1402, $1403, $1404, $1405, $1406, $1407, $1408, VersionRange($1409, $1410)), ($1411, $1412, $1413, $1414, $1415, $1416, $1417, $1418, $1419, $1420, $1421, $1422, $1423, $1424, $1425, $1426, $1427, $1428, $1429, $1430, $1431, $1432, $1433, $1434, $1435, $1436, $1437, $1438, VersionRange($1439, $1440)), ($1441, $1442, $1443, $1444, $1445, $1446, $1447, $1448, $1449, $1450, $1451, $1452, $1453, $1454, $1455, $1456, $1457, $1458, $1459, $1460, $1461, $1462, $1463, $1464, $1465, $1466, $1467, $1468, VersionRange($1469, $1470)), ($1471, $1472, $1473, $1474, $1475, $1476, $1477, $1478, $1479, $1480, $1481, $1482, $1483, $1484, $1485, $1486, $1487, $1488, $1489, $1490, $1491, $1492, $1493, $1494, $1495, $1496, $1497, $1498, VersionRange($1499, $1500)), ($1501, $1502, $1503, $1504, $1505, $1506, $1507, $1508, $1509, $1510, $1511, $1512, $1513, $1514, $1515, $1516, $1517, $1518, $1519, $1520, $1521, $1522, $1523, $1524, $1525, $1526, $1527, $1528, VersionRange($1529, $1530)), ($1531, $1532, $1533, $1534, $1535, $1536, $1537, $1538, $1539, $1540, $1541, $1542, $1543, $1544, $1545, $1546, $1547, $1548, $1549, $1550, $1551, $1552, $1553, $1554, $1555, $1556, $1557, $1558, VersionRange($1559, $1560)), ($1561, $1562, $1563, $1564, $1565, $1566, $1567, $1568, $1569, $1570, $1571, $1572, $1573, $1574, $1575, $1576, $1577, $1578, $1579, $1580, $1581, $1582, $1583, $1584, $1585, $1586, $1587, $1588, VersionRange($1589, $1590)), ($1591, $1592, $1593, $1594, $1595, $1596, $1597, $1598, $1599, $1600, $1601, $1602, $1603, $1604, $1605, $1606, $1607, $1608, $1609, $1610, $1611, $1612, $1613, $1614, $1615, $1616, $1617, $1618, VersionRange($1619, $1620)), ($1621, $1622, $1623, $1624, $1625, $1626, $1627, $1628, $1629, $1630, $1631, $1632, $1633, $1634, $1635, $1636, $1637, $1638, $1639, $1640, $1641, $1642, $1643, $1644, $1645, $1646, $1647, $1648, VersionRange($1649, $1650)), ($1651, $1652, $1653, $1654, $1655, $1656, $1657, $1658, $1659, $1660, $1661, $1662, $1663, $1664, $1665, $1666, $1667, $1668, $1669, $1670, $1671, $1672, $1673, $1674, $1675, $1676, $1677, $1678, VersionRange($1679, $1680)), ($1681, $1682, $1683, $1684, $1685, $1686, $1687, $1688, $1689, $1690, $1691, $1692, $1693, $1694, $1695, $1696, $1697, $1698, $1699, $1700, $1701, $1702, $1703, $1704, $1705, $1706, $1707, $1708, VersionRange($1709, $1710)), ($1711, $1712, $1713, $1714, $1715, $1716, $1717, $1718, $1719, $1720, $1721, $1722, $1723, $1724, $1725, $1726, $1727, $1728, $1729, $1730, $1731, $1732, $1733, $1734, $1735, $1736, $1737, $1738, VersionRange($1739, $1740)), ($1741, $1742, $1743, $1744, $1745, $1746, $1747, $1748, $1749, $1750, $1751, $1752, $1753, $1754, $1755, $1756, $1757, $1758, $1759, $1760, $1761, $1762, $1763, $1764, $1765, $1766, $1767, $1768, VersionRange($1769, $1770)), ($1771, $1772, $1773, $1774, $1775, $1776, $1777, $1778, $1779, $1780, $1781, $1782, $1783, $1784, $1785, $1786, $1787, $1788, $1789, $1790, $1791, $1792, $1793, $1794, $1795, $1796, $1797, $1798, VersionRange($1799, $1800)), ($1801, $1802, $1803, $1804, $1805, $1806, $1807, $1808, $1809, $1810, $1811, $1812, $1813, $1814, $1815, $1816, $1817, $1818, $1819, $1820, $1821, $1822, $1823, $1824, $1825, $1826, $1827, $1828, VersionRange($1829, $1830)), ($1831, $1832, $1833, $1834, $1835, $1836, $1837, $1838, $1839, $1840, $1841, $1842, $1843, $1844, $1845, $1846, $1847, $1848, $1849, $1850, $1851, $1852, $1853, $1854, $1855, $1856, $1857, $1858, VersionRange($1859, $1860)), ($1861, $1862, $1863, $1864, $1865, $1866, $1867, $1868, $1869, $1870, $1871, $1872, $1873, $1874, $1875, $1876, $1877, $1878, $1879, $1880, $1881, $1882, $1883, $1884, $1885, $1886, $1887, $1888, VersionRange($1889, $1890)), ($1891, $1892, $1893, $1894, $1895, $1896, $1897, $1898, $1899, $1900, $1901, $1902, $1903, $1904, $1905, $1906, $1907, $1908, $1909, $1910, $1911, $1912, $1913, $1914, $1915, $1916, $1917, $1918, VersionRange($1919, $1920)), ($1921, $1922, $1923, $1924, $1925, $1926, $1927, $1928, $1929, $1930, $1931, $1932, $1933, $1934, $1935, $1936, $1937, $1938, $1939, $1940, $1941, $1942, $1943, $1944, $1945, $1946, $1947, $1948, VersionRange($1949, $1950)), ($1951, $1952, $1953, $1954, $1955, $1956, $1957, $1958, $1959, $1960, $1961, $1962, $1963, $1964, $1965, $1966, $1967, $1968, $1969, $1970, $1971, $1972, $1973, $1974, $1975, $1976, $1977, $1978, VersionRange($1979, $1980)), ($1981, $1982, $1983, $1984, $1985, $1986, $1987, $1988, $1989, $1990, $1991, $1992, $1993, $1994, $1995, $1996, $1997, $1998, $1999, $2000, $2001, $2002, $2003, $2004, $2005, $2006, $2007, $2008, VersionRange($2009, $2010)), ($2011, $2012, $2013, $2014, $2015, $2016, $2017, $2018, $2019, $2020, $2021, $2022, $2023, $2024, $2025, $2026, $2027, $2028, $2029, $2030, $2031, $2032, $2033, $2034, $2035, $2036, $2037, $2038, VersionRange($2039, $2040)), ($2041, $2042, $2043, $2044, $2045, $2046, $2047, $2048, $2049, $2050, $2051, $2052, $2053, $2054, $2055, $2056, $2057, $2058, $2059, $2060, $2061, $2062, $2063, $2064, $2065, $2066, $2067, $2068, VersionRange($2069, $2070)), ($2071, $2072, $2073, $2074, $2075, $2076, $2077, $2078, $2079, $2080, $2081, $2082, $2083, $2084, $2085, $2086, $2087, $2088, $2089, $2090, $2091, $2092, $2093, $2094, $2095, $2096, $2097, $2098, VersionRange($2099, $2100)), ($2101, $2102, $2103, $2104, $2105, $2106, $2107, $2108, $2109, $2110, $2111, $2112, $2113, $2114, $2115, $2116, $2117, $2118, $2119, $2120, $2121, $2122, $2123, $2124, $2125, $2126, $2127, $2128, VersionRange($2129, $2130)), ($2131, $2132, $2133, $2134, $2135, $2136, $2137, $2138, $2139, $2140, $2141, $2142, $2143, $2144, $2145, $2146, $2147, $2148, $2149, $2150, $2151, $2152, $2153, $2154, $2155, $2156, $2157, $2158, VersionRange($2159, $2160)), ($2161, $2162, $2163, $2164, $2165, $2166, $2167, $2168, $2169, $2170, $2171, $2172, $2173, $2174, $2175, $2176, $2177, $2178, $2179, $2180, $2181, $2182, $2183, $2184, $2185, $2186, $2187, $2188, VersionRange($2189, $2190)), ($2191, $2192, $2193, $2194, $2195, $2196, $2197, $2198, $2199, $2200, $2201, $2202, $2203, $2204, $2205, $2206, $2207, $2208, $2209, $2210, $2211, $2212, $2213, $2214, $2215, $2216, $2217, $2218, VersionRange($2219, $2220)), ($2221, $2222, $2223, $2224, $2225, $2226, $2227, $2228, $2229, $2230, $2231, $2232, $2233, $2234, $2235, $2236, $2237, $2238, $2239, $2240, $2241, $2242, $2243, $2244, $2245, $2246, $2247, $2248, VersionRange($2249, $2250)), ($2251, $2252, $2253, $2254, $2255, $2256, $2257, $2258, $2259, $2260, $2261, $2262, $2263, $2264, $2265, $2266, $2267, $2268, $2269, $2270, $2271, $2272, $2273, $2274, $2275, $2276, $2277, $2278, VersionRange($2279, $2280)), ($2281, $2282, $2283, $2284, $2285, $2286, $2287, $2288, $2289, $2290, $2291, $2292, $2293, $2294, $2295, $2296, $2297, $2298, $2299, $2300, $2301, $2302, $2303, $2304, $2305, $2306, $2307, $2308, VersionRange($2309, $2310)), ($2311, $2312, $2313, $2314, $2315, $2316, $2317, $2318, $2319, $2320, $2321, $2322, $2323, $2324, $2325, $2326, $2327, $2328, $2329, $2330, $2331, $2332, $2333, $2334, $2335, $2336, $2337, $2338, VersionRange($2339, $2340)), ($2341, $2342, $2343, $2344, $2345, $2346, $2347, $2348, $2349, $2350, $2351, $2352, $2353, $2354, $2355, $2356, $2357, $2358, $2359, $2360, $2361, $2362, $2363, $2364, $2365, $2366, $2367, $2368, VersionRange($2369, $2370)), ($2371, $2372, $2373, $2374, $2375, $2376, $2377, $2378, $2379, $2380, $2381, $2382, $2383, $2384, $2385, $2386, $2387, $2388, $2389, $2390, $2391, $2392, $2393, $2394, $2395, $2396, $2397, $2398, VersionRange($2399, $2400)), ($2401, $2402, $2403, $2404, $2405, $2406, $2407, $2408, $2409, $2410, $2411, $2412, $2413, $2414, $2415, $2416, $2417, $2418, $2419, $2420, $2421, $2422, $2423, $2424, $2425, $2426, $2427, $2428, VersionRange($2429, $2430)), ($2431, $2432, $2433, $2434, $2435, $2436, $2437, $2438, $2439, $2440, $2441, $2442, $2443, $2444, $2445, $2446, $2447, $2448, $2449, $2450, $2451, $2452, $2453, $2454, $2455, $2456, $2457, $2458, VersionRange($2459, $2460)), ($2461, $2462, $2463, $2464, $2465, $2466, $2467, $2468, $2469, $2470, $2471, $2472, $2473, $2474, $2475, $2476, $2477, $2478, $2479, $2480, $2481, $2482, $2483, $2484, $2485, $2486, $2487, $2488, VersionRange($2489, $2490)), ($2491, $2492, $2493, $2494, $2495, $2496, $2497, $2498, $2499, $2500, $2501, $2502, $2503, $2504, $2505, $2506, $2507, $2508, $2509, $2510, $2511, $2512, $2513, $2514, $2515, $2516, $2517, $2518, VersionRange($2519, $2520)), ($2521, $2522, $2523, $2524, $2525, $2526, $2527, $2528, $2529, $2530, $2531, $2532, $2533, $2534, $2535, $2536, $2537, $2538, $2539, $2540, $2541, $2542, $2543, $2544, $2545, $2546, $2547, $2548, VersionRange($2549, $2550)), ($2551, $2552, $2553, $2554, $2555, $2556, $2557, $2558, $2559, $2560, $2561, $2562, $2563, $2564, $2565, $2566, $2567, $2568, $2569, $2570, $2571, $2572, $2573, $2574, $2575, $2576, $2577, $2578, VersionRange($2579, $2580)), ($2581, $2582, $2583, $2584, $2585, $2586, $2587, $2588, $2589, $2590, $2591, $2592, $2593, $2594, $2595, $2596, $2597, $2598, $2599, $2600, $2601, $2602, $2603, $2604, $2605, $2606, $2607, $2608, VersionRange($2609, $2610)), ($2611, $2612, $2613, $2614, $2615, $2616, $2617, $2618, $2619, $2620, $2621, $2622, $2623, $2624, $2625, $2626, $2627, $2628, $2629, $2630, $2631, $2632, $2633, $2634, $2635, $2636, $2637, $2638, VersionRange($2639, $2640)), ($2641, $2642, $2643, $2644, $2645, $2646, $2647, $2648, $2649, $2650, $2651, $2652, $2653, $2654, $2655, $2656, $2657, $2658, $2659, $2660, $2661, $2662, $2663, $2664, $2665, $2666, $2667, $2668, VersionRange($2669, $2670)), ($2671, $2672, $2673, $2674, $2675, $2676, $2677, $2678, $2679, $2680, $2681, $2682, $2683, $2684, $2685, $2686, $2687, $2688, $2689, $2690, $2691, $2692, $2693, $2694, $2695, $2696, $2697, $2698, VersionRange($2699, $2700)), ($2701, $2702, $2703, $2704, $2705, $2706, $2707, $2708, $2709, $2710, $2711, $2712, $2713, $2714, $2715, $2716, $2717, $2718, $2719, $2720, $2721, $2722, $2723, $2724, $2725, $2726, $2727, $2728, VersionRange($2729, $2730)), ($2731, $2732, $2733, $2734, $2735, $2736, $2737, $2738, $2739, $2740, $2741, $2742, $2743, $2744, $2745, $2746, $2747, $2748, $2749, $2750, $2751, $2752, $2753, $2754, $2755, $2756, $2757, $2758, VersionRange($2759, $2760)), ($2761, $2762, $2763, $2764, $2765, $2766, $2767, $2768, $2769, $2770, $2771, $2772, $2773, $2774, $2775, $2776, $2777, $2778, $2779, $2780, $2781, $2782, $2783, $2784, $2785, $2786, $2787, $2788, VersionRange($2789, $2790)), ($2791, $2792, $2793, $2794, $2795, $2796, $2797, $2798, $2799, $2800, $2801, $2802, $2803, $2804, $2805, $2806, $2807, $2808, $2809, $2810, $2811, $2812, $2813, $2814, $2815, $2816, $2817, $2818, VersionRange($2819, $2820)), ($2821, $2822, $2823, $2824, $2825, $2826, $2827, $2828, $2829, $2830, $2831, $2832, $2833, $2834, $2835, $2836, $2837, $2838, $2839, $2840, $2841, $2842, $2843, $2844, $2845, $2846, $2847, $2848, VersionRange($2849, $2850)), ($2851, $2852, $2853, $2854, $2855, $2856, $2857, $2858, $2859, $2860, $2861, $2862, $2863, $2864, $2865, $2866, $2867, $2868, $2869, $2870, $2871, $2872, $2873, $2874, $2875, $2876, $2877, $2878, VersionRange($2879, $2880)), ($2881, $2882, $2883, $2884, $2885, $2886, $2887, $2888, $2889, $2890, $2891, $2892, $2893, $2894, $2895, $2896, $2897, $2898, $2899, $2900, $2901, $2902, $2903, $2904, $2905, $2906, $2907, $2908, VersionRange($2909, $2910)), ($2911, $2912, $2913, $2914, $2915, $2916, $2917, $2918, $2919, $2920, $2921, $2922, $2923, $2924, $2925, $2926, $2927, $2928, $2929, $2930, $2931, $2932, $2933, $2934, $2935, $2936, $2937, $2938, VersionRange($2939, $2940)), ($2941, $2942, $2943, $2944, $2945, $2946, $2947, $2948, $2949, $2950, $2951, $2952, $2953, $2954, $2955, $2956, $2957, $2958, $2959, $2960, $2961, $2962, $2963, $2964, $2965, $2966, $2967, $2968, VersionRange($2969, $2970)), ($2971, $2972, $2973, $2974, $2975, $2976, $2977, $2978, $2979, $2980, $2981, $2982, $2983, $2984, $2985, $2986, $2987, $2988, $2989, $2990, $2991, $2992, $2993, $2994, $2995, $2996, $2997, $2998, VersionRange($2999, $3000)), ($3001, $3002, $3003, $3004, $3005, $3006, $3007, $3008, $3009, $3010, $3011, $3012, $3013, $3014, $3015, $3016, $3017, $3018, $3019, $3020, $3021, $3022, $3023, $3024, $3025, $3026, $3027, $3028, VersionRange($3029, $3030)), ($3031, $3032, $3033, $3034, $3035, $3036, $3037, $3038, $3039, $3040, $3041, $3042, $3043, $3044, $3045, $3046, $3047, $3048, $3049, $3050, $3051, $3052, $3053, $3054, $3055, $3056, $3057, $3058, VersionRange($3059, $3060)), ($3061, $3062, $3063, $3064, $3065, $3066, $3067, $3068, $3069, $3070, $3071, $3072, $3073, $3074, $3075, $3076, $3077, $3078, $3079, $3080, $3081, $3082, $3083, $3084, $3085, $3086, $3087, $3088, VersionRange($3089, $3090)), ($3091, $3092, $3093, $3094, $3095, $3096, $3097, $3098, $3099, $3100, $3101, $3102, $3103, $3104, $3105, $3106, $3107, $3108, $3109, $3110, $3111, $3112, $3113, $3114, $3115, $3116, $3117, $3118, VersionRange($3119, $3120)), ($3121, $3122, $3123, $3124, $3125, $3126, $3127, $3128, $3129, $3130, $3131, $3132, $3133, $3134, $3135, $3136, $3137, $3138, $3139, $3140, $3141, $3142, $3143, $3144, $3145, $3146, $3147, $3148, VersionRange($3149, $3150)), ($3151, $3152, $3153, $3154, $3155, $3156, $3157, $3158, $3159, $3160, $3161, $3162, $3163, $3164, $3165, $3166, $3167, $3168, $3169, $3170, $3171, $3172, $3173, $3174, $3175, $3176, $3177, $3178, VersionRange($3179, $3180)), ($3181, $3182, $3183, $3184, $3185, $3186, $3187, $3188, $3189, $3190, $3191, $3192, $3193, $3194, $3195, $3196, $3197, $3198, $3199, $3200, $3201, $3202, $3203, $3204, $3205, $3206, $3207, $3208, VersionRange($3209, $3210)), ($3211, $3212, $3213, $3214, $3215, $3216, $3217, $3218, $3219, $3220, $3221, $3222, $3223, $3224, $3225, $3226, $3227, $3228, $3229, $3230, $3231, $3232, $3233, $3234, $3235, $3236, $3237, $3238, VersionRange($3239, $3240)), ($3241, $3242, $3243, $3244, $3245, $3246, $3247, $3248, $3249, $3250, $3251, $3252, $3253, $3254, $3255, $3256, $3257, $3258, $3259, $3260, $3261, $3262, $3263, $3264, $3265, $3266, $3267, $3268, VersionRange($3269, $3270)), ($3271, $3272, $3273, $3274, $3275, $3276, $3277, $3278, $3279, $3280, $3281, $3282, $3283, $3284, $3285, $3286, $3287, $3288, $3289, $3290, $3291, $3292, $3293, $3294, $3295, $3296, $3297, $3298, VersionRange($3299, $3300)), ($3301, $3302, $3303, $3304, $3305, $3306, $3307, $3308, $3309, $3310, $3311, $3312, $3313, $3314, $3315, $3316, $3317, $3318, $3319, $3320, $3321, $3322, $3323, $3324, $3325, $3326, $3327, $3328, VersionRange($3329, $3330)), ($3331, $3332, $3333, $3334, $3335, $3336, $3337, $3338, $3339, $3340, $3341, $3342, $3343, $3344, $3345, $3346, $3347, $3348, $3349, $3350, $3351, $3352, $3353, $3354, $3355, $3356, $3357, $3358, VersionRange($3359, $3360)), ($3361, $3362, $3363, $3364, $3365, $3366, $3367, $3368, $3369, $3370, $3371, $3372, $3373, $3374, $3375, $3376, $3377, $3378, $3379, $3380, $3381, $3382, $3383, $3384, $3385, $3386, $3387, $3388, VersionRange($3389, $3390)), ($3391, $3392, $3393, $3394, $3395, $3396, $3397, $3398, $3399, $3400, $3401, $3402, $3403, $3404, $3405, $3406, $3407, $3408, $3409, $3410, $3411, $3412, $3413, $3414, $3415, $3416, $3417, $3418, VersionRange($3419, $3420)), ($3421, $3422, $3423, $3424, $3425, $3426, $3427, $3428, $3429, $3430, $3431, $3432, $3433, $3434, $3435, $3436, $3437, $3438, $3439, $3440, $3441, $3442, $3443, $3444, $3445, $3446, $3447, $3448, VersionRange($3449, $3450)), ($3451, $3452, $3453, $3454, $3455, $3456, $3457, $3458, $3459, $3460, $3461, $3462, $3463, $3464, $3465, $3466, $3467, $3468, $3469, $3470, $3471, $3472, $3473, $3474, $3475, $3476, $3477, $3478, VersionRange($3479, $3480)), ($3481, $3482, $3483, $3484, $3485, $3486, $3487, $3488, $3489, $3490, $3491, $3492, $3493, $3494, $3495, $3496, $3497, $3498, $3499, $3500, $3501, $3502, $3503, $3504, $3505, $3506, $3507, $3508, VersionRange($3509, $3510)), ($3511, $3512, $3513, $3514, $3515, $3516, $3517, $3518, $3519, $3520, $3521, $3522, $3523, $3524, $3525, $3526, $3527, $3528, $3529, $3530, $3531, $3532, $3533, $3534, $3535, $3536, $3537, $3538, VersionRange($3539, $3540)), ($3541, $3542, $3543, $3544, $3545, $3546, $3547, $3548, $3549, $3550, $3551, $3552, $3553, $3554, $3555, $3556, $3557, $3558, $3559, $3560, $3561, $3562, $3563, $3564, $3565, $3566, $3567, $3568, VersionRange($3569, $3570)), ($3571, $3572, $3573, $3574, $3575, $3576, $3577, $3578, $3579, $3580, $3581, $3582, $3583, $3584, $3585, $3586, $3587, $3588, $3589, $3590, $3591, $3592, $3593, $3594, $3595, $3596, $3597, $3598, VersionRange($3599, $3600)), ($3601, $3602, $3603, $3604, $3605, $3606, $3607, $3608, $3609, $3610, $3611, $3612, $3613, $3614, $3615, $3616, $3617, $3618, $3619, $3620, $3621, $3622, $3623, $3624, $3625, $3626, $3627, $3628, VersionRange($3629, $3630)), ($3631, $3632, $3633, $3634, $3635, $3636, $3637, $3638, $3639, $3640, $3641, $3642, $3643, $3644, $3645, $3646, $3647, $3648, $3649, $3650, $3651, $3652, $3653, $3654, $3655, $3656, $3657, $3658, VersionRange($3659, $3660)), ($3661, $3662, $3663, $3664, $3665, $3666, $3667, $3668, $3669, $3670, $3671, $3672, $3673, $3674, $3675, $3676, $3677, $3678, $3679, $3680, $3681, $3682, $3683, $3684, $3685, $3686, $3687, $3688, VersionRange($3689, $3690)), ($3691, $3692, $3693, $3694, $3695, $3696, $3697, $3698, $3699, $3700, $3701, $3702, $3703, $3704, $3705, $3706, $3707, $3708, $3709, $3710, $3711, $3712, $3713, $3714, $3715, $3716, $3717, $3718, VersionRange($3719, $3720)), ($3721, $3722, $3723, $3724, $3725, $3726, $3727, $3728, $3729, $3730, $3731, $3732, $3733, $3734, $3735, $3736, $3737, $3738, $3739, $3740, $3741, $3742, $3743, $3744, $3745, $3746, $3747, $3748, VersionRange($3749, $3750)), ($3751, $3752, $3753, $3754, $3755, $3756, $3757, $3758, $3759, $3760, $3761, $3762, $3763, $3764, $3765, $3766, $3767, $3768, $3769, $3770, $3771, $3772, $3773, $3774, $3775, $3776, $3777, $3778, VersionRange($3779, $3780)), ($3781, $3782, $3783, $3784, $3785, $3786, $3787, $3788, $3789, $3790, $3791, $3792, $3793, $3794, $3795, $3796, $3797, $3798, $3799, $3800, $3801, $3802, $3803, $3804, $3805, $3806, $3807, $3808, VersionRange($3809, $3810)), ($3811, $3812, $3813, $3814, $3815, $3816, $3817, $3818, $3819, $3820, $3821, $3822, $3823, $3824, $3825, $3826, $3827, $3828, $3829, $3830, $3831, $3832, $3833, $3834, $3835, $3836, $3837, $3838, VersionRange($3839, $3840)), ($3841, $3842, $3843, $3844, $3845, $3846, $3847, $3848, $3849, $3850, $3851, $3852, $3853, $3854, $3855, $3856, $3857, $3858, $3859, $3860, $3861, $3862, $3863, $3864, $3865, $3866, $3867, $3868, VersionRange($3869, $3870)), ($3871, $3872, $3873, $3874, $3875, $3876, $3877, $3878, $3879, $3880, $3881, $3882, $3883, $3884, $3885, $3886, $3887, $3888, $3889, $3890, $3891, $3892, $3893, $3894, $3895, $3896, $3897, $3898, VersionRange($3899, $3900)), ($3901, $3902, $3903, $3904, $3905, $3906, $3907, $3908, $3909, $3910, $3911, $3912, $3913, $3914, $3915, $3916, $3917, $3918, $3919, $3920, $3921, $3922, $3923, $3924, $3925, $3926, $3927, $3928, VersionRange($3929, $3930)), ($3931, $3932, $3933, $3934, $3935, $3936, $3937, $3938, $3939, $3940, $3941, $3942, $3943, $3944, $3945, $3946, $3947, $3948, $3949, $3950, $3951, $3952, $3953, $3954, $3955, $3956, $3957, $3958, VersionRange($3959, $3960)), ($3961, $3962, $3963, $3964, $3965, $3966, $3967, $3968, $3969, $3970, $3971, $3972, $3973, $3974, $3975, $3976, $3977, $3978, $3979, $3980, $3981, $3982, $3983, $3984, $3985, $3986, $3987, $3988, VersionRange($3989, $3990)), ($3991, $3992, $3993, $3994, $3995, $3996, $3997, $3998, $3999, $4000, $4001, $4002, $4003, $4004, $4005, $4006, $4007, $4008, $4009, $4010, $4011, $4012, $4013, $4014, $4015, $4016, $4017, $4018, VersionRange($4019, $4020)), ($4021, $4022, $4023, $4024, $4025, $4026, $4027, $4028, $4029, $4030, $4031, $4032, $4033, $4034, $4035, $4036, $4037, $4038, $4039, $4040, $4041, $4042, $4043, $4044, $4045, $4046, $4047, $4048, VersionRange($4049, $4050)), ($4051, $4052, $4053, $4054, $4055, $4056, $4057, $4058, $4059, $4060, $4061, $4062, $4063, $4064, $4065, $4066, $4067, $4068, $4069, $4070, $4071, $4072, $4073, $4074, $4075, $4076, $4077, $4078, VersionRange($4079, $4080)), ($4081, $4082, $4083, $4084, $4085, $4086, $4087, $4088, $4089, $4090, $4091, $4092, $4093, $4094, $4095, $4096, $4097, $4098, $4099, $4100, $4101, $4102, $4103, $4104, $4105, $4106, $4107, $4108, VersionRange($4109, $4110)), ($4111, $4112, $4113, $4114, $4115, $4116, $4117, $4118, $4119, $4120, $4121, $4122, $4123, $4124, $4125, $4126, $4127, $4128, $4129, $4130, $4131, $4132, $4133, $4134, $4135, $4136, $4137, $4138, VersionRange($4139, $4140)), ($4141, $4142, $4143, $4144, $4145, $4146, $4147, $4148, $4149, $4150, $4151, $4152, $4153, $4154, $4155, $4156, $4157, $4158, $4159, $4160, $4161, $4162, $4163, $4164, $4165, $4166, $4167, $4168, VersionRange($4169, $4170)), ($4171, $4172, $4173, $4174, $4175, $4176, $4177, $4178, $4179, $4180, $4181, $4182, $4183, $4184, $4185, $4186, $4187, $4188, $4189, $4190, $4191, $4192, $4193, $4194, $4195, $4196, $4197, $4198, VersionRange($4199, $4200)), ($4201, $4202, $4203, $4204, $4205, $4206, $4207, $4208, $4209, $4210, $4211, $4212, $4213, $4214, $4215, $4216, $4217, $4218, $4219, $4220, $4221, $4222, $4223, $4224, $4225, $4226, $4227, $4228, VersionRange($4229, $4230)), ($4231, $4232, $4233, $4234, $4235, $4236, $4237, $4238, $4239, $4240, $4241, $4242, $4243, $4244, $4245, $4246, $4247, $4248, $4249, $4250, $4251, $4252, $4253, $4254, $4255, $4256, $4257, $4258, VersionRange($4259, $4260)), ($4261, $4262, $4263, $4264, $4265, $4266, $4267, $4268, $4269, $4270, $4271, $4272, $4273, $4274, $4275, $4276, $4277, $4278, $4279, $4280, $4281, $4282, $4283, $4284, $4285, $4286, $4287, $4288, VersionRange($4289, $4290)), ($4291, $4292, $4293, $4294, $4295, $4296, $4297, $4298, $4299, $4300, $4301, $4302, $4303, $4304, $4305, $4306, $4307, $4308, $4309, $4310, $4311, $4312, $4313, $4314, $4315, $4316, $4317, $4318, VersionRange($4319, $4320)), ($4321, $4322, $4323, $4324, $4325, $4326, $4327, $4328, $4329, $4330, $4331, $4332, $4333, $4334, $4335, $4336, $4337, $4338, $4339, $4340, $4341, $4342, $4343, $4344, $4345, $4346, $4347, $4348, VersionRange($4349, $4350)), ($4351, $4352, $4353, $4354, $4355, $4356, $4357, $4358, $4359, $4360, $4361, $4362, $4363, $4364, $4365, $4366, $4367, $4368, $4369, $4370, $4371, $4372, $4373, $4374, $4375, $4376, $4377, $4378, VersionRange($4379, $4380)), ($4381, $4382, $4383, $4384, $4385, $4386, $4387, $4388, $4389, $4390, $4391, $4392, $4393, $4394, $4395, $4396, $4397, $4398, $4399, $4400, $4401, $4402, $4403, $4404, $4405, $4406, $4407, $4408, VersionRange($4409, $4410)), ($4411, $4412, $4413, $4414, $4415, $4416, $4417, $4418, $4419, $4420, $4421, $4422, $4423, $4424, $4425, $4426, $4427, $4428, $4429, $4430, $4431, $4432, $4433, $4434, $4435, $4436, $4437, $4438, VersionRange($4439, $4440)), ($4441, $4442, $4443, $4444, $4445, $4446, $4447, $4448, $4449, $4450, $4451, $4452, $4453, $4454, $4455, $4456, $4457, $4458, $4459, $4460, $4461, $4462, $4463, $4464, $4465, $4466, $4467, $4468, VersionRange($4469, $4470)), ($4471, $4472, $4473, $4474, $4475, $4476, $4477, $4478, $4479, $4480, $4481, $4482, $4483, $4484, $4485, $4486, $4487, $4488, $4489, $4490, $4491, $4492, $4493, $4494, $4495, $4496, $4497, $4498, VersionRange($4499, $4500)), ($4501, $4502, $4503, $4504, $4505, $4506, $4507, $4508, $4509, $4510, $4511, $4512, $4513, $4514, $4515, $4516, $4517, $4518, $4519, $4520, $4521, $4522, $4523, $4524, $4525, $4526, $4527, $4528, VersionRange($4529, $4530)), ($4531, $4532, $4533, $4534, $4535, $4536, $4537, $4538, $4539, $4540, $4541, $4542, $4543, $4544, $4545, $4546, $4547, $4548, $4549, $4550, $4551, $4552, $4553, $4554, $4555, $4556, $4557, $4558, VersionRange($4559, $4560)), ($4561, $4562, $4563, $4564, $4565, $4566, $4567, $4568, $4569, $4570, $4571, $4572, $4573, $4574, $4575, $4576, $4577, $4578, $4579, $4580, $4581, $4582, $4583, $4584, $4585, $4586, $4587, $4588, VersionRange($4589, $4590)), ($4591, $4592, $4593, $4594, $4595, $4596, $4597, $4598, $4599, $4600, $4601, $4602, $4603, $4604, $4605, $4606, $4607, $4608, $4609, $4610, $4611, $4612, $4613, $4614, $4615, $4616, $4617, $4618, VersionRange($4619, $4620)), ($4621, $4622, $4623, $4624, $4625, $4626, $4627, $4628, $4629, $4630, $4631, $4632, $4633, $4634, $4635, $4636, $4637, $4638, $4639, $4640, $4641, $4642, $4643, $4644, $4645, $4646, $4647, $4648, VersionRange($4649, $4650)), ($4651, $4652, $4653, $4654, $4655, $4656, $4657, $4658, $4659, $4660, $4661, $4662, $4663, $4664, $4665, $4666, $4667, $4668, $4669, $4670, $4671, $4672, $4673, $4674, $4675, $4676, $4677, $4678, VersionRange($4679, $4680)), ($4681, $4682, $4683, $4684, $4685, $4686, $4687, $4688, $4689, $4690, $4691, $4692, $4693, $4694, $4695, $4696, $4697, $4698, $4699, $4700, $4701, $4702, $4703, $4704, $4705, $4706, $4707, $4708, VersionRange($4709, $4710)), ($4711, $4712, $4713, $4714, $4715, $4716, $4717, $4718, $4719, $4720, $4721, $4722, $4723, $4724, $4725, $4726, $4727, $4728, $4729, $4730, $4731, $4732, $4733, $4734, $4735, $4736, $4737, $4738, VersionRange($4739, $4740)), ($4741, $4742, $4743, $4744, $4745, $4746, $4747, $4748, $4749, $4750, $4751, $4752, $4753, $4754, $4755, $4756, $4757, $4758, $4759, $4760, $4761, $4762, $4763, $4764, $4765, $4766, $4767, $4768, VersionRange($4769, $4770)), ($4771, $4772, $4773, $4774, $4775, $4776, $4777, $4778, $4779, $4780, $4781, $4782, $4783, $4784, $4785, $4786, $4787, $4788, $4789, $4790, $4791, $4792, $4793, $4794, $4795, $4796, $4797, $4798, VersionRange($4799, $4800)), ($4801, $4802, $4803, $4804, $4805, $4806, $4807, $4808, $4809, $4810, $4811, $4812, $4813, $4814, $4815, $4816, $4817, $4818, $4819, $4820, $4821, $4822, $4823, $4824, $4825, $4826, $4827, $4828, VersionRange($4829, $4830)), ($4831, $4832, $4833, $4834, $4835, $4836, $4837, $4838, $4839, $4840, $4841, $4842, $4843, $4844, $4845, $4846, $4847, $4848, $4849, $4850, $4851, $4852, $4853, $4854, $4855, $4856, $4857, $4858, VersionRange($4859, $4860)), ($4861, $4862, $4863, $4864, $4865, $4866, $4867, $4868, $4869, $4870, $4871, $4872, $4873, $4874, $4875, $4876, $4877, $4878, $4879, $4880, $4881, $4882, $4883, $4884, $4885, $4886, $4887, $4888, VersionRange($4889, $4890)), ($4891, $4892, $4893, $4894, $4895, $4896, $4897, $4898, $4899, $4900, $4901, $4902, $4903, $4904, $4905, $4906, $4907, $4908, $4909, $4910, $4911, $4912, $4913, $4914, $4915, $4916, $4917, $4918, VersionRange($4919, $4920)), ($4921, $4922, $4923, $4924, $4925, $4926, $4927, $4928, $4929, $4930, $4931, $4932, $4933, $4934, $4935, $4936, $4937, $4938, $4939, $4940, $4941, $4942, $4943, $4944, $4945, $4946, $4947, $4948, VersionRange($4949, $4950)), ($4951, $4952, $4953, $4954, $4955, $4956, $4957, $4958, $4959, $4960, $4961, $4962, $4963, $4964, $4965, $4966, $4967, $4968, $4969, $4970, $4971, $4972, $4973, $4974, $4975, $4976, $4977, $4978, VersionRange($4979, $4980)), ($4981, $4982, $4983, $4984, $4985, $4986, $4987, $4988, $4989, $4990, $4991, $4992, $4993, $4994, $4995, $4996, $4997, $4998, $4999, $5000, $5001, $5002, $5003, $5004, $5005, $5006, $5007, $5008, VersionRange($5009, $5010)), ($5011, $5012, $5013, $5014, $5015, $5016, $5017, $5018, $5019, $5020, $5021, $5022, $5023, $5024, $5025, $5026, $5027, $5028, $5029, $5030, $5031, $5032, $5033, $5034, $5035, $5036, $5037, $5038, VersionRange($5039, $5040)), ($5041, $5042, $5043, $5044, $5045, $5046, $5047, $5048, $5049, $5050, $5051, $5052, $5053, $5054, $5055, $5056, $5057, $5058, $5059, $5060, $5061, $5062, $5063, $5064, $5065, $5066, $5067, $5068, VersionRange($5069, $5070)), ($5071, $5072, $5073, $5074, $5075, $5076, $5077, $5078, $5079, $5080, $5081, $5082, $5083, $5084, $5085, $5086, $5087, $5088, $5089, $5090, $5091, $5092, $5093, $5094, $5095, $5096, $5097, $5098, VersionRange($5099, $5100)), ($5101, $5102, $5103, $5104, $5105, $5106, $5107, $5108, $5109, $5110, $5111, $5112, $5113, $5114, $5115, $5116, $5117, $5118, $5119, $5120, $5121, $5122, $5123, $5124, $5125, $5126, $5127, $5128, VersionRange($5129, $5130)), ($5131, $5132, $5133, $5134, $5135, $5136, $5137, $5138, $5139, $5140, $5141, $5142, $5143, $5144, $5145, $5146, $5147, $5148, $5149, $5150, $5151, $5152, $5153, $5154, $5155, $5156, $5157, $5158, VersionRange($5159, $5160)), ($5161, $5162, $5163, $5164, $5165, $5166, $5167, $5168, $5169, $5170, $5171, $5172, $5173, $5174, $5175, $5176, $5177, $5178, $5179, $5180, $5181, $5182, $5183, $5184, $5185, $5186, $5187, $5188, VersionRange($5189, $5190)), ($5191, $5192, $5193, $5194, $5195, $5196, $5197, $5198, $5199, $5200, $5201, $5202, $5203, $5204, $5205, $5206, $5207, $5208, $5209, $5210, $5211, $5212, $5213, $5214, $5215, $5216, $5217, $5218, VersionRange($5219, $5220)), ($5221, $5222, $5223, $5224, $5225, $5226, $5227, $5228, $5229, $5230, $5231, $5232, $5233, $5234, $5235, $5236, $5237, $5238, $5239, $5240, $5241, $5242, $5243, $5244, $5245, $5246, $5247, $5248, VersionRange($5249, $5250)), ($5251, $5252, $5253, $5254, $5255, $5256, $5257, $5258, $5259, $5260, $5261, $5262, $5263, $5264, $5265, $5266, $5267, $5268, $5269, $5270, $5271, $5272, $5273, $5274, $5275, $5276, $5277, $5278, VersionRange($5279, $5280)), ($5281, $5282, $5283, $5284, $5285, $5286, $5287, $5288, $5289, $5290, $5291, $5292, $5293, $5294, $5295, $5296, $5297, $5298, $5299, $5300, $5301, $5302, $5303, $5304, $5305, $5306, $5307, $5308, VersionRange($5309, $5310)), ($5311, $5312, $5313, $5314, $5315, $5316, $5317, $5318, $5319, $5320, $5321, $5322, $5323, $5324, $5325, $5326, $5327, $5328, $5329, $5330, $5331, $5332, $5333, $5334, $5335, $5336, $5337, $5338, VersionRange($5339, $5340)), ($5341, $5342, $5343, $5344, $5345, $5346, $5347, $5348, $5349, $5350, $5351, $5352, $5353, $5354, $5355, $5356, $5357, $5358, $5359, $5360, $5361, $5362, $5363, $5364, $5365, $5366, $5367, $5368, VersionRange($5369, $5370)), ($5371, $5372, $5373, $5374, $5375, $5376, $5377, $5378, $5379, $5380, $5381, $5382, $5383, $5384, $5385, $5386, $5387, $5388, $5389, $5390, $5391, $5392, $5393, $5394, $5395, $5396, $5397, $5398, VersionRange($5399, $5400)), ($5401, $5402, $5403, $5404, $5405, $5406, $5407, $5408, $5409, $5410, $5411, $5412, $5413, $5414, $5415, $5416, $5417, $5418, $5419, $5420, $5421, $5422, $5423, $5424, $5425, $5426, $5427, $5428, VersionRange($5429, $5430)), ($5431, $5432, $5433, $5434, $5435, $5436, $5437, $5438, $5439, $5440, $5441, $5442, $5443, $5444, $5445, $5446, $5447, $5448, $5449, $5450, $5451, $5452, $5453, $5454, $5455, $5456, $5457, $5458, VersionRange($5459, $5460)), ($5461, $5462, $5463, $5464, $5465, $5466, $5467, $5468, $5469, $5470, $5471, $5472, $5473, $5474, $5475, $5476, $5477, $5478, $5479, $5480, $5481, $5482, $5483, $5484, $5485, $5486, $5487, $5488, VersionRange($5489, $5490)), ($5491, $5492, $5493, $5494, $5495, $5496, $5497, $5498, $5499, $5500, $5501, $5502, $5503, $5504, $5505, $5506, $5507, $5508, $5509, $5510, $5511, $5512, $5513, $5514, $5515, $5516, $5517, $5518, VersionRange($5519, $5520)), ($5521, $5522, $5523, $5524, $5525, $5526, $5527, $5528, $5529, $5530, $5531, $5532, $5533, $5534, $5535, $5536, $5537, $5538, $5539, $5540, $5541, $5542, $5543, $5544, $5545, $5546, $5547, $5548, VersionRange($5549, $5550)), ($5551, $5552, $5553, $5554, $5555, $5556, $5557, $5558, $5559, $5560, $5561, $5562, $5563, $5564, $5565, $5566, $5567, $5568, $5569, $5570, $5571, $5572, $5573, $5574, $5575, $5576, $5577, $5578, VersionRange($5579, $5580)), ($5581, $5582, $5583, $5584, $5585, $5586, $5587, $5588, $5589, $5590, $5591, $5592, $5593, $5594, $5595, $5596, $5597, $5598, $5599, $5600, $5601, $5602, $5603, $5604, $5605, $5606, $5607, $5608, VersionRange($5609, $5610)), ($5611, $5612, $5613, $5614, $5615, $5616, $5617, $5618, $5619, $5620, $5621, $5622, $5623, $5624, $5625, $5626, $5627, $5628, $5629, $5630, $5631, $5632, $5633, $5634, $5635, $5636, $5637, $5638, VersionRange($5639, $5640)), ($5641, $5642, $5643, $5644, $5645, $5646, $5647, $5648, $5649, $5650, $5651, $5652, $5653, $5654, $5655, $5656, $5657, $5658, $5659, $5660, $5661, $5662, $5663, $5664, $5665, $5666, $5667, $5668, VersionRange($5669, $5670)), ($5671, $5672, $5673, $5674, $5675, $5676, $5677, $5678, $5679, $5680, $5681, $5682, $5683, $5684, $5685, $5686, $5687, $5688, $5689, $5690, $5691, $5692, $5693, $5694, $5695, $5696, $5697, $5698, VersionRange($5699, $5700)), ($5701, $5702, $5703, $5704, $5705, $5706, $5707, $5708, $5709, $5710, $5711, $5712, $5713, $5714, $5715, $5716, $5717, $5718, $5719, $5720, $5721, $5722, $5723, $5724, $5725, $5726, $5727, $5728, VersionRange($5729, $5730)), ($5731, $5732, $5733, $5734, $5735, $5736, $5737, $5738, $5739, $5740, $5741, $5742, $5743, $5744, $5745, $5746, $5747, $5748, $5749, $5750, $5751, $5752, $5753, $5754, $5755, $5756, $5757, $5758, VersionRange($5759, $5760)), ($5761, $5762, $5763, $5764, $5765, $5766, $5767, $5768, $5769, $5770, $5771, $5772, $5773, $5774, $5775, $5776, $5777, $5778, $5779, $5780, $5781, $5782, $5783, $5784, $5785, $5786, $5787, $5788, VersionRange($5789, $5790)), ($5791, $5792, $5793, $5794, $5795, $5796, $5797, $5798, $5799, $5800, $5801, $5802, $5803, $5804, $5805, $5806, $5807, $5808, $5809, $5810, $5811, $5812, $5813, $5814, $5815, $5816, $5817, $5818, VersionRange($5819, $5820)), ($5821, $5822, $5823, $5824, $5825, $5826, $5827, $5828, $5829, $5830, $5831, $5832, $5833, $5834, $5835, $5836, $5837, $5838, $5839, $5840, $5841, $5842, $5843, $5844, $5845, $5846, $5847, $5848, VersionRange($5849, $5850)), ($5851, $5852, $5853, $5854, $5855, $5856, $5857, $5858, $5859, $5860, $5861, $5862, $5863, $5864, $5865, $5866, $5867, $5868, $5869, $5870, $5871, $5872, $5873, $5874, $5875, $5876, $5877, $5878, VersionRange($5879, $5880)), ($5881, $5882, $5883, $5884, $5885, $5886, $5887, $5888, $5889, $5890, $5891, $5892, $5893, $5894, $5895, $5896, $5897, $5898, $5899, $5900, $5901, $5902, $5903, $5904, $5905, $5906, $5907, $5908, VersionRange($5909, $5910)), ($5911, $5912, $5913, $5914, $5915, $5916, $5917, $5918, $5919, $5920, $5921, $5922, $5923, $5924, $5925, $5926, $5927, $5928, $5929, $5930, $5931, $5932, $5933, $5934, $5935, $5936, $5937, $5938, VersionRange($5939, $5940)), ($5941, $5942, $5943, $5944, $5945, $5946, $5947, $5948, $5949, $5950, $5951, $5952, $5953, $5954, $5955, $5956, $5957, $5958, $5959, $5960, $5961, $5962, $5963, $5964, $5965, $5966, $5967, $5968, VersionRange($5969, $5970)), ($5971, $5972, $5973, $5974, $5975, $5976, $5977, $5978, $5979, $5980, $5981, $5982, $5983, $5984, $5985, $5986, $5987, $5988, $5989, $5990, $5991, $5992, $5993, $5994, $5995, $5996, $5997, $5998, VersionRange($5999, $6000)), ($6001, $6002, $6003, $6004, $6005, $6006, $6007, $6008, $6009, $6010, $6011, $6012, $6013, $6014, $6015, $6016, $6017, $6018, $6019, $6020, $6021, $6022, $6023, $6024, $6025, $6026, $6027, $6028, VersionRange($6029, $6030)), ($6031, $6032, $6033, $6034, $6035, $6036, $6037, $6038, $6039, $6040, $6041, $6042, $6043, $6044, $6045, $6046, $6047, $6048, $6049, $6050, $6051, $6052, $6053, $6054, $6055, $6056, $6057, $6058, VersionRange($6059, $6060)), ($6061, $6062, $6063, $6064, $6065, $6066, $6067, $6068, $6069, $6070, $6071, $6072, $6073, $6074, $6075, $6076, $6077, $6078, $6079, $6080, $6081, $6082, $6083, $6084, $6085, $6086, $6087, $6088, VersionRange($6089, $6090)), ($6091, $6092, $6093, $6094, $6095, $6096, $6097, $6098, $6099, $6100, $6101, $6102, $6103, $6104, $6105, $6106, $6107, $6108, $6109, $6110, $6111, $6112, $6113, $6114, $6115, $6116, $6117, $6118, VersionRange($6119, $6120)), ($6121, $6122, $6123, $6124, $6125, $6126, $6127, $6128, $6129, $6130, $6131, $6132, $6133, $6134, $6135, $6136, $6137, $6138, $6139, $6140, $6141, $6142, $6143, $6144, $6145, $6146, $6147, $6148, VersionRange($6149, $6150)), ($6151, $6152, $6153, $6154, $6155, $6156, $6157, $6158, $6159, $6160, $6161, $6162, $6163, $6164, $6165, $6166, $6167, $6168, $6169, $6170, $6171, $6172, $6173, $6174, $6175, $6176, $6177, $6178, VersionRange($6179, $6180)), ($6181, $6182, $6183, $6184, $6185, $6186, $6187, $6188, $6189, $6190, $6191, $6192, $6193, $6194, $6195, $6196, $6197, $6198, $6199, $6200, $6201, $6202, $6203, $6204, $6205, $6206, $6207, $6208, VersionRange($6209, $6210)), ($6211, $6212, $6213, $6214, $6215, $6216, $6217, $6218, $6219, $6220, $6221, $6222, $6223, $6224, $6225, $6226, $6227, $6228, $6229, $6230, $6231, $6232, $6233, $6234, $6235, $6236, $6237, $6238, VersionRange($6239, $6240)), ($6241, $6242, $6243, $6244, $6245, $6246, $6247, $6248, $6249, $6250, $6251, $6252, $6253, $6254, $6255, $6256, $6257, $6258, $6259, $6260, $6261, $6262, $6263, $6264, $6265, $6266, $6267, $6268, VersionRange($6269, $6270)), ($6271, $6272, $6273, $6274, $6275, $6276, $6277, $6278, $6279, $6280, $6281, $6282, $6283, $6284, $6285, $6286, $6287, $6288, $6289, $6290, $6291, $6292, $6293, $6294, $6295, $6296, $6297, $6298, VersionRange($6299, $6300)), ($6301, $6302, $6303, $6304, $6305, $6306, $6307, $6308, $6309, $6310, $6311, $6312, $6313, $6314, $6315, $6316, $6317, $6318, $6319, $6320, $6321, $6322, $6323, $6324, $6325, $6326, $6327, $6328, VersionRange($6329, $6330)), ($6331, $6332, $6333, $6334, $6335, $6336, $6337, $6338, $6339, $6340, $6341, $6342, $6343, $6344, $6345, $6346, $6347, $6348, $6349, $6350, $6351, $6352, $6353, $6354, $6355, $6356, $6357, $6358, VersionRange($6359, $6360)), ($6361, $6362, $6363, $6364, $6365, $6366, $6367, $6368, $6369, $6370, $6371, $6372, $6373, $6374, $6375, $6376, $6377, $6378, $6379, $6380, $6381, $6382, $6383, $6384, $6385, $6386, $6387, $6388, VersionRange($6389, $6390)), ($6391, $6392, $6393, $6394, $6395, $6396, $6397, $6398, $6399, $6400, $6401, $6402, $6403, $6404, $6405, $6406, $6407, $6408, $6409, $6410, $6411, $6412, $6413, $6414, $6415, $6416, $6417, $6418, VersionRange($6419, $6420)), ($6421, $6422, $6423, $6424, $6425, $6426, $6427, $6428, $6429, $6430, $6431, $6432, $6433, $6434, $6435, $6436, $6437, $6438, $6439, $6440, $6441, $6442, $6443, $6444, $6445, $6446, $6447, $6448, VersionRange($6449, $6450)), ($6451, $6452, $6453, $6454, $6455, $6456, $6457, $6458, $6459, $6460, $6461, $6462, $6463, $6464, $6465, $6466, $6467, $6468, $6469, $6470, $6471, $6472, $6473, $6474, $6475, $6476, $6477, $6478, VersionRange($6479, $6480)), ($6481, $6482, $6483, $6484, $6485, $6486, $6487, $6488, $6489, $6490, $6491, $6492, $6493, $6494, $6495, $6496, $6497, $6498, $6499, $6500, $6501, $6502, $6503, $6504, $6505, $6506, $6507, $6508, VersionRange($6509, $6510)), ($6511, $6512, $6513, $6514, $6515, $6516, $6517, $6518, $6519, $6520, $6521, $6522, $6523, $6524, $6525, $6526, $6527, $6528, $6529, $6530, $6531, $6532, $6533, $6534, $6535, $6536, $6537, $6538, VersionRange($6539, $6540)), ($6541, $6542, $6543, $6544, $6545, $6546, $6547, $6548, $6549, $6550, $6551, $6552, $6553, $6554, $6555, $6556, $6557, $6558, $6559, $6560, $6561, $6562, $6563, $6564, $6565, $6566, $6567, $6568, VersionRange($6569, $6570)), ($6571, $6572, $6573, $6574, $6575, $6576, $6577, $6578, $6579, $6580, $6581, $6582, $6583, $6584, $6585, $6586, $6587, $6588, $6589, $6590, $6591, $6592, $6593, $6594, $6595, $6596, $6597, $6598, VersionRange($6599, $6600)), ($6601, $6602, $6603, $6604, $6605, $6606, $6607, $6608, $6609, $6610, $6611, $6612, $6613, $6614, $6615, $6616, $6617, $6618, $6619, $6620, $6621, $6622, $6623, $6624, $6625, $6626, $6627, $6628, VersionRange($6629, $6630)), ($6631, $6632, $6633, $6634, $6635, $6636, $6637, $6638, $6639, $6640, $6641, $6642, $6643, $6644, $6645, $6646, $6647, $6648, $6649, $6650, $6651, $6652, $6653, $6654, $6655, $6656, $6657, $6658, VersionRange($6659, $6660)), ($6661, $6662, $6663, $6664, $6665, $6666, $6667, $6668, $6669, $6670, $6671, $6672, $6673, $6674, $6675, $6676, $6677, $6678, $6679, $6680, $6681, $6682, $6683, $6684, $6685, $6686, $6687, $6688, VersionRange($6689, $6690)), ($6691, $6692, $6693, $6694, $6695, $6696, $6697, $6698, $6699, $6700, $6701, $6702, $6703, $6704, $6705, $6706, $6707, $6708, $6709, $6710, $6711, $6712, $6713, $6714, $6715, $6716, $6717, $6718, VersionRange($6719, $6720)), ($6721, $6722, $6723, $6724, $6725, $6726, $6727, $6728, $6729, $6730, $6731, $6732, $6733, $6734, $6735, $6736, $6737, $6738, $6739, $6740, $6741, $6742, $6743, $6744, $6745, $6746, $6747, $6748, VersionRange($6749, $6750)), ($6751, $6752, $6753, $6754, $6755, $6756, $6757, $6758, $6759, $6760, $6761, $6762, $6763, $6764, $6765, $6766, $6767, $6768, $6769, $6770, $6771, $6772, $6773, $6774, $6775, $6776, $6777, $6778, VersionRange($6779, $6780)), ($6781, $6782, $6783, $6784, $6785, $6786, $6787, $6788, $6789, $6790, $6791, $6792, $6793, $6794, $6795, $6796, $6797, $6798, $6799, $6800, $6801, $6802, $6803, $6804, $6805, $6806, $6807, $6808, VersionRange($6809, $6810)), ($6811, $6812, $6813, $6814, $6815, $6816, $6817, $6818, $6819, $6820, $6821, $6822, $6823, $6824, $6825, $6826, $6827, $6828, $6829, $6830, $6831, $6832, $6833, $6834, $6835, $6836, $6837, $6838, VersionRange($6839, $6840)), ($6841, $6842, $6843, $6844, $6845, $6846, $6847, $6848, $6849, $6850, $6851, $6852, $6853, $6854, $6855, $6856, $6857, $6858, $6859, $6860, $6861, $6862, $6863, $6864, $6865, $6866, $6867, $6868, VersionRange($6869, $6870)), ($6871, $6872, $6873, $6874, $6875, $6876, $6877, $6878, $6879, $6880, $6881, $6882, $6883, $6884, $6885, $6886, $6887, $6888, $6889, $6890, $6891, $6892, $6893, $6894, $6895, $6896, $6897, $6898, VersionRange($6899, $6900)), ($6901, $6902, $6903, $6904, $6905, $6906, $6907, $6908, $6909, $6910, $6911, $6912, $6913, $6914, $6915, $6916, $6917, $6918, $6919, $6920, $6921, $6922, $6923, $6924, $6925, $6926, $6927, $6928, VersionRange($6929, $6930)), ($6931, $6932, $6933, $6934, $6935, $6936, $6937, $6938, $6939, $6940, $6941, $6942, $6943, $6944, $6945, $6946, $6947, $6948, $6949, $6950, $6951, $6952, $6953, $6954, $6955, $6956, $6957, $6958, VersionRange($6959, $6960)), ($6961, $6962, $6963, $6964, $6965, $6966, $6967, $6968, $6969, $6970, $6971, $6972, $6973, $6974, $6975, $6976, $6977, $6978, $6979, $6980, $6981, $6982, $6983, $6984, $6985, $6986, $6987, $6988, VersionRange($6989, $6990)), ($6991, $6992, $6993, $6994, $6995, $6996, $6997, $6998, $6999, $7000, $7001, $7002, $7003, $7004, $7005, $7006, $7007, $7008, $7009, $7010, $7011, $7012, $7013, $7014, $7015, $7016, $7017, $7018, VersionRange($7019, $7020)), ($7021, $7022, $7023, $7024, $7025, $7026, $7027, $7028, $7029, $7030, $7031, $7032, $7033, $7034, $7035, $7036, $7037, $7038, $7039, $7040, $7041, $7042, $7043, $7044, $7045, $7046, $7047, $7048, VersionRange($7049, $7050)), ($7051, $7052, $7053, $7054, $7055, $7056, $7057, $7058, $7059, $7060, $7061, $7062, $7063, $7064, $7065, $7066, $7067, $7068, $7069, $7070, $7071, $7072, $7073, $7074, $7075, $7076, $7077, $7078, VersionRange($7079, $7080)), ($7081, $7082, $7083, $7084, $7085, $7086, $7087, $7088, $7089, $7090, $7091, $7092, $7093, $7094, $7095, $7096, $7097, $7098, $7099, $7100, $7101, $7102, $7103, $7104, $7105, $7106, $7107, $7108, VersionRange($7109, $7110)), ($7111, $7112, $7113, $7114, $7115, $7116, $7117, $7118, $7119, $7120, $7121, $7122, $7123, $7124, $7125, $7126, $7127, $7128, $7129, $7130, $7131, $7132, $7133, $7134, $7135, $7136, $7137, $7138, VersionRange($7139, $7140)), ($7141, $7142, $7143, $7144, $7145, $7146, $7147, $7148, $7149, $7150, $7151, $7152, $7153, $7154, $7155, $7156, $7157, $7158, $7159, $7160, $7161, $7162, $7163, $7164, $7165, $7166, $7167, $7168, VersionRange($7169, $7170)), ($7171, $7172, $7173, $7174, $7175, $7176, $7177, $7178, $7179, $7180, $7181, $7182, $7183, $7184, $7185, $7186, $7187, $7188, $7189, $7190, $7191, $7192, $7193, $7194, $7195, $7196, $7197, $7198, VersionRange($7199, $7200)), ($7201, $7202, $7203, $7204, $7205, $7206, $7207, $7208, $7209, $7210, $7211, $7212, $7213, $7214, $7215, $7216, $7217, $7218, $7219, $7220, $7221, $7222, $7223, $7224, $7225, $7226, $7227, $7228, VersionRange($7229, $7230)), ($7231, $7232, $7233, $7234, $7235, $7236, $7237, $7238, $7239, $7240, $7241, $7242, $7243, $7244, $7245, $7246, $7247, $7248, $7249, $7250, $7251, $7252, $7253, $7254, $7255, $7256, $7257, $7258, VersionRange($7259, $7260)), ($7261, $7262, $7263, $7264, $7265, $7266, $7267, $7268, $7269, $7270, $7271, $7272, $7273, $7274, $7275, $7276, $7277, $7278, $7279, $7280, $7281, $7282, $7283, $7284, $7285, $7286, $7287, $7288, VersionRange($7289, $7290)), ($7291, $7292, $7293, $7294, $7295, $7296, $7297, $7298, $7299, $7300, $7301, $7302, $7303, $7304, $7305, $7306, $7307, $7308, $7309, $7310, $7311, $7312, $7313, $7314, $7315, $7316, $7317, $7318, VersionRange($7319, $7320)), ($7321, $7322, $7323, $7324, $7325, $7326, $7327, $7328, $7329, $7330, $7331, $7332, $7333, $7334, $7335, $7336, $7337, $7338, $7339, $7340, $7341, $7342, $7343, $7344, $7345, $7346, $7347, $7348, VersionRange($7349, $7350)), ($7351, $7352, $7353, $7354, $7355, $7356, $7357, $7358, $7359, $7360, $7361, $7362, $7363, $7364, $7365, $7366, $7367, $7368, $7369, $7370, $7371, $7372, $7373, $7374, $7375, $7376, $7377, $7378, VersionRange($7379, $7380)), ($7381, $7382, $7383, $7384, $7385, $7386, $7387, $7388, $7389, $7390, $7391, $7392, $7393, $7394, $7395, $7396, $7397, $7398, $7399, $7400, $7401, $7402, $7403, $7404, $7405, $7406, $7407, $7408, VersionRange($7409, $7410)), ($7411, $7412, $7413, $7414, $7415, $7416, $7417, $7418, $7419, $7420, $7421, $7422, $7423, $7424, $7425, $7426, $7427, $7428, $7429, $7430, $7431, $7432, $7433, $7434, $7435, $7436, $7437, $7438, VersionRange($7439, $7440)), ($7441, $7442, $7443, $7444, $7445, $7446, $7447, $7448, $7449, $7450, $7451, $7452, $7453, $7454, $7455, $7456, $7457, $7458, $7459, $7460, $7461, $7462, $7463, $7464, $7465, $7466, $7467, $7468, VersionRange($7469, $7470)), ($7471, $7472, $7473, $7474, $7475, $7476, $7477, $7478, $7479, $7480, $7481, $7482, $7483, $7484, $7485, $7486, $7487, $7488, $7489, $7490, $7491, $7492, $7493, $7494, $7495, $7496, $7497, $7498, VersionRange($7499, $7500)), ($7501, $7502, $7503, $7504, $7505, $7506, $7507, $7508, $7509, $7510, $7511, $7512, $7513, $7514, $7515, $7516, $7517, $7518, $7519, $7520, $7521, $7522, $7523, $7524, $7525, $7526, $7527, $7528, VersionRange($7529, $7530)), ($7531, $7532, $7533, $7534, $7535, $7536, $7537, $7538, $7539, $7540, $7541, $7542, $7543, $7544, $7545, $7546, $7547, $7548, $7549, $7550, $7551, $7552, $7553, $7554, $7555, $7556, $7557, $7558, VersionRange($7559, $7560)), ($7561, $7562, $7563, $7564, $7565, $7566, $7567, $7568, $7569, $7570, $7571, $7572, $7573, $7574, $7575, $7576, $7577, $7578, $7579, $7580, $7581, $7582, $7583, $7584, $7585, $7586, $7587, $7588, VersionRange($7589, $7590)), ($7591, $7592, $7593, $7594, $7595, $7596, $7597, $7598, $7599, $7600, $7601, $7602, $7603, $7604, $7605, $7606, $7607, $7608, $7609, $7610, $7611, $7612, $7613, $7614, $7615, $7616, $7617, $7618, VersionRange($7619, $7620)), ($7621, $7622, $7623, $7624, $7625, $7626, $7627, $7628, $7629, $7630, $7631, $7632, $7633, $7634, $7635, $7636, $7637, $7638, $7639, $7640, $7641, $7642, $7643, $7644, $7645, $7646, $7647, $7648, VersionRange($7649, $7650)), ($7651, $7652, $7653, $7654, $7655, $7656, $7657, $7658, $7659, $7660, $7661, $7662, $7663, $7664, $7665, $7666, $7667, $7668, $7669, $7670, $7671, $7672, $7673, $7674, $7675, $7676, $7677, $7678, VersionRange($7679, $7680)), ($7681, $7682, $7683, $7684, $7685, $7686, $7687, $7688, $7689, $7690, $7691, $7692, $7693, $7694, $7695, $7696, $7697, $7698, $7699, $7700, $7701, $7702, $7703, $7704, $7705, $7706, $7707, $7708, VersionRange($7709, $7710)), ($7711, $7712, $7713, $7714, $7715, $7716, $7717, $7718, $7719, $7720, $7721, $7722, $7723, $7724, $7725, $7726, $7727, $7728, $7729, $7730, $7731, $7732, $7733, $7734, $7735, $7736, $7737, $7738, VersionRange($7739, $7740)), ($7741, $7742, $7743, $7744, $7745, $7746, $7747, $7748, $7749, $7750, $7751, $7752, $7753, $7754, $7755, $7756, $7757, $7758, $7759, $7760, $7761, $7762, $7763, $7764, $7765, $7766, $7767, $7768, VersionRange($7769, $7770)), ($7771, $7772, $7773, $7774, $7775, $7776, $7777, $7778, $7779, $7780, $7781, $7782, $7783, $7784, $7785, $7786, $7787, $7788, $7789, $7790, $7791, $7792, $7793, $7794, $7795, $7796, $7797, $7798, VersionRange($7799, $7800)), ($7801, $7802, $7803, $7804, $7805, $7806, $7807, $7808, $7809, $7810, $7811, $7812, $7813, $7814, $7815, $7816, $7817, $7818, $7819, $7820, $7821, $7822, $7823, $7824, $7825, $7826, $7827, $7828, VersionRange($7829, $7830)), ($7831, $7832, $7833, $7834, $7835, $7836, $7837, $7838, $7839, $7840, $7841, $7842, $7843, $7844, $7845, $7846, $7847, $7848, $7849, $7850, $7851, $7852, $7853, $7854, $7855, $7856, $7857, $7858, VersionRange($7859, $7860)), ($7861, $7862, $7863, $7864, $7865, $7866, $7867, $7868, $7869, $7870, $7871, $7872, $7873, $7874, $7875, $7876, $7877, $7878, $7879, $7880, $7881, $7882, $7883, $7884, $7885, $7886, $7887, $7888, VersionRange($7889, $7890)), ($7891, $7892, $7893, $7894, $7895, $7896, $7897, $7898, $7899, $7900, $7901, $7902, $7903, $7904, $7905, $7906, $7907, $7908, $7909, $7910, $7911, $7912, $7913, $7914, $7915, $7916, $7917, $7918, VersionRange($7919, $7920)), ($7921, $7922, $7923, $7924, $7925, $7926, $7927, $7928, $7929, $7930, $7931, $7932, $7933, $7934, $7935, $7936, $7937, $7938, $7939, $7940, $7941, $7942, $7943, $7944, $7945, $7946, $7947, $7948, VersionRange($7949, $7950)), ($7951, $7952, $7953, $7954, $7955, $7956, $7957, $7958, $7959, $7960, $7961, $7962, $7963, $7964, $7965, $7966, $7967, $7968, $7969, $7970, $7971, $7972, $7973, $7974, $7975, $7976, $7977, $7978, VersionRange($7979, $7980)), ($7981, $7982, $7983, $7984, $7985, $7986, $7987, $7988, $7989, $7990, $7991, $7992, $7993, $7994, $7995, $7996, $7997, $7998, $7999, $8000, $8001, $8002, $8003, $8004, $8005, $8006, $8007, $8008, VersionRange($8009, $8010)), ($8011, $8012, $8013, $8014, $8015, $8016, $8017, $8018, $8019, $8020, $8021, $8022, $8023, $8024, $8025, $8026, $8027, $8028, $8029, $8030, $8031, $8032, $8033, $8034, $8035, $8036, $8037, $8038, VersionRange($8039, $8040)), ($8041, $8042, $8043, $8044, $8045, $8046, $8047, $8048, $8049, $8050, $8051, $8052, $8053, $8054, $8055, $8056, $8057, $8058, $8059, $8060, $8061, $8062, $8063, $8064, $8065, $8066, $8067, $8068, VersionRange($8069, $8070)), ($8071, $8072, $8073, $8074, $8075, $8076, $8077, $8078, $8079, $8080, $8081, $8082, $8083, $8084, $8085, $8086, $8087, $8088, $8089, $8090, $8091, $8092, $8093, $8094, $8095, $8096, $8097, $8098, VersionRange($8099, $8100)), ($8101, $8102, $8103, $8104, $8105, $8106, $8107, $8108, $8109, $8110, $8111, $8112, $8113, $8114, $8115, $8116, $8117, $8118, $8119, $8120, $8121, $8122, $8123, $8124, $8125, $8126, $8127, $8128, VersionRange($8129, $8130)), ($8131, $8132, $8133, $8134, $8135, $8136, $8137, $8138, $8139, $8140, $8141, $8142, $8143, $8144, $8145, $8146, $8147, $8148, $8149, $8150, $8151, $8152, $8153, $8154, $8155, $8156, $8157, $8158, VersionRange($8159, $8160)), ($8161, $8162, $8163, $8164, $8165, $8166, $8167, $8168, $8169, $8170, $8171, $8172, $8173, $8174, $8175, $8176, $8177, $8178, $8179, $8180, $8181, $8182, $8183, $8184, $8185, $8186, $8187, $8188, VersionRange($8189, $8190)), ($8191, $8192, $8193, $8194, $8195, $8196, $8197, $8198, $8199, $8200, $8201, $8202, $8203, $8204, $8205, $8206, $8207, $8208, $8209, $8210, $8211, $8212, $8213, $8214, $8215, $8216, $8217, $8218, VersionRange($8219, $8220)), ($8221, $8222, $8223, $8224, $8225, $8226, $8227, $8228, $8229, $8230, $8231, $8232, $8233, $8234, $8235, $8236, $8237, $8238, $8239, $8240, $8241, $8242, $8243, $8244, $8245, $8246, $8247, $8248, VersionRange($8249, $8250)), ($8251, $8252, $8253, $8254, $8255, $8256, $8257, $8258, $8259, $8260, $8261, $8262, $8263, $8264, $8265, $8266, $8267, $8268, $8269, $8270, $8271, $8272, $8273, $8274, $8275, $8276, $8277, $8278, VersionRange($8279, $8280)), ($8281, $8282, $8283, $8284, $8285, $8286, $8287, $8288, $8289, $8290, $8291, $8292, $8293, $8294, $8295, $8296, $8297, $8298, $8299, $8300, $8301, $8302, $8303, $8304, $8305, $8306, $8307, $8308, VersionRange($8309, $8310)), ($8311, $8312, $8313, $8314, $8315, $8316, $8317, $8318, $8319, $8320, $8321, $8322, $8323, $8324, $8325, $8326, $8327, $8328, $8329, $8330, $8331, $8332, $8333, $8334, $8335, $8336, $8337, $8338, VersionRange($8339, $8340)), ($8341, $8342, $8343, $8344, $8345, $8346, $8347, $8348, $8349, $8350, $8351, $8352, $8353, $8354, $8355, $8356, $8357, $8358, $8359, $8360, $8361, $8362, $8363, $8364, $8365, $8366, $8367, $8368, VersionRange($8369, $8370)), ($8371, $8372, $8373, $8374, $8375, $8376, $8377, $8378, $8379, $8380, $8381, $8382, $8383, $8384, $8385, $8386, $8387, $8388, $8389, $8390, $8391, $8392, $8393, $8394, $8395, $8396, $8397, $8398, VersionRange($8399, $8400)), ($8401, $8402, $8403, $8404, $8405, $8406, $8407, $8408, $8409, $8410, $8411, $8412, $8413, $8414, $8415, $8416, $8417, $8418, $8419, $8420, $8421, $8422, $8423, $8424, $8425, $8426, $8427, $8428, VersionRange($8429, $8430)), ($8431, $8432, $8433, $8434, $8435, $8436, $8437, $8438, $8439, $8440, $8441, $8442, $8443, $8444, $8445, $8446, $8447, $8448, $8449, $8450, $8451, $8452, $8453, $8454, $8455, $8456, $8457, $8458, VersionRange($8459, $8460)), ($8461, $8462, $8463, $8464, $8465, $8466, $8467, $8468, $8469, $8470, $8471, $8472, $8473, $8474, $8475, $8476, $8477, $8478, $8479, $8480, $8481, $8482, $8483, $8484, $8485, $8486, $8487, $8488, VersionRange($8489, $8490)), ($8491, $8492, $8493, $8494, $8495, $8496, $8497, $8498, $8499, $8500, $8501, $8502, $8503, $8504, $8505, $8506, $8507, $8508, $8509, $8510, $8511, $8512, $8513, $8514, $8515, $8516, $8517, $8518, VersionRange($8519, $8520)), ($8521, $8522, $8523, $8524, $8525, $8526, $8527, $8528, $8529, $8530, $8531, $8532, $8533, $8534, $8535, $8536, $8537, $8538, $8539, $8540, $8541, $8542, $8543, $8544, $8545, $8546, $8547, $8548, VersionRange($8549, $8550)), ($8551, $8552, $8553, $8554, $8555, $8556, $8557, $8558, $8559, $8560, $8561, $8562, $8563, $8564, $8565, $8566, $8567, $8568, $8569, $8570, $8571, $8572, $8573, $8574, $8575, $8576, $8577, $8578, VersionRange($8579, $8580)), ($8581, $8582, $8583, $8584, $8585, $8586, $8587, $8588, $8589, $8590, $8591, $8592, $8593, $8594, $8595, $8596, $8597, $8598, $8599, $8600, $8601, $8602, $8603, $8604, $8605, $8606, $8607, $8608, VersionRange($8609, $8610)), ($8611, $8612, $8613, $8614, $8615, $8616, $8617, $8618, $8619, $8620, $8621, $8622, $8623, $8624, $8625, $8626, $8627, $8628, $8629, $8630, $8631, $8632, $8633, $8634, $8635, $8636, $8637, $8638, VersionRange($8639, $8640)), ($8641, $8642, $8643, $8644, $8645, $8646, $8647, $8648, $8649, $8650, $8651, $8652, $8653, $8654, $8655, $8656, $8657, $8658, $8659, $8660, $8661, $8662, $8663, $8664, $8665, $8666, $8667, $8668, VersionRange($8669, $8670)), ($8671, $8672, $8673, $8674, $8675, $8676, $8677, $8678, $8679, $8680, $8681, $8682, $8683, $8684, $8685, $8686, $8687, $8688, $8689, $8690, $8691, $8692, $8693, $8694, $8695, $8696, $8697, $8698, VersionRange($8699, $8700)), ($8701, $8702, $8703, $8704, $8705, $8706, $8707, $8708, $8709, $8710, $8711, $8712, $8713, $8714, $8715, $8716, $8717, $8718, $8719, $8720, $8721, $8722, $8723, $8724, $8725, $8726, $8727, $8728, VersionRange($8729, $8730)), ($8731, $8732, $8733, $8734, $8735, $8736, $8737, $8738, $8739, $8740, $8741, $8742, $8743, $8744, $8745, $8746, $8747, $8748, $8749, $8750, $8751, $8752, $8753, $8754, $8755, $8756, $8757, $8758, VersionRange($8759, $8760)), ($8761, $8762, $8763, $8764, $8765, $8766, $8767, $8768, $8769, $8770, $8771, $8772, $8773, $8774, $8775, $8776, $8777, $8778, $8779, $8780, $8781, $8782, $8783, $8784, $8785, $8786, $8787, $8788, VersionRange($8789, $8790)), ($8791, $8792, $8793, $8794, $8795, $8796, $8797, $8798, $8799, $8800, $8801, $8802, $8803, $8804, $8805, $8806, $8807, $8808, $8809, $8810, $8811, $8812, $8813, $8814, $8815, $8816, $8817, $8818, VersionRange($8819, $8820)), ($8821, $8822, $8823, $8824, $8825, $8826, $8827, $8828, $8829, $8830, $8831, $8832, $8833, $8834, $8835, $8836, $8837, $8838, $8839, $8840, $8841, $8842, $8843, $8844, $8845, $8846, $8847, $8848, VersionRange($8849, $8850)), ($8851, $8852, $8853, $8854, $8855, $8856, $8857, $8858, $8859, $8860, $8861, $8862, $8863, $8864, $8865, $8866, $8867, $8868, $8869, $8870, $8871, $8872, $8873, $8874, $8875, $8876, $8877, $8878, VersionRange($8879, $8880)), ($8881, $8882, $8883, $8884, $8885, $8886, $8887, $8888, $8889, $8890, $8891, $8892, $8893, $8894, $8895, $8896, $8897, $8898, $8899, $8900, $8901, $8902, $8903, $8904, $8905, $8906, $8907, $8908, VersionRange($8909, $8910)), ($8911, $8912, $8913, $8914, $8915, $8916, $8917, $8918, $8919, $8920, $8921, $8922, $8923, $8924, $8925, $8926, $8927, $8928, $8929, $8930, $8931, $8932, $8933, $8934, $8935, $8936, $8937, $8938, VersionRange($8939, $8940)), ($8941, $8942, $8943, $8944, $8945, $8946, $8947, $8948, $8949, $8950, $8951, $8952, $8953, $8954, $8955, $8956, $8957, $8958, $8959, $8960, $8961, $8962, $8963, $8964, $8965, $8966, $8967, $8968, VersionRange($8969, $8970)), ($8971, $8972, $8973, $8974, $8975, $8976, $8977, $8978, $8979, $8980, $8981, $8982, $8983, $8984, $8985, $8986, $8987, $8988, $8989, $8990, $8991, $8992, $8993, $8994, $8995, $8996, $8997, $8998, VersionRange($8999, $9000)), ($9001, $9002, $9003, $9004, $9005, $9006, $9007, $9008, $9009, $9010, $9011, $9012, $9013, $9014, $9015, $9016, $9017, $9018, $9019, $9020, $9021, $9022, $9023, $9024, $9025, $9026, $9027, $9028, VersionRange($9029, $9030)), ($9031, $9032, $9033, $9034, $9035, $9036, $9037, $9038, $9039, $9040, $9041, $9042, $9043, $9044, $9045, $9046, $9047, $9048, $9049, $9050, $9051, $9052, $9053, $9054, $9055, $9056, $9057, $9058, VersionRange($9059, $9060)), ($9061, $9062, $9063, $9064, $9065, $9066, $9067, $9068, $9069, $9070, $9071, $9072, $9073, $9074, $9075, $9076, $9077, $9078, $9079, $9080, $9081, $9082, $9083, $9084, $9085, $9086, $9087, $9088, VersionRange($9089, $9090)), ($9091, $9092, $9093, $9094, $9095, $9096, $9097, $9098, $9099, $9100, $9101, $9102, $9103, $9104, $9105, $9106, $9107, $9108, $9109, $9110, $9111, $9112, $9113, $9114, $9115, $9116, $9117, $9118, VersionRange($9119, $9120)), ($9121, $9122, $9123, $9124, $9125, $9126, $9127, $9128, $9129, $9130, $9131, $9132, $9133, $9134, $9135, $9136, $9137, $9138, $9139, $9140, $9141, $9142, $9143, $9144, $9145, $9146, $9147, $9148, VersionRange($9149, $9150)), ($9151, $9152, $9153, $9154, $9155, $9156, $9157, $9158, $9159, $9160, $9161, $9162, $9163, $9164, $9165, $9166, $9167, $9168, $9169, $9170, $9171, $9172, $9173, $9174, $9175, $9176, $9177, $9178, VersionRange($9179, $9180)), ($9181, $9182, $9183, $9184, $9185, $9186, $9187, $9188, $9189, $9190, $9191, $9192, $9193, $9194, $9195, $9196, $9197, $9198, $9199, $9200, $9201, $9202, $9203, $9204, $9205, $9206, $9207, $9208, VersionRange($9209, $9210)), ($9211, $9212, $9213, $9214, $9215, $9216, $9217, $9218, $9219, $9220, $9221, $9222, $9223, $9224, $9225, $9226, $9227, $9228, $9229, $9230, $9231, $9232, $9233, $9234, $9235, $9236, $9237, $9238, VersionRange($9239, $9240)), ($9241, $9242, $9243, $9244, $9245, $9246, $9247, $9248, $9249, $9250, $9251, $9252, $9253, $9254, $9255, $9256, $9257, $9258, $9259, $9260, $9261, $9262, $9263, $9264, $9265, $9266, $9267, $9268, VersionRange($9269, $9270)), ($9271, $9272, $9273, $9274, $9275, $9276, $9277, $9278, $9279, $9280, $9281, $9282, $9283, $9284, $9285, $9286, $9287, $9288, $9289, $9290, $9291, $9292, $9293, $9294, $9295, $9296, $9297, $9298, VersionRange($9299, $9300)), ($9301, $9302, $9303, $9304, $9305, $9306, $9307, $9308, $9309, $9310, $9311, $9312, $9313, $9314, $9315, $9316, $9317, $9318, $9319, $9320, $9321, $9322, $9323, $9324, $9325, $9326, $9327, $9328, VersionRange($9329, $9330)), ($9331, $9332, $9333, $9334, $9335, $9336, $9337, $9338, $9339, $9340, $9341, $9342, $9343, $9344, $9345, $9346, $9347, $9348, $9349, $9350, $9351, $9352, $9353, $9354, $9355, $9356, $9357, $9358, VersionRange($9359, $9360)), ($9361, $9362, $9363, $9364, $9365, $9366, $9367, $9368, $9369, $9370, $9371, $9372, $9373, $9374, $9375, $9376, $9377, $9378, $9379, $9380, $9381, $9382, $9383, $9384, $9385, $9386, $9387, $9388, VersionRange($9389, $9390)), ($9391, $9392, $9393, $9394, $9395, $9396, $9397, $9398, $9399, $9400, $9401, $9402, $9403, $9404, $9405, $9406, $9407, $9408, $9409, $9410, $9411, $9412, $9413, $9414, $9415, $9416, $9417, $9418, VersionRange($9419, $9420)), ($9421, $9422, $9423, $9424, $9425, $9426, $9427, $9428, $9429, $9430, $9431, $9432, $9433, $9434, $9435, $9436, $9437, $9438, $9439, $9440, $9441, $9442, $9443, $9444, $9445, $9446, $9447, $9448, VersionRange($9449, $9450)), ($9451, $9452, $9453, $9454, $9455, $9456, $9457, $9458, $9459, $9460, $9461, $9462, $9463, $9464, $9465, $9466, $9467, $9468, $9469, $9470, $9471, $9472, $9473, $9474, $9475, $9476, $9477, $9478, VersionRange($9479, $9480)), ($9481, $9482, $9483, $9484, $9485, $9486, $9487, $9488, $9489, $9490, $9491, $9492, $9493, $9494, $9495, $9496, $9497, $9498, $9499, $9500, $9501, $9502, $9503, $9504, $9505, $9506, $9507, $9508, VersionRange($9509, $9510)), ($9511, $9512, $9513, $9514, $9515, $9516, $9517, $9518, $9519, $9520, $9521, $9522, $9523, $9524, $9525, $9526, $9527, $9528, $9529, $9530, $9531, $9532, $9533, $9534, $9535, $9536, $9537, $9538, VersionRange($9539, $9540)), ($9541, $9542, $9543, $9544, $9545, $9546, $9547, $9548, $9549, $9550, $9551, $9552, $9553, $9554, $9555, $9556, $9557, $9558, $9559, $9560, $9561, $9562, $9563, $9564, $9565, $9566, $9567, $9568, VersionRange($9569, $9570)), ($9571, $9572, $9573, $9574, $9575, $9576, $9577, $9578, $9579, $9580, $9581, $9582, $9583, $9584, $9585, $9586, $9587, $9588, $9589, $9590, $9591, $9592, $9593, $9594, $9595, $9596, $9597, $9598, VersionRange($9599, $9600)), ($9601, $9602, $9603, $9604, $9605, $9606, $9607, $9608, $9609, $9610, $9611, $9612, $9613, $9614, $9615, $9616, $9617, $9618, $9619, $9620, $9621, $9622, $9623, $9624, $9625, $9626, $9627, $9628, VersionRange($9629, $9630)), ($9631, $9632, $9633, $9634, $9635, $9636, $9637, $9638, $9639, $9640, $9641, $9642, $9643, $9644, $9645, $9646, $9647, $9648, $9649, $9650, $9651, $9652, $9653, $9654, $9655, $9656, $9657, $9658, VersionRange($9659, $9660)), ($9661, $9662, $9663, $9664, $9665, $9666, $9667, $9668, $9669, $9670, $9671, $9672, $9673, $9674, $9675, $9676, $9677, $9678, $9679, $9680, $9681, $9682, $9683, $9684, $9685, $9686, $9687, $9688, VersionRange($9689, $9690)), ($9691, $9692, $9693, $9694, $9695, $9696, $9697, $9698, $9699, $9700, $9701, $9702, $9703, $9704, $9705, $9706, $9707, $9708, $9709, $9710, $9711, $9712, $9713, $9714, $9715, $9716, $9717, $9718, VersionRange($9719, $9720)), ($9721, $9722, $9723, $9724, $9725, $9726, $9727, $9728, $9729, $9730, $9731, $9732, $9733, $9734, $9735, $9736, $9737, $9738, $9739, $9740, $9741, $9742, $9743, $9744, $9745, $9746, $9747, $9748, VersionRange($9749, $9750)), ($9751, $9752, $9753, $9754, $9755, $9756, $9757, $9758, $9759, $9760, $9761, $9762, $9763, $9764, $9765, $9766, $9767, $9768, $9769, $9770, $9771, $9772, $9773, $9774, $9775, $9776, $9777, $9778, VersionRange($9779, $9780)), ($9781, $9782, $9783, $9784, $9785, $9786, $9787, $9788, $9789, $9790, $9791, $9792, $9793, $9794, $9795, $9796, $9797, $9798, $9799, $9800, $9801, $9802, $9803, $9804, $9805, $9806, $9807, $9808, VersionRange($9809, $9810)), ($9811, $9812, $9813, $9814, $9815, $9816, $9817, $9818, $9819, $9820, $9821, $9822, $9823, $9824, $9825, $9826, $9827, $9828, $9829, $9830, $9831, $9832, $9833, $9834, $9835, $9836, $9837, $9838, VersionRange($9839, $9840)), ($9841, $9842, $9843, $9844, $9845, $9846, $9847, $9848, $9849, $9850, $9851, $9852, $9853, $9854, $9855, $9856, $9857, $9858, $9859, $9860, $9861, $9862, $9863, $9864, $9865, $9866, $9867, $9868, VersionRange($9869, $9870)), ($9871, $9872, $9873, $9874, $9875, $9876, $9877, $9878, $9879, $9880, $9881, $9882, $9883, $9884, $9885, $9886, $9887, $9888, $9889, $9890, $9891, $9892, $9893, $9894, $9895, $9896, $9897, $9898, VersionRange($9899, $9900)), ($9901, $9902, $9903, $9904, $9905, $9906, $9907, $9908, $9909, $9910, $9911, $9912, $9913, $9914, $9915, $9916, $9917, $9918, $9919, $9920, $9921, $9922, $9923, $9924, $9925, $9926, $9927, $9928, VersionRange($9929, $9930)), ($9931, $9932, $9933, $9934, $9935, $9936, $9937, $9938, $9939, $9940, $9941, $9942, $9943, $9944, $9945, $9946, $9947, $9948, $9949, $9950, $9951, $9952, $9953, $9954, $9955, $9956, $9957, $9958, VersionRange($9959, $9960)), ($9961, $9962, $9963, $9964, $9965, $9966, $9967, $9968, $9969, $9970, $9971, $9972, $9973, $9974, $9975, $9976, $9977, $9978, $9979, $9980, $9981, $9982, $9983, $9984, $9985, $9986, $9987, $9988, VersionRange($9989, $9990)), ($9991, $9992, $9993, $9994, $9995, $9996, $9997, $9998, $9999, $10000, $10001, $10002, $10003, $10004, $10005, $10006, $10007, $10008, $10009, $10010, $10011, $10012, $10013, $10014, $10015, $10016, $10017, $10018, VersionRange($10019, $10020)), ($10021, $10022, $10023, $10024, $10025, $10026, $10027, $10028, $10029, $10030, $10031, $10032, $10033, $10034, $10035, $10036, $10037, $10038, $10039, $10040, $10041, $10042, $10043, $10044, $10045, $10046, $10047, $10048, VersionRange($10049, $10050)), ($10051, $10052, $10053, $10054, $10055, $10056, $10057, $10058, $10059, $10060, $10061, $10062, $10063, $10064, $10065, $10066, $10067, $10068, $10069, $10070, $10071, $10072, $10073, $10074, $10075, $10076, $10077, $10078, VersionRange($10079, $10080)), ($10081, $10082, $10083, $10084, $10085, $10086, $10087, $10088, $10089, $10090, $10091, $10092, $10093, $10094, $10095, $10096, $10097, $10098, $10099, $10100, $10101, $10102, $10103, $10104, $10105, $10106, $10107, $10108, VersionRange($10109, $10110)), ($10111, $10112, $10113, $10114, $10115, $10116, $10117, $10118, $10119, $10120, $10121, $10122, $10123, $10124, $10125, $10126, $10127, $10128, $10129, $10130, $10131, $10132, $10133, $10134, $10135, $10136, $10137, $10138, VersionRange($10139, $10140)), ($10141, $10142, $10143, $10144, $10145, $10146, $10147, $10148, $10149, $10150, $10151, $10152, $10153, $10154, $10155, $10156, $10157, $10158, $10159, $10160, $10161, $10162, $10163, $10164, $10165, $10166, $10167, $10168, VersionRange($10169, $10170)), ($10171, $10172, $10173, $10174, $10175, $10176, $10177, $10178, $10179, $10180, $10181, $10182, $10183, $10184, $10185, $10186, $10187, $10188, $10189, $10190, $10191, $10192, $10193, $10194, $10195, $10196, $10197, $10198, VersionRange($10199, $10200)), ($10201, $10202, $10203, $10204, $10205, $10206, $10207, $10208, $10209, $10210, $10211, $10212, $10213, $10214, $10215, $10216, $10217, $10218, $10219, $10220, $10221, $10222, $10223, $10224, $10225, $10226, $10227, $10228, VersionRange($10229, $10230)), ($10231, $10232, $10233, $10234, $10235, $10236, $10237, $10238, $10239, $10240, $10241, $10242, $10243, $10244, $10245, $10246, $10247, $10248, $10249, $10250, $10251, $10252, $10253, $10254, $10255, $10256, $10257, $10258, VersionRange($10259, $10260)), ($10261, $10262, $10263, $10264, $10265, $10266, $10267, $10268, $10269, $10270, $10271, $10272, $10273, $10274, $10275, $10276, $10277, $10278, $10279, $10280, $10281, $10282, $10283, $10284, $10285, $10286, $10287, $10288, VersionRange($10289, $10290)), ($10291, $10292, $10293, $10294, $10295, $10296, $10297, $10298, $10299, $10300, $10301, $10302, $10303, $10304, $10305, $10306, $10307, $10308, $10309, $10310, $10311, $10312, $10313, $10314, $10315, $10316, $10317, $10318, VersionRange($10319, $10320)), ($10321, $10322, $10323, $10324, $10325, $10326, $10327, $10328, $10329, $10330, $10331, $10332, $10333, $10334, $10335, $10336, $10337, $10338, $10339, $10340, $10341, $10342, $10343, $10344, $10345, $10346, $10347, $10348, VersionRange($10349, $10350)), ($10351, $10352, $10353, $10354, $10355, $10356, $10357, $10358, $10359, $10360, $10361, $10362, $10363, $10364, $10365, $10366, $10367, $10368, $10369, $10370, $10371, $10372, $10373, $10374, $10375, $10376, $10377, $10378, VersionRange($10379, $10380)), ($10381, $10382, $10383, $10384, $10385, $10386, $10387, $10388, $10389, $10390, $10391, $10392, $10393, $10394, $10395, $10396, $10397, $10398, $10399, $10400, $10401, $10402, $10403, $10404, $10405, $10406, $10407, $10408, VersionRange($10409, $10410)), ($10411, $10412, $10413, $10414, $10415, $10416, $10417, $10418, $10419, $10420, $10421, $10422, $10423, $10424, $10425, $10426, $10427, $10428, $10429, $10430, $10431, $10432, $10433, $10434, $10435, $10436, $10437, $10438, VersionRange($10439, $10440)), ($10441, $10442, $10443, $10444, $10445, $10446, $10447, $10448, $10449, $10450, $10451, $10452, $10453, $10454, $10455, $10456, $10457, $10458, $10459, $10460, $10461, $10462, $10463, $10464, $10465, $10466, $10467, $10468, VersionRange($10469, $10470)), ($10471, $10472, $10473, $10474, $10475, $10476, $10477, $10478, $10479, $10480, $10481, $10482, $10483, $10484, $10485, $10486, $10487, $10488, $10489, $10490, $10491, $10492, $10493, $10494, $10495, $10496, $10497, $10498, VersionRange($10499, $10500)), ($10501, $10502, $10503, $10504, $10505, $10506, $10507, $10508, $10509, $10510, $10511, $10512, $10513, $10514, $10515, $10516, $10517, $10518, $10519, $10520, $10521, $10522, $10523, $10524, $10525, $10526, $10527, $10528, VersionRange($10529, $10530)), ($10531, $10532, $10533, $10534, $10535, $10536, $10537, $10538, $10539, $10540, $10541, $10542, $10543, $10544, $10545, $10546, $10547, $10548, $10549, $10550, $10551, $10552, $10553, $10554, $10555, $10556, $10557, $10558, VersionRange($10559, $10560)), ($10561, $10562, $10563, $10564, $10565, $10566, $10567, $10568, $10569, $10570, $10571, $10572, $10573, $10574, $10575, $10576, $10577, $10578, $10579, $10580, $10581, $10582, $10583, $10584, $10585, $10586, $10587, $10588, VersionRange($10589, $10590)), ($10591, $10592, $10593, $10594, $10595, $10596, $10597, $10598, $10599, $10600, $10601, $10602, $10603, $10604, $10605, $10606, $10607, $10608, $10609, $10610, $10611, $10612, $10613, $10614, $10615, $10616, $10617, $10618, VersionRange($10619, $10620)), ($10621, $10622, $10623, $10624, $10625, $10626, $10627, $10628, $10629, $10630, $10631, $10632, $10633, $10634, $10635, $10636, $10637, $10638, $10639, $10640, $10641, $10642, $10643, $10644, $10645, $10646, $10647, $10648, VersionRange($10649, $10650)), ($10651, $10652, $10653, $10654, $10655, $10656, $10657, $10658, $10659, $10660, $10661, $10662, $10663, $10664, $10665, $10666, $10667, $10668, $10669, $10670, $10671, $10672, $10673, $10674, $10675, $10676, $10677, $10678, VersionRange($10679, $10680)), ($10681, $10682, $10683, $10684, $10685, $10686, $10687, $10688, $10689, $10690, $10691, $10692, $10693, $10694, $10695, $10696, $10697, $10698, $10699, $10700, $10701, $10702, $10703, $10704, $10705, $10706, $10707, $10708, VersionRange($10709, $10710)), ($10711, $10712, $10713, $10714, $10715, $10716, $10717, $10718, $10719, $10720, $10721, $10722, $10723, $10724, $10725, $10726, $10727, $10728, $10729, $10730, $10731, $10732, $10733, $10734, $10735, $10736, $10737, $10738, VersionRange($10739, $10740)), ($10741, $10742, $10743, $10744, $10745, $10746, $10747, $10748, $10749, $10750, $10751, $10752, $10753, $10754, $10755, $10756, $10757, $10758, $10759, $10760, $10761, $10762, $10763, $10764, $10765, $10766, $10767, $10768, VersionRange($10769, $10770)), ($10771, $10772, $10773, $10774, $10775, $10776, $10777, $10778, $10779, $10780, $10781, $10782, $10783, $10784, $10785, $10786, $10787, $10788, $10789, $10790, $10791, $10792, $10793, $10794, $10795, $10796, $10797, $10798, VersionRange($10799, $10800)), ($10801, $10802, $10803, $10804, $10805, $10806, $10807, $10808, $10809, $10810, $10811, $10812, $10813, $10814, $10815, $10816, $10817, $10818, $10819, $10820, $10821, $10822, $10823, $10824, $10825, $10826, $10827, $10828, VersionRange($10829, $10830)), ($10831, $10832, $10833, $10834, $10835, $10836, $10837, $10838, $10839, $10840, $10841, $10842, $10843, $10844, $10845, $10846, $10847, $10848, $10849, $10850, $10851, $10852, $10853, $10854, $10855, $10856, $10857, $10858, VersionRange($10859, $10860)), ($10861, $10862, $10863, $10864, $10865, $10866, $10867, $10868, $10869, $10870, $10871, $10872, $10873, $10874, $10875, $10876, $10877, $10878, $10879, $10880, $10881, $10882, $10883, $10884, $10885, $10886, $10887, $10888, VersionRange($10889, $10890)), ($10891, $10892, $10893, $10894, $10895, $10896, $10897, $10898, $10899, $10900, $10901, $10902, $10903, $10904, $10905, $10906, $10907, $10908, $10909, $10910, $10911, $10912, $10913, $10914, $10915, $10916, $10917, $10918, VersionRange($10919, $10920)), ($10921, $10922, $10923, $10924, $10925, $10926, $10927, $10928, $10929, $10930, $10931, $10932, $10933, $10934, $10935, $10936, $10937, $10938, $10939, $10940, $10941, $10942, $10943, $10944, $10945, $10946, $10947, $10948, VersionRange($10949, $10950)), ($10951, $10952, $10953, $10954, $10955, $10956, $10957, $10958, $10959, $10960, $10961, $10962, $10963, $10964, $10965, $10966, $10967, $10968, $10969, $10970, $10971, $10972, $10973, $10974, $10975, $10976, $10977, $10978, VersionRange($10979, $10980)), ($10981, $10982, $10983, $10984, $10985, $10986, $10987, $10988, $10989, $10990, $10991, $10992, $10993, $10994, $10995, $10996, $10997, $10998, $10999, $11000, $11001, $11002, $11003, $11004, $11005, $11006, $11007, $11008, VersionRange($11009, $11010)), ($11011, $11012, $11013, $11014, $11015, $11016, $11017, $11018, $11019, $11020, $11021, $11022, $11023, $11024, $11025, $11026, $11027, $11028, $11029, $11030, $11031, $11032, $11033, $11034, $11035, $11036, $11037, $11038, VersionRange($11039, $11040)), ($11041, $11042, $11043, $11044, $11045, $11046, $11047, $11048, $11049, $11050, $11051, $11052, $11053, $11054, $11055, $11056, $11057, $11058, $11059, $11060, $11061, $11062, $11063, $11064, $11065, $11066, $11067, $11068, VersionRange($11069, $11070)), ($11071, $11072, $11073, $11074, $11075, $11076, $11077, $11078, $11079, $11080, $11081, $11082, $11083, $11084, $11085, $11086, $11087, $11088, $11089, $11090, $11091, $11092, $11093, $11094, $11095, $11096, $11097, $11098, VersionRange($11099, $11100)), ($11101, $11102, $11103, $11104, $11105, $11106, $11107, $11108, $11109, $11110, $11111, $11112, $11113, $11114, $11115, $11116, $11117, $11118, $11119, $11120, $11121, $11122, $11123, $11124, $11125, $11126, $11127, $11128, VersionRange($11129, $11130)), ($11131, $11132, $11133, $11134, $11135, $11136, $11137, $11138, $11139, $11140, $11141, $11142, $11143, $11144, $11145, $11146, $11147, $11148, $11149, $11150, $11151, $11152, $11153, $11154, $11155, $11156, $11157, $11158, VersionRange($11159, $11160)), ($11161, $11162, $11163, $11164, $11165, $11166, $11167, $11168, $11169, $11170, $11171, $11172, $11173, $11174, $11175, $11176, $11177, $11178, $11179, $11180, $11181, $11182, $11183, $11184, $11185, $11186, $11187, $11188, VersionRange($11189, $11190)), ($11191, $11192, $11193, $11194, $11195, $11196, $11197, $11198, $11199, $11200, $11201, $11202, $11203, $11204, $11205, $11206, $11207, $11208, $11209, $11210, $11211, $11212, $11213, $11214, $11215, $11216, $11217, $11218, VersionRange($11219, $11220)), ($11221, $11222, $11223, $11224, $11225, $11226, $11227, $11228, $11229, $11230, $11231, $11232, $11233, $11234, $11235, $11236, $11237, $11238, $11239, $11240, $11241, $11242, $11243, $11244, $11245, $11246, $11247, $11248, VersionRange($11249, $11250)), ($11251, $11252, $11253, $11254, $11255, $11256, $11257, $11258, $11259, $11260, $11261, $11262, $11263, $11264, $11265, $11266, $11267, $11268, $11269, $11270, $11271, $11272, $11273, $11274, $11275, $11276, $11277, $11278, VersionRange($11279, $11280)), ($11281, $11282, $11283, $11284, $11285, $11286, $11287, $11288, $11289, $11290, $11291, $11292, $11293, $11294, $11295, $11296, $11297, $11298, $11299, $11300, $11301, $11302, $11303, $11304, $11305, $11306, $11307, $11308, VersionRange($11309, $11310)), ($11311, $11312, $11313, $11314, $11315, $11316, $11317, $11318, $11319, $11320, $11321, $11322, $11323, $11324, $11325, $11326, $11327, $11328, $11329, $11330, $11331, $11332, $11333, $11334, $11335, $11336, $11337, $11338, VersionRange($11339, $11340)), ($11341, $11342, $11343, $11344, $11345, $11346, $11347, $11348, $11349, $11350, $11351, $11352, $11353, $11354, $11355, $11356, $11357, $11358, $11359, $11360, $11361, $11362, $11363, $11364, $11365, $11366, $11367, $11368, VersionRange($11369, $11370)), ($11371, $11372, $11373, $11374, $11375, $11376, $11377, $11378, $11379, $11380, $11381, $11382, $11383, $11384, $11385, $11386, $11387, $11388, $11389, $11390, $11391, $11392, $11393, $11394, $11395, $11396, $11397, $11398, VersionRange($11399, $11400)), ($11401, $11402, $11403, $11404, $11405, $11406, $11407, $11408, $11409, $11410, $11411, $11412, $11413, $11414, $11415, $11416, $11417, $11418, $11419, $11420, $11421, $11422, $11423, $11424, $11425, $11426, $11427, $11428, VersionRange($11429, $11430)), ($11431, $11432, $11433, $11434, $11435, $11436, $11437, $11438, $11439, $11440, $11441, $11442, $11443, $11444, $11445, $11446, $11447, $11448, $11449, $11450, $11451, $11452, $11453, $11454, $11455, $11456, $11457, $11458, VersionRange($11459, $11460)), ($11461, $11462, $11463, $11464, $11465, $11466, $11467, $11468, $11469, $11470, $11471, $11472, $11473, $11474, $11475, $11476, $11477, $11478, $11479, $11480, $11481, $11482, $11483, $11484, $11485, $11486, $11487, $11488, VersionRange($11489, $11490)), ($11491, $11492, $11493, $11494, $11495, $11496, $11497, $11498, $11499, $11500, $11501, $11502, $11503, $11504, $11505, $11506, $11507, $11508, $11509, $11510, $11511, $11512, $11513, $11514, $11515, $11516, $11517, $11518, VersionRange($11519, $11520)), ($11521, $11522, $11523, $11524, $11525, $11526, $11527, $11528, $11529, $11530, $11531, $11532, $11533, $11534, $11535, $11536, $11537, $11538, $11539, $11540, $11541, $11542, $11543, $11544, $11545, $11546, $11547, $11548, VersionRange($11549, $11550)), ($11551, $11552, $11553, $11554, $11555, $11556, $11557, $11558, $11559, $11560, $11561, $11562, $11563, $11564, $11565, $11566, $11567, $11568, $11569, $11570, $11571, $11572, $11573, $11574, $11575, $11576, $11577, $11578, VersionRange($11579, $11580)), ($11581, $11582, $11583, $11584, $11585, $11586, $11587, $11588, $11589, $11590, $11591, $11592, $11593, $11594, $11595, $11596, $11597, $11598, $11599, $11600, $11601, $11602, $11603, $11604, $11605, $11606, $11607, $11608, VersionRange($11609, $11610)), ($11611, $11612, $11613, $11614, $11615, $11616, $11617, $11618, $11619, $11620, $11621, $11622, $11623, $11624, $11625, $11626, $11627, $11628, $11629, $11630, $11631, $11632, $11633, $11634, $11635, $11636, $11637, $11638, VersionRange($11639, $11640)), ($11641, $11642, $11643, $11644, $11645, $11646, $11647, $11648, $11649, $11650, $11651, $11652, $11653, $11654, $11655, $11656, $11657, $11658, $11659, $11660, $11661, $11662, $11663, $11664, $11665, $11666, $11667, $11668, VersionRange($11669, $11670)), ($11671, $11672, $11673, $11674, $11675, $11676, $11677, $11678, $11679, $11680, $11681, $11682, $11683, $11684, $11685, $11686, $11687, $11688, $11689, $11690, $11691, $11692, $11693, $11694, $11695, $11696, $11697, $11698, VersionRange($11699, $11700)), ($11701, $11702, $11703, $11704, $11705, $11706, $11707, $11708, $11709, $11710, $11711, $11712, $11713, $11714, $11715, $11716, $11717, $11718, $11719, $11720, $11721, $11722, $11723, $11724, $11725, $11726, $11727, $11728, VersionRange($11729, $11730)), ($11731, $11732, $11733, $11734, $11735, $11736, $11737, $11738, $11739, $11740, $11741, $11742, $11743, $11744, $11745, $11746, $11747, $11748, $11749, $11750, $11751, $11752, $11753, $11754, $11755, $11756, $11757, $11758, VersionRange($11759, $11760)), ($11761, $11762, $11763, $11764, $11765, $11766, $11767, $11768, $11769, $11770, $11771, $11772, $11773, $11774, $11775, $11776, $11777, $11778, $11779, $11780, $11781, $11782, $11783, $11784, $11785, $11786, $11787, $11788, VersionRange($11789, $11790)), ($11791, $11792, $11793, $11794, $11795, $11796, $11797, $11798, $11799, $11800, $11801, $11802, $11803, $11804, $11805, $11806, $11807, $11808, $11809, $11810, $11811, $11812, $11813, $11814, $11815, $11816, $11817, $11818, VersionRange($11819, $11820)), ($11821, $11822, $11823, $11824, $11825, $11826, $11827, $11828, $11829, $11830, $11831, $11832, $11833, $11834, $11835, $11836, $11837, $11838, $11839, $11840, $11841, $11842, $11843, $11844, $11845, $11846, $11847, $11848, VersionRange($11849, $11850)), ($11851, $11852, $11853, $11854, $11855, $11856, $11857, $11858, $11859, $11860, $11861, $11862, $11863, $11864, $11865, $11866, $11867, $11868, $11869, $11870, $11871, $11872, $11873, $11874, $11875, $11876, $11877, $11878, VersionRange($11879, $11880)), ($11881, $11882, $11883, $11884, $11885, $11886, $11887, $11888, $11889, $11890, $11891, $11892, $11893, $11894, $11895, $11896, $11897, $11898, $11899, $11900, $11901, $11902, $11903, $11904, $11905, $11906, $11907, $11908, VersionRange($11909, $11910)), ($11911, $11912, $11913, $11914, $11915, $11916, $11917, $11918, $11919, $11920, $11921, $11922, $11923, $11924, $11925, $11926, $11927, $11928, $11929, $11930, $11931, $11932, $11933, $11934, $11935, $11936, $11937, $11938, VersionRange($11939, $11940)), ($11941, $11942, $11943, $11944, $11945, $11946, $11947, $11948, $11949, $11950, $11951, $11952, $11953, $11954, $11955, $11956, $11957, $11958, $11959, $11960, $11961, $11962, $11963, $11964, $11965, $11966, $11967, $11968, VersionRange($11969, $11970)), ($11971, $11972, $11973, $11974, $11975, $11976, $11977, $11978, $11979, $11980, $11981, $11982, $11983, $11984, $11985, $11986, $11987, $11988, $11989, $11990, $11991, $11992, $11993, $11994, $11995, $11996, $11997, $11998, VersionRange($11999, $12000)), ($12001, $12002, $12003, $12004, $12005, $12006, $12007, $12008, $12009, $12010, $12011, $12012, $12013, $12014, $12015, $12016, $12017, $12018, $12019, $12020, $12021, $12022, $12023, $12024, $12025, $12026, $12027, $12028, VersionRange($12029, $12030)), ($12031, $12032, $12033, $12034, $12035, $12036, $12037, $12038, $12039, $12040, $12041, $12042, $12043, $12044, $12045, $12046, $12047, $12048, $12049, $12050, $12051, $12052, $12053, $12054, $12055, $12056, $12057, $12058, VersionRange($12059, $12060)), ($12061, $12062, $12063, $12064, $12065, $12066, $12067, $12068, $12069, $12070, $12071, $12072, $12073, $12074, $12075, $12076, $12077, $12078, $12079, $12080, $12081, $12082, $12083, $12084, $12085, $12086, $12087, $12088, VersionRange($12089, $12090)), ($12091, $12092, $12093, $12094, $12095, $12096, $12097, $12098, $12099, $12100, $12101, $12102, $12103, $12104, $12105, $12106, $12107, $12108, $12109, $12110, $12111, $12112, $12113, $12114, $12115, $12116, $12117, $12118, VersionRange($12119, $12120)), ($12121, $12122, $12123, $12124, $12125, $12126, $12127, $12128, $12129, $12130, $12131, $12132, $12133, $12134, $12135, $12136, $12137, $12138, $12139, $12140, $12141, $12142, $12143, $12144, $12145, $12146, $12147, $12148, VersionRange($12149, $12150)), ($12151, $12152, $12153, $12154, $12155, $12156, $12157, $12158, $12159, $12160, $12161, $12162, $12163, $12164, $12165, $12166, $12167, $12168, $12169, $12170, $12171, $12172, $12173, $12174, $12175, $12176, $12177, $12178, VersionRange($12179, $12180)), ($12181, $12182, $12183, $12184, $12185, $12186, $12187, $12188, $12189, $12190, $12191, $12192, $12193, $12194, $12195, $12196, $12197, $12198, $12199, $12200, $12201, $12202, $12203, $12204, $12205, $12206, $12207, $12208, VersionRange($12209, $12210)), ($12211, $12212, $12213, $12214, $12215, $12216, $12217, $12218, $12219, $12220, $12221, $12222, $12223, $12224, $12225, $12226, $12227, $12228, $12229, $12230, $12231, $12232, $12233, $12234, $12235, $12236, $12237, $12238, VersionRange($12239, $12240)), ($12241, $12242, $12243, $12244, $12245, $12246, $12247, $12248, $12249, $12250, $12251, $12252, $12253, $12254, $12255, $12256, $12257, $12258, $12259, $12260, $12261, $12262, $12263, $12264, $12265, $12266, $12267, $12268, VersionRange($12269, $12270)), ($12271, $12272, $12273, $12274, $12275, $12276, $12277, $12278, $12279, $12280, $12281, $12282, $12283, $12284, $12285, $12286, $12287, $12288, $12289, $12290, $12291, $12292, $12293, $12294, $12295, $12296, $12297, $12298, VersionRange($12299, $12300)), ($12301, $12302, $12303, $12304, $12305, $12306, $12307, $12308, $12309, $12310, $12311, $12312, $12313, $12314, $12315, $12316, $12317, $12318, $12319, $12320, $12321, $12322, $12323, $12324, $12325, $12326, $12327, $12328, VersionRange($12329, $12330)), ($12331, $12332, $12333, $12334, $12335, $12336, $12337, $12338, $12339, $12340, $12341, $12342, $12343, $12344, $12345, $12346, $12347, $12348, $12349, $12350, $12351, $12352, $12353, $12354, $12355, $12356, $12357, $12358, VersionRange($12359, $12360)), ($12361, $12362, $12363, $12364, $12365, $12366, $12367, $12368, $12369, $12370, $12371, $12372, $12373, $12374, $12375, $12376, $12377, $12378, $12379, $12380, $12381, $12382, $12383, $12384, $12385, $12386, $12387, $12388, VersionRange($12389, $12390)), ($12391, $12392, $12393, $12394, $12395, $12396, $12397, $12398, $12399, $12400, $12401, $12402, $12403, $12404, $12405, $12406, $12407, $12408, $12409, $12410, $12411, $12412, $12413, $12414, $12415, $12416, $12417, $12418, VersionRange($12419, $12420)), ($12421, $12422, $12423, $12424, $12425, $12426, $12427, $12428, $12429, $12430, $12431, $12432, $12433, $12434, $12435, $12436, $12437, $12438, $12439, $12440, $12441, $12442, $12443, $12444, $12445, $12446, $12447, $12448, VersionRange($12449, $12450)), ($12451, $12452, $12453, $12454, $12455, $12456, $12457, $12458, $12459, $12460, $12461, $12462, $12463, $12464, $12465, $12466, $12467, $12468, $12469, $12470, $12471, $12472, $12473, $12474, $12475, $12476, $12477, $12478, VersionRange($12479, $12480)), ($12481, $12482, $12483, $12484, $12485, $12486, $12487, $12488, $12489, $12490, $12491, $12492, $12493, $12494, $12495, $12496, $12497, $12498, $12499, $12500, $12501, $12502, $12503, $12504, $12505, $12506, $12507, $12508, VersionRange($12509, $12510)), ($12511, $12512, $12513, $12514, $12515, $12516, $12517, $12518, $12519, $12520, $12521, $12522, $12523, $12524, $12525, $12526, $12527, $12528, $12529, $12530, $12531, $12532, $12533, $12534, $12535, $12536, $12537, $12538, VersionRange($12539, $12540)), ($12541, $12542, $12543, $12544, $12545, $12546, $12547, $12548, $12549, $12550, $12551, $12552, $12553, $12554, $12555, $12556, $12557, $12558, $12559, $12560, $12561, $12562, $12563, $12564, $12565, $12566, $12567, $12568, VersionRange($12569, $12570)), ($12571, $12572, $12573, $12574, $12575, $12576, $12577, $12578, $12579, $12580, $12581, $12582, $12583, $12584, $12585, $12586, $12587, $12588, $12589, $12590, $12591, $12592, $12593, $12594, $12595, $12596, $12597, $12598, VersionRange($12599, $12600)), ($12601, $12602, $12603, $12604, $12605, $12606, $12607, $12608, $12609, $12610, $12611, $12612, $12613, $12614, $12615, $12616, $12617, $12618, $12619, $12620, $12621, $12622, $12623, $12624, $12625, $12626, $12627, $12628, VersionRange($12629, $12630)), ($12631, $12632, $12633, $12634, $12635, $12636, $12637, $12638, $12639, $12640, $12641, $12642, $12643, $12644, $12645, $12646, $12647, $12648, $12649, $12650, $12651, $12652, $12653, $12654, $12655, $12656, $12657, $12658, VersionRange($12659, $12660)), ($12661, $12662, $12663, $12664, $12665, $12666, $12667, $12668, $12669, $12670, $12671, $12672, $12673, $12674, $12675, $12676, $12677, $12678, $12679, $12680, $12681, $12682, $12683, $12684, $12685, $12686, $12687, $12688, VersionRange($12689, $12690)), ($12691, $12692, $12693, $12694, $12695, $12696, $12697, $12698, $12699, $12700, $12701, $12702, $12703, $12704, $12705, $12706, $12707, $12708, $12709, $12710, $12711, $12712, $12713, $12714, $12715, $12716, $12717, $12718, VersionRange($12719, $12720)), ($12721, $12722, $12723, $12724, $12725, $12726, $12727, $12728, $12729, $12730, $12731, $12732, $12733, $12734, $12735, $12736, $12737, $12738, $12739, $12740, $12741, $12742, $12743, $12744, $12745, $12746, $12747, $12748, VersionRange($12749, $12750)), ($12751, $12752, $12753, $12754, $12755, $12756, $12757, $12758, $12759, $12760, $12761, $12762, $12763, $12764, $12765, $12766, $12767, $12768, $12769, $12770, $12771, $12772, $12773, $12774, $12775, $12776, $12777, $12778, VersionRange($12779, $12780)), ($12781, $12782, $12783, $12784, $12785, $12786, $12787, $12788, $12789, $12790, $12791, $12792, $12793, $12794, $12795, $12796, $12797, $12798, $12799, $12800, $12801, $12802, $12803, $12804, $12805, $12806, $12807, $12808, VersionRange($12809, $12810)), ($12811, $12812, $12813, $12814, $12815, $12816, $12817, $12818, $12819, $12820, $12821, $12822, $12823, $12824, $12825, $12826, $12827, $12828, $12829, $12830, $12831, $12832, $12833, $12834, $12835, $12836, $12837, $12838, VersionRange($12839, $12840)), ($12841, $12842, $12843, $12844, $12845, $12846, $12847, $12848, $12849, $12850, $12851, $12852, $12853, $12854, $12855, $12856, $12857, $12858, $12859, $12860, $12861, $12862, $12863, $12864, $12865, $12866, $12867, $12868, VersionRange($12869, $12870)), ($12871, $12872, $12873, $12874, $12875, $12876, $12877, $12878, $12879, $12880, $12881, $12882, $12883, $12884, $12885, $12886, $12887, $12888, $12889, $12890, $12891, $12892, $12893, $12894, $12895, $12896, $12897, $12898, VersionRange($12899, $12900)), ($12901, $12902, $12903, $12904, $12905, $12906, $12907, $12908, $12909, $12910, $12911, $12912, $12913, $12914, $12915, $12916, $12917, $12918, $12919, $12920, $12921, $12922, $12923, $12924, $12925, $12926, $12927, $12928, VersionRange($12929, $12930)), ($12931, $12932, $12933, $12934, $12935, $12936, $12937, $12938, $12939, $12940, $12941, $12942, $12943, $12944, $12945, $12946, $12947, $12948, $12949, $12950, $12951, $12952, $12953, $12954, $12955, $12956, $12957, $12958, VersionRange($12959, $12960)), ($12961, $12962, $12963, $12964, $12965, $12966, $12967, $12968, $12969, $12970[...][ Date: 2023-07-04 18:40:12 ]
-
Queries
Queries by type
Key values
- 6,128 Total read queries
- 5,667,862 Total write queries
Queries by database
Key values
- unknown Main database
- 5,702,002 Requests
- 3h9m20s (unknown)
- Main time consuming database
Queries by user
Key values
- unknown Main user
- 5,702,002 Requests
User Request type Count Duration clair Total 67 6ms select 9 4ms tcl 43 1ms unknown Total 5,702,002 3h9m20s cte 1 3ms ddl 9 2ms delete 19 6m9s insert 5,660,216 2h59m41s others 1,105 22ms select 6,119 524ms tcl 7,574 3m28s Duration by user
Key values
- 3h9m20s (unknown) Main time consuming user
User Request type Count Duration clair Total 67 6ms select 9 4ms tcl 43 1ms unknown Total 5,702,002 3h9m20s cte 1 3ms ddl 9 2ms delete 19 6m9s insert 5,660,216 2h59m41s others 1,105 22ms select 6,119 524ms tcl 7,574 3m28s Queries by host
Key values
- unknown Main host
- 5,702,069 Requests
- 3h9m20s (unknown)
- Main time consuming host
Queries by application
Key values
- unknown Main application
- 5,702,010 Requests
- 3h9m20s (unknown)
- Main time consuming application
Number of cancelled queries
Key values
- 0 per second Cancelled query Peak
- 2023-07-04 13:39:17 Date
Number of cancelled queries (5 minutes period)
NO DATASET
-
Top Queries
Histogram of query times
Key values
- 5,596,638 0-1ms duration
Slowest individual queries
Rank Duration Query 1 6m7s DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = 'suse-updater-suse.linux.enterprise.server.11' AND v1.id = v2.id;[ Date: 2023-07-04 18:47:48 - Bind query: yes ]
2 9s944ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x10407dc66e0363fca3c37bf49a1315a9', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly16.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5bfa2bd8aed79c1d9d30e289fec06a25', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly16.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd7c9dc482d09385454cc6a2cd2e8637e', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly16.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x749fecac7c9f8ba004b60d143be4aff6', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly16.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x40321c510b676b589bfe9a4ab7f03c45', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly17.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x403fd184006fb28cb79668a7dfce704f', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly17.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6148f263e1683d444d001b3ee30f0a0f', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly17.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3f09d51c207b55338209f758bca01d0a', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly17.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x59bfcafd6451d50015c9b880caf772e9', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly17.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa16f110a5b49a326f5a2e7b371cbab1a', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly17.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8234e27523b7e243c2e0094e6b6b9ee5', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly18.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x37a51d265769cf4ef0cfb0bab403fc76', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly18.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x476fef3ad97cf47d44bde8e5fa94d2e8', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly18.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x172a73f49c943853bea8eb27ef870012', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly18.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3419bfa174a0538f28a75faf478fad05', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly18.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc39b4092d15076f7bb2bc54123eafadc', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly18.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x443aa34b1be71520fbc8d57f8ec9e8f4', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly8.2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5d09e74777d0e74978cac6800e424454', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly8.2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbee6cc228cc1df5d09cf08f600cd4669', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly8.2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8dd8fd7955ab0ca47d104e569d637755', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly8.2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe237cf7734926cb5b05dbfe8b5e8886c', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly8.2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfd0c668a5ee8f142f18eb9a217130857', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly8.2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa1474d967f9c8bfcad158209cc9a89f2', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly9.0', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2dc4e330e580babc24d2c167bc3da33c', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly9.0', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3ec5c8f3b75a0377b0916e60e89078f3', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly9.0', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7d2adef343c6da8ffae58114dcc92040', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly9.0', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x890df469f0c008e6c2e4b122abd05f3b', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly9.0', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x268b52d5374c572103d4ea3e8335eb33', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly9.0', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x088146eb06f468dd8e054ed71c3940fa', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-undertow', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:2.0.30-3.SP3_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7296fb08ed35ea68aa723262f81fd3b3', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-undertow', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:2.0.30-3.SP3_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfbcf0269dee70891418612af9e55bf89', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-undertow', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6', 'rhel-cpe-repository', '', '0:2.0.30-3.SP3_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1d43977fcffc529975c0929f55c8ee1c', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-undertow', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:2.0.30-3.SP3_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x254c7b5e6d37dcad9fd7608eb6c31257', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-undertow', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6', 'rhel-cpe-repository', '', '0:2.0.30-3.SP3_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x86e964d6bf7b9e2d9453fec22d62e550', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-undertow', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el6', 'rhel-cpe-repository', '', '0:2.0.30-3.SP3_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xec4041aa1ed6dae59d86fe5f748812a0', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1c19349b5fb204946cc65d00c019a33c', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xba4e23235c7700c93eed8339f34b564a', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xeba3473bc3018b4a7c8b797b8d872d6b', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf54dbd488bb804c2715369a0b1fc34e2', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcb48ec14b014a1e67a5eeeec9c64558d', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el6', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5954c1e265fd40a4c06cce5629ca5e07', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x545a03f7a865539beaa485122ce09247', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf8bb0d70dec0ab408322215f32fc7f86', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3c73cbb307d53c9f24cdb6ae6c9d74c2', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0f8efa7c7357bec21ecf2e0edfed03ec', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfdbb32df4c22712dc6b93b03c3627103', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el6', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc9be0c3c3182aef4d2c595d43b323b44', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate-entitymanager', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2305a9d2506dcb18a17680e133146458', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate-entitymanager', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x48cb263d7525dce6867783b5cd28281b', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redh[...];[ Date: 2023-07-04 18:39:52 - Bind query: yes ]
3 9s150ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x41157a171274e8fac6ce5a78162eff13', 'RHBA-2011:1656: mod_nss bug fix update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The mod_nss module provides strong cryptography for the Apache HTTP Server via the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, using the Network Security Services (NSS) security library. Users of mod_nss are advised to upgrade to this updated package, which fixes these bugs.', '2011-12-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2011:1656 https://access.redhat.com/security/cve/CVE-2011-4973', 'Moderate', 'Medium', 'mod_nss', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.0.8-13.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x799a0d4aeaf0d1542c38453f7e8637b0', 'RHBA-2012:0763: glibc bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Users of glibc are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0763 https://access.redhat.com/security/cve/CVE-2012-6686', 'Moderate', 'Medium', 'glibc', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.12-1.80.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa456872337872ba24f1f1eff474ae6b0', 'RHBA-2012:0763: glibc bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Users of glibc are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0763 https://access.redhat.com/security/cve/CVE-2012-6686', 'Moderate', 'Medium', 'glibc-common', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.12-1.80.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x816835af9b6e486a97961836e8b5691a', 'RHBA-2012:0763: glibc bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Users of glibc are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0763 https://access.redhat.com/security/cve/CVE-2012-6686', 'Moderate', 'Medium', 'glibc-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.12-1.80.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x26ce31750df85faf81d839f65bffc35e', 'RHBA-2012:0763: glibc bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Users of glibc are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0763 https://access.redhat.com/security/cve/CVE-2012-6686', 'Moderate', 'Medium', 'glibc-headers', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.12-1.80.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9efd7fb83d629d1b5b680134c26b1487', 'RHBA-2012:0763: glibc bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Users of glibc are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0763 https://access.redhat.com/security/cve/CVE-2012-6686', 'Moderate', 'Medium', 'glibc-static', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.12-1.80.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x51f404f8c8cf8d6481c1b61b933da0fd', 'RHBA-2012:0763: glibc bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Users of glibc are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0763 https://access.redhat.com/security/cve/CVE-2012-6686', 'Moderate', 'Medium', 'glibc-utils', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.12-1.80.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa1908b5da9ca7d9273907984fc15ed78', 'RHBA-2012:0763: glibc bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Users of glibc are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0763 https://access.redhat.com/security/cve/CVE-2012-6686', 'Moderate', 'Medium', 'nscd', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.12-1.80.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x396106a9cff1009cc7f9392c7d28948b', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x88d4cf3b9f17bc6bc355e79dd2b4fb21', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius-krb5', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4b950d0e56f65a2fd994043f5370c719', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius-ldap', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4d0c578be9c44766e94c25736f4b6311', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius-mysql', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7de219ae488f0a7dde11f137814e0d7d', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius-perl', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5e965282cde7612f9ec06e674cb2807f', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius-postgresql', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2798d1aa389778d825fe4a12cfcd043c', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius-python', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x830b0c2a3a1e0de572a9c3ff54a4f297', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius-unixODBC', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9215b3749993f5cc1264dce92a82f5bf', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius-utils', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x20abf00c601382b0b9c9738110c01cab', 'RHBA-2013:0363: sudo bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The sudo (super user do) utility allows system administrators to give certain users the ability to run commands as root. Users of sudo are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2013-02-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:0363 https://access.redhat.com/security/cve/CVE-2013-1776', 'Low', 'Low', 'sudo', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.8.6p3-7.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa068cd200d007af8c688aa0b6401bad3', 'RHBA-2013:0363: sudo bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The sudo (super user do) utility allows system administrators to give certain users the ability to run commands as root. Users of sudo are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2013-02-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:0363 https://access.redhat.com/security/cve/CVE-2013-1776', 'Low', 'Low', 'sudo-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.8.6p3-7.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6045b7931286bb5cb5ba0f7958ff47e2', 'RHBA-2013:0386: tuned bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'The tuned packages contain a daemon that tunes system settings dynamically. It does so by monitoring the usage of several system components periodically. Users of tuned are advised to upgrade to these updated packages, which fix these bugs.', '2013-02-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:0386 https://access.redhat.com/security/cve/CVE-2012-6136', 'Low', 'Low', 'tuned', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.2.19-11.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x30c7a6fb6fdb77515fe2b10ad8ebe5fe', 'RHBA-2013:0386: tuned bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'The tuned packages contain a daemon that tunes system settings dynamically. It does so by monitoring the usage of several system components periodically. Users of tuned are advised to upgrade to these updated packages, which fix these bugs.', '2013-02-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:0386 https://access.redhat.com/security/cve/CVE-2012-6136', 'Low', 'Low', 'tuned-utils', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.2.19-11.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3a383ff12ad607c1d128668f52eb5ccf', 'RHBA-2013:1581: libvirt bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. All libvirt users are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1581 https://access.redhat.com/security/cve/CVE-2013-7336', 'Moderate', 'Medium', 'libvirt', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.10.2-29.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xde78cdd48efcdb8d9aea1e8b3413d44e', 'RHBA-2013:1581: libvirt bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. All libvirt users are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1581 https://access.redhat.com/security/cve/CVE-2013-7336', 'Moderate', 'Medium', 'libvirt-client', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.10.2-29.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x054820ad542f7c67c9a2d6e36f7ca6dd', 'RHBA-2013:1581: libvirt bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. All libvirt users are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1581 https://access.redhat.com/security/cve/CVE-2013-7336', 'Moderate', 'Medium', 'libvirt-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.10.2-29.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa63421c39095cb9f6ff4af787231ec55', 'RHBA-2013:1581: libvirt bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. All libvirt users are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1581 https://access.redhat.com/security/cve/CVE-2013-7336', 'Moderate', 'Medium', 'libvirt-lock-sanlock', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.10.2-29.el6', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x1acd1ff51cc512f366568409b4f35507', 'RHBA-2013:1581: libvirt bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. All libvirt users are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1581 https://access.redhat.com/security/cve/CVE-2013-7336', 'Moderate', 'Medium', 'libvirt-python', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.10.2-29.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd65befbb633a9c2a6d9cde057823926e', 'RHBA-2013:1647: mysql bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Users of mysql are advised to upgrade to these updated packages, which fix these bugs. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1647 https://access.redhat.com/security/cve/CVE-2013-1861 https://access.redhat.com/security/cve/CVE-2013-3802 https://access.redhat.com/security/cve/CVE-2013-3804 https://access.redhat.com/security/cve/CVE-2013-3839', 'Low', 'Low', 'mysql', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:5.1.71-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4cb8f61e667f6d8c94bf847c6d0cc542', 'RHBA-2013:1647: mysql bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Users of mysql are advised to upgrade to these updated packages, which fix these bugs. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1647 https://access.redhat.com/security/cve/CVE-2013-1861 https://access.redhat.com/security/cve/CVE-2013-3802 https://access.redhat.com/security/cve/CVE-2013-3804 https://access.redhat.com/security/cve/CVE-2013-3839', 'Low', 'Low', 'mysql-bench', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:5.1.71-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x04a56c11be15b9a037c63c02a3740085', 'RHBA-2013:1647: mysql bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Users of mysql are advised to upgrade to these updated packages, which fix these bugs. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1647 https://access.redhat.com/security/cve/CVE-2013-1861 https://access.redhat.com/security/cve/CVE-2013-3802 https://access.redhat.com/security/cve/CVE-2013-3804 https://access.redhat.com/security/cve/CVE-2013-3839', 'Low', 'Low', 'mysql-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:5.1.71-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8d5f5aee6922f0358b1ccdfe4764edd0', 'RHBA-2013:1647: mysql bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Users of mysql are advised to upgrade to these updated packages, which fix these bugs. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1647 https://access.redhat.com/security/cve/CVE-2013-1861 https://access.redhat.com/security/cve/CVE-2013-3802 https://access.redhat.com/security/cve/CVE-2013-3804 https://access.redhat.com/security/cve/CVE-2013-3839', 'Low', 'Low', 'mysql-embedded', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:5.1.71-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc2e84030432128900c5d6c44bd06205c', 'RHBA-2013:1647: mysql bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Users of mysql are advised to upgrade to these updated packages, which fix these bugs. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1647 https://access.redhat.com/security/cve/CVE-2013-1861 https://access.redhat.com/security/cve/CVE-2013-3802 https://access.redhat.com/security/cve/CVE-2013-3804 https://access.redhat.com/security/cve/CVE-2013-3839', 'Low', 'Low', 'mysql-embedded-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:5.1.71-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x50d9d9c3a6138108ed54657a124d68dc', 'RHBA-2013:1647: mysql bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Users of mysql are advised to upgrade to these updated packages, which fix these bugs. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1647 https://access.redhat.com/security/cve/CVE-2013-1861 https://access.redhat.com/security/cve/CVE-2013-3802 https://access.redhat.com/security/cve/CVE-2013-3804 https://access.redhat.com/security/cve/CVE-2013-3839', 'Low', 'Low', 'mysql-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:5.1.71-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe3e1f75a35fce4aa37da1a5838095aa5', 'RHBA-2013:1647: mysql bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Users of mysql are advised to upgrade to these updated packages, which fix these bugs. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1647 https://access.redhat.com/security/cve/CVE-2013-1861 https://access.redhat.com/security/cve/CVE-2013-3802 https://access.redhat.com/security/cve/CVE-2013-3804 https://access.redhat.com/security/cve/CVE-2013-3839', 'Low', 'Low', 'mysql-server', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:5.1.71-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x169302cc1b283ce47a8367f7de5cbcc6', 'RHBA-2013:1647: mysql bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Users of mysql are advised to upgrade to these updated packages, which fix these bugs. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1647 https://access.redhat.com/security/cve/CVE-2013-1861 https://access.redhat.com/security/cve/CVE-2013-3802 https://access.redhat.com/security/cve/CVE-2013-3804 https://access.redhat.com/security/cve/CVE-2013-3839', 'Low', 'Low', 'mysql-test', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:5.1.71-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x45ae3e2cd2e113387adad634efc75e91', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaa1c58d9deb9934a1b7986ca96f5ae57', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf67f9cd3c28788e62aa1c9c1ede7abe1', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-python', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x853843d7a21ccbc399e5adb3186c429d', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5c2398ce1d9644d31b06366e3c896612', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa7f38b4786dd2a6fb8bc10acb0adc089', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x83e040fe16777f5e6dabd3f7d3c5ec4f', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x04e4117c50dd71ea0d14666a1af131a0', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-python', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfd90d72126780f1accea5444d66a3c6b', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'python-sssdconfig', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xaf683900a75f13813f0070dcf31382ad', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe58a2b67dc0fd4c5b4609082bed68f0e', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ad', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x099c172af092cf0b766296d51502df93', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-client', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0392e58d33ef04596c940db5e98791c5', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9a0459090b4ec6757e1d4493390030c6', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common-pac', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe392e73cbffcf18c20a3f30ad7b73017', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-dbus', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9cb15afbc90ab7d7e0e9697c77588f9a', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ipa', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x36472032fee359804f56fb2fe4c6d4c6', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8c0ff7ef11f94616eda2454742282d4d', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5-common', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x21b19c396aa4f68b334658d82b8a33ce', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ldap', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9321d8ccea0b96c851dc8fefd3111092', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-proxy', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd2faa7885b921f87aee20500e1cd1d33', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-tools', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf1329e8b52de92f4706521d9791c24f6', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xcb-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.6-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcbda7ba591ccd03a1c2b1b0f3055db86', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xcb-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.6-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x801f97e71a38e4acd76973702970fe8c', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-acecad', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.5.0-7.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x92e40c14de13d684cc6d46bae9a42785', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-aiptek', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.4.1-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd48cabb575cdcada3529e4421584d516', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-ast', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.98.0-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa8ccaa8547f7f21a831333a42505d396', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-elographics', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.4.1-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8f4b3e16475a32a9c6351f6e0ffbbad7', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-dummy', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.6-15.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x175dff9435342ca7cbabd27324ba8f61', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-fpit', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.4.0-6.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xba883a027094194ddf6400dbe43ba3ec', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-hyperpen', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.4.1-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa8d3c2972e3c29ac346939c192d57283', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-geode', '', '', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.11.15-1.el6', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xd8ae1e065f7490407f4612d436323b07', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-keyboard', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.8.0-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x08da45f9a082395d2723a6799dee610c', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-mouse', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.9.0-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1951153acc78849ca41c7b1b172b698f', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-mouse-devel', '', '', 'i686|ppc|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.9.0-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xffc33b98c65d6cf799f06c03eda0a4c4', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-mutouch', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.3.0-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4dbd7dfec8f8616749fef9f712c5f83d', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-neomagic', '', '', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.2.7-7.el6', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xa2d38ab84e42deb1775116261b28d22b', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-nouveau', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '1:1.0.10-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x64d491e1595a716e85c419299da01820', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-penmount', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.5.0-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb7dbf849b4c017c0bf47ca2120799c8e', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-nv', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.20-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xde0a95db5594f902439b4142ddca97a3', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-openchrome', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.3-6.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa817e1a9d8a85f16836f4f2b83d6d629', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-openchrome-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.3-6.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x14d3ad68f58459af5c2897a5891148fc', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-void', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.4.0-23.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9fa495272dde3383ae175d322f686572', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'libpciaccess', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.13.3-0.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7a5a858a46b7c08691faf47654c482a9', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'libpciaccess-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.13.3-0.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5b1220e9f67e20ee30a662be9c881a4f', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'libwacom', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.8-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2d558a85865c4bc9e22b5b3a40bc0f42', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'libwacom-data', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.8-1.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4b447c558302a5bd28c9b4c0538fda9e', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'libwacom-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.8-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1ce03d115f8c668ce73d5721083badf4', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-apm', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.2.5-10.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf2074d055d34d778fad8310edc08b498', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-cirrus', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.5.2-2.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb2c8645cb86c62865e9cf6ca2aebf20a', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-i128', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.3.6-10.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2baebe5744d4fdfe6f5d9aff78224bc7', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-mach64', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:6.9.4-8.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x13ae1a39fc77099ec39bfcaac248685b', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-rendition', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:4.2.5-10.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdd085b9a107258cc39461a24723b60ac', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-sis', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.10.7-10.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x51cda96874bf42ac75405f718b7075fe', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-savage', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.3.7-2.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7b354f45e4a1c776ffda9e3cf5b51af4', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-sisusb', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.9.6-10.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x950c777a4774e06e7b964b135623bfde', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-trident', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.3.6-10.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc47b2a93b7f353bd3a0b94b7abd3d131', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-s3virge', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.10.6-10.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb89e4387dc5aa5c778b82b3d1e5d7c4b', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-voodoo', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.2.5-10.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4409d6544c809e5094d93ae254f4f076', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-siliconmotion', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.7.7-9.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdb5ec79c486729abf4d1b670ad1c2821', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-vesa', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.3.2-15.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7864ac35e910c6ca205f2e6418b239bb', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'mesa-private-llvm', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:3.4-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa985af3c6c54bba8df23da96d74110c6', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'mesa-private-llvm-devel', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:3.4-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x82d12acc4a8a32b0924e15744837af79', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-v4l', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.2.0-36.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x96d250a1ad5b060accfbb0062852a669', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'pixman', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.32.4-4.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x820d053afafe65292d21ad550c60ef96', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'pixman-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.32.4-4.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcf98c33d1954feae066ba5470756555f', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-modesetting', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.8.0-14.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4e64546f8088c29626c6fc466ae27ee0', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-ati', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:7.3.99-2.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x95f495cef03eb867d98b3304eb17f94a', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-ati-firmware', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:7.3.99-2.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd681ce9b2c86448d46456fe6babaee16', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-synaptics', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.7.6-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9cea5c7b54671395272630f3c4859700', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-synaptics-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.7.6-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xed2dc6a0ad4ff904a49745464c579a8e', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xcb-util-image', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.9-4.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa1e882b085d4b238be213368b31155e4', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xcb-util-image-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.9-4.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xac6a20e97838b8cdfc81d6c8d93af33d', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xcb-util-keysyms', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.9-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa3890dc20012b9a70b63aa1af2ecb076', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xcb-util-keysyms-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.9-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xffa068fd31aa0372d2a17ee739f37bd3', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xcb-util-wm', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.9-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdd92824d76a80021ee00171540c3b1f5', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xcb-util-wm-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.9-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb2b318a906dd9b4e28682e648db22ab8', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-glamor', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.6.0-5.20140506gitf78901e.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x80b72511a954089b43f9f689d41d4800', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-glamor-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.6.0-5.20140506gitf78901e.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcf8b2c17f8abd256ac82035e0129c20a', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'libdrm', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.4.52-4.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcbe2c36e0a92f50a4111033a4dbbd42b', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'libdrm-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.4.52-4.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8d6ff2fc91117abd4b2d1be9d30b39b7', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-wacom', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.23.0-4.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0a472f0ea21aba7b0966631501abe9c1', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-wacom-devel', '', '', 'i686|ppc|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.23.0-4.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x68d84509bc9e6f5f1365bb72bb3bb216', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'glx-utils', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:10.1.2-2.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x14955f0a46bbf4184316ad0abd67acb0', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'mesa-demos', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:10.1.2-2.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfdd28b6fe7bee1632b24dc8e9ed[...];[ Date: 2023-07-04 18:39:53 - Bind query: yes ]
4 8s636ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\xdf50f6701c6896c7d4a3913e3dc9f36e', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe64c4b5d41feaf725a7863e710333e34', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x250773d0f2e2a6c8664304473f0d8bcb', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4d632f3165ad2c0fed1b6760a550a9cc', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5cd5a8e953b7742b776b2126ee6a4697', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb0d1984093d149b5aec45ce4d0b741ed', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa7b783844fe6ec3a04eade04090cf43e', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x197f2faf81b9609a4cdcdbf9805d612b', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x77f67e4d807c1e2760b54dd265b1eada', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb56127cddbbb27a3e5393b80fce73eb6', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xeac4179aa959f68f08d887238d0d3f8d', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x072fcd827c425ea0abe7bafcc150514c', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe1ed92fe9adaa140fd6a4f77f358d60f', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x80234f8656c431a8d1f6236ac5c6e866', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf45446966ff981a6e758d909294c9a36', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf2fc35e9978f26f6b21150e4a61bf0fa', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5ce58ca05da5f1b4420a323d014bc4db', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x868ea871fb6449e92dedd5cb34921c1b', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x74edf32858d9f890dba214a2a7bdc39d', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3066939e96c2343450ce97f81bab780f', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xac03dffca16749f6ff0f7faea88b129f', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x69e16066b8dfbadbdcb83f202506c7c6', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfd71a98927f60c3a0e22fff99d9b3cee', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x439c57179ebe58ee89f202ac9693fa81', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbee219a223bb3a28fd1f279ae7f7eda6', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4b7933e23db4163fafe4bd30e9f5c9d6', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf10bb0b56a1deb6e26c1d8b71ddf142c', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1cd32c05d4d2cb08eab88eb057704e06', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc2d2255b8b9e9edb59f783c724865909', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8a881a162c87893d7c2b758b017b8f07', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb7fd23c77e3fa08beb9b18b328343f13', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0449f541296ff890055e849de1c1c158', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xad965155e7ad1c1413a4b600ced119d9', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x85d398eea9be26d6a8fa231f0821210f', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x72038959c25eb26ef799f9e1f9eecf8d', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x02cbed00a83fb7d2756c45e1d48c9f65', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x062c6b236bed03f89b23fa5d11cf5927', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf4681d1ba026830049aceed5a40d7bc2', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2c5ced01d06900f03bc8dc6fd8574e3a', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x91a0493b266fc427a35bba3761aaba1c', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x89eb17c8c5aa3bafa46d05d7708a77fc', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x12e95f3ca03233eb2c853e36b254a5d1', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5ca226f90379855cc4792e78d5a2c93a', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc212e6c246a4b48f7101fade65d51f6f', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x412502ed0e3e20b43463f9801f32e421', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf5b8f0486cf4c3469691614a4e43fd7e', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x68ac3f0f18adaf76b8ab2867c843ba2d', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xccdf13184cfa60a6423053a5e14aa7c4', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb5dc36a49801dd51e2360e4d2273915c', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0b4513bd95363b72e6e59ffa4719f978', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfdb25bf7cb626c770638b20b6aacf119', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x96841bd97f4ec7dc1be3415d7b50918b', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6830da9e3a001cb7ed432f7d8c572853', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xff169aaa7619db3234309b7a1547c628', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x993b15f672b9316308b446ffc3a4e56e', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9b10b456619265506d2a9a714e79e3ae', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc32682f754fb2b8552fd495c74cfd85d', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7f30fbb56e14f332619ff37b11f615c7', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x645c08bfbdba8188440e9876774861e2', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbb4a1699af7a40fef03e576e30f3ee04', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x61b0b2749c587595aedc7024a9c1c588', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x93dff8409768a0e0764d596f7b7e0cad', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x115d32acd89d9380682a123e22a0a7a2', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x005c3206abdbb7f865248e0589034d62', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6822e035904832c2721d03deaf51a3ff', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1c04b401b7d3f30e866b85e48db8a812', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xab36e56bdab0391442369fd2f3a4720b', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb6c5dbb4e7dfe99382f42af2c8e4cb1d', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa3936004518d5283df3293651b90db50', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9793dfebeca9321d5011dab44f6ef3fc', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1134a1fce80ae2dcfe3080dd82b9dbb5', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd7e0e2f9331566e5819446eec2c4def3', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7fbb18a44021627f3d89b7c4ea82a466', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3f50ee1513a7cab3ca9223f325065623', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3979849fe73aafac238b47e4e9bf83b4', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x505519e74e466ca3449d0f646d65fd18', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x52e7f3ef267883eaa67c317a765980cc', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfe6120025ea49a4ce2b28d94a884a191', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x36aa69b4942e5adc2e86194ae8c45297', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2c7307441c2254609d96c2b3da8928c0', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb9fe6ce8b8f9b37384ffa8980dc80f25', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x63d1f6905b604fa09cfc17110175b58a', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa0eb77aca3ea23d95a7d544d7e70fb3d', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaae53463e0cb74484c43eda252dd7a2b', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe469f7837dfa827398605ec1724e64d1', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903', 'Important', 'High', 'git', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:2.31.1-3.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5c05493252de8a4300aaed91fecadb32', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903', 'Important', 'High', 'git', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:2.31.1-3.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x51b158f1e97ba820eda23af5af7aacc3', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903', 'Important', 'High', 'git', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:2.31.1-3.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x13aa8067cd53f6867c322d38a5b645fd', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903', 'Important', 'High', 'git', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:2.31.1-3.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xeb77cc304f2905c786a59e2005bcab14', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903', 'Important', 'High', 'git', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:2.31.1-3.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x00740ef4840f8261a0a8a44eff3dfa4b', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903', 'Important', 'High', 'git', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:2.31.1-3.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x401f8d646845222932ded9d1e18ca04e', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE[...];[ Date: 2023-07-04 18:39:16 - Bind query: yes ]
5 8s85ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x7f8368a83a1bc42259a21974fa3fcbfb', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-dbg', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x86a61158fe043950c2faddcc6363a6c5', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-dbg', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x883906866c8a0c22c28e73c523ceae35', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-dbg', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3d2b27d1359acd82b953801b10d1538b', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-dbg', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3bbe91f471a0bf14016e3caa75101c0d', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-devel', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe9a6de12e4e3701ab2089e678643fa5e', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-devel', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9ba4a76c282393d938fddc5f8d63da3f', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-devel', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7563f6ddc6748e469249e18d13a3b832', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-devel', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe55e5eef2d570cc476510350ee489ec4', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-embedded', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x59a986177556f284eb438386a670ff0b', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-embedded', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3e8f9b1228720941182cc40f95d90e7c', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-embedded', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5c2f40024bea6f107c575912113e701b', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-embedded', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x14bc0995582c8241172762903bb3a463', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-enchant', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb247aed9ed826e52c2bca5987e35f5af', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-enchant', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x40a28a11a14ae04f132e7cfaedd07a7f', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-enchant', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd35983e29de03f2ec0687492b20bdded', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-enchant', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x33126307a3c3943f1c2cc634cdf7245b', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-fpm', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x51d3f9f5459d54acda8fce40c1ff9fde', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-fpm', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc481d4de3004959c5fffa57ba5bded45', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-fpm', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x086e7c608c4f5cf8e9c7388598f3229b', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-fpm', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1d66a1508071aae9b51d0840892d6123', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-gd', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6b535e914a6e62aab733045d55fafca4', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-gd', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3a6f63283275985f0103e58eb316364c', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-gd', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x377db08cfb552a733587d041ee5a74c1', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-gd', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbcc5220f5cf969b719c4332f36668819', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-gmp', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf243a8bc87ffaf0b4ba8036dd4c8fbc7', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-gmp', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4d981d800905e120511fa07923ec3b6b', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-gmp', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x32877a978e51d461cdcbe40e305120a3', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-gmp', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3a96cf1483d72104a7bdf9767faa486f', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-intl', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2c84c6ed80d1e871214ee0d3b0bb3ffd', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-intl', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf73c63e164941266471105b8956bb1c2', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-intl', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa9a3342f58e8d3b54ff15b06d185779c', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-intl', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe70792073b5f4d948e8f966bc0576063', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-json', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1edb45d51fdd04b83e92d0cb14a273f7', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-json', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x89c007fa71f2c7f5e728a3f6616ab285', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-json', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x401dbe0282728eccb5b24c490381607b', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-json', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x786291f3f6bd74d6f52191b7c38aec25', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-ldap', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x074188119f274c737c83e3a586e99df7', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-ldap', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9ef2e4790e36cd3726979174882dae1f', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-ldap', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x01719c777591c628a574c1c4ff4ded4d', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-ldap', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf263952739a0d83de3bec47b40d5e329', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-mbstring', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x746ed19a7fe2370f08ef866711cd2f2c', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-mbstring', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb04060607e2d7f924679e74d7e52bb07', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-mbstring', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x93966baddda66b0cb48683146546f118', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-mbstring', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x33b50454657b05b90323a25f77b866f0', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-mysqlnd', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4171ab7537c6d6d5c94449f168fe5bdc', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-mysqlnd', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5b8c4a5c2fe8c6add3e1eb6c37248526', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-mysqlnd', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x27242b990ee057d95a8d0a0ca4b10bcb', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-mysqlnd', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfa898a9f41ffc4bf712c61347cc8db5f', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-odbc', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9853879c3430c2db2a34f521b52a1e4c', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-odbc', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3f420e7c11dfc559d68588f922da9703', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-odbc', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x48b6e3be0dbcabad6f615c27e46553a0', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-odbc', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1d2c928ac87eb7d68f7efcf01ad79c66', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-opcache', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x27a2dc61d695044dae656ea74fb03736', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-opcache', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbbb5c92f65904ac163d275300cffae1d', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-opcache', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xddd50ea72111037f9d5557bebde374ee', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-opcache', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbfbef2079bae2fd3e4092efc77da75d1', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-pdo', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4e8a0f4b4cca56a1701ec190485b8e07', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-pdo', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5b4d3cbb3df5604ecefda0fbcd9cd844', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-pdo', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3d8d05e7c3002b1b97d376150f81bf53', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-pdo', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x28155c35fe5a44445915376a309d74ef', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-pear', '', 'php:7.2', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '1:1.10.5-9.module+el8.1.0+3202+af5476b9', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc5e129bc9c04b7e6fb72704cffb27dc8', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-pear', '', 'php:7.2', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '1:1.10.5-9.module+el8.1.0+3202+af5476b9', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb2e603e4ada6cfccdd4e8edc94e4f3dd', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-pear', '', 'php:7.2', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '1:1.10.5-9.module+el8.1.0+3202+af5476b9', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0b9ff80d0c2bf2f5c87e210bdd1c0487', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-pear', '', 'php:7.2', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '1:1.10.5-9.module+el8.1.0+3202+af5476b9', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x825c89810b0f564e4aec2446ded23808', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-pecl-apcu', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:5.1.12-2.module+el8.1.0+3202+af5476b9', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd10da39fb59109820373dffeea5900c3', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-pecl-apcu', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:5.1.12-2.module+el8.1.0+3202+af5476b9', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbbb81263c35f54a7bcb9c3218d2b57f6', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-pecl-apcu', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:5.1.12-2.module+el8.1.0+3202+af5476b9', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x756e864ab2d210076f63964478572fe7', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-pecl-apcu', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:5.1.12-2.module+el8.1.0+3202+af5476b9', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0d96117e47631a3717c2201ae778e244', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-pecl-apcu-devel', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:5.1.12-2.module+el8.1.0+3202+af5476b9', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf71cebdeb6702e30ec308c24a974f948', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-pecl-apcu-devel', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:5.1.12-2.module+el8.1.0+3202+af5476b9', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd9817a2df9431c9f3e25ef6a697b7144', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-pecl-apcu-devel', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:5.1.12-2.module+el8.1.0+3202+af5476b9', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x295aa148ef0a1204c3c99705b3c589eb', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-pecl-apcu-devel', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:5.1.12-2.module+el8.1.0+3202+af5476b9', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7ee0b348ad4c3959507c1bdc05d3496e', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-pecl-zip', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:1.15.3-1.module+el8.1.0+3186+20164e6f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf16e4b57b5557ae8fe9cacc99220aec8', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-pecl-zip', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.15.3-1.module+el8.1.0+3186+20164e6f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0735603bd7605c6d04de0389a6340a64', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-pecl-zip', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:1.15.3-1.module+el8.1.0+3186+20164e6f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8b3a1149883f6548a7e3748ed3ff80b6', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-pecl-zip', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.15.3-1.module+el8.1.0+3186+20164e6f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd51cc3b763f30bab5362cc0ee6536e90', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-pgsql', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe61e6826a29d2a4aa5aba266f672eef3', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-pgsql', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd800ce9d42dc04b9c5106d35535f62f8', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-pgsql', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6b15d5f394d729da8208bd44a1c275f3', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-pgsql', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5d24a4bdf5a590d334871bf304761b05', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-process', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xafb3361a70035a87daf0a4370db0ab8c', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-process', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x84b7e8afafe249e6e77539c362d70b9b', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-process', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5278e45d22998aab66261b85079d4c20', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-process', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3f5183c14653d34812034f9c41f74c15', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-recode', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa0d0407155b3f1726f593a70aa71fcc1', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-recode', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x71f3b27d4d2f40efce2e63e3169a78f0', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-recode', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x08c49b6ce94a37fcd89ebbe8497a0512', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-recode', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x45484003e31ffebb37f730c96b48b7d6', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-snmp', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6c216480aae98297b1444846c6817dd3', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-snmp', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaf842795f3aefb075cc80ec448434783', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-snmp', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4ec26b01b9c45a76ad1ddb19a416b72c', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-snmp', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x93fe948f7354962d48228a62b22475cd', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-soap', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x72541cbfc03f0c9b2d8e5e0890a84a30', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-soap', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcd24db491e3b76f889f1bfd05334c296', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-soap', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7073e421dbf05cf4c963da5626e7f31f', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-soap', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6250a0ead44605008f84a564b802663e', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-xml', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x67de91336dd4844a2eb1a5a65af3136e', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-xml', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0f250fd44cd6375fcffc57997f912ff9', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-xml', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3034fcf398e7aa53cbd678acda069085', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-xml', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x57d200170e39f1ef5270b760f8c3cb42', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-xmlrpc', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdf49040fb0464b195345b97dc31a7ff3', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-xmlrpc', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x85d5404dc5096f233c10cc65aafa698d', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-xmlrpc', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x485da1cf98e4cdac7bfdc0cf4b62c505', 'RHSA-2019:3735: php:7.2 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3735 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'php-xmlrpc', '', 'php:7.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:7.2.11-4.module+el8.1.0+4555+f5cb8e18', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x171d95c2aa92486d631e75d461bb9664', 'RHSA-2019:3736: php:7.3 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3736 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'apcu-panel', '', 'php:7.3', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:5.1.17-1.module+el8.1.0+3189+a1bff096', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0475fc8ce3c8e13f5e7a84fda5e3b7d9', 'RHSA-2019:3736: php:7.3 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3736 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'apcu-panel', '', 'php:7.3', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:5.1.17-1.module+el8.1.0+3189+a1bff096', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x182156f16a7f9cedf437939018f96878', 'RHSA-2019:3736: php:7.3 security update (Critical)', 'RHEL8-rhel-8.8-aus', 'PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3736 https://access.redhat.com/security/cve/CVE-2019-11043', 'Critical', 'Critical', 'apcu-panel', '', 'php:7.3', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:5.1.17-1.module+el8.1.0+3189+a1bff096', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x46a5e39461cae86a028778a589cd3e76', 'RHSA-2019:3[...];[ Date: 2023-07-04 18:39:52 - Bind query: yes ]
6 7s933ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\xe72c506f68b454d6a83947de8b6c145a', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-cli', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5:nfs:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xbfdf5ec6ff918bf3abd2b0142cb22781', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-cli', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5:samba:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x84ca31801a58ba100db90b510debd254', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-cli', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5:server:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x9c8474142d5118f83a20bd516ed1c634', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-cli', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5:wa:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x43606d57065695f9b0b604490f7a36ed', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-cli', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3:client:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x43c8d43ed45f63c13a30ee9db8a99d57', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xdc6eacd2baffaa30db0523f228d5a197', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xbf239708d585a2511f4a3e140d1da0ed', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1:bigdata:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x3e37895633c13ccf4778ce7596f481c8', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1:nagios:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x9980ef0d0be1435db73b8d3b1033e513', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1:nfs:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xc5d92ff81a279de6b157e34166a4aebd', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1:samba:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xde26d018f47bbb622f0a5f6b37cb5878', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1:server:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x36aebc68d3e839604be952a3447d49ce', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1:splunk:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xa338ac0ef47e54ba3073b8fd194e3f73', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.2', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x5a7e5b8099bc423b50c598fd723e833e', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.2:nagios:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xfca69ba841669b68c2cb2396c2cf1375', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.2:nfs:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xdda1f5cf97138eadeccb941fe7ba870f', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.2:samba:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x38d25f271434ad7d95802ff2a966fe2a', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.2:server:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x8dfcb576d7cdd5a290ab57e076b1722a', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x74fda6c80319e0463113d830b75dc462', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3:na:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x55dd2dcbc2147c26ad6c6ac04979ce0f', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3:nagios:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xb6c44ea640079fc2be65fcc0ac9f98d5', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3:nfs:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x5bc5b6b07aa01b95c8c329e069ba2daa', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3:samba:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xf88951e085aad44ca3232d8faf931b01', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3:server:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xfeea556c82b58e0d0abe7eac50bbc499', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3:wa:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x74ddbff743fa4e546d920b5a2db60a35', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.4', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xcfc4f5473cbf642258a7eb299d9cca2c', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.4:na:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xd0019e8d6f21eda876e95fb5e3cc7b28', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.4:nfs:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x35050ced4a78c7c9336a2181b454da30', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.4:samba:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xe6ae1f76dcf1080322d6f52f092dcc99', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.4:server:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x325a419b40e689526c521707e5c88cf3', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.4:wa:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x4a1aa6a5359c7465211596a881be94d1', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x0f291b7ef9f4c01291e83e4d204421da', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5:na:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x89749dd169d79f55cad2c8fb397a1321', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5:nfs:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x0269440059b14a41bc55b56efa6ed840', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5:samba:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x87dcd7aeb7a29fdbfe482064b501208f', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5:server:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x7f71972b35186fb24e3c023890aa2833', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5:wa:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x3194a9be908ba67769b0a403b23d5c99', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-client-xlators', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3:client:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x60459e355badc800ee94f5816cfc3063', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x8c2359455ffc5dbf489a53a06454b332', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x1154664d27126f8f34924877a94ea5db', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1:bigdata:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xc43c29533372a12f8aefe65cdcffc3b8', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1:nagios:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xd5e26b738144a750cff3dfef7ef8c1fa', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1:nfs:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xce580a272af6eef14df6863d3d287175', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1:samba:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x200a0c08a0841b889a358b8b6dc2d196', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1:server:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x44923aa21e7edf09fb60e58564e26f46', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1:splunk:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x0acb3957d6505086c940d2f433292732', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.2', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xaa26b793341d7e5bdb4a40532fc4d097', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.2:nagios:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xaf3eac4cb5ccfa45cb438461e9a62fa6', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.2:nfs:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x91818b5c109c50fbc22f38517a89c2a0', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.2:samba:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x8174c22552ebe3f5b760a9ca55ba5092', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.2:server:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xef1d0bb6e330503ead67b6996ec04382', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x1094de27480b1ec9939e9061f91ac0e1', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3:na:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x799253922c8904ca338be15e825787e7', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3:nagios:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x7c12df203ff32c2f28acca7da1b7a86d', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3:nfs:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xa5d5ac699882129df56803a534049d52', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3:samba:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x765ee0648044ab3a8eab17bdd30b2100', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3:server:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xaba7385305abf5f70a4b6dceabe849f7', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3:wa:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x005ddf3342b0d3bb220728671ffa9c3e', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.4', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x2ebd89ba2601c355db6badaa4e7b99a0', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.4:na:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xbafe02440c41ef448df7de9790599c94', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.4:nfs:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x6a5827f78811e34da6ab45fd8804ecd9', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.4:samba:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x958c52217061c160055480d0a717fb81', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.4:server:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x61f097bb966b9df1bcf3e2005ab173d3', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.4:wa:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xeafa6f5a5c82c0c70e9392a6f51072e4', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x37269d2cea4f39a54f9f4190883bc7ce', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5:na:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x52d14beb91e442753d1578a6b7211642', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5:nfs:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x62519c8b2d9e22f4921523d89b24bba6', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5:samba:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xb57e1a26893ccec6968a5de4824bfb38', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5:server:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xa11300354b36a5c08a3d950a00bf647e', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5:wa:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xd5c2d846c3b0ab1aa3ba8318733c5418', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3:client:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xf0d1116766d5ac3959851a095b5b98f6', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xdbef6fc6f92ef7201cc13a2b60da68a8', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x7e4b2d9373d72a6ddeec6e7fc600a102', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1:bigdata:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x4bb5c4e0b679d016502204869e7c9189', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1:nagios:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x49d5aed41505d64326d97df12fa3c50c', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1:nfs:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xd3effd57510bbebe372fc1762bed4c60', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1:samba:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xe26a20125a25c0c9b7c138a0d1a8611b', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1:server:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x7dde36e863074520d7d5bf12af644f20', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1:splunk:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xdf02d503873d9b999949e43cfa51d3a3', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.2', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x81751305bab8353d65e23b5d777f2dd2', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.2:nagios:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xbffa2626c8ef0e258bbbbd70d0ebb8a3', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.2:nfs:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x27a156addbfe27a0acd7e0f5641ed9a6', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.2:samba:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x85f554d0475cbe6cf2fc97bfab880b25', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.2:server:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xccfcfb3efa5ffbf65ce340d2a3e5956b', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x615033e615d10ab88002f7fbd2112cb2', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3:na:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x3d24ebd65b119869317cb90c24f2d49d', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3:nagios:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x20999ca3bb2e23a3487e45fa3a1fa98e', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3:nfs:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x9e85e40d32a42ca8bda81019db4d3650', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3:samba:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x0621780c408299ebe6dcc487803a491c', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3:server:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x312c8e7ba58f2ee8c2b4ba15864ff076', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3:wa:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xbdb63ce52e85c57a36b59c2e552646a4', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.4', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x2ff2519854badf733f36fa8a3f7540c6', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.4:na:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xe0e18eecedad7b259d073fc6ecaae0f3', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.4:nfs:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xc645e92d776c2056ef389c5ab93e383c', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.4:samba:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x94c2daee101595484e0cbe9cf4f9b7ae', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.4:server:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x1707e5ca01782e24a3f4aba730b472d4', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.4:wa:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xe280e9ebac22663a77fef87654fa7fce', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xca1e4beb163188ba3be1707ff37a008e', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5:na:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x7ebb2db6684660b4643099a9ada0968f', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5:nfs:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x47d79d62f4b903311fcde83e5e37e74f', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5:samba:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xc3cf4a9c8836bfc42b3c065ce66fc8cc', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5:server:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xdac285311974e7ab8d01a76377da54a0', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5:wa:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xd2ed83fa9f10fb2a924a3107bcd6755b', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-events', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3:client:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x17496d09ca70a9a406067ffcc8f383de', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xe47ac8eef5313161e57b637ee09fbf52', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x6aea012ce39c6cb0e7f6c7814d72b55f', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1:bigdata:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x4b59099d913e6c9bf17d17ebdd53229d', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1:nagios:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x57108a11da164cf187dfb000b6aa45fe', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1:nfs:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x8ec99eef26bd4da0b9453e1cf806623c', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1:samba:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xd9fb427b82e6bc25f30de158f401aa63', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1:server:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xd00f567a7ca0aa71c92dcc5750d1cc5a', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.1:splunk:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x2576d4c5f30f85438f8a122a7861d838', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.2', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xc51c28ae1bcd66b546987b806dd8520a', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.2:nagios:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xac852ae79f79e456b86958941cf3c4d8', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.2:nfs:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x2a663ad6136d6ba8fbd9a014655a37fe', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.2:samba:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xd4a542ba22650a018fc92f52c03b7711', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.2:server:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xacb30cbaa6b020f3d93b3c39701fd93a', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x7d582951e8f2a9ef4d6c07a4e7cc2176', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3:na:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x7d60bccd5bc7f86a7be094f0cbadf8d9', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3:nagios:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x1faa6ce93847bf5e5cdbe27b83e89cb0', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3:nfs:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x636cb9ba20344514478bfe04b7bdb8b6', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3:samba:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x9460f72308be49fc8f1edee1c751482c', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3:server:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xd08b2e830b03b7396aca6c444db96cf7', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.3:wa:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x2eadb15220ca3446a7f14900b847463f', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.4', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x25f3aa5f0be29261725cda5f911e3d08', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.4:na:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x4830a7df9cb32a1d6fa2b0055354f285', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.4:nfs:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xf7faa505da1a7ff6ffcdcd18ebd61d15', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.4:samba:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xbb7d2be3e6553be5559cbd3af5e63bd8', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.4:server:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x93dbd2f643ef291b4480071613fb8b6b', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.4:wa:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xd6cde395fc244efe42b682f1440911c2', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x2ec099bd01df6fd6586964c4ce2e4d09', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5:na:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x73feeb525ea764fb3933db581aa3d26a', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5:nfs:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x7c46a20b9e4b5aa354b695ea88db8433', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5:samba:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x1b03ba85ebce814d3a1c3801b3143031', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References section.', '2018-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:1954 https://access.redhat.com/security/cve/CVE-2018-10841', 'Important', 'High', 'glusterfs-fuse', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:storage:3.5:server:el7', 'rhel-cpe-repository', '', '0:3.8.4-54.10.el7rhgs', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x97ed8f8b0e0adff81e71ac1cb6e587ac', 'RHSA-2018:1954: glusterfs security update (Important)', 'RHEL7-storage-gluster-3-including-unpatched', 'GlusterFS is a key building block of Red Hat Gluster Storage. It is based the References [...];[ Date: 2023-07-04 18:39:50 - Bind query: yes ]
7 7s921ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\xee16e5b709fbdb12689c7688aab2bd67', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcfda2c518aa24f5eb35ea6d72c6f08d1', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaf91862e55c9cc0c05b434971d044918', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7b586d5e6c69bca6695c78fff974aeba', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x483c93a86aaae8e6d030fb274a1f4c2d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb3390c9cbc4959fdf37c0a32e0ad3de2', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa5f851858ac7810ab8acbd72e02ee778', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x71608cbeba11adb99cd84f78cab68d6d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7149b31d3f195cc787cd6c0e3ceb799c', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x37056ef6fa1707ea87fb2d3f18ca533d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4f4efbb1c8e75f7e4678b45c97fa8775', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5aae70e9eda187fb4b78d97ffdeacd4d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xae39ee9314cedc45a2002b636a721dce', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x073cbf85ff50a5b7d16909b1a2d1095e', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcba602389cd5eb0d856c2c6336644620', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x047d9e7a71045de4c5b738e5ecea3ecc', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2e8287089b94676464ed939d897839e4', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd2e4d82703bca79020f322d007b91845', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7549447ab68ee3f9eb68dedadb60d6c2', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd65c4e26e6c38943345fb05eda599e1b', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb17d837e22103a0365df26c71186202d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcb0b801adba8d53f133344df70da30d5', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7e26a39d6ca0129ad2d42c78fdc891bd', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb42f609e4c47b9255ff4739ae486d031', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x218a13a0506ab94178e986ac0b0e66ed', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbaa1db9ce780d62e27d8d30508d80124', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x13beea1e27bbc0fc80e6574e159ffb8a', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa94e8fdfa58fb47e88ddc5a95780034e', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa803b1a081bbb8404d64d518c454121e', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2a9ceb61016da7509ceaac156a695842', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa6f7eeaf82e36d7d8ce4317f4df23748', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x35f06c69aaacaa81663beba8af569857', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8539820b8f9e0dc8bc94100d3f52703d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x875e2b664fbd400bc23e490da6269138', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8b5ee9b045f1599f2767ab4cedcc1822', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7b85342c00c3263ca29d2b1e77af9771', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfb6c7b1008c30233447dc5d4003ae680', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x02ea0bffb109722466cc01e93ff55cd2', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x53fe879d73faf9bfe9729490758fe416', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x47700bda8dea9d53b6a7479c50d5f039', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa60d2323fa988648b3adc876f561b931', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcef67f6f9fa7adbf45b79c98c2f6a4eb', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x662bd034ff2b8ceb7beac91e7bef5b85', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x07f3eb01b18ba99d416c5174ccae9349', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2f457f8c9f6ddfa01f8215de3fc2bb78', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x862a4261bb1ed4a05bbcca0828f1e211', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc9276a527e2b33561af4475f2722a861', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5a13b5b2001a34100a370ebedd51c79a', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x10802ab03f9318fc2fb52b0811bffce6', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x43dfa3f273dd39fc126eba2399b8ce0d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x82807b1a69910cc8b96eb73c6b29e8d1', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x86a5fd556b449424faad35d48184ec4e', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3b6759b77212f8cd704904eea2d61110', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x54c6fdaa9acd85d8874de3cf00da5b13', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcb353aa7b3ae1f9113c9f8ae8b747b7f', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6461f35d78dfa0bd78c453f283b01e01', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7edbb9f59bf677ea7f66de059fba2aa4', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x32e1638c1a56aa77d03239cd42cd0904', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x184209d030853c6361e2de63861f1598', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0af3eaace9357aadc58199aa39bb8685', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x276ff4618d9abd079e3357ff3fc4e993', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0527526cb681e4a53d77cfd3c42bf4c2', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa44f45286e47146ba58915af8b9da056', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd9c7491e9516e354a2a3098f339bc42f', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x774caf504b2eaf37ad6f7452c403e8ff', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x82135e5ebfe67d2af5a038752a5d33d5', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4d8c2165cbc7621623551003ebbe0a34', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4ba220428e2c017023016464e80f02eb', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3550ea99fea294e347970ecc21903dc6', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xce5fa538421d9f9df77030e0a642ce8b', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xed30b421450a245796a2dc4b8c1ff433', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x740256e5a9f4feef611641f8c738c815', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa58e395069157d7371981fab45053c6b', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xae920a2ba488ec9e9672ba3227651dbc', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x741107cc26abd451e2d742bbd7b19fff', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x24fcdae6feff2d55d81006f55695e465', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa05f65824f543d89486834675bfaaa8b', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcad8e126c1234a223aac0b79f58133aa', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x20cd5d59f85cc93b54fbf0e48ab5dfda', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc54534001ca3e93c5235c00d564c653b', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc98a0638b162010fd1327716434fe23c', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7b4311de265278ed837b01e16867acad', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb46b07a6d2254baa1ace5a044129713a', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9e9dd711ea568fe641b06f5c99c8f60c', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x59ee8d0a0cb3ab065c846f633b46fd75', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x479af0f4fc4585827f7f7cfeb355bcd4', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xac6b81406a814ac2775413b058d4ef43', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa89213ccb3739aa9564be382d804d72a', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5aecada0bf8fb2b062a63e57679e6e3f', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x787c42cedcd64053a65fb685a34418b9', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red H[...];[ Date: 2023-07-04 18:39:50 - Bind query: yes ]
8 7s883ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x290b41666ae14020bd7be4b6c0b50c95', 'RHSA-2018:2692: firefox security update (Critical)', 'RHEL7-rhel-7.7-aus', 'Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Alex Gaynor, Boris Zbarsky, Christoph Diehl, Christian Holler, Jason Kratzer, Jed Davis, Tyson Smith, Bogdan Tara, Karl Tomlinson, Mats Palmgren, Nika Layzell, Ted Campbell, Nils, Zhanjia Song, and Holger Fuhrmannek as the original reporters.', '2018-09-12 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2692 https://access.redhat.com/security/cve/CVE-2017-16541 https://access.redhat.com/security/cve/CVE-2018-12376 https://access.redhat.com/security/cve/CVE-2018-12377 https://access.redhat.com/security/cve/CVE-2018-12378 https://access.redhat.com/security/cve/CVE-2018-12379 https://access.redhat.com/security/cve/CVE-2018-18499', 'Critical', 'Critical', 'firefox', '', '', 'aarch64|i686|ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:60.2.0-1.el7_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1084a272edf011f2e9844b240b64bcf2', 'RHSA-2018:2692: firefox security update (Critical)', 'RHEL7-rhel-7.7-aus', 'Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Alex Gaynor, Boris Zbarsky, Christoph Diehl, Christian Holler, Jason Kratzer, Jed Davis, Tyson Smith, Bogdan Tara, Karl Tomlinson, Mats Palmgren, Nika Layzell, Ted Campbell, Nils, Zhanjia Song, and Holger Fuhrmannek as the original reporters.', '2018-09-12 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2692 https://access.redhat.com/security/cve/CVE-2017-16541 https://access.redhat.com/security/cve/CVE-2018-12376 https://access.redhat.com/security/cve/CVE-2018-12377 https://access.redhat.com/security/cve/CVE-2018-12378 https://access.redhat.com/security/cve/CVE-2018-12379 https://access.redhat.com/security/cve/CVE-2018-18499', 'Critical', 'Critical', 'firefox', '', '', 'aarch64|i686|ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:60.2.0-1.el7_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x74499cfafafb2ab66b0dbc6106521c49', 'RHSA-2018:2731: spice and spice-gtk security update (Important)', 'RHEL7-rhel-7.7-aus', 'The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing ''desktop'' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. This issue was discovered by Frediano Ziglio (Red Hat).', '2018-09-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2731 https://access.redhat.com/security/cve/CVE-2018-10873', 'Important', 'High', 'spice-glib', '', '', 'aarch64|i686|ppc64le|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:0.34-3.el7_5.2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8899b203372a16873864df814d492a46', 'RHSA-2018:2731: spice and spice-gtk security update (Important)', 'RHEL7-rhel-7.7-aus', 'The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing ''desktop'' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. This issue was discovered by Frediano Ziglio (Red Hat).', '2018-09-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2731 https://access.redhat.com/security/cve/CVE-2018-10873', 'Important', 'High', 'spice-glib', '', '', 'aarch64|i686|ppc64le|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:0.34-3.el7_5.2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4a3b4c8e8602c9db8f146433131c96a3', 'RHSA-2018:2731: spice and spice-gtk security update (Important)', 'RHEL7-rhel-7.7-aus', 'The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing ''desktop'' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. This issue was discovered by Frediano Ziglio (Red Hat).', '2018-09-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2731 https://access.redhat.com/security/cve/CVE-2018-10873', 'Important', 'High', 'spice-glib-devel', '', '', 'aarch64|i686|ppc64le|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:0.34-3.el7_5.2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8600535ad08b52ac1544fe262413aa28', 'RHSA-2018:2731: spice and spice-gtk security update (Important)', 'RHEL7-rhel-7.7-aus', 'The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing ''desktop'' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. This issue was discovered by Frediano Ziglio (Red Hat).', '2018-09-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2731 https://access.redhat.com/security/cve/CVE-2018-10873', 'Important', 'High', 'spice-glib-devel', '', '', 'aarch64|i686|ppc64le|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:0.34-3.el7_5.2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4a2acae60ad271122e526e555eef0511', 'RHSA-2018:2731: spice and spice-gtk security update (Important)', 'RHEL7-rhel-7.7-aus', 'The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing ''desktop'' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. This issue was discovered by Frediano Ziglio (Red Hat).', '2018-09-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2731 https://access.redhat.com/security/cve/CVE-2018-10873', 'Important', 'High', 'spice-gtk-tools', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:0.34-3.el7_5.2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x93005b3aa8fb3f2b6e4337b5f45e84f5', 'RHSA-2018:2731: spice and spice-gtk security update (Important)', 'RHEL7-rhel-7.7-aus', 'The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing ''desktop'' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. This issue was discovered by Frediano Ziglio (Red Hat).', '2018-09-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2731 https://access.redhat.com/security/cve/CVE-2018-10873', 'Important', 'High', 'spice-gtk-tools', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:0.34-3.el7_5.2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x233ee89dece54c68c37d99396d9b706d', 'RHSA-2018:2731: spice and spice-gtk security update (Important)', 'RHEL7-rhel-7.7-aus', 'The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing ''desktop'' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. This issue was discovered by Frediano Ziglio (Red Hat).', '2018-09-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2731 https://access.redhat.com/security/cve/CVE-2018-10873', 'Important', 'High', 'spice-gtk3', '', '', 'aarch64|i686|ppc64le|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:0.34-3.el7_5.2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x15682fb861fe574144308b3f50c2a0ec', 'RHSA-2018:2731: spice and spice-gtk security update (Important)', 'RHEL7-rhel-7.7-aus', 'The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing ''desktop'' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. This issue was discovered by Frediano Ziglio (Red Hat).', '2018-09-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2731 https://access.redhat.com/security/cve/CVE-2018-10873', 'Important', 'High', 'spice-gtk3', '', '', 'aarch64|i686|ppc64le|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:0.34-3.el7_5.2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x96a81e324ebfa437b43bb1630dc9c683', 'RHSA-2018:2731: spice and spice-gtk security update (Important)', 'RHEL7-rhel-7.7-aus', 'The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing ''desktop'' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. This issue was discovered by Frediano Ziglio (Red Hat).', '2018-09-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2731 https://access.redhat.com/security/cve/CVE-2018-10873', 'Important', 'High', 'spice-gtk3-devel', '', '', 'aarch64|i686|ppc64le|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:0.34-3.el7_5.2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x22d81f4c4fb373709f135e85ba192d2c', 'RHSA-2018:2731: spice and spice-gtk security update (Important)', 'RHEL7-rhel-7.7-aus', 'The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing ''desktop'' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. This issue was discovered by Frediano Ziglio (Red Hat).', '2018-09-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2731 https://access.redhat.com/security/cve/CVE-2018-10873', 'Important', 'High', 'spice-gtk3-devel', '', '', 'aarch64|i686|ppc64le|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:0.34-3.el7_5.2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2d6fe3ba91db7c022f0d32e0c6bed4fe', 'RHSA-2018:2731: spice and spice-gtk security update (Important)', 'RHEL7-rhel-7.7-aus', 'The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing ''desktop'' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. This issue was discovered by Frediano Ziglio (Red Hat).', '2018-09-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2731 https://access.redhat.com/security/cve/CVE-2018-10873', 'Important', 'High', 'spice-gtk3-vala', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:0.34-3.el7_5.2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbdc139e4d809b710485eee94f55e1638', 'RHSA-2018:2731: spice and spice-gtk security update (Important)', 'RHEL7-rhel-7.7-aus', 'The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing ''desktop'' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. This issue was discovered by Frediano Ziglio (Red Hat).', '2018-09-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2731 https://access.redhat.com/security/cve/CVE-2018-10873', 'Important', 'High', 'spice-gtk3-vala', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:0.34-3.el7_5.2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdff8dbb70131c1336618417297ab3d64', 'RHSA-2018:2731: spice and spice-gtk security update (Important)', 'RHEL7-rhel-7.7-aus', 'The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing ''desktop'' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. This issue was discovered by Frediano Ziglio (Red Hat).', '2018-09-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2731 https://access.redhat.com/security/cve/CVE-2018-10873', 'Important', 'High', 'spice-server', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:0.14.0-2.el7_5.5', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x094d859729d94c4d22f892580345467e', 'RHSA-2018:2731: spice and spice-gtk security update (Important)', 'RHEL7-rhel-7.7-aus', 'The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing ''desktop'' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. This issue was discovered by Frediano Ziglio (Red Hat).', '2018-09-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2731 https://access.redhat.com/security/cve/CVE-2018-10873', 'Important', 'High', 'spice-server', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:0.14.0-2.el7_5.5', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x816851a686db3e83b751e28ec45d86d9', 'RHSA-2018:2731: spice and spice-gtk security update (Important)', 'RHEL7-rhel-7.7-aus', 'The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing ''desktop'' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. This issue was discovered by Frediano Ziglio (Red Hat).', '2018-09-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2731 https://access.redhat.com/security/cve/CVE-2018-10873', 'Important', 'High', 'spice-server-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:0.14.0-2.el7_5.5', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xef60dbb097e83b730003d137baa68321', 'RHSA-2018:2731: spice and spice-gtk security update (Important)', 'RHEL7-rhel-7.7-aus', 'The Simple Protocol for Independent Computing Environments (SPICE) is a remote display system built for virtual environments which allows the user to view a computing ''desktop'' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. This issue was discovered by Frediano Ziglio (Red Hat).', '2018-09-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2731 https://access.redhat.com/security/cve/CVE-2018-10873', 'Important', 'High', 'spice-server-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:0.14.0-2.el7_5.5', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x6949d1907cdc33f886d06b5f5a698f25', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel', '', '', 'ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x647b6542eaada70099878d42184bebb8', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel', '', '', 'ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5f13d3da2833eacb38b678a7fb47ad08', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-abi-whitelists', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x828696746af2e688551251b9ba6766b1', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-abi-whitelists', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7ecd6eee79f925c3e03c9f40a319c073', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-bootwrapper', '', '', 'ppc64|ppc64le', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc355d2e98aac26cb8f05e002696b8756', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-bootwrapper', '', '', 'ppc64|ppc64le', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5a6cb5f8054745076c17de44e0307f74', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-debug', '', '', 'ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa56ed9de2a0d6513ad8112c6a39e14ea', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-debug', '', '', 'ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc0af5bb6a7f1e261621a97c00770a95d', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-debug-devel', '', '', 'ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3722aca2e4eed33f8dcdb56b962772aa', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-debug-devel', '', '', 'ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc9f15185990ee9d21edc6b80b44a6930', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-devel', '', '', 'ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1bdbaa5ba9fdba8b16ed2eebde4c2fc2', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-devel', '', '', 'ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x078dcbf5bc01cb00d8caef92e970b5c0', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe5ac137954c5ce5b1a209c4b7738a466', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x931d111b008111e86530c5c240f8302f', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-headers', '', '', 'ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb8546b9c5e00fb50711973c54f7f446d', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-headers', '', '', 'ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5e03c704f71100f6578149f7a9e043a6', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-kdump', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x5c036299343070ce19e183e7268022da', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-kdump', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xb384d220c0856601966dec0e90294655', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-kdump-devel', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x4681b90e28b5d856a867e48caeb105e8', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-kdump-devel', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x326c18648c9d81ed93a7eefd416fa215', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-tools', '', '', 'ppc64|ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8f75ad9a27773b3642446c3ee9aea5cd', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-tools', '', '', 'ppc64|ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbe2247941a80e89412409c13deed7b2f', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-tools-libs', '', '', 'ppc64|ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8a179820d8ca0b6c17848c3cedf0b938', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-tools-libs', '', '', 'ppc64|ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5fcb7c7964ce1f4bcebce8b30d518ffa', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-tools-libs-devel', '', '', 'ppc64|ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa0cfcf627e1e167e8e50cbf09eb27105', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-tools-libs-devel', '', '', 'ppc64|ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x862ca7e9018a6a2c755a84b2cd3aa4a7', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'perf', '', '', 'ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe37993a1a3527105665ec741f68b771b', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'perf', '', '', 'ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb9c9cba0cd5419807af546976b832eb4', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'python-perf', '', '', 'ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x55564ccf1c741faf2bfb5e98a4220fad', 'RHSA-2018:2748: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. https://access.redhat.com/articles/3588731', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2748 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'python-perf', '', '', 'ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbb5e10c0459a053146d8a55099dca746', 'RHSA-2018:2757: 389-ds-base security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-aus', '389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. * When a search evaluates the "shadowAccount" entry, Directory Server adds the shadow attributes to the entry. If the fine-grained password policy is enabled, the "shadowAccount" entry can contain its own "pwdpolicysubentry" policy attribute. Previously, to retrieve this attribute, the server started an internal search for each "shadowAccount" entry, which was unnecessary because the entry was already known to the server. With this update, Directory Server only starts internal searches if the entry is not known. As a result, the performance of searches, such as response time and throughput, is improved. (BZ#1615924)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2757 https://access.redhat.com/security/cve/CVE-2018-10850 https://access.redhat.com/security/cve/CVE-2018-10935 https://access.redhat.com/security/cve/CVE-2018-14624 https://access.redhat.com/security/cve/CVE-2018-14638', 'Moderate', 'Medium', '389-ds-base', '', '', 'aarch64|ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:1.3.7.5-28.el7_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x44edc1256d24eea1575848fca26a6478', 'RHSA-2018:2757: 389-ds-base security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-aus', '389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. * When a search evaluates the "shadowAccount" entry, Directory Server adds the shadow attributes to the entry. If the fine-grained password policy is enabled, the "shadowAccount" entry can contain its own "pwdpolicysubentry" policy attribute. Previously, to retrieve this attribute, the server started an internal search for each "shadowAccount" entry, which was unnecessary because the entry was already known to the server. With this update, Directory Server only starts internal searches if the entry is not known. As a result, the performance of searches, such as response time and throughput, is improved. (BZ#1615924)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2757 https://access.redhat.com/security/cve/CVE-2018-10850 https://access.redhat.com/security/cve/CVE-2018-10935 https://access.redhat.com/security/cve/CVE-2018-14624 https://access.redhat.com/security/cve/CVE-2018-14638', 'Moderate', 'Medium', '389-ds-base', '', '', 'aarch64|ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:1.3.7.5-28.el7_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0ca4be295a32d91c3bc91dd8dda29ff3', 'RHSA-2018:2757: 389-ds-base security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-aus', '389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. * When a search evaluates the "shadowAccount" entry, Directory Server adds the shadow attributes to the entry. If the fine-grained password policy is enabled, the "shadowAccount" entry can contain its own "pwdpolicysubentry" policy attribute. Previously, to retrieve this attribute, the server started an internal search for each "shadowAccount" entry, which was unnecessary because the entry was already known to the server. With this update, Directory Server only starts internal searches if the entry is not known. As a result, the performance of searches, such as response time and throughput, is improved. (BZ#1615924)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2757 https://access.redhat.com/security/cve/CVE-2018-10850 https://access.redhat.com/security/cve/CVE-2018-10935 https://access.redhat.com/security/cve/CVE-2018-14624 https://access.redhat.com/security/cve/CVE-2018-14638', 'Moderate', 'Medium', '389-ds-base-devel', '', '', 'aarch64|ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:1.3.7.5-28.el7_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x527aea29943eda383f27390fb29d3473', 'RHSA-2018:2757: 389-ds-base security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-aus', '389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. * When a search evaluates the "shadowAccount" entry, Directory Server adds the shadow attributes to the entry. If the fine-grained password policy is enabled, the "shadowAccount" entry can contain its own "pwdpolicysubentry" policy attribute. Previously, to retrieve this attribute, the server started an internal search for each "shadowAccount" entry, which was unnecessary because the entry was already known to the server. With this update, Directory Server only starts internal searches if the entry is not known. As a result, the performance of searches, such as response time and throughput, is improved. (BZ#1615924)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2757 https://access.redhat.com/security/cve/CVE-2018-10850 https://access.redhat.com/security/cve/CVE-2018-10935 https://access.redhat.com/security/cve/CVE-2018-14624 https://access.redhat.com/security/cve/CVE-2018-14638', 'Moderate', 'Medium', '389-ds-base-devel', '', '', 'aarch64|ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:1.3.7.5-28.el7_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf245d4c20c7ad0bc4225e428fafd593b', 'RHSA-2018:2757: 389-ds-base security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-aus', '389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. * When a search evaluates the "shadowAccount" entry, Directory Server adds the shadow attributes to the entry. If the fine-grained password policy is enabled, the "shadowAccount" entry can contain its own "pwdpolicysubentry" policy attribute. Previously, to retrieve this attribute, the server started an internal search for each "shadowAccount" entry, which was unnecessary because the entry was already known to the server. With this update, Directory Server only starts internal searches if the entry is not known. As a result, the performance of searches, such as response time and throughput, is improved. (BZ#1615924)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2757 https://access.redhat.com/security/cve/CVE-2018-10850 https://access.redhat.com/security/cve/CVE-2018-10935 https://access.redhat.com/security/cve/CVE-2018-14624 https://access.redhat.com/security/cve/CVE-2018-14638', 'Moderate', 'Medium', '389-ds-base-libs', '', '', 'aarch64|ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:1.3.7.5-28.el7_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3161a671259f2d807cb576067a58820b', 'RHSA-2018:2757: 389-ds-base security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-aus', '389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. * When a search evaluates the "shadowAccount" entry, Directory Server adds the shadow attributes to the entry. If the fine-grained password policy is enabled, the "shadowAccount" entry can contain its own "pwdpolicysubentry" policy attribute. Previously, to retrieve this attribute, the server started an internal search for each "shadowAccount" entry, which was unnecessary because the entry was already known to the server. With this update, Directory Server only starts internal searches if the entry is not known. As a result, the performance of searches, such as response time and throughput, is improved. (BZ#1615924)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2757 https://access.redhat.com/security/cve/CVE-2018-10850 https://access.redhat.com/security/cve/CVE-2018-10935 https://access.redhat.com/security/cve/CVE-2018-14624 https://access.redhat.com/security/cve/CVE-2018-14638', 'Moderate', 'Medium', '389-ds-base-libs', '', '', 'aarch64|ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:1.3.7.5-28.el7_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0f33795e6226c57039a2fcdaba11fb2a', 'RHSA-2018:2757: 389-ds-base security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-aus', '389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. * When a search evaluates the "shadowAccount" entry, Directory Server adds the shadow attributes to the entry. If the fine-grained password policy is enabled, the "shadowAccount" entry can contain its own "pwdpolicysubentry" policy attribute. Previously, to retrieve this attribute, the server started an internal search for each "shadowAccount" entry, which was unnecessary because the entry was already known to the server. With this update, Directory Server only starts internal searches if the entry is not known. As a result, the performance of searches, such as response time and throughput, is improved. (BZ#1615924)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2757 https://access.redhat.com/security/cve/CVE-2018-10850 https://access.redhat.com/security/cve/CVE-2018-10935 https://access.redhat.com/security/cve/CVE-2018-14624 https://access.redhat.com/security/cve/CVE-2018-14638', 'Moderate', 'Medium', '389-ds-base-snmp', '', '', 'aarch64|ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:1.3.7.5-28.el7_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0039e9b4026393bd8c91e1389cc0b526', 'RHSA-2018:2757: 389-ds-base security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-aus', '389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. * When a search evaluates the "shadowAccount" entry, Directory Server adds the shadow attributes to the entry. If the fine-grained password policy is enabled, the "shadowAccount" entry can contain its own "pwdpolicysubentry" policy attribute. Previously, to retrieve this attribute, the server started an internal search for each "shadowAccount" entry, which was unnecessary because the entry was already known to the server. With this update, Directory Server only starts internal searches if the entry is not known. As a result, the performance of searches, such as response time and throughput, is improved. (BZ#1615924)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2757 https://access.redhat.com/security/cve/CVE-2018-10850 https://access.redhat.com/security/cve/CVE-2018-10935 https://access.redhat.com/security/cve/CVE-2018-14624 https://access.redhat.com/security/cve/CVE-2018-14638', 'Moderate', 'Medium', '389-ds-base-snmp', '', '', 'aarch64|ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:1.3.7.5-28.el7_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x87ee335360bd75a3562f6dd945fa7f3f', 'RHSA-2018:2762: qemu-kvm-ma security update (Important)', 'RHEL7-rhel-7.7-aus', 'Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. Red Hat would like to thank Jskz - Zero Day Initiative (trendmicro.com) for reporting this issue.', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2762 https://access.redhat.com/security/cve/CVE-2018-11806', 'Important', 'High', 'qemu-img-ma', '', '', 'aarch64|ppc64|ppc64le|s390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '10:2.10.0-21.el7_5.4', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2124cc19ba7ae314e5308b413e7adbcc', 'RHSA-2018:2762: qemu-kvm-ma security update (Important)', 'RHEL7-rhel-7.7-aus', 'Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. Red Hat would like to thank Jskz - Zero Day Initiative (trendmicro.com) for reporting this issue.', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2762 https://access.redhat.com/security/cve/CVE-2018-11806', 'Important', 'High', 'qemu-img-ma', '', '', 'aarch64|ppc64|ppc64le|s390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '10:2.10.0-21.el7_5.4', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xce99f5300fc0e4ffa8946594834d8610', 'RHSA-2018:2762: qemu-kvm-ma security update (Important)', 'RHEL7-rhel-7.7-aus', 'Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. Red Hat would like to thank Jskz - Zero Day Initiative (trendmicro.com) for reporting this issue.', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2762 https://access.redhat.com/security/cve/CVE-2018-11806', 'Important', 'High', 'qemu-kvm-common-ma', '', '', 'aarch64|ppc64|ppc64le|s390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '10:2.10.0-21.el7_5.4', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x23bfd635a67554312acf6df38f6e0d88', 'RHSA-2018:2762: qemu-kvm-ma security update (Important)', 'RHEL7-rhel-7.7-aus', 'Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. Red Hat would like to thank Jskz - Zero Day Initiative (trendmicro.com) for reporting this issue.', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2762 https://access.redhat.com/security/cve/CVE-2018-11806', 'Important', 'High', 'qemu-kvm-common-ma', '', '', 'aarch64|ppc64|ppc64le|s390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '10:2.10.0-21.el7_5.4', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x12aac5fb072b5c6c2f1fb843ca1cc745', 'RHSA-2018:2762: qemu-kvm-ma security update (Important)', 'RHEL7-rhel-7.7-aus', 'Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. Red Hat would like to thank Jskz - Zero Day Initiative (trendmicro.com) for reporting this issue.', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2762 https://access.redhat.com/security/cve/CVE-2018-11806', 'Important', 'High', 'qemu-kvm-ma', '', '', 'aarch64|ppc64|ppc64le|s390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '10:2.10.0-21.el7_5.4', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa3586d9873a3dd242d4cfa8c6afd3adc', 'RHSA-2018:2762: qemu-kvm-ma security update (Important)', 'RHEL7-rhel-7.7-aus', 'Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. Red Hat would like to thank Jskz - Zero Day Initiative (trendmicro.com) for reporting this issue.', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2762 https://access.redhat.com/security/cve/CVE-2018-11806', 'Important', 'High', 'qemu-kvm-ma', '', '', 'aarch64|ppc64|ppc64le|s390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '10:2.10.0-21.el7_5.4', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3b5ce56ad87972ee81380a319bfa3de0', 'RHSA-2018:2762: qemu-kvm-ma security update (Important)', 'RHEL7-rhel-7.7-aus', 'Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. Red Hat would like to thank Jskz - Zero Day Initiative (trendmicro.com) for reporting this issue.', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2762 https://access.redhat.com/security/cve/CVE-2018-11806', 'Important', 'High', 'qemu-kvm-tools-ma', '', '', 'aarch64|ppc64|ppc64le|s390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '10:2.10.0-21.el7_5.4', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8643b9b67e4ab592c1a871ef8b92e9c9', 'RHSA-2018:2762: qemu-kvm-ma security update (Important)', 'RHEL7-rhel-7.7-aus', 'Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. Red Hat would like to thank Jskz - Zero Day Initiative (trendmicro.com) for reporting this issue.', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2762 https://access.redhat.com/security/cve/CVE-2018-11806', 'Important', 'High', 'qemu-kvm-tools-ma', '', '', 'aarch64|ppc64|ppc64le|s390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '10:2.10.0-21.el7_5.4', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x62e5ac7a0d4d8e07ad72faf0b726d354', 'RHSA-2018:2763: kernel-rt security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. * Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1617941)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2763 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-rt', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.rt56.821.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x2007c4587ef5713e952a4a5a877be31d', 'RHSA-2018:2763: kernel-rt security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. * Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1617941)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2763 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-rt', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.rt56.821.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x5da64f5129ec6caea59e4f44cab84aad', 'RHSA-2018:2763: kernel-rt security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. * Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1617941)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2763 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-rt-debug', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.rt56.821.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x99e81e963f0efe50b6f133dd7206bd71', 'RHSA-2018:2763: kernel-rt security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. * Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1617941)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2763 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-rt-debug', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.rt56.821.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xee32192021f986c75cff00ba591e0f66', 'RHSA-2018:2763: kernel-rt security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. * Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1617941)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2763 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-rt-debug-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.rt56.821.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xbe1e330cfcc902c9197149c871b2548a', 'RHSA-2018:2763: kernel-rt security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. * Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1617941)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2763 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-rt-debug-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.rt56.821.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x88028cf1d4fe60e15ba2b53ad0b3132b', 'RHSA-2018:2763: kernel-rt security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. * Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1617941)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2763 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-rt-debug-kvm', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.rt56.821.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x62b382ed106094acbcc0ff272f7f849d', 'RHSA-2018:2763: kernel-rt security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. * Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1617941)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2763 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-rt-debug-kvm', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.rt56.821.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x7ed385faa5115d91265647acc60e6215', 'RHSA-2018:2763: kernel-rt security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. * Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1617941)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2763 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-rt-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.rt56.821.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xba4d918e07f3f0ad4fa76070114e5f46', 'RHSA-2018:2763: kernel-rt security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. * Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1617941)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2763 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-rt-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.rt56.821.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xb49bc39b4bcaeb41262786094ed8d0ef', 'RHSA-2018:2763: kernel-rt security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. * Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1617941)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2763 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-rt-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.rt56.821.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc31ac19d9964545bbc6f111f4847d989', 'RHSA-2018:2763: kernel-rt security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. * Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1617941)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2763 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-rt-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.rt56.821.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe12ba36566687c9d098cdd073c0fca82', 'RHSA-2018:2763: kernel-rt security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. * Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1617941)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2763 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-rt-kvm', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.rt56.821.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x16e7ac99749397bca4d256db2584d83d', 'RHSA-2018:2763: kernel-rt security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. * Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1617941)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2763 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-rt-kvm', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.rt56.821.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x3887fe82819366daffd125920a77c76b', 'RHSA-2018:2763: kernel-rt security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. * Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1617941)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2763 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-rt-trace', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.rt56.821.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x971b18e213f8d01d973b1026d544a445', 'RHSA-2018:2763: kernel-rt security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. * Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1617941)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2763 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-rt-trace', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.rt56.821.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xd9705c75cbeac48c6b83b3c078eb9838', 'RHSA-2018:2763: kernel-rt security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. * Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1617941)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2763 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-rt-trace-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.rt56.821.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x77ff592d0b8dfb618353486d76ae1c5e', 'RHSA-2018:2763: kernel-rt security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. * Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1617941)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2763 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-rt-trace-devel', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.rt56.821.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xc45683d5df4bcb15b25cbcb15e1f0b49', 'RHSA-2018:2763: kernel-rt security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. * Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1617941)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2763 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-rt-trace-kvm', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.rt56.821.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x32de753ad464c1d3f478de7181ace78f', 'RHSA-2018:2763: kernel-rt security and bug fix update (Important)', 'RHEL7-rhel-7.7-aus', 'The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. * Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1617941)', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2763 https://access.redhat.com/security/cve/CVE-2018-14634', 'Important', 'High', 'kernel-rt-trace-kvm', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-862.14.4.rt56.821.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xdedc3653eca8148252b94c2618e23df6', 'RHSA-2018:2766: flatpak security update (Moderate)', 'RHEL7-rhel-7.7-aus', 'Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2766 https://access.redhat.com/security/cve/CVE-2018-6560', 'Moderate', 'Medium', 'flatpak', '', '', 'aarch64|ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:0.8.8-4.el7_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x69556d39ccd2507c9f313dda2be100a3', 'RHSA-2018:2766: flatpak security update (Moderate)', 'RHEL7-rhel-7.7-aus', 'Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2766 https://access.redhat.com/security/cve/CVE-2018-6560', 'Moderate', 'Medium', 'flatpak', '', '', 'aarch64|ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:0.8.8-4.el7_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbbf04e8024598cbf0730ccf8021bc57b', 'RHSA-2018:2766: flatpak security update (Moderate)', 'RHEL7-rhel-7.7-aus', 'Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2766 https://access.redhat.com/security/cve/CVE-2018-6560', 'Moderate', 'Medium', 'flatpak-builder', '', '', 'aarch64|ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:0.8.8-4.el7_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5d46d8b726e4a6e492c0f33a537cfc60', 'RHSA-2018:2766: flatpak security update (Moderate)', 'RHEL7-rhel-7.7-aus', 'Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2766 https://access.redhat.com/security/cve/CVE-2018-6560', 'Moderate', 'Medium', 'flatpak-builder', '', '', 'aarch64|ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:0.8.8-4.el7_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x187b33333a380cfba79259c7d685440e', 'RHSA-2018:2766: flatpak security update (Moderate)', 'RHEL7-rhel-7.7-aus', 'Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2766 https://access.redhat.com/security/cve/CVE-2018-6560', 'Moderate', 'Medium', 'flatpak-devel', '', '', 'aarch64|ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:0.8.8-4.el7_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc4cd84ba05392a1f4fbd45be5de4ad36', 'RHSA-2018:2766: flatpak security update (Moderate)', 'RHEL7-rhel-7.7-aus', 'Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2766 https://access.redhat.com/security/cve/CVE-2018-6560', 'Moderate', 'Medium', 'flatpak-devel', '', '', 'aarch64|ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:0.8.8-4.el7_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9f8aa72f4d85faba93e05e7ff02ab59c', 'RHSA-2018:2766: flatpak security update (Moderate)', 'RHEL7-rhel-7.7-aus', 'Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2766 https://access.redhat.com/security/cve/CVE-2018-6560', 'Moderate', 'Medium', 'flatpak-libs', '', '', 'aarch64|ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:0.8.8-4.el7_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x087bcf7b4e6e9a9bc13829f6dc1ce752', 'RHSA-2018:2766: flatpak security update (Moderate)', 'RHEL7-rhel-7.7-aus', 'Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2766 https://access.redhat.com/security/cve/CVE-2018-6560', 'Moderate', 'Medium', 'flatpak-libs', '', '', 'aarch64|ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:0.8.8-4.el7_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x971747b5edaa50eff10047865292c78e', 'RHSA-2018:2768: nss security update (Moderate)', 'RHEL7-rhel-7.7-aus', 'Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Red Hat would like to thank the Mozilla project for reporting this issue.', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2768 https://access.redhat.com/security/cve/CVE-2018-12384', 'Moderate', 'Medium', 'nss', '', '', 'aarch64|i686|ppc|ppc64|ppc64le|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.36.0-7.el7_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfd3977c18512e2b7c7ddc75492c6e917', 'RHSA-2018:2768: nss security update (Moderate)', 'RHEL7-rhel-7.7-aus', 'Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Red Hat would like to thank the Mozilla project for reporting this issue.', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2768 https://access.redhat.com/security/cve/CVE-2018-12384', 'Moderate', 'Medium', 'nss', '', '', 'aarch64|i686|ppc|ppc64|ppc64le|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7::server', 'rhel-cpe-repository', '', '0:3.36.0-7.el7_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x28044d0564e31c5f3843193c5fe201a2', 'RHSA-2018:2768: nss security update (Moderate)', 'RHEL7-rhel-7.7-aus', 'Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Red Hat would like to thank the Mozilla project for reporting this issue.', '2018-09-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:2768 https://access.redhat.com/security/cve/CVE-2018-12384', 'Moderate', 'Medium', 'nss-devel', '', '', 'aarch64|i686|ppc|ppc64|ppc64le|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.7', 'rhel-cpe-repository', '', '0:3.36.0-7.el7_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x446763500f844ec86b7933eecb7c9[...];[ Date: 2023-07-04 18:39:50 - Bind query: yes ]
9 7s853ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\xb0fdd3d2938164e48fd1e80a1c1c8445', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-cross-headers', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1210c7af8ff9e74e4851502ba13dd40e', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-cross-headers', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::appstream', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x831db4b5eb4a88871c3476f11516ee28', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-cross-headers', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::highavailability', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x53134d7683d6b85f70e01b9dd83dade7', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-cross-headers', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::nfv', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x53b05f8c02e3c86fac2b12d12e8eb515', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-cross-headers', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::realtime', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc39c6a90c3cade6c9ed9fd1d974f041b', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-cross-headers', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::resilientstorage', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6161d1f8818eb4a932d42527d410af8b', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-cross-headers', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::sap', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2025244bd90a83246bd6facdda807c84', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-cross-headers', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::sap_hana', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb1877e381572760500a077e1c13e55d4', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-cross-headers', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:rhel_e4s:9.0', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1ae90a7e9f6453888e6840cb816fd368', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-cross-headers', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:rhel_e4s:9.0::baseos', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x47efc4d1175e9bc0e9673885b4b3e0e1', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xefe7b97a2c13a4491c78eebeb3a60412', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::appstream', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4c92801b5a7c0fb1cf5c0f98246f8d14', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::highavailability', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4dc3d14a11b3cdfa6daae75fd773c8be', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::nfv', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x15cd1d193a4e13dafc7ebb698b89787e', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::realtime', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x772f58a0d31adf1c89e0fc5dfefb64fa', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::resilientstorage', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbc74c71c9f1ea9fda75aa28a149c3ec3', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::sap', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x98f6bd4c4295d4f43945f52a3009d1bb', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::sap_hana', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd3f34819b4bea606d93244fb7758e0ef', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:rhel_e4s:9.0', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x75fc9dbcaa5247d46451a71f8166c51f', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:rhel_e4s:9.0::baseos', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x61d14b7f88a8077f0c8e98ea4b94b40d', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-core', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x31d8e41a6eb52e8ea860e279dd8a394c', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-core', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::appstream', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x19dc28da0b03649c9d3ece4654e4149b', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-core', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::highavailability', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x20647425acda1ffd63a3429428d194e0', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-core', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::nfv', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x29ae08e9159606a26f39445fa0c73692', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-core', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::realtime', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfdc29e222347e8222f4a82e4719918bf', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-core', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::resilientstorage', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x68966df02c30a1c5a4efdd99c4084cd7', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-core', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::sap', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc44084be422e1fa6df017d29f0b8dd3b', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-core', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::sap_hana', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfaad7e637e18a6e0fd247a093a256389', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-core', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:rhel_e4s:9.0', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xda7e35e10085ca1f284bf2a77770fea4', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-core', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:rhel_e4s:9.0::baseos', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6c66a4b5ce3ccddcf1cab211abdcbff9', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc56b95a457d49d508955b5b9dcc062a1', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::appstream', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2618bb4a587daf7e55e9d8694f5c2982', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::highavailability', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc12361098dab7b3d3d08a5688afe406f', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::nfv', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0ed029bf14316a110dcd828828928a2a', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::realtime', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd3202a9d79465a0f7e6423386a299f1a', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::resilientstorage', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xea5005d2ae2bea4a2c9fe3b8e3dae629', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::sap', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1c6dedc33bc335695c58682a9b0741ec', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::sap_hana', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x36e790f9b3dddc2584480e058a6df7a5', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:rhel_e4s:9.0', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1c4319e679f9f1ec5944c8c41bc16daf', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:rhel_e4s:9.0::baseos', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbd64eb2aa6c1753d75ee6d7d6384bf93', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-devel-matched', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf8d277aad8d54ad4c3b97cec703d8503', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-devel-matched', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::appstream', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x586f0bd87f61ef11c3cd182f203f46f9', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-devel-matched', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::highavailability', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe605d671308696db560e7dd1b6b737d0', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-devel-matched', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::nfv', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x00623dfd7f8b05ed5907de200bf3a5cf', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-devel-matched', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::realtime', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2283ae5e787ab5d1421364b545080f72', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-devel-matched', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::resilientstorage', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb9e4caa59e10585dff912004491f8f52', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-devel-matched', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::sap', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7889937a0733ac9208f350415e401e51', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-devel-matched', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::sap_hana', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x50a0b33aff45419d0bd5458af5bad70a', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-devel-matched', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:rhel_e4s:9.0', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2eb9b2e823983af1d0be65a76eeae3d6', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-devel-matched', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:rhel_e4s:9.0::baseos', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd431790152d72cb1f81ad3ba7e6f706e', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-modules', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf05f1098d70f8e0e8477948d5e4e9d2c', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-modules', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::appstream', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb20662b32761caf79243f4b1d9d0dbf9', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-modules', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::highavailability', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x84a0190d0a7f7f9ca5fab859f348b3c4', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-modules', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::nfv', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbaae8ace3c7072534d4073eb034f020c', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-modules', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::realtime', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaad2c175f86d400656fd289230856daa', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-modules', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::resilientstorage', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x04a8a42e509be805722256601cabb71d', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-modules', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::sap', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4e50a0201c0cedc3626586de12952d26', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-modules', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::sap_hana', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x94382e6b581aaa0d62494a427562fe94', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-modules', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:rhel_e4s:9.0', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x467d304e587ba0bd37c2d805ac5695c6', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-modules', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:rhel_e4s:9.0::baseos', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5d380724ae8dee80fd754a9bbbdabb6a', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-modules-extra', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd1a6535ffc38035a41fbec39f8c44b95', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-modules-extra', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::appstream', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x680fea3b0f2e8f63bf16784ee35be362', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-modules-extra', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::highavailability', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4c14e530da61cbf976c4399262c05355', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-modules-extra', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::nfv', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf386c20e5755a4bb5b4111562e3880eb', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-modules-extra', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::realtime', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2927ab311c0e6192f515b631e8cf5334', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-modules-extra', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::resilientstorage', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd02071bd16309ebddad5c5d85fe9fe39', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-modules-extra', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::sap', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd222e8eb1eafd5cf9baee2fa1f7bdff1', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-modules-extra', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::sap_hana', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd1b7301d754f5aa4e1c81eed61174e87', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-modules-extra', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:rhel_e4s:9.0', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf2375b802f01f87170e87474eae93b85', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-debug-modules-extra', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:rhel_e4s:9.0::baseos', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc73c06c848e1671c8efa0025f1e22cb0', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5c5820ffc7a777596b624f1d9297061a', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::appstream', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfd718883bb9d9c858b15dda9486e505e', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::highavailability', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0d86bca0db7e4a9e2403116612ff3b73', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::nfv', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x73fc270d831e4400df6c69fbf0890034', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::realtime', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x45f6d04282b2016fbcc9dd27896665f2', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::resilientstorage', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5178ee9a05322ab997aa2737a2829584', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::sap', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x645b7d58009797fa3fd725ba1ff30bef', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::sap_hana', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2a2e3385777290ff42bf4d9ebad910a8', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:rhel_e4s:9.0', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x37fd38370215e9b3eca863af94e1be71', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:rhel_e4s:9.0::baseos', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x90e66b1296b38e821ce19b25e626c62f', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-devel-matched', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3c6605775121967d732a7dc9e5e14bf8', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-devel-matched', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::appstream', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x49e86d21c1e70e349f8e79dd4b2f274c', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-devel-matched', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::highavailability', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2c1a389206893d4bef8978d69a100897', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-devel-matched', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::nfv', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3081064bca652a359d32bac1e09821ea', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-devel-matched', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::realtime', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe89fc0a019be842d3e27d7a646cef2e3', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-devel-matched', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::resilientstorage', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5b13effef5e20648c9264b8ed234d35c', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-devel-matched', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::sap', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1136f88c561954a284e59e09cacc4343', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-devel-matched', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::sap_hana', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4efc47628db33f211909967d27b71467', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-devel-matched', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:rhel_e4s:9.0', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb3e54a854149b2d7f5f0d49be1fbc7fa', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-devel-matched', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:rhel_e4s:9.0::baseos', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9264afe41a2e87b35456aac6b3b6e5c1', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x61e0e3a795b20708bf427de125d3c747', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::appstream', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf6895dddcebe1c11f731a88a455174d7', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::highavailability', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb29a9409704e50729d97d959ad25198e', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::nfv', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x071b6c89eb8bed2be4db3d2d9521100f', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::realtime', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x23e39c61a354653c2800801f844c0168', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::resilientstorage', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9fc82caef5e519600dd2c1d0e1ff5569', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::sap', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8029ceb5aa11d487e39b57e8c943bab3', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_e4s:9.0::sap_hana', 'rhel-cpe-repository', '', '0:5.14.0-70.17.1.el9_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb4d3499b967f16300a158ef5ec8240f2', 'RHSA-2022:5249: kernel security and bug fix update (Important)', 'RHEL9-rhel-9.0-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux operating system. * Mark ThunderX NIC driver as unmaintained (BZ#2092638)', '2022-07-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:5249 https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1729 https://access.redhat.com/security/cve/CVE-2022-1966 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-32250', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:rhel_e4s:9.0', 'rhel-cpe-rep[...];[ Date: 2023-07-04 18:39:50 - Bind query: yes ]
10 7s703ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x0255eb10f514a1b21a77a5692601dc19', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jaxrs', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x61c600625b1cef61321eb0b61e23339a', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jaxrs', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xab746190dc3200e00f45e2d6f417a0ae', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jaxrs', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb3ebc3d1481369076eb202dcbfa5f980', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jaxrs', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xda09249e81ed59828af47ff3a9b39387', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jaxrs', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf10239f19b4eadfd04f79556dc6551c8', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jaxrs', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1ce6b06e293802bb3694b9a84a693e13', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jaxrs', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8faae745781a5c54810d1ce63bf64188', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jaxrs', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x07471b83fc5ce5ba40733b035a2ac999', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jettison-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x29d189d72a7d328855cf71892b4db816', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jettison-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x27454c3a95657ebbc4609f2e5a4e91f2', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jettison-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf6702598a8bc0caf627cc319b60c6749', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jettison-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x38127ad314ae65a600c821585cb5b255', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jettison-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x196360ce1812487865b56e46f3901504', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jettison-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4b0376854a6b4757aaed81159be0329f', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jettison-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x24a18adfdfe62c8499cad91c1509fe41', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jettison-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe285bc20087a281fc1cae590b4b00945', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jose-jwt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x120d3ae34ce0ad6caa1e4973a5115487', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jose-jwt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc3ca426921c067a2bef1806091f80de9', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jose-jwt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8ffadf4db817f86f9c27126029530ac5', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jose-jwt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6db28b762860c5477b7883157f1362cf', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jose-jwt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x08c686d2000704c4a937d725052d8ddb', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jose-jwt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbf1873e78fcda6c24e04cd3836a1a010', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jose-jwt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x79a31f2626bab6b0d38d02720f753ff7', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jose-jwt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x852876e320057fac390eb56530100f68', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jsapi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x14dc7c17bd70348017b31fda43cc002d', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jsapi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc654dffd7b8d379b769829f91cb80d72', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jsapi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x490d8e779f5dc1e8f52ab53246f91a10', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jsapi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf6f853ffe9a366a40572b86bda29c766', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jsapi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb5d899bb585c77755acf5d2abf1f8474', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jsapi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8fdc134e34bd89a54dbb75a6afa0a74b', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jsapi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd76122b38c59609de2db10f73bf5eb85', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-jsapi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7e76912bb4dbf0e8afc58f7cd3b1aae2', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-json-binding-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x359f125d16e7213f32aa7ed584181f59', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-json-binding-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe28fcebde257eae09792a38b6f83a12a', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-json-binding-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x078f99f3f8a93e713d46a1df81a00745', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-json-binding-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe504472331ae2c08cc7376145688abb4', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-json-binding-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7728c6f624daea883560473ab853e8ad', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-json-binding-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x710babbbe70184723f078a31bcf07964', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-json-binding-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0cda85ab7e57e101d8c5cd214dedabb7', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-json-binding-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x074807d9135c035432d2b569968b1743', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-json-p-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9d7e403d7cbe9e3f88ca70351eb2b4b2', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-json-p-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xca9d4a91df819aa5d8b5b155aa4aed82', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-json-p-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2d06012fee96d4e2d709d03fc8fa2b38', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-json-p-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa12317be1b7ebe03029252c2996e9596', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-json-p-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0ae82123b40f93f4af7ca7b2e7f8d1ec', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-json-p-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x41428c72ee5fd6425a89a92876df383e', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-json-p-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3e2c80fad83f0a00973a2a06657f6d1d', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-json-p-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5c1730df4929b93ca04db0f7d5797d10', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-multipart-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x388d9d2500de85605a49dd2465a6e260', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-multipart-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x70efe3f2828b05430479889aaf4bc775', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-multipart-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5ab9de361c88df2c5e8c42285530e1bc', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-multipart-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6f2eb85b09ddd08b88368f441015cb74', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-multipart-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb4832ff29452e7436fde4c4ab19ccb64', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-multipart-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe88f0396c6ca7137048105b2434638ea', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-multipart-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x77e5a610220d5d5aec96124d26526428', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-multipart-provider', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x403f584162f62cd0a25ce23f35505bb1', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-rxjava2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfdaa1a6bcd8b2d2451b08e6117237ee5', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-rxjava2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7cd7855443711a28e84212115cad7ce5', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-rxjava2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf49bdf490f2258535dba1a7808a27f19', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-rxjava2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x15d95f8e0490b776994ad2eee03818ee', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-rxjava2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1b21acaabab4ccd36ed08203037fd980', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-rxjava2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xecb2387ec89c8066f3f31a410aa1ad62', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-rxjava2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa526415ac310a018e90c3f1c6013b5f3', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-rxjava2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcd23fdd043381907bb1138b4204f7884', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-spring', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xae5f0219bdb7e8a3ef9ebff30534c1d4', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-spring', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x59d533c619b8dd301449f3dc19aff03f', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-spring', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb3bf0cfdcdc5f26f79c8aa60ca2eac0f', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-spring', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9bddbd74b5c7e18900a2c3e8186b9431', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-spring', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5d4c802830d02d944c19e64ecf8bdd8f', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-spring', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x315ecef5ad389215077d94182afd039a', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-spring', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2284635f33691d10c9b7afad0ecfc19f', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-spring', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x47db342af21a20bfaaca6370c4424a01', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-validator-provider-11', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbd77df566d789a0ccc8dbadaadbce815', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-validator-provider-11', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa1db093f65dabdd1231e3214405fdfdc', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-validator-provider-11', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xaca8c095a860ea08c6eb06898f81c266', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-validator-provider-11', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x12919bfadb7838ca3f4c994a6afc452a', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-validator-provider-11', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb8938caf88a829effdeff8bd8e65cb09', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-validator-provider-11', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4', 'rhel-cpe-repository', '', '0:3.11.3-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8a430db681a5ff93638c853ec75f2930', 'RHSA-2021:0247: Red Hat JBoss Enterprise Application Platform 7.3.5 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2021-01-25 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822', 'Important', 'High', 'eap7-resteasy-validator-provider-11', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_ap[...];[ Date: 2023-07-04 18:39:53 - Bind query: yes ]
11 7s669ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x0a21aaa3244ce3db1e13ef2169c985d0', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5022afbe9755ae3a1ec7e284ac71c406', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::appstream', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa3cf36652e96fd8d12265ebe0c04d5b5', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::crb', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb30361063d547a8b1c0292aa7f91b336', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::highavailability', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xab391c59e9aa7afed844ffbc00e14917', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::resilientstorage', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4aa97595a09e71d553efbd118d719bdd', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x079512c4a2f168d7423e41568df7266d', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap_hana', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf01e4bb312f3a898ae7dae6aaf62376f', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::supplementary', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3730b864858faac6d3fd185a8eee7845', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x21c25bd8bfe46cea9d23236eea173ec4', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1::baseos', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc0fd99c2d195bd45f716b27a682a2d9b', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gfs2', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc25244f749403daa2a67bfb425d9a7b2', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gfs2', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::appstream', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfb6ba5ce23bea1dc83dd6110146b2f93', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gfs2', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::crb', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbd306387d1d82fb7c3baac6fc9a02dc7', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gfs2', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::highavailability', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc0275c1cf9d8ebccb40fe3fa5c733550', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gfs2', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::resilientstorage', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb54b6f8a3efe1c478672fba70890de20', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gfs2', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0df2cb0f019ad04deefa81d2766f1d7b', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gfs2', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap_hana', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0b7ad8a7df47d37aba38dc86e3762869', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gfs2', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::supplementary', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7cbd8435ef51f744d480303057804807', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gfs2', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc48453cd3199aa6b62de0cb9b9c1b7f4', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gfs2', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1::baseos', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1fdd6ea81635f830d6386a41008acec5', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gfs2', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1d979ab5bfa7cafc768fac92324acaae', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gfs2', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::appstream', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6fd8ffa4391f1c13efeb0c462e1da8a7', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gfs2', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::crb', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8694e02fcab277454d9b5bdc87862946', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gfs2', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::highavailability', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7ffcd05efba803ec26d414c6c2bdc530', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gfs2', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::resilientstorage', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x02f955a05c322aff77ea9c3b1a3ed3a1', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gfs2', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf2612a64e2c0186c84a36a588d11b16f', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gfs2', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap_hana', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x08c6d80241ace48374e6e3a0c588e3bb', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gfs2', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::supplementary', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9f4b926a78c6fca0e91b238a70eb2a05', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gfs2', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x082f9370db4e0213f4603be75fe4eca6', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gfs2', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1::baseos', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdc9e8845f2a1ab6a7d91c760c1057b2a', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1ba088a1c6cad5537cceb7b31e6c5261', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::appstream', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4e2abe7e18fd3273a2733d84a80846d0', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::crb', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x96aee09f7496fa38392c79d77dca9040', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::highavailability', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcb2eda5256bc580234791ea8c0e49a18', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::resilientstorage', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbc616fa1ec5bf6e18c2c3ecd4a3fc674', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdcc5f0ecd766fe4c3179320a70d5cff8', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap_hana', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc38b0a1a871deadfcccd28722d1d2fa0', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::supplementary', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7c891c4ce643da44c7ba2195ae051876', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5613387e98a554b27b8c84442e94afc4', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1::baseos', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6130727e1fb2d6dde3e65c01848ac3e7', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa09559842d86893f62e81a3091c6105d', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::appstream', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4d7562802f334142c8008484c874a7c2', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::crb', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x27c437f6227a2dd123adb9df427346db', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::highavailability', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe9fc0016ea998b47ccfb998632f31b52', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::resilientstorage', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd2c953ec96843694a8e94bedfe4416a4', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xda4ae7d71b0898f89c9f40c8d99dfb9a', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap_hana', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6c4e8fffb3da389dcd64ac2cd758aa16', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::supplementary', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf59db6f181723cba505ffb41b5b8a12a', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3a83bdde6553e7bcef6bc3e9a9ffe7bd', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1::baseos', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x558a6b3557515cca9d5b74ce17e9e2f2', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject-devel', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcd33a62185db2f035f41a151d4f8498b', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject-devel', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::appstream', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x36da4420cd6814ae8a253ef28047eada', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject-devel', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::crb', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbf2b4b2b6d85641c44f7e00c8d574097', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject-devel', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::highavailability', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x949d5af0c7605cb3ff7374b9218d17e2', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject-devel', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::resilientstorage', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb11445683079c6b871376cc5ebfe5a1c', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject-devel', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe46012be4abdcb6b348eeaac9180941d', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject-devel', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap_hana', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd9c19ac17495e167ad54c05ea0e33b75', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject-devel', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::supplementary', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1abfc0ea9ae442b1cd6690e21d8f8abb', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject-devel', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x888fdef565d6b28b7c11b82c9087a8f6', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject-devel', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1::baseos', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc97c0203e63d93cf460392b7bfcf5cb9', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7c4dcc811997724b734cc967a30db2f3', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::appstream', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x45e8ac9e42cde996cf44d49b6b2a73f9', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::crb', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x29e886c366539589daf4ca9adf5b777d', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::highavailability', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdeef876c97063ccfbb167aeed12a306e', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::resilientstorage', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb236184d8be25463312cd366f9b06a82', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd08bccdaee26083979ddb75779b229f3', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap_hana', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0186baed46263754df34ecd15824adb7', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::supplementary', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x43e647afa678c6bd401e05a0fc49a386', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa5072cddbc42b5680cbb34cfd6615fe2', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-gobject-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1::baseos', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4ac4dd2d1505baa0bdaccd6e1bddbbf5', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-inspect-icons', '', 'virt:rhel', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x22804cb54097b791aa77bc0fda612c45', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-inspect-icons', '', 'virt:rhel', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::appstream', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf02f908c16ce7390cd93e485b584d9ae', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-inspect-icons', '', 'virt:rhel', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::crb', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa351fb0886300f89a9b205f829cdde11', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-inspect-icons', '', 'virt:rhel', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::highavailability', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7d9a540dddaac4d40a7bf1d8c9b364d2', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-inspect-icons', '', 'virt:rhel', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::resilientstorage', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1123f8bee533c4a118247cd99223c470', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-inspect-icons', '', 'virt:rhel', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5ea266f8e7429139b9dc4c8eabf3bb71', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-inspect-icons', '', 'virt:rhel', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap_hana', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf8f3c33b82fef6402f6e24a863668a6b', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-inspect-icons', '', 'virt:rhel', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::supplementary', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x98656cf307cf3e07f74ee7083acc8343', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libguestfs-inspect-icons', '', 'virt:rhel', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '1:1.38.4-14.module+el8.1.0+4066+0f1aadab', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc2fb4366b298f037292df0f2873850ba', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00[...];[ Date: 2023-07-04 18:39:14 - Bind query: yes ]
12 7s666ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x4ba09591f94c8c0aa64e90e3a00730e3', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-demo', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0e0dbb6fa3e4b9739647b2bdf0b41bb8', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-demo', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcb8b7f21a131d4aa7ba49cc9b4ab282b', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf6b560ea545923e7673747dc93b7f5dc', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x077d3c6b330fc87224ac9b2496e7e6aa', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-jdbc', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2652274fe29b4ded087aa7f4cf250c50', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-jdbc', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8b6c2a3db5e87cb66381c87d4c8d8bf8', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-plugin', '', '', 'ppc|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x11cb5406f989309606a2ed2d8e3706e7', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-plugin', '', '', 'ppc|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xabffcdd9b69c00822c45d7296d6849b4', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-src', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x685373277e6dae9386524ee088b17e03', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-src', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd3a44c57b8227c1fcf83f4bf7469bdc5', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb8bee463bab77460587ea281fb5112e7', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0a241c809ac50fedef3ee333843f22b1', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfe621dcbe443545e8d7f8921885b233d', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe25234c1e3806cc0bddeb4bdee2a2bea', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9169f107ad064642654d2f0da87b0225', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x13e124fa4b156be7aae2172d0965f7e6', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-irb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x87690be78199a1fbaa1206eae9a409c0', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-irb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x01c0c6c20cdb6dc2405abd24b16950ce', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2facba68eb6124487acbfeeccd14ac30', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x328d4aa9931707ce126764e6e77ccbe3', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-tcltk', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x37198ce17ff859bf92aaa4d7b868cc5a', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-tcltk', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc1bfbddcac3ad54eae60b6ed4f67dda1', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.2.0-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5f65235a3e23aa57134a16a3482c62e8', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.2.0-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x59f92bdaa4e651532cc67dcc09e79ee7', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-io-console', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:0.4.2-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x43be4aa2837254668c1a1e5827e46ede', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-io-console', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:0.4.2-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4833eb8288aa01ed2d2c8199c99f0766', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-json', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.7.7-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x42ad9882cc126ebef03f06bb69931aa6', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-json', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.7.7-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x76af51e944882ee501f1551b051cbd74', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-minitest', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:4.3.2-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa1bf7f71ea8192c7423c28c4900e8e0b', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-minitest', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:4.3.2-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa0efc398028a183bc331fddc44ff8e89', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-psych', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.0-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0a711a12df6a1a78c060dc7cea120057', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-psych', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.0-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x74dd804b9cb34bfd8342605fdc6fb873', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-rake', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:0.9.6-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9e782a2d130dba031c4769702d172e23', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-rake', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:0.9.6-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf33c4061eed5732cb85d476f0099d084', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-rdoc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:4.0.0-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbfaa009c94f0064af28a25c5f9af0e9f', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-rdoc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:4.0.0-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf6f887cd9316b6a70c7d1e55ca67d878', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygems', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.14-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x12df04c62aafb1cd447a469211a0c8e1', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygems', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.14-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe3cbe10a7e3874cdfc6af66205b6f724', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygems-devel', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.14-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd54e20748cbb99de024c8bd85d568e7a', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygems-devel', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.14-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x57e73a87a9b438af42cbe3087255334d', 'RHSA-2014:1919: firefox security update (Critical)', 'RHEL7-rhel-7.3-tus', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-12-02 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1919 https://access.redhat.com/security/cve/CVE-2014-1587 https://access.redhat.com/security/cve/CVE-2014-1590 https://access.redhat.com/security/cve/CVE-2014-1592 https://access.redhat.com/security/cve/CVE-2014-1593 https://access.redhat.com/security/cve/CVE-2014-1594', 'Critical', 'Critical', 'firefox', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:31.3.0-3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x210b065fe20a82d0469d56feecc2f82e', 'RHSA-2014:1919: firefox security update (Critical)', 'RHEL7-rhel-7.3-tus', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-12-02 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1919 https://access.redhat.com/security/cve/CVE-2014-1587 https://access.redhat.com/security/cve/CVE-2014-1590 https://access.redhat.com/security/cve/CVE-2014-1592 https://access.redhat.com/security/cve/CVE-2014-1593 https://access.redhat.com/security/cve/CVE-2014-1594', 'Critical', 'Critical', 'firefox', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:31.3.0-3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1ef558c7ca0769796ee0f253fee5840b', 'RHSA-2014:1956: wpa_supplicant security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'The wpa_supplicant package contains an 802.1X Supplicant with support for which contains a backported patch to correct this issue.', '2014-12-03 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1956 https://access.redhat.com/security/cve/CVE-2014-3686', 'Moderate', 'Medium', 'wpa_supplicant', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:2.0-13.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0c722bcd23341731046dd2fc72f996a6', 'RHSA-2014:1956: wpa_supplicant security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'The wpa_supplicant package contains an 802.1X Supplicant with support for which contains a backported patch to correct this issue.', '2014-12-03 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1956 https://access.redhat.com/security/cve/CVE-2014-3686', 'Moderate', 'Medium', 'wpa_supplicant', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:2.0-13.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7003e53563ecbcb634d56ff750be1316', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfb4c6c5482c6281a21ad9f88b6feaa6f', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x09013d6bb11cc2154acb3f4586d69ad1', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-abi-whitelists', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x30557fdf50ba422aa8a3f9c566898cdf', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-abi-whitelists', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc62b739a14d5f81c3840b77340e1563e', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-bootwrapper', '', '', 'ppc64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xa3d5e40094970c07ce9350138c450399', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-bootwrapper', '', '', 'ppc64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x75779acdb49aacef7aa3df63e42b53b3', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-debug', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7055849c84fa8e9a1216c217d8d8da25', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-debug', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x027c3be2666799d424a61d2b4489986e', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-debug-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa3f90ea0e6188419632a7859e2521fc4', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-debug-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4d5bc43557a896ae880db43140ec2aa3', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3aa8990f9e358c8e35229f13060dffa2', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc00119e646f12f56c90180a0930bbdde', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xeddca3d17bc0e52a70b1fc56fb82424b', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9bf748ef60d6382e725cf59adc9f23fb', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-headers', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x03b9cc4b68c4340d551d4ad21d23e18f', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-headers', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb126a1bf48d5bb8d38701f9420cd1082', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-kdump', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x7bf85b0274b5d9f13dbe330379577640', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-kdump', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xd2764abcb7888c601d82b3ac1b370c91', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-kdump-devel', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xefd9a068a6fd73c3de5cc62675b5decd', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-kdump-devel', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x6213e768576bc521b639492e0bcda71c', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0b60356ea64c996b9ddbf055b6427093', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0beedf4bcb73df5e41f0a41bb619bad8', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools-libs', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7fb9e162855b2fa78f336e7a7898d749', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools-libs', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0aa5498001df0fd19769710b367174cb', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools-libs-devel', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0376eb3a9795126790ed6c7c852a1357', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools-libs-devel', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdc3bbbeb22169f2e401aec03b711812f', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'perf', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9edad094cfa778760ea206f6a5324db1', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'perf', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x97c19da147d2dab768a5e9f41b933216', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'python-perf', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbdfbe7bf3eb547cb0f53c5ef24ade6ca', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'python-perf', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x450fc822b888283be7cad4a395beeb11', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.3-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe589814aa9baf519b35ab9e7ff3c2742', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.3-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x83a3238f7a92b5fc970534d0d0ef8298', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.3-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm-apidocs', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x06a8603bc0938737c37fa699fd6da4b5', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.3-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm-apidocs', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf862a15aa7244f6872acd29f808514dc', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.3-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm-build', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x06523bb6d6b4ffd8cc23321e6b2e64e0', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.3-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm-build', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc7f96ce6cff7da56dd8f8fb503109d28', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.3-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm-build-libs', '', '', 'i686|p[...];[ Date: 2023-07-04 18:39:55 - Bind query: yes ]
13 7s607ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\xdde4ad6d6eeced305cf90f56d06bc62f', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-wildfly-http-transaction-client', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:1.0.17-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfefe351de5209bbbcf6f1426f2d9b595', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-wildfly-http-transaction-client', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:1.0.17-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb2147ac56556e17a88ddf78fbab44724', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-wildfly-http-transaction-client', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7', 'rhel-cpe-repository', '', '0:1.0.17-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xacb9f3c426af8077691cca6efc928b85', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-wildfly-http-transaction-client', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:1.0.17-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfc3131b08e9f03bceccd2f5977570b77', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-wildfly-http-transaction-client', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7', 'rhel-cpe-repository', '', '0:1.0.17-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x90c2f50c82464ed9e12bdc9fe3d000b3', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-wildfly-http-transaction-client', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4', 'rhel-cpe-repository', '', '0:1.0.17-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x21ed55b1679489c8b200342441b19409', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-wildfly-http-transaction-client', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7', 'rhel-cpe-repository', '', '0:1.0.17-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x52d34fc8e2ecb97d218b36ffa0a3ad03', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-wildfly-http-transaction-client', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el7', 'rhel-cpe-repository', '', '0:1.0.17-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa47fe3741d57b832b2e9da260e3d9bbe', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hal-console', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:3.0.17-2.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x27d2ae166023d8805d8d42ce07ad9cb9', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hal-console', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:3.0.17-2.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x53cf0fb4fec9cd98149c60b09fad48f7', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hal-console', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7', 'rhel-cpe-repository', '', '0:3.0.17-2.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd4bc0b7060caf0d9e7653b94dbe1331b', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hal-console', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:3.0.17-2.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb2776a2fa8cd77b5801fcb3576c2a6e3', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hal-console', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7', 'rhel-cpe-repository', '', '0:3.0.17-2.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6d6d986555a0c48c5a703f7efa8d5e11', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hal-console', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4', 'rhel-cpe-repository', '', '0:3.0.17-2.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd21183f8062c903cf65cf4fecceca1ca', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hal-console', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7', 'rhel-cpe-repository', '', '0:3.0.17-2.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2239b9f9c9244d5ca2ac86a10da4e1ba', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hal-console', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el7', 'rhel-cpe-repository', '', '0:3.0.17-2.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb7f45b0d9a1debe327f406567df4623c', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-wildfly-elytron', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:1.6.5-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbdb513c781784ab4d6c23dfb9ab4e836', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-wildfly-elytron', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:1.6.5-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xff119eea58165dbff165913630bdad5a', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-wildfly-elytron', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7', 'rhel-cpe-repository', '', '0:1.6.5-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x98986d518f2c09da7bff55e90fbb0a88', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-wildfly-elytron', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:1.6.5-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbe3f3edf28d05cae0d9333375fcae598', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-wildfly-elytron', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7', 'rhel-cpe-repository', '', '0:1.6.5-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4b6813985149b06bb66a5c52811df46e', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-wildfly-elytron', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4', 'rhel-cpe-repository', '', '0:1.6.5-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x644cbf8686b407286f44d92cba32aa7b', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-wildfly-elytron', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7', 'rhel-cpe-repository', '', '0:1.6.5-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf873c266465f74e00a36a6f0912ec706', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-wildfly-elytron', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el7', 'rhel-cpe-repository', '', '0:1.6.5-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2f8d09a9e30c9c97056017ca03d491bb', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcd40a7a6aa3cd6198a491ee5117a9158', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x01cbbc35bec5c3e53165cf1ffb063d49', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x467683f475084f64b10fc52b09e10b6d', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc93beb823eb9496b29b59d3a20011518', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1836eb5850324cedf77adfa3ee7d344b', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc41432d9bccdbea4130db45cd407433f', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8d62cdfbe7404c099a94354987b2ceb0', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el7', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbd692ab337b2da02582bbdccdeddd8da', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x49f2bbd2b530e1e6a2357cb7586857be', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc92aff0e3fd8260cf9551f1fe8d12c37', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x675b8acb0bab12c3b1875bb7811f8cac', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x237fca77017667626663a93b4864fcaa', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7ee40c293a212a80caf8274afdf6264c', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7ad5dc279b66d714fb57196ecd2bd696', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd7f4ff5680afe5d41ad29d7bf3ee7f09', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el7', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xaec7dfbfa2d6ef28a4eea190abddd5c6', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-entitymanager', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdca092e3e414ca116e5d1afc329bef7d', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-entitymanager', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x627c87698598316a5e2a73b8c26bc42f', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-entitymanager', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc024d3d17841328391e0317c69e45da2', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-entitymanager', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5a09ed7edde86a73ee150ca589fa0174', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-entitymanager', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8cf8a90e85674d30724b5e4c1731a0d6', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-entitymanager', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4552a69dbd6cf2aac318e269470e4369', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-entitymanager', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x057c71736b739976fd70f415ca377d6e', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-entitymanager', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el7', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc1eac72dfce3d54d0759d772f186ecdb', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-envers', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x33bedb8094eea756074b71d686cea55c', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-envers', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8d603de9c8b6a0d186d0eca3dc0cf75b', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-envers', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6a3b7676ff7acafe2f389bbe8727e500', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-envers', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf38baa9a0fa54f0f533c999f20bb4bef', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-envers', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7207bdcf5476000388e4e3faad7ad109', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-envers', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcb61a2259a10b6afd6d2f394a9bb5707', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-envers', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6f3ccf026a16519272cab3414445fee6', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-envers', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el7', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1b509e0e398bc1e8a6c7e924b80d4729', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-java8', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x157c587b074433d4bc5d04af26a3955e', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-java8', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3152506c25d9fb6fa0993bc0f9a1ef92', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-java8', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x633252884d1a783195718fedf2ef91c9', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-java8', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6bcf642e570efb9dbbe95cd399bd771f', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-java8', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbb4050b6a2c43318df7eaa38ac0dea38', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-java8', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc95d7180bb62e8f4ae7c54f60e92d2c7', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-java8', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x548fc37c38edde561fe8db5a6d6594ca', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-hibernate-java8', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el7', 'rhel-cpe-repository', '', '0:5.3.13-1.Final_redhat_00001.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x885af0aba5c19177ea4a1ca295fe68f9', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-picketlink-bindings', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:2.5.5-20.SP12_redhat_00009.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa7a20ebb4e1af4672258baa258899c3a', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-picketlink-bindings', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:2.5.5-20.SP12_redhat_00009.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2a21a056614a5558b63aff81df9707e4', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-picketlink-bindings', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7', 'rhel-cpe-repository', '', '0:2.5.5-20.SP12_redhat_00009.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x421a967704595704dab7ffc194764c31', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-picketlink-bindings', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:2.5.5-20.SP12_redhat_00009.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x55821f8219a73b7d1adae7c346802fd7', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-picketlink-bindings', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7', 'rhel-cpe-repository', '', '0:2.5.5-20.SP12_redhat_00009.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3ce8f60307f15dc7c5d2ee3173093796', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-picketlink-bindings', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4', 'rhel-cpe-repository', '', '0:2.5.5-20.SP12_redhat_00009.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6e82eebda8ecfbc7503bcc16809536b6', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-picketlink-bindings', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7', 'rhel-cpe-repository', '', '0:2.5.5-20.SP12_redhat_00009.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xde7f21f7dee7db9bf8dfa28f7e1519ed', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-picketlink-bindings', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el7', 'rhel-cpe-repository', '', '0:2.5.5-20.SP12_redhat_00009.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8003c750353d1ad268479aa380b43cfd', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-picketlink-wildfly8', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:2.5.5-20.SP12_redhat_00009.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf7a6348936e676399e005a8bd7195caf', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-picketlink-wildfly8', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:2.5.5-20.SP12_redhat_00009.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x91692072d798e0d86570b208d9e35b6c', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-picketlink-wildfly8', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el7', 'rhel-cpe-repository', '', '0:2.5.5-20.SP12_redhat_00009.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x726e97055ea79c4a37930ab7b4b71b46', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-picketlink-wildfly8', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:2.5.5-20.SP12_redhat_00009.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5e1c76a915b66282a7ba9b65958f09f6', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:4019 https://access.redhat.com/security/cve/CVE-2019-14838 https://access.redhat.com/security/cve/CVE-2019-14843 https://access.redhat.com/security/cve/CVE-2019-9511 https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/cve/CVE-2019-9515', 'Important', 'High', 'eap7-picketlink-wildfly8', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7', 'rhel-cpe-repository', '', '0:2.5.5-20.SP12_redhat_00009.1.el7eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5959e27f8b0233b4cec1f1026e6e8c58', 'RHSA-2019:4019: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 7 security update (Important)', 'RHEL7-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-[...];[ Date: 2023-07-04 18:39:14 - Bind query: yes ]
14 7s591ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x9d60d99edd9d98810147e10946608e1c', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-libcomps', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '0:0.1.11-2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x63f5bce4a2593477bdbeceb646f1acd5', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-libcomps', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::appstream', 'rhel-cpe-repository', '', '0:0.1.11-2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x32ebb33786cb01a10cc64ba145e04dbf', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-libcomps', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::crb', 'rhel-cpe-repository', '', '0:0.1.11-2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe2152471617eb838803bcecfdd10fd9c', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-libcomps', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::highavailability', 'rhel-cpe-repository', '', '0:0.1.11-2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe49327658bdc699bdfc3fc70ec241153', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-libcomps', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::resilientstorage', 'rhel-cpe-repository', '', '0:0.1.11-2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x32367267f69fb705d079cac9a8320eb9', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-libcomps', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap', 'rhel-cpe-repository', '', '0:0.1.11-2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x53d8bb445af2b1d70b16bedd9523afc8', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-libcomps', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap_hana', 'rhel-cpe-repository', '', '0:0.1.11-2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x48b81bf3049e0a6a6c7977045f65615a', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-libcomps', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::supplementary', 'rhel-cpe-repository', '', '0:0.1.11-2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x280ef7ed95e096936b1af21a325d9933', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-libcomps', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '0:0.1.11-2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x68043f7aaeb5bc09250710903b81b972', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-libcomps', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1::baseos', 'rhel-cpe-repository', '', '0:0.1.11-2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x81eb16b38a35daf6b8da3a419d23ede3', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x893d9845a01a6b6b79fc7d14392b664d', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::appstream', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7d80e99092deef6e00afa6ac3e7b9bc3', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::crb', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfd2e7b533653d522b44143c2d56ce6d8', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::highavailability', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5f06769919c92045f2b19317e719efa1', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::resilientstorage', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x08cff297eb99eb4d8d9c14ef957cebb4', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdb1b15b6c4b77f5b6f27b420961b1ca9', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap_hana', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x634c997040a198a3f4beff6f4c0592d3', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::supplementary', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0f98b4ea8be670655b34149082ab4ebb', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x53ecdc1d80c819de1329f1eff2f4281e', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1::baseos', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5314887adffdfb543bc386d328fba993', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x76f15857015b465fcc877cca32ffdae7', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::appstream', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x11fff93192b8fe0cc4fbb3ba6be2be9e', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::crb', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x31a3b623c30c07e51a5b1ad96f985a17', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::highavailability', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x705bc65f5a28746b2cebf050772c9616', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::resilientstorage', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf35c61df124c317b9e65761bd69fae48', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7b63fb6d3bdabeddad19978229d932f7', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap_hana', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf5116385f3869d47f2d009afbddc1957', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::supplementary', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb7e54b20f7334f8644f3cb3c3506d996', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8a057da3c37233040c32e6c2aa1d0b3a', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1::baseos', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5231736bfd3503c0d2e1ac73891c8daa', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x142db4315301e6fb46facee6a7121b30', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::appstream', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x71f7e62197a04ace1c47891508f30c5d', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::crb', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2c7a4cb145f175ae9fd8da0514373f57', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::highavailability', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x47509558db055621d563ac217bbaee48', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::resilientstorage', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x658ff886fb346d844b6cd4095463211f', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7f8f607e71e4fe6efe0254c8a97e6c0b', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap_hana', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x62872ba0d3c343174bbf6c167da71e9f', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::supplementary', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdadf68b449427b6f4baba2a5c88b7b84', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfc05bff9b315818eaa24273aa0729db1', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'createrepo_c-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1::baseos', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5f764bf4d14f3e8ac3d64d2ca13b1edc', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-createrepo_c', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2b7ae2c4418d223b663c71bc42fc4c90', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-createrepo_c', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::appstream', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x797ae8b9a1e221055f9bdb85cfa349fd', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-createrepo_c', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::crb', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x16c19a0284511fe335d470ce3045093f', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-createrepo_c', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::highavailability', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaf8bdc0f8752d52e5f581334a67593df', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-createrepo_c', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::resilientstorage', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1950aa6dd79b53738a66830ac0ddb34d', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-createrepo_c', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5372c30e1a487947f38950d90a5d1b7f', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-createrepo_c', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap_hana', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x03130aeef443caa22c54330d1b1128c3', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-createrepo_c', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::supplementary', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x811affc73b3e1db38b29cbc2cf38cda5', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-createrepo_c', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x54062bcf4b1681bb0c63153b712f4128', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-createrepo_c', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1::baseos', 'rhel-cpe-repository', '', '0:0.11.0-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x34909ffaddac0ffd5ea75223bf3e79fc', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'dnf-plugins-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xeab766654f255e927fae2394acf57c59', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'dnf-plugins-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::appstream', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x40b6d5bff3acaf296e498e4c3bfd0fab', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'dnf-plugins-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::crb', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa774c6b8555767504407f0efa31592c2', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'dnf-plugins-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::highavailability', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf4f4551b31dc9ac6fde5b1265885c8d2', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'dnf-plugins-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::resilientstorage', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb9091b4490dc39dcf777b039342972cb', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'dnf-plugins-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdfc5da4c8d211a703248d87bb570682e', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'dnf-plugins-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap_hana', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc345e910f093743d064c72636c42843e', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'dnf-plugins-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::supplementary', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe10238a3502722d88c9d22bc9c85c7b4', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'dnf-plugins-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x96ab5020855f9f13406468ca6e7d0a0a', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'dnf-plugins-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1::baseos', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb7f996880638afdf22d7abc3d7cd4418', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-dnf-plugin-versionlock', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xeca3ed9bb84843f6b597085016e71f40', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-dnf-plugin-versionlock', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::appstream', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe23c94520fd64cce815273ac4317abb0', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-dnf-plugin-versionlock', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::crb', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x54cedd7b432fc4cd10fd486d20c035e9', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-dnf-plugin-versionlock', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::highavailability', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x858a8bcb404cd92b96b68b63690f0373', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-dnf-plugin-versionlock', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::resilientstorage', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc1b1d75dc2f7d2037092f360675de8aa', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-dnf-plugin-versionlock', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa501878840ea81fcf30e6d6edd6f39bc', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-dnf-plugin-versionlock', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap_hana', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbe3b69040e2c88ed249470d491cc9abd', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-dnf-plugin-versionlock', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::supplementary', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcb88929f39d364428ba63f978af28a21', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-dnf-plugin-versionlock', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7b10110b6bf15d02f9aa1a21eba1873d', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-dnf-plugin-versionlock', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1::baseos', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0060854f68fbe03e11674af975beb289', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-dnf-plugins-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x71ad6da2e0d5301aca584b30316cd1be', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-dnf-plugins-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::appstream', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa2a1cd60f01cf3c6f29176f732dd045b', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-dnf-plugins-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::crb', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb2cbbe448073577acc37a41fade615a0', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-dnf-plugins-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::highavailability', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfa6433b55825ac3c18d26e488e288b50', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-dnf-plugins-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::resilientstorage', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2a65b3516cd7ae56a316223c035d7a58', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-dnf-plugins-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x75439571b924e4bc578f775fd70da074', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-dnf-plugins-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap_hana', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7fc92f5d2a7da24722923d020193bca1', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-dnf-plugins-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::supplementary', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb8ac27daf8fb911ac13d12a51a58179b', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-dnf-plugins-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x85dc0014973b17668ca12d157ce622b2', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'python3-dnf-plugins-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1::baseos', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcba94a20ef8ca35d2f918a1928ff29a2', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'yum-utils', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf9669cf3bc621659f00e4fbae8100bbd', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'yum-utils', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::appstream', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x333314add6dabacd83c8c96db49052e0', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'yum-utils', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::crb', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc21bea4aff1cc9c5a04394c88439b243', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'yum-utils', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::highavailability', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x799b90a43f7b86432c07b46cead000af', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'yum-utils', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::resilientstorage', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfc6c3a91ba054890e5211d06530d92da', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'yum-utils', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xde11ec19787eef980fc9a0fe5cee1fbc', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'yum-utils', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap_hana', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x40c6d036f7a9472bb80d1306e3676636', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'yum-utils', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::supplementary', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0222d2a62580f8291b0f16a9a6568c35', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'yum-utils', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8bb4c55de41b125ab9cd856c8288dcdd', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'yum-utils', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.1::baseos', 'rhel-cpe-repository', '', '0:4.0.8-3.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf9335ac7c4e8d9130bcf2231ee6aa561', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'microdnf', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1', 'rhel-cpe-repository', '', '0:3.0.1-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb1ecbfe7102fcaa74a5b49247535a292', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'microdnf', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::appstream', 'rhel-cpe-repository', '', '0:3.0.1-3.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1d4c3849fead827cdbe01ecf677f98c0', 'RHSA-2019:3583: yum security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3583 https://access.redhat.com/security/cve/CVE-2018-20534 https://access.redhat.com/security/cve/CVE-2019-3817', 'Moderate', 'Medium', 'microdnf', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:[...];[ Date: 2023-07-04 18:39:50 - Bind query: yes ]
15 7s522ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x8efd16f07135341dc5e1d2e801bbc8b5', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf5b0b2ddd0295af5c9e65013952c3034', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::appstream', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd36ab7755ddfe0eb5d4516be98e0fddd', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::crb', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x74bf8845990c6598a35bd77a191ff22a', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6766e42750634de39814492ceda5f3f2', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::resilientstorage', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3af7561ea168c888778fa37ba0e4cd90', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::sap', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb1547a20d823c91b2b16d39325b74463', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::sap_hana', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3a6386824ca565e55d64802676307ce3', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::supplementary', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd1ae66cc490f5c76599934dcf1120c47', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.8', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1e23fd478e287cf1aaded54c7172fd90', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.8::baseos', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3ba2c2461edb12eb272cd04e99d4c118', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-libs', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8cbc29683c7a6cbf9bca85e87ab701a4', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-libs', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::appstream', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x802799a03253ca547d0e1b13731f66f4', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-libs', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::crb', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6d2f40e19a56dcccff6bf746beb740e0', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-libs', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9320c15a4075a39c66a865db390b6562', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-libs', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::resilientstorage', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbdf148fc18f82c7de492afa3765a5f37', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-libs', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::sap', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcfdcbbd84e16c7168940c857c9c11dc9', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-libs', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::sap_hana', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf55a8ed509a5f723eb7d31b1b6b83144', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-libs', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::supplementary', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x381c1e7d9906546d70f64d343996cc29', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-libs', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.8', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd8c6a3c3374837e67cd7301776722a4b', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-libs', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.8::baseos', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5451d067d8ec687e728fe593cd827e1c', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-libs', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa2f7909a3abeaf1afd7ffceb6639d58d', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-libs', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::appstream', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe0af09a303aa828415fa67e055fe733f', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-libs', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::crb', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x68f8fe66b9be958ba93aac5cfd971b7a', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-libs', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcb8ed744bb1711be3fda8ea50c7ea34b', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-libs', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::resilientstorage', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xac10bd7895d4696db00eb02925dd5b50', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-libs', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::sap', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3a8bd5885cbf9030d8dcaed60ed78aa3', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-libs', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::sap_hana', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x55a376c36489ec75f47966e588e5e512', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-libs', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::supplementary', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2de735f504c16c78520aab4a3cbf5ff6', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-libs', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.8', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5ee49f6fde3ecf2dcc09307c96604430', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'netcf-libs', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.8::baseos', 'rhel-cpe-repository', '', '0:0.2.8-12.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xff24798808a5422865a78a8da441cdb9', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Guestfs', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8', 'rhel-cpe-repository', '', '1:1.40.2-25.module+el8.3.0+7421+642fe24f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe9e6f0ef19660df19a1e0ca79b60a17b', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Guestfs', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::appstream', 'rhel-cpe-repository', '', '1:1.40.2-25.module+el8.3.0+7421+642fe24f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x12179885b84ba8d77fd27bfdb1d2dab3', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Guestfs', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::crb', 'rhel-cpe-repository', '', '1:1.40.2-25.module+el8.3.0+7421+642fe24f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xca0afb5766130c9b47f93926b8ab140b', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Guestfs', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::highavailability', 'rhel-cpe-repository', '', '1:1.40.2-25.module+el8.3.0+7421+642fe24f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x84bbe7628caccde3dda73edd910149cd', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Guestfs', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::resilientstorage', 'rhel-cpe-repository', '', '1:1.40.2-25.module+el8.3.0+7421+642fe24f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf1e6aa2f7a189cc045d5d312d5bcb41e', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Guestfs', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::sap', 'rhel-cpe-repository', '', '1:1.40.2-25.module+el8.3.0+7421+642fe24f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9116d972999338f78af8916069f56879', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Guestfs', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::sap_hana', 'rhel-cpe-repository', '', '1:1.40.2-25.module+el8.3.0+7421+642fe24f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xca429b4f25f02fdac4d5c4d7c592becf', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Guestfs', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::supplementary', 'rhel-cpe-repository', '', '1:1.40.2-25.module+el8.3.0+7421+642fe24f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xeb2bb5eb3324c714c00b8ab6f570182c', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Guestfs', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.8', 'rhel-cpe-repository', '', '1:1.40.2-25.module+el8.3.0+7421+642fe24f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6a56dece553dcc2deb9b97ed66e137ab', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Guestfs', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.8::baseos', 'rhel-cpe-repository', '', '1:1.40.2-25.module+el8.3.0+7421+642fe24f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5e69d5a454958bc2fd20b6bfd4ded79e', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Guestfs', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8', 'rhel-cpe-repository', '', '1:1.40.2-25.module+el8.3.0+7421+642fe24f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb9703a3968e99312cbee97dadc66768a', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Guestfs', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::appstream', 'rhel-cpe-repository', '', '1:1.40.2-25.module+el8.3.0+7421+642fe24f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdba7342c97177985701eeb1e5d18d8c6', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Guestfs', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::crb', 'rhel-cpe-repository', '', '1:1.40.2-25.module+el8.3.0+7421+642fe24f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x65f8b887978a66d1954132f0631eed10', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Guestfs', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::highavailability', 'rhel-cpe-repository', '', '1:1.40.2-25.module+el8.3.0+7421+642fe24f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1fb5de447838224a23e000d9889ea7b3', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Guestfs', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::resilientstorage', 'rhel-cpe-repository', '', '1:1.40.2-25.module+el8.3.0+7421+642fe24f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc0589888e0ccedc7c1ef45234f3d7525', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Guestfs', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::sap', 'rhel-cpe-repository', '', '1:1.40.2-25.module+el8.3.0+7421+642fe24f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7c647ecc7a1f4ca6fae7a3a28dc5670d', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Guestfs', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::sap_hana', 'rhel-cpe-repository', '', '1:1.40.2-25.module+el8.3.0+7421+642fe24f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8829ee7f9a3202d7871e70c859d80b98', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Guestfs', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::supplementary', 'rhel-cpe-repository', '', '1:1.40.2-25.module+el8.3.0+7421+642fe24f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x863d5d408b904f1c5345fe909772ad7a', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Guestfs', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.8', 'rhel-cpe-repository', '', '1:1.40.2-25.module+el8.3.0+7421+642fe24f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x34b2cc1224635237891464c851be104f', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Guestfs', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.8::baseos', 'rhel-cpe-repository', '', '1:1.40.2-25.module+el8.3.0+7421+642fe24f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5ab93d17f11b2ae3982cd968d9b8c9b2', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Virt', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8', 'rhel-cpe-repository', '', '0:6.0.0-1.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xab29e59b7e3cf09aa34910eb90e49a6f', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Virt', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::appstream', 'rhel-cpe-repository', '', '0:6.0.0-1.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaddf1601289226fa7bc0fac82a1056cc', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Virt', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::crb', 'rhel-cpe-repository', '', '0:6.0.0-1.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb0f6e82af50b1842245260e0b8690494', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Virt', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::highavailability', 'rhel-cpe-repository', '', '0:6.0.0-1.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa8edef55874e3502b637a9950d506520', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Virt', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::resilientstorage', 'rhel-cpe-repository', '', '0:6.0.0-1.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd8459b83f9176d7f973958c4bb7711e4', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Virt', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::sap', 'rhel-cpe-repository', '', '0:6.0.0-1.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xefc99b8d661f69a61e6de14b31781bf3', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Virt', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::sap_hana', 'rhel-cpe-repository', '', '0:6.0.0-1.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb8a1f1ac2409ee2bbe5ce51f2666e775', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Virt', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::supplementary', 'rhel-cpe-repository', '', '0:6.0.0-1.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb77d13b54a3be21b7f7827a2d5f89064', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Virt', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.8', 'rhel-cpe-repository', '', '0:6.0.0-1.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe6e3ee753e8d1e335ef85f4edb2cc7ef', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Virt', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.8::baseos', 'rhel-cpe-repository', '', '0:6.0.0-1.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x030c23d5a6ce3e2d2314edcfb44d3649', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Virt', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8', 'rhel-cpe-repository', '', '0:6.0.0-1.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa6f94e3e291384e8d99b71483ae27a00', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Virt', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::appstream', 'rhel-cpe-repository', '', '0:6.0.0-1.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x559bf4a4d26b554c8e360b7daac87277', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Virt', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::crb', 'rhel-cpe-repository', '', '0:6.0.0-1.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7965805045413883b986f66fcab705b1', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Virt', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::highavailability', 'rhel-cpe-repository', '', '0:6.0.0-1.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb7360b0ea2bf2cea71a6302b48af8008', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Virt', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::resilientstorage', 'rhel-cpe-repository', '', '0:6.0.0-1.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x89bc09016c96f71b00e349c6573af7bb', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Virt', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::sap', 'rhel-cpe-repository', '', '0:6.0.0-1.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x80f8fa557491473c05f358808095e4c3', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Virt', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::sap_hana', 'rhel-cpe-repository', '', '0:6.0.0-1.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5f9e0dfbf7c7a6af22597517ab5e7fe9', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Virt', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::supplementary', 'rhel-cpe-repository', '', '0:6.0.0-1.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xeca9dd145e3ae8065d74b924a6b2fe52', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Virt', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.8', 'rhel-cpe-repository', '', '0:6.0.0-1.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x39a6e2adc35e9bb65268e3d996dea67a', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-Sys-Virt', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.8::baseos', 'rhel-cpe-repository', '', '0:6.0.0-1.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4249f4930abd26453cc5f6c2ee0623d3', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-hivex', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8', 'rhel-cpe-repository', '', '0:1.3.18-20.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x924187ef98b43bbe576e44ed83b5c528', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-hivex', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.3.18-20.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3312445cbcab3f94eb2572a95b8307c5', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-hivex', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::crb', 'rhel-cpe-repository', '', '0:1.3.18-20.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3279ac4dec76b150367a6f9182f3b328', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-hivex', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.3.18-20.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd30b00998a06b826eba57679f84f84e3', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-hivex', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::resilientstorage', 'rhel-cpe-repository', '', '0:1.3.18-20.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xae48463141b89afcefbf81baf4496d55', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-hivex', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::sap', 'rhel-cpe-repository', '', '0:1.3.18-20.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd76f515cd5954d71af533a496904208f', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-hivex', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.3.18-20.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0b9d61b2d037cdf2accb8d96aa2e5465', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-hivex', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::supplementary', 'rhel-cpe-repository', '', '0:1.3.18-20.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8bd3ad3523c7de954b88ca6293505c1d', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-hivex', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.8', 'rhel-cpe-repository', '', '0:1.3.18-20.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x023ca9d8c2a460768296cfa59c7a35a3', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-hivex', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.3.18-20.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6412c15b66c41820398abb8d93117104', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-hivex', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8', 'rhel-cpe-repository', '', '0:1.3.18-20.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9c0eb6e4c27873f47ed0cd4b3a95baae', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-hivex', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.3.18-20.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x730cb2a59c21d70062ef61d66748ff20', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'perl-hivex', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::crb', 'rhel-cpe-repository', '', '0:1.3.18-20.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x708d7de413b117e8417c9dd48cb96731', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel securit[...];[ Date: 2023-07-04 18:39:50 - Bind query: yes ]
16 7s498ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\xa026242aea4ae2b9a95ec2272dd817bc', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb43d3a424e96c9c4a27c36855266cc1b', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_hpn:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x37a9c9673c5347d1e6c438a7dca81b7a', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_oracle_java:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc2b8278a78999d224d1007591f687caf', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x13b12fe3fd9984d8f4fd17a6bba582a1', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap_hana:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x68278e2fafd979cee614a5b1faef3730', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x388c4d5a5924d2d566646ae0041665db', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::client', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x979ba28228ec601a3167bbfa62d426e4', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::computenode', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2ed8c592aa48c84e2c3194253b64630e', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::server', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5ae0ef663cadc61832fea09a33789eeb', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::workstation', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x68f3b8803a91d2d8f119714fdfbdc5fc', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdb216728479286b4d8d4db1475948aa5', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_hpn:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x89a9959aac87ebb18d280843ebad98a4', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_oracle_java:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb6c854640cb15b22a2ca9607487f03a5', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0894c08ffdec487ff7af9b5bd879be14', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap_hana:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6ae40ad5a7d262154e257e67e084f3f1', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x551f633e4cd3fe633e6cc85f72dcf37a', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::client', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x20f06453a335f9d11d4aa19e7725979d', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::computenode', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd4b347780f87a408a51fed8b2e00a42d', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::server', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf377250041ddff630ede353a681ed5e3', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::workstation', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1e40e6af88e05baa7a2ec94d3a947ca8', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdcdb4e560b4f6026f58a6f5865800623', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_hpn:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3b308c995ba23068335284394bef2056', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_oracle_java:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2e9d857114fd17941f34cd459b2d615a', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4713a00cff114943a47088a2d5989ab9', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap_hana:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xffd932961b01d3a93e02cdd2367b6954', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5f21b61144e677fc40f8ce618f782930', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::client', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0918a84dc41beb1ca31a91e590c4996b', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::computenode', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0dadaaa3fe7ff6743b8e492ce5ab77c2', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::server', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfee49bdd3c2e613a1c6a1a0c7af93bf1', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::workstation', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x815af53f20d7b60724b1277b965add8a', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-javadoc', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6ce4375e86741f4033bb32a7d146acfd', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-javadoc', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_hpn:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x39baa703e60e989f5d087b85b099e4f6', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-javadoc', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_oracle_java:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x217e643d4d6e71ffa46a1d74cd03fd41', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-javadoc', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1eff6ea0173044f7d3dbabef06ade25c', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-javadoc', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap_hana:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1ab288c15995710c4db1ae7ff06c5a81', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-javadoc', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xab4e22ca2e9c68bf3bee3e8ee5316998', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-javadoc', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::client', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x56dbde04edf8d96377655cbd1eac3d48', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-javadoc', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::computenode', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd3b6ac973580332bdb1c35ea80945b43', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-javadoc', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::server', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0b3c023972f2b3ee6ed23e6eab1b4a78', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-javadoc', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::workstation', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9d4048e797700c55c3a45ee1cde3d58f', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-src', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9aecfe0074a2bf602bfdde60f2583e23', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-src', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_hpn:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x532a71974bcbeb5ac7a57793a4bcb6ab', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-src', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_oracle_java:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x694d1771c3da4dd3e24ba995f582e7bc', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-src', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf65effad0b16aeab798d7cb15d92d686', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-src', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap_hana:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3a6c8306b967b1c541b51db181e967d1', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-src', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0b3cea57dc40770a95453efd5bcfbe68', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-src', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::client', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x835afe32c2c5b59a309f91d8ad49ccda', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-src', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::computenode', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6a8a03415fa997c93893fc579053f8f1', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-src', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::server', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbc3f3ca3cd615a9441fe0e19c246470f', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-src', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::workstation', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4309d329c2401e6220a38e6b2572faa0', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras:6', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xed580feda3d2b7751a5c3af9f78a32fe', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_hpn:6', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe075405f86b57760c88c2cb665d4a763', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_oracle_java:6', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9084d19e11fae94f4cda8699e4eb9cf6', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap:6', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x66ceda9a9559cb5927f65c03af934404', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap_hana:6', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbec28245def5a8c16afba93bdc7350ae', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa3d767e47e44e78c27e29e2a4e0046af', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::client', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x43af1458d778a850b810c25c2da688d0', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::computenode', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd1f8384de74c32c989655b0001ec9613', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::server', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdd6e0439eb986a1761087d88e854ed71', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::workstation', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x098e44e263debb17044462afc7dbb507', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras:6', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x294cf37ae9924d559c44c7326170e48d', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_hpn:6', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xee5f21633d1811ba74b6989d288e7d46', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_oracle_java:6', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x30845ce03511ce011a577faea3f35aea', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap:6', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x03f36df046ee79e82ebc3e43af1d7320', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap_hana:6', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x15d27d55fc39ce6a852eeadee9b17b48', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc300a4b68a8f6bd6cf8afafbe66ab7e2', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::client', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x962e4ae1a1b0be6c3d6191ee380039a5', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::computenode', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc49b59b3a545e51b9bddb50c55ae9407', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::server', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf46345887a44baedd5a5a986c9bc6edb', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::workstation', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x69d6230909c92ae5a044c688a2b89f79', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras:6', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd91eb17938ce2396de6196cf6f45904b', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_hpn:6', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x65db0684a201f8462558492b27038bcb', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_oracle_java:6', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0a4cbcd0e7391e1c2cf9f52a61e3d6ca', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap:6', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x40eac2754f2d7d6cdaa0ee6fd350471a', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap_hana:6', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd641d30d9a505409fa321bdfa99d4171', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0016b47eb74b8957d4338fcbf46ef469', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::client', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x58523ccc64f60459bffbae426e5cf3e6', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::computenode', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xceb25fdeba3f22a30f86cbf29cd00a02', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::server', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x69d4eb7e5ec406d286ef52455688d8e6', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::workstation', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc11ab493bdbac9a4cc53a19abbfd6d78', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras:6', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x97522e36bd3983fb093545fbe7e4a83e', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_hpn:6', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2b18fc3b0d2a4cd62a007bd3199476ea', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_oracle_java:6', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd30631d7e0aa0e61119f71ea1c0f3dae', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap:6', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb2911800dfaae99e561c72c637381f5c', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap_hana:6', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc1981a73bb56d8f30cd46c6467eddc45', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb69ed018142f4c77d9e4ddb8ac8ce3e2', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::client', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x13febf2ef385e07bcb0c049821ccb51f', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::computenode', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd407743813cb1d53f0db344d1eeb8c3f', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::server', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf635f19576eb3c9c60270631ef78bc5e', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6', 'The Sun 1.6.0 Java release includes th[...];[ Date: 2023-07-04 18:39:54 - Bind query: yes ]
17 7s418ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x315f82f16fded4537ecce7706aebc8d7', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-libs', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:3.9.13-1.module+el8.7.0+15656+ffd4a257', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf1236e77edc4e2b664378c6fd1590eb5', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-libs', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:3.9.13-1.module+el8.7.0+15656+ffd4a257', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa72c27ad40689920a040ab47016f332d', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-libs', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:3.9.13-1.module+el8.7.0+15656+ffd4a257', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2d2f292f6f53708d405a3679e8ef818c', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-libs', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:3.9.13-1.module+el8.7.0+15656+ffd4a257', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x491a37887cc14534ba718f72747c5f16', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-libs', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:3.9.13-1.module+el8.7.0+15656+ffd4a257', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2e6f2881d6fbf06a0d7ddbf90fa0fed9', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-libs', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:3.9.13-1.module+el8.7.0+15656+ffd4a257', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x259eecd1dd0ccdacb3774d6e50236e98', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-libs', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:3.9.13-1.module+el8.7.0+15656+ffd4a257', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6eb7be2fab7998b617fe9f9226004461', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-libs', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:3.9.13-1.module+el8.7.0+15656+ffd4a257', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x161d7a2663f9a3d93188591ae1ab3ca1', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-lxml', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:4.6.5-1.module+el8.6.0+13933+9cf0c87c', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaedc91bd47f22949a4f612012b6b6ec2', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-lxml', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:4.6.5-1.module+el8.6.0+13933+9cf0c87c', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x04043c83455008095271a510df1f6d81', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-lxml', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:4.6.5-1.module+el8.6.0+13933+9cf0c87c', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5362909488385b156f2c85f127a570aa', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-lxml', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:4.6.5-1.module+el8.6.0+13933+9cf0c87c', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7980967a48ead8fc0b7172cc5e2f8309', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-lxml', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:4.6.5-1.module+el8.6.0+13933+9cf0c87c', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3d64cecbff3b4a25bbd8a6c66775affd', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-lxml', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:4.6.5-1.module+el8.6.0+13933+9cf0c87c', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7cd32e039edb20bbf94133c763c85f33', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-lxml', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:4.6.5-1.module+el8.6.0+13933+9cf0c87c', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x31ff773b7faa2d2932b91561aaec1d53', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-lxml', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:4.6.5-1.module+el8.6.0+13933+9cf0c87c', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb7bb44fbdd7352e7f5290b0aabb65339', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-lxml', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:4.6.5-1.module+el8.6.0+13933+9cf0c87c', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5af1c510f941d72dff7e26dd6973a74f', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-lxml', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:4.6.5-1.module+el8.6.0+13933+9cf0c87c', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0a4a56788d38342906975a8e78581343', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-lxml', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:4.6.5-1.module+el8.6.0+13933+9cf0c87c', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7cea079e6b14e9440dabecb992ef399d', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-lxml', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:4.6.5-1.module+el8.6.0+13933+9cf0c87c', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfb75b0ecc81f5bfc308fe5728da9e759', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-lxml', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:4.6.5-1.module+el8.6.0+13933+9cf0c87c', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xab5da9acc1468fc35411ab3d9bee12bf', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-lxml', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:4.6.5-1.module+el8.6.0+13933+9cf0c87c', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x479e1592c8660ff0f6f825244f27255b', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-mod_wsgi', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:4.7.1-5.module+el8.7.0+16654+645aad7f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf0afc0e0a651d081cef2f72fbd5861fa', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-mod_wsgi', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:4.7.1-5.module+el8.7.0+16654+645aad7f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6c3a72d6b1bda6f2e24c71d16f449d00', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-mod_wsgi', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:4.7.1-5.module+el8.7.0+16654+645aad7f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x031a5672c6fbbde980542cfbd3e110b8', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-mod_wsgi', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:4.7.1-5.module+el8.7.0+16654+645aad7f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4cd37eff06886b0d185ead537a78951f', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-mod_wsgi', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:4.7.1-5.module+el8.7.0+16654+645aad7f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbbb1fbfd5e1e1d6f7f64d31e8e7a0c58', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-mod_wsgi', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:4.7.1-5.module+el8.7.0+16654+645aad7f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa6fddd7648565aecb5a3c8fc1655a3fd', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-mod_wsgi', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:4.7.1-5.module+el8.7.0+16654+645aad7f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x65ddb0ed649f3dcbdd65bdd0ef3048f6', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-mod_wsgi', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:4.7.1-5.module+el8.7.0+16654+645aad7f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x45e8fa78a0425a9977d110c3d0779008', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-mod_wsgi', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:4.7.1-5.module+el8.7.0+16654+645aad7f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8422aa8291a60b8cfa765a360307ac3b', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-mod_wsgi', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:4.7.1-5.module+el8.7.0+16654+645aad7f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc1ec2f49aca635a31c47bd87957aeffa', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-mod_wsgi', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:4.7.1-5.module+el8.7.0+16654+645aad7f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x13c285ee44484002ed2d875030c0c80c', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-mod_wsgi', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:4.7.1-5.module+el8.7.0+16654+645aad7f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x99b661dd6cb8bf436b9a5b6610e39dad', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-mod_wsgi', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:4.7.1-5.module+el8.7.0+16654+645aad7f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe5029c57f5517b71a42bac188546c948', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-mod_wsgi', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:4.7.1-5.module+el8.7.0+16654+645aad7f', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3ed011151ba1c1be13b7582b41b1616a', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x20115dbdfc2aab9a8edf532e9cfea9fa', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x78348bcbaaa6ace8d25f3f36ea8ea2b7', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaaa1619209eb14603a011d4281866bc3', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcfc3f1497f49ccfee350025faa4887d1', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x29a0af4118fc34d3cc029e9c539fc1a5', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd0d5127a957be3e4e691ab9f9ac3f7ec', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbc4f961b503dbabfcd137875b1e256bf', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x84652afed3bbd533525e2f44d14b636c', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1666eadd92a65965d109a3783c6c2ccd', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfba922815cf39133e4c0e4366924102f', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x121f76f10d03565fac139102350eecbc', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x219da05515c2076a3dd7f23e3a975d53', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc633c10b81ee7389b92931b30de7f253', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x93fa02ec8a7dcaf3c021ef75d157ad7c', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-doc', '', 'python39:3.9', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x250798511723f18ed15eb7d304422664', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-doc', '', 'python39:3.9', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf0f38f9f7e51e226bf0058b903dd2856', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-doc', '', 'python39:3.9', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3734b3f1a0dbb6a889bf47945249b94c', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-doc', '', 'python39:3.9', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6c849cd38f470d60a6cdb67a7bb366af', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-doc', '', 'python39:3.9', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3ee72260afe3bc46bd2ec8fae30043e7', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-doc', '', 'python39:3.9', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5e0fc93d23dacf08b19f4fb067d0b98b', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-doc', '', 'python39:3.9', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xaa9d0861c5df37c93a5dacf56387cca2', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-doc', '', 'python39-devel:3.9', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x23dd06e3b66a6b091edc832c32ee1b6c', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-doc', '', 'python39-devel:3.9', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfe26a88b944a800fc815cd3ca453e6c8', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-doc', '', 'python39-devel:3.9', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xeb0fde1cc1fb201cd11bee4527d124c3', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-doc', '', 'python39-devel:3.9', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x56439c883122a4111a0180bf58cabf86', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-doc', '', 'python39-devel:3.9', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0e849dd0e5fc5d489d201b7f8b63d461', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-doc', '', 'python39-devel:3.9', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb3c0d0da1c4efa3cd035469b674ae44d', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-doc', '', 'python39-devel:3.9', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x49a05ceb2626656545b36c1739351f3a', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-f2py', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x32cff347e3432b8c00981405eb4be68d', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-f2py', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6088dbe14d29cbdfd8825e160301d474', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-f2py', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9ec2e8f88756b06e4da707e24d88bd05', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-f2py', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdb45b0e4cbe4e19a06409e6e85ff7b6d', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-f2py', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7d0343cc7135c5a1c9568c9557d641c7', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-f2py', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8fecedc20e83eece66838f33ce5506ee', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-f2py', '', 'python39:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd6a97c0a458e85e22e0572e5ab2481c1', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-f2py', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbc4a51d529586e2beda8162e582b3208', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-f2py', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x21729b1fa7e5a53482fb63b3b142f22c', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-f2py', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdf3e16cff37bc5191cfcdd5e51ab76ad', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-f2py', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7cc6b3ec6cd47ac83fbd50dd8073b0e4', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-f2py', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3ad80b80e3018e1e008fd2b02755dfa0', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-f2py', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x66b0ba13947e2f00898a99fc6780305e', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-numpy-f2py', '', 'python39-devel:3.9', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.19.4-3.module+el8.5.0+12204+54860423', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x89c96a9435d7e67d1f425dfb4d5364d3', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-pip', '', 'python39:3.9', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:20.2.4-7.module+el8.6.0+13003+6bb2c488', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x91ed388a28dd47a3a4ac671f1141e738', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-pip', '', 'python39:3.9', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:20.2.4-7.module+el8.6.0+13003+6bb2c488', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfa932689a828978f8a4a251a0859df99', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-pip', '', 'python39:3.9', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:20.2.4-7.module+el8.6.0+13003+6bb2c488', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3d1adf08e362b07ec824d1cfa9f2d8cb', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-pip', '', 'python39:3.9', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:20.2.4-7.module+el8.6.0+13003+6bb2c488', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0497ecad5bc2f972fe6906d615b78d30', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-pip', '', 'python39:3.9', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:20.2.4-7.module+el8.6.0+13003+6bb2c488', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1b6854d271167f295d35382969215df5', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-pip', '', 'python39:3.9', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:20.2.4-7.module+el8.6.0+13003+6bb2c488', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x527b48a7f625e6f6be8af110ec03c4f0', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-pip', '', 'python39:3.9', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:20.2.4-7.module+el8.6.0+13003+6bb2c488', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd3c2c33d1a1b394cf11c4395cf37fbaa', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-pip', '', 'python39-devel:3.9', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:20.2.4-7.module+el8.6.0+13003+6bb2c488', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3a1a8e50190852f663dbba32e465ca32', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-pip', '', 'python39-devel:3.9', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:20.2.4-7.module+el8.6.0+13003+6bb2c488', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5724d9b4c953ded748d28e0994b7b724', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-pip', '', 'python39-devel:3.9', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:20.2.4-7.module+el8.6.0+13003+6bb2c488', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x208031ff936b3f2d7c3854d84c09ab83', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7592 https://access.redhat.com/security/cve/CVE-2015-20107', 'Moderate', 'Medium', 'python39-pip', '', 'python39-devel:3.9', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:20.2.4-7.module+el8.6.0+13003+6bb2c488', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb92dcaba77bdf05f601b85b3acaffda2', 'RHSA-2022:7592: python39:3.9 and python39-devel:3.9 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.', '2022-11-08 00:0[...];[ Date: 2023-07-04 18:39:49 - Bind query: yes ]
18 7s387ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\xdf50f6701c6896c7d4a3913e3dc9f36e', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe64c4b5d41feaf725a7863e710333e34', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x250773d0f2e2a6c8664304473f0d8bcb', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4d632f3165ad2c0fed1b6760a550a9cc', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5cd5a8e953b7742b776b2126ee6a4697', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb0d1984093d149b5aec45ce4d0b741ed', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa7b783844fe6ec3a04eade04090cf43e', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x197f2faf81b9609a4cdcdbf9805d612b', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x77f67e4d807c1e2760b54dd265b1eada', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb56127cddbbb27a3e5393b80fce73eb6', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xeac4179aa959f68f08d887238d0d3f8d', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x072fcd827c425ea0abe7bafcc150514c', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe1ed92fe9adaa140fd6a4f77f358d60f', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x80234f8656c431a8d1f6236ac5c6e866', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf45446966ff981a6e758d909294c9a36', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf2fc35e9978f26f6b21150e4a61bf0fa', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5ce58ca05da5f1b4420a323d014bc4db', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x868ea871fb6449e92dedd5cb34921c1b', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x74edf32858d9f890dba214a2a7bdc39d', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3066939e96c2343450ce97f81bab780f', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xac03dffca16749f6ff0f7faea88b129f', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x69e16066b8dfbadbdcb83f202506c7c6', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfd71a98927f60c3a0e22fff99d9b3cee', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x439c57179ebe58ee89f202ac9693fa81', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbee219a223bb3a28fd1f279ae7f7eda6', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4b7933e23db4163fafe4bd30e9f5c9d6', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf10bb0b56a1deb6e26c1d8b71ddf142c', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1cd32c05d4d2cb08eab88eb057704e06', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc2d2255b8b9e9edb59f783c724865909', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8a881a162c87893d7c2b758b017b8f07', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb7fd23c77e3fa08beb9b18b328343f13', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0449f541296ff890055e849de1c1c158', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xad965155e7ad1c1413a4b600ced119d9', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x85d398eea9be26d6a8fa231f0821210f', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x72038959c25eb26ef799f9e1f9eecf8d', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x02cbed00a83fb7d2756c45e1d48c9f65', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x062c6b236bed03f89b23fa5d11cf5927', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf4681d1ba026830049aceed5a40d7bc2', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2c5ced01d06900f03bc8dc6fd8574e3a', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x91a0493b266fc427a35bba3761aaba1c', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x89eb17c8c5aa3bafa46d05d7708a77fc', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x12e95f3ca03233eb2c853e36b254a5d1', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5ca226f90379855cc4792e78d5a2c93a', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc212e6c246a4b48f7101fade65d51f6f', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x412502ed0e3e20b43463f9801f32e421', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf5b8f0486cf4c3469691614a4e43fd7e', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x68ac3f0f18adaf76b8ab2867c843ba2d', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xccdf13184cfa60a6423053a5e14aa7c4', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb5dc36a49801dd51e2360e4d2273915c', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0b4513bd95363b72e6e59ffa4719f978', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfdb25bf7cb626c770638b20b6aacf119', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x96841bd97f4ec7dc1be3415d7b50918b', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6830da9e3a001cb7ed432f7d8c572853', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xff169aaa7619db3234309b7a1547c628', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x993b15f672b9316308b446ffc3a4e56e', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9b10b456619265506d2a9a714e79e3ae', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc32682f754fb2b8552fd495c74cfd85d', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7f30fbb56e14f332619ff37b11f615c7', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x645c08bfbdba8188440e9876774861e2', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbb4a1699af7a40fef03e576e30f3ee04', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x61b0b2749c587595aedc7024a9c1c588', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x93dff8409768a0e0764d596f7b7e0cad', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x115d32acd89d9380682a123e22a0a7a2', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x005c3206abdbb7f865248e0589034d62', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6822e035904832c2721d03deaf51a3ff', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1c04b401b7d3f30e866b85e48db8a812', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xab36e56bdab0391442369fd2f3a4720b', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb6c5dbb4e7dfe99382f42af2c8e4cb1d', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa3936004518d5283df3293651b90db50', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9793dfebeca9321d5011dab44f6ef3fc', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1134a1fce80ae2dcfe3080dd82b9dbb5', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd7e0e2f9331566e5819446eec2c4def3', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7fbb18a44021627f3d89b7c4ea82a466', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3f50ee1513a7cab3ca9223f325065623', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3979849fe73aafac238b47e4e9bf83b4', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x505519e74e466ca3449d0f646d65fd18', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x52e7f3ef267883eaa67c317a765980cc', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfe6120025ea49a4ce2b28d94a884a191', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x36aa69b4942e5adc2e86194ae8c45297', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2c7307441c2254609d96c2b3da8928c0', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb9fe6ce8b8f9b37384ffa8980dc80f25', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x63d1f6905b604fa09cfc17110175b58a', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa0eb77aca3ea23d95a7d544d7e70fb3d', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaae53463e0cb74484c43eda252dd7a2b', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe469f7837dfa827398605ec1724e64d1', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903', 'Important', 'High', 'git', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:2.31.1-3.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5c05493252de8a4300aaed91fecadb32', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903', 'Important', 'High', 'git', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:2.31.1-3.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x51b158f1e97ba820eda23af5af7aacc3', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903', 'Important', 'High', 'git', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:2.31.1-3.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x13aa8067cd53f6867c322d38a5b645fd', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903', 'Important', 'High', 'git', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:2.31.1-3.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xeb77cc304f2905c786a59e2005bcab14', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903', 'Important', 'High', 'git', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:2.31.1-3.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x00740ef4840f8261a0a8a44eff3dfa4b', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903', 'Important', 'High', 'git', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:2.31.1-3.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x401f8d646845222932ded9d1e18ca04e', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903', 'Important', 'High', 'git', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '0:2.31.1-3.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x51c66c425b7a9f2575251dbe60fcd1a4', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903', 'Important', 'High', 'git', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '0:2.31.1-3.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2f944bb5503a3f89b66e1a604e5500f5', 'RHSA-2023:0611: git securit[...];[ Date: 2023-07-04 18:39:16 - Bind query: yes ]
19 7s351ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\xa026242aea4ae2b9a95ec2272dd817bc', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb43d3a424e96c9c4a27c36855266cc1b', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_hpn:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x37a9c9673c5347d1e6c438a7dca81b7a', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_oracle_java:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc2b8278a78999d224d1007591f687caf', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x13b12fe3fd9984d8f4fd17a6bba582a1', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap_hana:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x68278e2fafd979cee614a5b1faef3730', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x388c4d5a5924d2d566646ae0041665db', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::client', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x979ba28228ec601a3167bbfa62d426e4', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::computenode', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2ed8c592aa48c84e2c3194253b64630e', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::server', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5ae0ef663cadc61832fea09a33789eeb', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::workstation', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x68f3b8803a91d2d8f119714fdfbdc5fc', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdb216728479286b4d8d4db1475948aa5', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_hpn:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x89a9959aac87ebb18d280843ebad98a4', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_oracle_java:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb6c854640cb15b22a2ca9607487f03a5', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0894c08ffdec487ff7af9b5bd879be14', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap_hana:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6ae40ad5a7d262154e257e67e084f3f1', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x551f633e4cd3fe633e6cc85f72dcf37a', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::client', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x20f06453a335f9d11d4aa19e7725979d', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::computenode', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd4b347780f87a408a51fed8b2e00a42d', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::server', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf377250041ddff630ede353a681ed5e3', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::workstation', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1e40e6af88e05baa7a2ec94d3a947ca8', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdcdb4e560b4f6026f58a6f5865800623', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_hpn:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3b308c995ba23068335284394bef2056', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_oracle_java:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2e9d857114fd17941f34cd459b2d615a', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4713a00cff114943a47088a2d5989ab9', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap_hana:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xffd932961b01d3a93e02cdd2367b6954', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5f21b61144e677fc40f8ce618f782930', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::client', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0918a84dc41beb1ca31a91e590c4996b', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::computenode', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0dadaaa3fe7ff6743b8e492ce5ab77c2', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::server', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfee49bdd3c2e613a1c6a1a0c7af93bf1', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::workstation', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x815af53f20d7b60724b1277b965add8a', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-javadoc', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6ce4375e86741f4033bb32a7d146acfd', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-javadoc', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_hpn:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x39baa703e60e989f5d087b85b099e4f6', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-javadoc', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_oracle_java:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x217e643d4d6e71ffa46a1d74cd03fd41', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-javadoc', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1eff6ea0173044f7d3dbabef06ade25c', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-javadoc', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap_hana:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1ab288c15995710c4db1ae7ff06c5a81', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-javadoc', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xab4e22ca2e9c68bf3bee3e8ee5316998', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-javadoc', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::client', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x56dbde04edf8d96377655cbd1eac3d48', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-javadoc', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::computenode', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd3b6ac973580332bdb1c35ea80945b43', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-javadoc', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::server', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0b3c023972f2b3ee6ed23e6eab1b4a78', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-javadoc', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::workstation', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9d4048e797700c55c3a45ee1cde3d58f', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-src', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9aecfe0074a2bf602bfdde60f2583e23', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-src', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_hpn:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x532a71974bcbeb5ac7a57793a4bcb6ab', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-src', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_oracle_java:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x694d1771c3da4dd3e24ba995f582e7bc', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-src', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf65effad0b16aeab798d7cb15d92d686', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-src', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap_hana:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3a6c8306b967b1c541b51db181e967d1', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-src', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0b3cea57dc40770a95453efd5bcfbe68', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-src', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::client', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x835afe32c2c5b59a309f91d8ad49ccda', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-src', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::computenode', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6a8a03415fa997c93893fc579053f8f1', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-src', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::server', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbc3f3ca3cd615a9441fe0e19c246470f', 'RHSA-2012:0729: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0729 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-openjdk-src', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::workstation', 'rhel-cpe-repository', '', '1:1.6.0.0-1.48.1.11.3.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4309d329c2401e6220a38e6b2572faa0', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6-including-unpatched', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras:6', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xed580feda3d2b7751a5c3af9f78a32fe', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6-including-unpatched', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_hpn:6', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe075405f86b57760c88c2cb665d4a763', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6-including-unpatched', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_oracle_java:6', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9084d19e11fae94f4cda8699e4eb9cf6', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6-including-unpatched', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap:6', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x66ceda9a9559cb5927f65c03af934404', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6-including-unpatched', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap_hana:6', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbec28245def5a8c16afba93bdc7350ae', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6-including-unpatched', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa3d767e47e44e78c27e29e2a4e0046af', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6-including-unpatched', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::client', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x43af1458d778a850b810c25c2da688d0', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6-including-unpatched', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::computenode', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd1f8384de74c32c989655b0001ec9613', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6-including-unpatched', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::server', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdd6e0439eb986a1761087d88e854ed71', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6-including-unpatched', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::workstation', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x098e44e263debb17044462afc7dbb507', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6-including-unpatched', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras:6', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x294cf37ae9924d559c44c7326170e48d', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6-including-unpatched', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_hpn:6', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xee5f21633d1811ba74b6989d288e7d46', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6-including-unpatched', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_oracle_java:6', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x30845ce03511ce011a577faea3f35aea', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6-including-unpatched', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap:6', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x03f36df046ee79e82ebc3e43af1d7320', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6-including-unpatched', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap_hana:6', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x15d27d55fc39ce6a852eeadee9b17b48', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6-including-unpatched', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc300a4b68a8f6bd6cf8afafbe66ab7e2', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6-including-unpatched', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::client', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x962e4ae1a1b0be6c3d6191ee380039a5', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6-including-unpatched', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::computenode', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc49b59b3a545e51b9bddb50c55ae9407', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6-including-unpatched', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::server', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf46345887a44baedd5a5a986c9bc6edb', 'RHSA-2012:0731: expat security update (Moderate)', 'RHEL6-rhel-6-including-unpatched', 'Expat is a C library written by James Clark for parsing XML documents. update to take effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0731 https://access.redhat.com/security/cve/CVE-2012-0876 https://access.redhat.com/security/cve/CVE-2012-1148', 'Moderate', 'Medium', 'expat-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::workstation', 'rhel-cpe-repository', '', '0:2.0.1-11.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x69d6230909c92ae5a044c688a2b89f79', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras:6', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd91eb17938ce2396de6196cf6f45904b', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_hpn:6', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x65db0684a201f8462558492b27038bcb', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_oracle_java:6', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0a4cbcd0e7391e1c2cf9f52a61e3d6ca', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap:6', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x40eac2754f2d7d6cdaa0ee6fd350471a', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap_hana:6', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd641d30d9a505409fa321bdfa99d4171', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0016b47eb74b8957d4338fcbf46ef469', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::client', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x58523ccc64f60459bffbae426e5cf3e6', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::computenode', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xceb25fdeba3f22a30f86cbf29cd00a02', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::server', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x69d4eb7e5ec406d286ef52455688d8e6', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::workstation', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc11ab493bdbac9a4cc53a19abbfd6d78', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras:6', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x97522e36bd3983fb093545fbe7e4a83e', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_hpn:6', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2b18fc3b0d2a4cd62a007bd3199476ea', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_oracle_java:6', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd30631d7e0aa0e61119f71ea1c0f3dae', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap:6', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb2911800dfaae99e561c72c637381f5c', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:rhel_extras_sap_hana:6', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc1981a73bb56d8f30cd46c6467eddc45', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb69ed018142f4c77d9e4ddb8ac8ce3e2', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::client', 'rhel-cpe-repository', '', '1:1.6.0.33-1jpp.1.el6_2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x13febf2ef385e07bcb0c049821ccb51f', 'RHSA-2012:0734: java-1.6.0-sun security update (Critical)', 'RHEL6-rhel-6-including-unpatched', 'The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and effect.', '2012-06-13 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2012:0734 https://access.redhat.com/security/cve/CVE-2012-0551 https://access.redhat.com/security/cve/CVE-2012-1711 https://access.redhat.com/security/cve/CVE-2012-1713 https://access.redhat.com/security/cve/CVE-2012-1716 https://access.redhat.com/security/cve/CVE-2012-1717 https://access.redhat.com/security/cve/CVE-2012-1718 https://access.redhat.com/security/cve/CVE-2012-1719 https://access.redhat.com/security/cve/CVE-2012-1721 https://access.redhat.com/security/cve/CVE-2012-1722 https://access.redhat.com/security/cve/CVE-2012-1723 https://access.redhat.com/security/cve/CVE-2012-1724 https://access.redhat.com/security/cve/CVE-2012-1725', 'Critical', 'Critical', 'java-1.6.0-sun-demo', '', '', 'i686|x86_64', 'binary', 'rhel', [...];[ Date: 2023-07-04 18:39:54 - Bind query: yes ]
20 7s293ms INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x9c5c44989b1c4dfdc6bdbaffeda82761', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x07582fadf78216c2b182b102a48b6300', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x159f101ac6a7aff2bc3c01fcd87f0177', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2d0b7adb7378bc43b3215fd67c34cee3', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x56c85ee42957202c2f93ed73f8890c32', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xce800bf2e07d6706de39e0fccb4ae88a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x992c049336c5b6db5945a5c01b5f1683', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0117272805102356c823d5578eb8f5b5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc71295f1a06112f17c0e22c66db33ab8', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9e7cc16f4e258f0a3de23587581d43a7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbbf2423aa38be727ab82a6679c36d36c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9e9247faa08792937061ff04b4c81442', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe92c82fd1b3dbd4639e2a291dfd075c4', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa05628ade44860902279e24313423a92', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf9eff09f67fc640d000e43ccd1d02d31', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb3d78ea0c3b97e6726fab6e1b4c82f04', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x09178218ff9257c1efb38f0705a38781', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8b6ebc63b239e0e7f097845ac75a2e01', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x83fd66877c1f7f8648b6393aaad8228d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2da6561322a92630d5bb4be3dfe1b6b3', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7084a459465ae50686d7127c97a15d84', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6e3f1b97348c45c1fa97d40a67224db0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x51ca20614a7909041ee9cea485516532', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x64ffb2ed7a9e4b3057e2ce010663bd4b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3f5ac798baa87a58c5a220cacef485c9', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb0b95117599ecaf08866229fdaadcb89', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa7a5cd2bb8a276a170e849a6b0f7fdf4', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x05affdb274e571924379acc72b354ed5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbcf072349c687433dd3ac6e4fb8ae204', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x84dde84e9c8f91c5f670276507eac6f5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0b609f1c8acc094d32db7879dd2617f7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa2dc9377157c6bcb60a3cb4850b6d9e5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xeafea302e4d76f0d73da7ef9eec05735', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb6d94580be389e57ef2fd38a9e7e3f96', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x967ae28a858e0a4e0e967fc198e0a64a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x23e169258e27384a7f399ab564b5c2ba', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3e542f015d931a933d5fb87ecfddcf7e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x24f23316c26e18a49fe9e3640d960d90', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x02f53e6ba203100f00e29d0b260eb876', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x258b4af5150abd4829489b0046abb715', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5d814aac9e075f74c8ecf2081455051a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf9be79c370493be095037a554db0d9d7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe25bf7c62c2c7b129129f9a35b1e6876', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2c5f309975ab26961f6fbe2724f9e442', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x446667a8187fb46f6a8ab9ec991e7c8c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x803a3849cf68bb427e7b010def4a508c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3a3c0071c30733eb75d6fe203fca9695', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x99321d1cc7688ed6de03a1ae05268300', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc0af2f0d1d2aebe80c489a079d96cdb5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa02fbd62d53a41bcaa37a6ae53a66d09', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbff6943e3bb50803af3e491d3d67ba5f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x59f9c6c044ffcd59a06bd633dffc9823', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd3ba659e8a0d83caaa6701f0a2cf6756', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0071f0ab473ead1d7974279e65e702ad', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6fb9c22cb51690af3751a50943a0d5ab', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x80b7d6dde6bef9f15149c1bd108e45a0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8c8d53dc2d19060da9a50fa14de0fb9c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0cbff66adee5ce6adc522566184b3caf', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x70a994761270ccd5069e294520655198', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xea97807990a883ba891e0802e1e542ed', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x458b3ad7e0ba564ebf127d994b2c7ccd', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x59e4db0384552080cccde43662185678', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6d1dcd4b5dab3ff625639785cd2b4b60', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4913469ac6df62329a075e36a5b24341', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x79fe2dd14b11cb4023b71038ddfeb3a2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x577f756b27254ebfbafec53f780544d6', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa5d36d7fd411b4315f7d9a090a0edee9', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa87b2f333b2461f87be4f60cb2ea7586', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf86527408a10f274d11fcbc72a12c88d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe5ac6f610eb4811ce0380ec32e1e8ee7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6183913e7979c7a7a57fa55456b9f821', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x15090f9823857fbf108436d8be5f2d76', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa227494a1acb04cd288f42eab64dc660', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf1fc44984d0640e2298637dd708479ad', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd8462fb6a5ff0660583823e12e6cf1e2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x39acb597283db30f832dd28157cf5220', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6e466d811a11289aba2941d1955af135', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x35ae3e134f1beaa19d6d3f76f40334f8', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd971b9ad6b78cbb940a0566a38c5f83f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4a96cd7b28386d8b860e997f57984050', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x04038f9947f7b1f397b950868ab7d2bc', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xefd533b13848d2c917aa91926c92d698', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3e6fa59996bb2ba8f3efbd88f0cce9d0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9307a7937aa8439331c9de475723807f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa59e21b54f0205a28b99c4a265c0f43b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6d7a0551070f1637a9a36f6a297be357', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x41c7cded2267900d5bc13e9975483cf3', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2f3e9296c5590a6c51b29c5c9405465c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x937feffa95afb595313187e1126327dc', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd22f970134bc28906ae981a3edf90a9c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4f3dc74c038e29ca627b8a3128f53915', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa0536aa4e0a6e482c6c508947dc1957a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x356cfae0089670915a93790058030bd7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdb5c0273c58fde2d567762d72be91b24', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1ba6d64a827a499cabf9e119c1c36a60', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x270e0027e9792414520adb85a7c6fa6f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbf6b6316fabb81d0f27c003dd290cbc2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x15eac55c329d48eb40790d1a323d0fad', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x66a90e441a60dc12341c6e9835d2f8ed', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1fc77c3e552926e1602530d74c281546', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this re[...];[ Date: 2023-07-04 18:39:51 - Bind query: yes ]
Time consuming queries
Rank Total duration Times executed Min duration Max duration Avg duration Query 1 1h10m22s 5,387,543 0ms 2s134ms 0ms insert into uo_vuln (uo, vuln) values (?, ( select id from vuln where hash_kind = ? and hash = ?)) on conflict do nothing;Times Reported Time consuming queries #1
Day Hour Count Duration Avg duration Jul 04 14 5,387,543 1h10m22s 0ms -
INSERT INTO uo_vuln (uo, vuln) VALUES ('240', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xe0985c3977fdc77854e430ae9822ef7c')) ON CONFLICT DO NOTHING;
Date: 2023-07-04 18:47:39 Duration: 2s134ms Bind query: yes
-
INSERT INTO uo_vuln (uo, vuln) VALUES ('455', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xc3a5da79b853d490a30519638168a76f')) ON CONFLICT DO NOTHING;
Date: 2023-07-04 18:47:39 Duration: 2s134ms Bind query: yes
-
INSERT INTO uo_vuln (uo, vuln) VALUES ('349', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xdc4850040e6bebaa66a87a623f0677ab')) ON CONFLICT DO NOTHING;
Date: 2023-07-04 18:47:39 Duration: 2s134ms Bind query: yes
2 6m9s 19 0ms 6m7s 19s421ms delete from vuln v1 using vuln v2 left join uo_vuln uvl on v2.id = uvl.vuln where uvl.vuln is null and v2.updater = ? and v1.id = v2.id;Times Reported Time consuming queries #2
Day Hour Count Duration Avg duration Jul 04 14 19 6m9s 19s421ms -
DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = 'suse-updater-suse.linux.enterprise.server.11' AND v1.id = v2.id;
Date: 2023-07-04 18:47:48 Duration: 6m7s Bind query: yes
-
DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = 'RHEL7-rhel-7.4-tus' AND v1.id = v2.id;
Date: 2023-07-04 18:41:41 Duration: 687ms Bind query: yes
-
DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = 'RHEL7-jboss-eap-6' AND v1.id = v2.id;
Date: 2023-07-04 18:41:40 Duration: 389ms Bind query: yes
3 3m27s 2,088 0ms 1s958ms 99ms commit;Times Reported Time consuming queries #3
Day Hour Count Duration Avg duration Jul 04 14 2,088 3m27s 99ms -
commit;
Date: 2023-07-04 18:39:33 Duration: 1s958ms
-
commit;
Date: 2023-07-04 18:40:46 Duration: 1s831ms
-
commit;
Date: 2023-07-04 18:40:46 Duration: 1s831ms
4 2m15s 1,653 0ms 1s885ms 81ms insert into updater_status (updater_name, last_attempt, last_success, last_run_succeeded, last_attempt_fingerprint) values (?, ?, ?, ?, ?) on conflict (updater_name) do update set last_attempt = ?, last_success = ?, last_run_succeeded = ?, last_attempt_fingerprint = ? returning updater_name;Times Reported Time consuming queries #4
Day Hour Count Duration Avg duration Jul 04 14 1,653 2m15s 81ms -
INSERT INTO updater_status (updater_name, last_attempt, last_success, last_run_succeeded, last_attempt_fingerprint) VALUES ('RHEL6-rhel-6-extras', '2023-07-04 18:39:31.481111+00', $2, 'true', '{"Etag":"\"d6027a87257c4753a606d67725005cdd\"","Date":"Fri, 30 Jun 2023 21:35:51 GMT"}') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_success = $2, last_run_succeeded = 'true', last_attempt_fingerprint = $3 RETURNING updater_name;
Date: 2023-07-04 18:39:33 Duration: 1s885ms Bind query: yes
-
INSERT INTO updater_status (updater_name, last_attempt, last_success, last_run_succeeded, last_attempt_fingerprint) VALUES ('RHEL7-openshift-3.10', '2023-07-04 18:39:31.477477+00', $2, 'true', '{"Etag":"\"b060a1bfb8d505f2204f9673a6186ef1\"","Date":"Sat, 01 Jul 2023 07:28:36 GMT"}') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_success = $2, last_run_succeeded = 'true', last_attempt_fingerprint = $3 RETURNING updater_name;
Date: 2023-07-04 18:39:33 Duration: 1s778ms Bind query: yes
-
INSERT INTO updater_status (updater_name, last_attempt, last_success, last_run_succeeded, last_attempt_fingerprint) VALUES ('RHEL7-ansible-2.5', '2023-07-04 18:39:31.899678+00', $2, 'true', '{"Etag":"\"51a323b1fcd3e5e3e61ca77fb12411dd\"","Date":"Sat, 01 Jul 2023 07:34:09 GMT"}') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_success = $2, last_run_succeeded = 'true', last_attempt_fingerprint = $3 RETURNING updater_name;
Date: 2023-07-04 18:39:34 Duration: 1s601ms Bind query: yes
5 1m13s 132,422 0ms 1s294ms 0ms insert into enrichment (hash_kind, hash, updater, tags, data) values (?, ?, ?, ?, ?) on conflict (hash_kind, hash) do nothing;Times Reported Time consuming queries #5
Day Hour Count Duration Avg duration Jul 04 14 132,422 1m13s 0ms -
INSERT INTO enrichment (hash_kind, hash, updater, tags, data) VALUES ('md5', '\x3f7d7cefd56fb0af4ea2160f331c004b', 'clair.cvss', '{CVE-2019-15986}', '{"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.7, "attackVector": "LOCAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}') ON CONFLICT (hash_kind, hash) DO NOTHING;
Date: 2023-07-04 18:36:49 Duration: 1s294ms Bind query: yes
-
INSERT INTO enrichment (hash_kind, hash, updater, tags, data) VALUES ('md5', '\xaab4109cec72fae530120b1ab8b73c8b', 'clair.cvss', '{CVE-2019-9821}', '{"scope": "UNCHANGED", "version": "3.0", "baseScore": 8.1, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}') ON CONFLICT (hash_kind, hash) DO NOTHING;
Date: 2023-07-04 18:37:00 Duration: 711ms Bind query: yes
-
INSERT INTO enrichment (hash_kind, hash, updater, tags, data) VALUES ('md5', '\xa66c6961281db4ae55d617f4ee2b3f4a', 'clair.cvss', '{CVE-2021-24378}', '{"scope": "CHANGED", "version": "3.1", "baseScore": 4.8, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "HIGH", "confidentialityImpact": "LOW"}') ON CONFLICT (hash_kind, hash) DO NOTHING;
Date: 2023-07-04 18:37:31 Duration: 706ms Bind query: yes
6 1m8s 132,428 0ms 1s649ms 0ms insert into uo_enrich (enrich, updater, uo, date) values (( select id from enrichment where hash_kind = ? and hash = ? and updater = ?), ?, ?, transaction_timestamp()) on conflict do nothing;Times Reported Time consuming queries #6
Day Hour Count Duration Avg duration Jul 04 14 132,428 1m8s 0ms -
INSERT INTO uo_enrich (enrich, updater, uo, date) VALUES (( SELECT id FROM enrichment WHERE hash_kind = 'md5' AND hash = '\x8fcfa6a5f64e25d3f95e1f322615c9d2' AND updater = 'clair.cvss'), $3, '207', transaction_timestamp()) ON CONFLICT DO NOTHING;
Date: 2023-07-04 18:36:19 Duration: 1s649ms Bind query: yes
-
INSERT INTO uo_enrich (enrich, updater, uo, date) VALUES (( SELECT id FROM enrichment WHERE hash_kind = 'md5' AND hash = '\x6d8c1f5f6e2ef57c03fdf9570f4b9ef2' AND updater = 'clair.cvss'), $3, '207', transaction_timestamp()) ON CONFLICT DO NOTHING;
Date: 2023-07-04 18:38:15 Duration: 1s450ms Bind query: yes
-
INSERT INTO uo_enrich (enrich, updater, uo, date) VALUES (( SELECT id FROM enrichment WHERE hash_kind = 'md5' AND hash = '\xe6b5b3855f0e71ed71ce6acd7c8ff2ff' AND updater = 'clair.cvss'), $3, '207', transaction_timestamp()) ON CONFLICT DO NOTHING;
Date: 2023-07-04 18:37:18 Duration: 1s189ms Bind query: yes
7 29s560ms 354 0ms 1s665ms 83ms insert into update_operation (updater, fingerprint, kind) values (?, ?, ?) returning id, ref;Times Reported Time consuming queries #7
Day Hour Count Duration Avg duration Jul 04 14 354 29s560ms 83ms -
INSERT INTO update_operation (updater, fingerprint, kind) VALUES ('RHEL6-rhsso-including-unpatched', '{"Etag":"\"349623598899226c6eb4ebb7289d35bd\"","Date":"Tue, 04 Jul 2023 12:51:24 GMT"}', 'vulnerability') RETURNING id, ref;
Date: 2023-07-04 18:39:33 Duration: 1s665ms Bind query: yes
-
INSERT INTO update_operation (updater, fingerprint, kind) VALUES ('RHEL7-openstack-14', '{"Etag":"\"0ff35622be2e5c2ca764c85e29bb2be1\"","Date":"Sat, 01 Jul 2023 07:29:47 GMT"}', 'vulnerability') RETURNING id, ref;
Date: 2023-07-04 18:39:33 Duration: 1s254ms Bind query: yes
-
INSERT INTO update_operation (updater, fingerprint, kind) VALUES ('osv/npm', '"21b1b656743a59c5e8d6c1c6f028abee"', 'vulnerability') RETURNING id, ref;
Date: 2023-07-04 18:41:43 Duration: 865ms Bind query: yes
8 13s189ms 6 1s240ms 4s286ms 2s198ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, https: / / ac[...];Times Reported Time consuming queries #8
Day Hour Count Duration Avg duration Jul 04 14 6 13s189ms 2s198ms -
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x71af22db714ffdf86cfb69c295c1e0c9', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:4.10.6-3.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3a001114df7f16b4c17a5ac4048d0b46', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:4.10.6-3.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc63967cb33901812fc83300e1ea3cfcc', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:4.10.6-3.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x913bc458bb3b8144c426f1f8a006432e', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:4.10.6-3.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1919aeadcc43f70966d6ab59c7c6cea8', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa396393aaf17e610712c92793582118d', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe93777a2cac37810a4e5c3ffd42d236c', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3b69d44073aa7be28d07718b954944b4', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc4116ccbbdae317709c27b66dc133fa5', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-pkcs11-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd9927015c5da93d91d6e5249e4a41965', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-pkcs11-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x135fd5d32ba00937e907ef1ce820a15a', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-sysinit', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9f5d23d32829b39da98ede9118d3b7f2', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-sysinit', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa141c1eb9964660aee8f64b51d4748e7', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x24add0a5de0a2f2ad022cbf4403d015d', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1174ff0a1175dfc95782306dec031171', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.16.2.3-2.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x239214ee9e81b780a4ca84d39e59a9ac', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.16.2.3-2.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xed13132844ac23bd1cab4d3e85300b96', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.16.2.3-2.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x93e3bbd4173aed03b767f6d037b666a8', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.16.2.3-2.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5667a17731e957ee51399dc50b20accf', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa5fdbb919f5a6d7a136286d64670db92', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2763edb3654f293630fe6d191c0f9edf', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcfae4fdc1f7dd1cf5040f270e31d3f9b', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x662709e1e9945abd38f4c10cad0be18f', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-freebl', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3d1cdc7cf0ee593e666704915a14597a', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-freebl', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x76d7aa31b06bcef2450fe52268fe2c70', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-freebl-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4a103ce979128a3e0ad086dd2755de8f', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-freebl-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4e7d1a998232e62b974933d6e3e8e33f', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x25d1eb143a4772c71708076ec1110106', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfbb5027e77297817e376c883577ec72d', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-client', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd81b2e760b651a2e20615559a5e8b0f9', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-client', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf105a7048639abcd325e88a035437fe1', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa93298b7ce249b5df66fbb605afa4365', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdc086e7689ddcca9496d277d28dc5034', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-filesystem', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdfbbb52af67ec23e510e4b0920517615', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-filesystem', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0ca7802a5ea320ad8ecf75f12c10874f', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-ipptool', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3e3a7bab57dacca638a749b96fd711ad', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-ipptool', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7e147fb8c504041f867fb7b2e3db1a8b', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9d32c577736757726afd3227ae11d27c', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x862f94493a6db6e168dfbadb9757a981', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-lpd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xea59344130e6d7946912dc895beb7a79', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-lpd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1ac9f75860e62a781325639820d25eb3', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd3a5ebd52d98e81822c8d207f543058b', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0850eee2b3e294894e79fd00057756da', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x150b7a3e094757d234fe06b132f7ddee', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x24c1642b1dce65fc4daf35caf30b975e', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x35ac11cb2d4e11587ffa5358aa7c7f62', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd02b93f1682093e9a696a3cfd2b2960b', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x40b52df88d07ff8ab516530a465e4b18', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x48bfb2f5a68c41ca89a3a5ff41f55515', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcd57fd245870bb901c6dfcde295a3b0d', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5695368e4485069fc07443a218b88352', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xab603de40dad381019d15722b832e811', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8ea862c2b7390b69fe9b4ffda0165aa8', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x63cac6ab9e9adf4f22236212ae2f4498', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2836faf178ac4a4b9f53ffeae3fabcfa', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6f6c8f1a9ed133a3ef8a160b2fe0adcf', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa2bf19cb8a9473a02b8d5bacfc22e6db', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_simpleifp', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd2218032eac5be926522cb5b2ca290a1', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_simpleifp', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd70bab33a37e5f5103409c57505f6503', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_simpleifp-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5b7081ee71387c71684ac03f3c125f62', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_simpleifp-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe71f40e586d918e0a8d732d70b86fcbc', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'python-sssdconfig', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5af79f2ebf42367fafe4208972f04cc3', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'python-sssdconfig', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xee89ed57d84f0887d0dfb15edc08b2c6', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1917951ad666db5e34a35183d71c59f9', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb59df4a1c4484ece3c7247f5ba1293bb', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ad', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x338619d95041f14b9eecaa11d3344873', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ad', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x67ddb09489fba9f17bed8e650fca145f', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-client', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x444c1b6fab48e0f8e228c94c5a6a6fbf', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-client', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x29e385944ab2004b20403d9208971af2', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0088b80a35c682e56199087ee0fc69bd', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0c65657063a2931a293eeab3d90465aa', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common-pac', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa21f5ae34fd92045e0f9afeb29daaa1d', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common-pac', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7cd0bb8f78195100bb274c3921b716c9', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-dbus', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x42e428ed5f2c1fe9581961aa7037e632', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-dbus', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc70ded859d3646cd4f85128e376a2052', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ipa', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x85f0d985fd8bb17fa962dde65c352e83', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ipa', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x629424d945e3bfd118d5b170d2f5a3ac', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x11c7f0794d1346276d26a5aa88262cad', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf9ab173d965fb849cc6b6094f3e7cae6', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcafadde3e37f239c97f08451c9fdcc1d', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x63336a9ce995358252c464df5899e708', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ldap', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2e7aebcd1dff5bcef723fab101445834', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ldap', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x15c97605152b008cbe4fa21005d16474', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-libwbclient', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2285680082bac3a940c9a52149075fa4', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-libwbclient', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x483d4c345e90596e6083e651b1ada683', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-libwbclient-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x87eaef4bd0cad61b5bf340ee8e6332cf', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-libwbclient-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0bad057e94cae0d1a1037c89f2d542e3', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-proxy', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe9c51a876413379b01c8cdcd0c2a478d', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-proxy', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x70bac87175573e3c3e14e5039f913eb6', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x43d304e201def4625ace8c844f9a9591', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe0bb17e716bb17297b725bfa0dc108da', 'RHBA-2015:0584: tboot bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The tboot packages provide the Trusted Boot (tboot) open source pre-kernel/VMM bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0584 https://access.redhat.com/security/cve/CVE-2014-5118', 'Low', 'Low', 'tboot', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:1.8.2-1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xb24834f858c357932a8ae7d0e3905c1d', 'RHBA-2015:0584: tboot bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The tboot packages provide the Trusted Boot (tboot) open source pre-kernel/VMM bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0584 https://access.redhat.com/security/cve/CVE-2014-5118', 'Low', 'Low', 'tboot', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:1.8.2-1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xf072995999ffbfc20907b9ffe85c79b2', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:4.10.8-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6d96e4c54eba470c9a983d754395c0bb', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:4.10.8-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xde826349b838f984a421325677570372', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:4.10.8-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xac11bb0ca3e24ddd39e2e8e99180d5e1', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:4.10.8-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4c515219392dfcf88d265c9600b49d9b', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.18.0-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6565539ea2464a97175d76b835facc8e', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.18.0-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x33aacc5f8c80531d2a9d27032ba1315b', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.18.0-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7fd884cd32f03437b8338bfda7057edf', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.18.0-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd163cd59f200079db5b34234b8945c82', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.18.0-2.2.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xad1b9763e644a45a7c94837d57f42cc2', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.18.0-2.2.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6f0a6454eac37664fe132d753e6d08c0', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://ac[...];
Date: 2023-07-04 18:40:15 Duration: 4s286ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x4be198bfed4d67e715843ef0b6341d3d', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:4.10.6-3.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa859f020134e17e036866a0e52caae23', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:4.10.6-3.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7b3d9d19bd13f64001108dcb6c24f1bc', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:4.10.6-3.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x899546753ac2bdcb85f7090ff4cd15e4', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:4.10.6-3.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf1f66196117c90438e9cc427b4fae244', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbd42d030ca36fa7698c52381730eb514', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6098f252d371a6c147400160e96a1320', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0a4eefa7fc78469467bd8a9eb9b4d446', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x18ea58748b20424335fb6d9bfe547031', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-pkcs11-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf951fdd6c2ca93135c3553ceb728778f', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-pkcs11-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4a3f43a85eb5e0619e127bb897c4a7de', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-sysinit', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc5b9bd72cd6acd52c384c9ba7619a18d', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-sysinit', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xafe80334141b6179607b21de60292922', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xde0b80b07ba3a3d966abfa343b138819', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb96dc8eee5cd13f088ec2841338c0e99', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-2.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1dab624fa4a45965d3076c9b0d66d6a4', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-2.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x13c4451b9e1e340861e6f14133449685', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-2.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x43aa33c446ea0771b252dc4ed870eb6d', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-2.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5e50b2d98392240ddadf70767617b17e', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x276a4e7f8653a7287c268372b5e951d5', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x961cdbb84bac6bb1a9a3c07734d8445f', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2edcfc7460cdaa71ed3e12d3b909d211', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd49afec5e00de29c0472d250e04a3126', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-freebl', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5abfda2d3aed6a3b76d2f6a21c6a5c5b', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-freebl', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x96b6564d006d5f7f86476510c9ee806c', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-freebl-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x18e4e3881a46058baee73018700e7877', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-freebl-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5f1335e7f682cf9fd5dcd9e01cfa813f', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xab631f4f2722a1aa220ca7f6325c7335', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb9fd18ab531ade6da0015a66b880728a', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-client', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4a65c1eb6a152ce6d16ad4d43a3dc0e6', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-client', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7a12af5c0cf2f2a1f5d01ca0da9cf8d4', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9933f7407bca0619f53e862cbd0c7eef', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdee73c4d47190f2ad15b6749fa416b5f', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-filesystem', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5409df6f0a1ed389389f8e2727151269', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-filesystem', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x798cba6b18e4e79cd9ca648adc60e508', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-ipptool', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x52ec84fedd4482a7cb8e4ffaa5e53079', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-ipptool', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb7a4c4bf148fdf0b646f9dc5004ce05a', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x410e28e84251c48ad7e86ab189e8e736', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4cb056cc5b4b029edc5048add1296806', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-lpd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6c109dcbba0e41d3e538ab3d38b92e83', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-lpd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdfaa29590e753ba8dbfebff4cf611ceb', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x239003e88376bef2ff87864ba1896ff8', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbb7859598a9f8fe3eb26339b8dbae473', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7680a0daff233aeadaf84c61e2fab944', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfa83b637699c87bf5195c0c80f38ee0b', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa8e2573d0b0ec230e8c098b738a17d86', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8fbbceefbd0331d00918f0a36f45885b', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x876aa3361fd540f625b049612ea2a4de', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcb33a3b1f7cbaab3d359686426bf5079', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfa5069d5435f6e2de5a5146fab926dae', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x622e16aaec75dfb811ea024c885661d0', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x04728281270a337184ff90511b711543', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x19a5d91cc8dde544460f7737437e2e49', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc25eea0e24fe2c20031be98eca6295f5', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x450b87f20946ef164c0e172aba24d855', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe726cf556ebffdafd83f890448c1111a', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0a52bede2316084a76d1dfaf6844bc16', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_simpleifp', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1bfc5bc7bae740e9c81820e2eec4bb79', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_simpleifp', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa6461c14348c771c9ba55b91f8baf4be', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_simpleifp-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x09fb51f2e38987d8e57b75e4d0cd654a', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_simpleifp-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xce73f50f02b8348f014adc3ced26d5df', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'python-sssdconfig', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x289fd31e46edf35c89f7f8ff4e6a2e5a', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'python-sssdconfig', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x92043f7fbb7a1a4199ac5e175a83e3a8', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1746dbdfd3055b8466e7b1842ef31b5d', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x69303a6da11537a6df65874dbb542124', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ad', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf5a24ba24e4c4164ca23525e495fd717', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ad', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x91eb9f3db8ea40aa5e130c00620ecfbd', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-client', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0fbf3167be280a4685f7980e542a22a8', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-client', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x72b28e775b7c9d6a3e57e32d3897e2ca', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc95950c2b61df493d0d6d293330ec2a5', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa27fd9f734a4b0ae562c00f3061e1af0', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common-pac', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x832a5ba8dcbdd98350a8bf0a231e8d35', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common-pac', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xef489f2b35a20f960b1349c6e67a721b', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-dbus', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdfd2917eb8ec7a814857e25d20902ecf', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-dbus', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0f436064a5754cf814b1e93e623ed55b', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ipa', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x78205fdd0b123dcfdf3fe9b4ab1df8a7', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ipa', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0b3322ca2069414067a8bf4e6a2884b7', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaf72ed345df9a421b7c9e489d10564d9', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x48330c66a3a1c1da669a28560814c2d1', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5a0a9bcd44b69ce9938c6daf0d982b4c', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x687ebbb01ea168c79c6348bef210aa62', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ldap', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9d9b6dc5ffdce92417a662eba49234f4', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ldap', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa79f05b04b40ee735bcf77487b892491', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-libwbclient', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x561701a51d32a425924ebc5772456f1e', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-libwbclient', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x848e940d919c08acc1a452a39f877f4b', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-libwbclient-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xee795dca849d84ca7e670bcf7a3b5b23', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-libwbclient-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9366982c215588150a82b986159f425d', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-proxy', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x93b11ead556ca22b5f7200572ce2dbb9', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-proxy', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x31709cfd9a0e61fd09856155a6e95e4f', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3fadd8416655e2a0b7dff07bd16f0cbb', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x864eee1d047f482dcf44c5984d553d6d', 'RHBA-2015:0584: tboot bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The tboot packages provide the Trusted Boot (tboot) open source pre-kernel/VMM bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0584 https://access.redhat.com/security/cve/CVE-2014-5118', 'Low', 'Low', 'tboot', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.8.2-1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x111b7ec7bed7be9917c326dc434c9375', 'RHBA-2015:0584: tboot bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The tboot packages provide the Trusted Boot (tboot) open source pre-kernel/VMM bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0584 https://access.redhat.com/security/cve/CVE-2014-5118', 'Low', 'Low', 'tboot', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.8.2-1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xfe18fec79615daec1a8b281a89e3bc53', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:4.10.8-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x789f437416d19f4caae192273176c5a1', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:4.10.8-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x288427553c5b69ae3570a164d886ef4e', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:4.10.8-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x36e7e8ed0b8024efa8f2107ba1d418cb', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:4.10.8-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4c3f0e3af9900e8f59c8ee46e9d4576e', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.18.0-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0c89d7b5236d4ea27421e92616794d87', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.18.0-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf2cb885e476cd5cbc78137828130963f', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.18.0-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4cb7c04ffd952d538be576f4fa71a39a', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.18.0-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x397052bff18fb5b083d00b717e3bab0e', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.18.0-2.2.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x46edc7b7598ba0bb1b9eea554751030e', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.18.0-2.2.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7d7ee91a6e1c3d35693e5724a21bbfe6', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://ac[...];
Date: 2023-07-04 18:39:41 Duration: 2s427ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x6c2220b046d35af0b35959c9465c199d', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:4.10.6-3.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2c5af2fc6f1d5c29c06fb024a6f725e5', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:4.10.6-3.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x166f79982051e65bf5e4fd9a294249fb', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:4.10.6-3.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x639cb635f231b5dc33b29bd3446e811c', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:4.10.6-3.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x468da40e402cde5aef7efdf97fc6f329', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x85c248f923c9b0fcc1c3266fc00684fe', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb02470501ccbabc500c5d77aa2e705c3', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6c5f368019be27adfa7402a61c5d1d10', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3cef56eed74248cb04f0c47ea07b2679', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-pkcs11-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x17d3663db632fb8b22196f19f6eabeee', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-pkcs11-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x88778ec55071ab2053038fea53f3e184', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-sysinit', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7996ebd34884b103c28d5e719f42e61b', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-sysinit', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0cea3fb0a891108fd3cb36fcca374d32', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2a1c293d838fb52a351fd57a30c30059', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd7fad8b2fb27040d3d47c6d87fb5782b', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-2.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x232e8306373848bacf6d29615b3fa746', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-2.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4032b0f5f655f693aae3f6ea9d9fbed2', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-2.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc3cc0ea9a3c624891426f6bb714b8e3c', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-2.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe1f384c2312540cf2a624290bd694539', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x52d1e80ae3b5c01e24287e11082fa35b', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1745867a8f792f059fca8913249cf6ee', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf32e9cbcb66d472134b7c80118791c11', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x149b0848807002b9596fdb1db2ef9883', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-freebl', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x323d8981a139763e85508375ef7ec890', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-freebl', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa7ca96524b85850ac08021db29c66866', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-freebl-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb1d4173517ce426d172bf657e43ae65e', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-freebl-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb79d284fff818fd7663ff45497cbe101', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaea389fd0ff1c18f16272ced59ec2a98', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9d0fda4e612f566996ca76580fda1402', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-client', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe9b4b9ae533c615de585197ea9a0a692', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-client', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc8c113ad9de6d4ffe49e9b73a657d7d9', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb156d92bfd96e4dbccf70fc12d5585a8', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc012cfabe62c762ab32cb0eaf071a601', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-filesystem', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf126f0ead1db3ee6cb066907c45fbfff', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-filesystem', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2ef59f141d20704b251e1394b2ace0d8', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-ipptool', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x504e3f0f034d1253b27b38ff206290d8', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-ipptool', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5b87e0e029d3c2e30148870444af5a70', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa028d7136d6c0bc94f5cac70d8584dcf', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x44d013f2e2b1fbc1fd755bcda6696730', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-lpd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf33c22d16071c9606265fea73e72d3ab', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-lpd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcf5d893886b8be6869f15cbe8a79b855', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8b61bdc25f4620760751744e4c309941', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd2610cf9bdf521db83e04524bd9e4a39', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x79778f2af70bccc2ac0b955eb6bd68c6', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9fb57143b1b92377c6fa99865fbe8cb2', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x94ef7332693f3e7028381a2de1114775', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x976f296d167e7a8ec164bb0cbe2814c8', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x949ff0f8ea04dcad4339a3ba4aa73349', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xde919a91424b7b9efe94672ba6884aa1', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3ecee2aad00222ef0b2358b55ad0efb9', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe3beb99f8cd9843fe2761286da272cbf', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x02921f57bdcf7cf1edc48b5a39a00b62', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8d401e54af3b208a926b9c527cb9db05', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc8d478414e2e21d4908a9112e992e313', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1d19c5795d9056ff7739206ce1dec1ba', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb7be189544ea3235659bfbd5fa58008b', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x516662afe1975896501f51d2f7c54d67', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_simpleifp', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2a0e10a8312f4b1fbbb336a4019a2204', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_simpleifp', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x79f65aa3d8511495f646b6a45fc39855', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_simpleifp-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf09de33fb154c2125f78452e62633f0a', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_simpleifp-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x66e33179010ec204e791da433cd52f37', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'python-sssdconfig', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x967c4553c893fdf0b2c04c395719e0a5', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'python-sssdconfig', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7f70bf78371411c35dbfad3f2a4e67c9', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x29519413251d1f638ed431f630ebaa6b', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd4e3cd2c48bf5bb3a1856320a2e031e5', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ad', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x20678b2ed04e897b02c668f90af763dc', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ad', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfa247b21677991fd92a12b8a1717510d', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-client', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x354df630762e40bae14148533d838fa7', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-client', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe28fb3c863e85c2894c4acfe23a543c4', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0a2228e4cedb3363d3d07ea6d7c1bec8', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9a19972692e1a75041940135492c6c56', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common-pac', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4043550249a307b92d5489d42facb557', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common-pac', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6b85edfcda59c8d42356efa9424a3299', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-dbus', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd5ea7cad136aba80404d5eb6f03571fe', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-dbus', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xec43fecee5c2c11537c2555508438d5b', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ipa', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9528e6ba5142536c356899adf11aeec0', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ipa', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0d059ec13693d10fed90e7c31d2135b8', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x63923188dfa71b9c5b2fd5938fad5e4e', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc17b46013e08aaee222186d641126b7b', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0eaf51296e740e46ce16234e9274a5fc', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf101c8b015bb4953009b2cdf662bc476', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ldap', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd8ef6e660976dc19fdd62b4f119c1fae', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ldap', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3cf88f3860eb63825a50e0e4a2a3c3a8', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-libwbclient', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf9df18fe6e3c73040ce5165653050343', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-libwbclient', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5833e8a7d91b028e3eb9c6a2885c18d9', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-libwbclient-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7890f400fe4307e9939064b5b1fb6c44', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-libwbclient-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd479f9d3a1c61f99fb980d5a407ca84d', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-proxy', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x76bc84a8cb56a2f6a69dab1dfd5df055', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-proxy', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xeb7ec24b58b69171e7290b1edc5717bf', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4c352c4814d2d8c39a226b68d1d671f8', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4fe007122f70189ac457b6cf3f1652ff', 'RHBA-2015:0584: tboot bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The tboot packages provide the Trusted Boot (tboot) open source pre-kernel/VMM bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0584 https://access.redhat.com/security/cve/CVE-2014-5118', 'Low', 'Low', 'tboot', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '1:1.8.2-1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x95650c9bf21ff80b019cb87467b3d6a7', 'RHBA-2015:0584: tboot bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The tboot packages provide the Trusted Boot (tboot) open source pre-kernel/VMM bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0584 https://access.redhat.com/security/cve/CVE-2014-5118', 'Low', 'Low', 'tboot', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '1:1.8.2-1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x433c1f1fb9b42fab39bff19d35f0fcc2', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:4.10.8-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc146132fc2e678b66b4375f1c6e00ac4', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:4.10.8-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbb29ee94345b8b67a957e03329a27a69', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:4.10.8-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfcfc8f52e51e89712e9507797d7e8a96', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:4.10.8-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6c73766ef22249ac27af0eae3a527eb7', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.18.0-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xac471bca1d441707590fd3698e4a2e5d', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.18.0-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x16823c5322a79e6bb0af3097d2899883', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.18.0-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf8effe167c1661ee7f98ca45b0d1c065', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.18.0-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x583722b2c7d1dd4e88b2868e347ae1da', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.18.0-2.2.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbc200ec13e33976ba4de57f7de592719', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.18.0-2.2.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbdfcaffa52360d9dfdb2ebc231a71a9a', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://ac[...];
Date: 2023-07-04 18:38:11 Duration: 2s231ms Bind query: yes
9 11s737ms 2 5s679ms 6s57ms 5s868ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, red[...];Times Reported Time consuming queries #9
Day Hour Count Duration Avg duration Jul 04 14 2 11s737ms 5s868ms -
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\xf535bcab636f5aa6086cc3731872ad70', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-osgi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8ebe10e23458cd0b366b78f95823e189', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-osgi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xebd2761b68aa049e97e3ad3d42d65d02', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-osgi-configadmin', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x86a38589c290d55ab7ff016bea2d365a', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-osgi-configadmin', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x23eee55aaf09d5dffc429dbe014d0eef', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-osgi-service', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6b2a7dae15793b0b077c5a2679ab5921', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-osgi-service', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3b9d4501e05a64e9c70a4c370c147615', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-picketlink', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf3677040c6db4aead719d8a7d6bbeb5c', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-picketlink', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa2768fe899567ea1e44a119b4e54e01d', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-platform-mbean', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc4bc52c3e7b15c40ff31f42beb31c821', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-platform-mbean', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb9eb2a010e90121888d4fe49d79e6b9c', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-pojo', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdea8037feb16021f27e48804d8aab321', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-pojo', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4509eed6bf9b9398f6546dd4afc17465', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-process-controller', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x14a0c0e6d68aed2c42efd022a4bb9f4d', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-process-controller', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x395c0432957c71fd82e95cba296ad850', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-protocol', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe55c429082f51e8c0312feb3ba48559f', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-protocol', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xff6b8a55cafe3226b10fab41d76a72ff', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-remoting', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xccb170094f0b15070129f46c2cfdaa0c', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-remoting', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4d54738599a91402b22f4b190daccd8c', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-sar', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xebf429c01b36d03a6e94d810931a3312', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-sar', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x475713e7578c102fe35be9c8545a2aa0', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-security', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x132bf2b3c6a09f414df87bdb40060f3e', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-security', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3575b0459b28f7dbe3dd88dfb8fc73e5', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9200cd1d086abce12aa87cc12bd6897c', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x88eebe91596cdac4e128e70126300391', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-system-jmx', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x917d78f3381f498f9b8281f84f7bf78e', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-system-jmx', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa7f3c4a942f6e5fe016d15bf13150cbb', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-threads', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3945b39b8cf884bfd5e724636126b80f', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-threads', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x40eb81999df1714cdefc0a13e288992a', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-transactions', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x25821591a4693daa870d7502333c6f2d', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-transactions', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf1a7da4e1f0212dcd239e81099afe1c9', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-version', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x51377358c46f3632ac323f8be904ddb7', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-version', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x75c19bd55aa11d61d4f40ec688b3de46', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-web', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x57d49574220989d356d02a79917e3b94', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-web', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8b5858dd52016cc5f1c213136604fbc9', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-webservices', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd21c065b250d9fd4c5288a83df93a97f', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-webservices', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x467651a48c80b2f7a41563ec5b235dd1', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-weld', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x931a0dfe146198053826ff103aab2909', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-weld', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcf39181fe4cbb581339c189d248c87d7', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-xts', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd3ba4db9732fa61efece034853378207', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-xts', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xce877f4790216e4814c6979e639d6f91', 'RHSA-2017:1658: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.', '2017-06-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/security/cve/CVE-2016-2177 https://access.redhat.com/security/cve/CVE-2016-2178 https://access.redhat.com/security/cve/CVE-2016-6304 https://access.redhat.com/security/cve/CVE-2016-8610', 'Important', 'High', 'jbcs-httpd24-openssl', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '1:1.0.2h-13.jbcs.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8f182153a5ab5c25c9464d78b563e1f5', 'RHSA-2017:1658: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.', '2017-06-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/security/cve/CVE-2016-2177 https://access.redhat.com/security/cve/CVE-2016-2178 https://access.redhat.com/security/cve/CVE-2016-6304 https://access.redhat.com/security/cve/CVE-2016-8610', 'Important', 'High', 'jbcs-httpd24-openssl', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '1:1.0.2h-13.jbcs.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd6ea535b5cad43707ab1bbe93daf355f', 'RHSA-2017:1658: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.', '2017-06-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/security/cve/CVE-2016-2177 https://access.redhat.com/security/cve/CVE-2016-2178 https://access.redhat.com/security/cve/CVE-2016-6304 https://access.redhat.com/security/cve/CVE-2016-8610', 'Important', 'High', 'jbcs-httpd24-openssl-devel', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '1:1.0.2h-13.jbcs.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x352ac509a60d17499bd90127b14786ec', 'RHSA-2017:1658: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.', '2017-06-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/security/cve/CVE-2016-2177 https://access.redhat.com/security/cve/CVE-2016-2178 https://access.redhat.com/security/cve/CVE-2016-6304 https://access.redhat.com/security/cve/CVE-2016-8610', 'Important', 'High', 'jbcs-httpd24-openssl-devel', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '1:1.0.2h-13.jbcs.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2ee65ae8a8332d70851de866b4fc00b9', 'RHSA-2017:1658: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.', '2017-06-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/security/cve/CVE-2016-2177 https://access.redhat.com/security/cve/CVE-2016-2178 https://access.redhat.com/security/cve/CVE-2016-6304 https://access.redhat.com/security/cve/CVE-2016-8610', 'Important', 'High', 'jbcs-httpd24-openssl-libs', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '1:1.0.2h-13.jbcs.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x32f13a687d07e356d656071323d9b43a', 'RHSA-2017:1658: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.', '2017-06-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/security/cve/CVE-2016-2177 https://access.redhat.com/security/cve/CVE-2016-2178 https://access.redhat.com/security/cve/CVE-2016-6304 https://access.redhat.com/security/cve/CVE-2016-8610', 'Important', 'High', 'jbcs-httpd24-openssl-libs', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '1:1.0.2h-13.jbcs.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdc45271eba673bc20c45eee2abee3f38', 'RHSA-2017:1658: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.', '2017-06-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/security/cve/CVE-2016-2177 https://access.redhat.com/security/cve/CVE-2016-2178 https://access.redhat.com/security/cve/CVE-2016-6304 https://access.redhat.com/security/cve/CVE-2016-8610', 'Important', 'High', 'jbcs-httpd24-openssl-perl', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '1:1.0.2h-13.jbcs.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3655f391886b24f0f53e83da0d1fe3a3', 'RHSA-2017:1658: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.', '2017-06-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/security/cve/CVE-2016-2177 https://access.redhat.com/security/cve/CVE-2016-2178 https://access.redhat.com/security/cve/CVE-2016-6304 https://access.redhat.com/security/cve/CVE-2016-8610', 'Important', 'High', 'jbcs-httpd24-openssl-perl', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '1:1.0.2h-13.jbcs.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa486195048275b1e8ed18d36400d3145', 'RHSA-2017:1658: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.', '2017-06-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/security/cve/CVE-2016-2177 https://access.redhat.com/security/cve/CVE-2016-2178 https://access.redhat.com/security/cve/CVE-2016-6304 https://access.redhat.com/security/cve/CVE-2016-8610', 'Important', 'High', 'jbcs-httpd24-openssl-static', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '1:1.0.2h-13.jbcs.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa4e9a6d680b2a35f8fa5245f94c80f2a', 'RHSA-2017:1658: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.', '2017-06-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/security/cve/CVE-2016-2177 https://access.redhat.com/security/cve/CVE-2016-2178 https://access.redhat.com/security/cve/CVE-2016-6304 https://access.redhat.com/security/cve/CVE-2016-8610', 'Important', 'High', 'jbcs-httpd24-openssl-static', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '1:1.0.2h-13.jbcs.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x929661c5d9e0a2568a2f1cfe225a6f4a', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jbossweb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.24-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x42a854b23849d7e2bf2288f707f71b6e', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jbossweb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.24-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa19af29f89daff1b192df2970614bb46', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-vfs2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:3.2.12-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe8b8103868b3192f81e153b2307d84c6', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-vfs2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:3.2.12-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdeb998e8c990374d1a5a3824bd8f7eb0', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-metadata', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.2.3-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x32ed6971b4b835a0d0e146a68140535f', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-metadata', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.2.3-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6512506d061e6cd722100605302c743f', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-metadata-appclient', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.2.3-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4ea6412ea63875a92deef1c590b831cd', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-metadata-appclient', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.2.3-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfe4bf85616be864a1ed3d792ced26e22', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-metadata-common', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.2.3-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6b13cdeeba292f402c847b0cff01f752', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-metadata-common', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.2.3-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x75b9e0a83ae65b3eb3c7335a3d02aac7', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-metadata-ear', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.2.3-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6b26c9997e8f788a10543f49486c1a5c', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-metadata-ear', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.2.3-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6e15c895c5ab3caa35236b39ac574a84', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-metadata-ejb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.2.3-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7b88a139ebe40c0d723ad701e5753064', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-metadata-ejb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.2.3-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb1b4765b9a0ff3a0f711cb1cbd1e9622', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-metadata-web', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.2.3-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8e173316ed40ba416a82bd1eef40eb60', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-metadata-web', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.2.3-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x82397e64059d7cf9ca30ccecd50d64db', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-marshalling', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:1.4.10-3.SP3_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x450de7790071f55036ec038597cb22d0', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-marshalling', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:1.4.10-3.SP3_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x587dd3fb39bfe3948720ac0870a76f4d', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'infinispan', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:5.2.22-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x622f74419528d6038ffea68e2489bf3d', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'infinispan', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:5.2.22-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0c175cccda9d3e0462df067d78317703', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'infinispan-cachestore-jdbc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:5.2.22-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xffee4d795bece121c090c7915b82cfdf', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'infinispan-cachestore-jdbc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:5.2.22-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdf42f29bd8d89e9de6676c9611995a0b', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'infinispan-cachestore-remote', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:5.2.22-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x430521abf6602929ee01a2852dffeebd', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'infinispan-cachestore-remote', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:5.2.22-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6a1153a43a27f470d143d7ada37a7086', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'infinispan-client-hotrod', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:5.2.22-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcc243aff9b7216baadc9230bfd4798f3', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'infinispan-client-hotrod', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:5.2.22-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0e317e6f5bc72acb7e3a1bd9fa280c7a', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'infinispan-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:5.2.22-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc411574a344f0415a374cd25d5ae4017', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'infinispan-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:5.2.22-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xda33403667f340763e78045e3e51e22e', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'hibernate4-core-eap6', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:4.2.27-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf12f4872ac1e37f227dd766210b1662d', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'hibernate4-core-eap6', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:4.2.27-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xec06a09252bd2b9408ad926fe337e1b5', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'hibernate4-eap6', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:4.2.27-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6c3539fcf4c5509d94a3325499cf2f54', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'hibernate4-eap6', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:4.2.27-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd08048837cf9b6a804dec3d53ad728cf', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'hibernate4-entitymanager-eap6', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:4.2.27-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd4268f80e1acef4d3cfd3d94b2783a0e', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'hibernate4-entitymanager-eap6', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:4.2.27-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x10bf96aba95e7faa05c2d748c165e0b9', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'hibernate4-envers-eap6', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:4.2.27-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd47a06652f817f9d9437bfc711cb67e6', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'hibernate4-envers-eap6', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:4.2.27-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x62ae3c75d10617daad515e9440ea5cf2', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'hibernate4-infinispan-eap6', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:4.2.27-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3a04993fa452d7b2fbeda17862a9bdde', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'hibernate4-infinispan-eap6', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:4.2.27-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x85e9ac06bf05062184ebe2cde185cb33', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-remoting3', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:3.3.10-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8d82af7231e829e3247774210a91d43c', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-remoting3', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:3.3.10-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xaada746ca054f4babbef3d797bc0fe5d', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'hornetq', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:2.3.25-22.SP20_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x25b9b8accf90d1baf6fbec8dbbe001b6', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'hornetq', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:2.3.25-22.SP20_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1e598e66ee2b91d2bd42701a70934f50', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-modules', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:1.3.10-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xec31a112cbe1e69727b850cfb79c9377', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-modules', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:1.3.10-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2ff89df35b41104aa81205025201a074', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'apache-cxf', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:2.7.18-7.SP6_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2d64cd04e620b36e131f89ba3cb422de', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'apache-cxf', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:2.7.18-7.SP6_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7027105cf782834c95d2fa91133adc35', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'codehaus-jackson', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:1.9.9-11.redhat_5.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x69d305c9d2d2dc9e824e773213024021', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'codehaus-jackson', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:1.9.9-11.redhat_5.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x551187be9636cae6f9812e579840d37c', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'codehaus-jackson-core-asl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:1.9.9-11.redhat_5.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x407236891d7baf95a56c716086adf81a', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'codehaus-jackson-core-asl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:1.9.9-11.redhat_5.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc37fada9713088e84ceb7f1c6d9442e3', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'codehaus-jackson-jaxrs', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:1.9.9-11.redhat_5.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf1bbbbac74b4b713cb288f32b0b46bad', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'codehaus-jackson-jaxrs', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red [...];
Date: 2023-07-04 18:39:52 Duration: 6s57ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x5a28b266ea81e9941e0dcc8233909a0b', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-vmware', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7e6670eeb27899ce44ec558fe278bd18', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-vmware', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x35c93d95dc6dd6aec6f8d67d5fc3c0ca', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-vmware', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3cca38ccd8a0883a4b3503c0d0646071', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-vmware', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfdd56d5dc57556019eefa964e774b8e8', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-weblog', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd5d56dc20fa01c61548266c4533e0a46', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-weblog', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf3f606951ed7eb60eb1e4883beb624ef', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-weblog', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd12b0eb11a11b56831b2c5ec16b81b1f', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-weblog', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6d57c097f16909b8062b95a1659e6dbe', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-zimbra', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5ca4ea88130d1599438a966988bfd26a', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-zimbra', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa661d8c19bff53460cae38b8706cdcc2', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-zimbra', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc8d2841e0784aa55480fea9dffc05289', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-zimbra', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5a73e0de5dc32929e834f8deb522c615', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-zswap', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb095a501295f682aa33115d4f0e88479', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-zswap', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc5f58b5d5a300b9b6184bb9c1133a5a8', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-zswap', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc4731f6d889094f1d1528365d7a52def', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-zswap', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x24c017fb34c6c99f3eea561347e26ca8', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-selinux', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf990b7f59a5ee345796c288881534b75', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-selinux', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa21890f0e6bfe62472fd1c8ac56ad619', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-selinux', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5febfc8010ab549566b3f6134eceb25d', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-selinux', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6b7db3d3167d31c2ed275eb94c1881c8', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-system-tools', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3c1435518dfa35a0a2e433ff58fc3636', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-system-tools', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0a67c36376c30e7b1b67cbb46da2ec52', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-system-tools', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa0cac87c21e5bfef10a3af8b5e230d41', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-system-tools', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7e9aa5de6762dc899116eaf3b1681da7', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-testsuite', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7da258b11e34b2ea61582b931ad365d3', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-testsuite', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb6fefc03bca8f534d88cf9b528efddc7', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-testsuite', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0f81b1142d6963bc17eb456d1168d2ce', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-testsuite', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3a65b42c2eec0369fd36d6b0d487ccbb', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-zeroconf', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdce200c4ae518ccf3c805f6e43a227e5', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-zeroconf', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa429a1a8e6b15fea6044f26a75cc44ea', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-zeroconf', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbff4d54358f49efe89aae04fc52e4865', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-zeroconf', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x285f64e5e015d81cf3cd16962ec1d2a9', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-LogImport', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x44df49b07c38962cda72e68a9d03e8df', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-LogImport', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb91bff0b217955411acbbc4449f19c25', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-LogImport', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xea7feec32dab5c31b687a7e2dd2cc43c', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-LogImport', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1b3b889e2c439fc43a109868cc637f5a', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-LogSummary', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x21e9cf84d3c5f7311174caa72f7f0203', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-LogSummary', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x45c657ce0b06ed638619cae7805a14c9', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-LogSummary', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc5a22e2a9fa3fc317a789283929e7077', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-LogSummary', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8a19f9e27d143cec34db7cb74b8be5d5', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-MMV', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x109eaaa51cf720e30e0acaa82af5014f', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-MMV', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd2f460863c9e7786eea25250a7f6712e', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-MMV', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x66b38e7293c3ce9af82c1f8c67d9135b', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-MMV', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaeb5296af7e9f815cc895321e4dd6f98', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-PMDA', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1ed91d7a11bffd08396d025567394a21', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-PMDA', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf498fbca6c2ff3851354d53d25f407db', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-PMDA', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4cdf3b844e9caa2917f48cb34e2a4203', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-PMDA', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9e2d782243068c2fe10c880ffaec49d7', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'python3-pcp', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x86a606e66db97d6ebd66bdcde1db34af', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'python3-pcp', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf601a67d3e8b291a09f2865d7a5a62bb', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'python3-pcp', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x420f7fcdf0d82a87a17cf2fb6b78c826', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'python3-pcp', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3b38ec79a58abd71ec807484cc082b86', 'RHBA-2021:0629: microcode_ctl bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'The microcode_ctl packages provide microcode updates for Intel and AMD of 20201110 (BZ#1907899)', '2021-02-22 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2021:0629 https://access.redhat.com/security/cve/CVE-2020-8696', 'Moderate', 'Medium', 'microcode_ctl', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '4:20191115-4.20210216.1.el8_2', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x936d6fb37f77bdbe26cce2aa9961497e', 'RHBA-2021:0629: microcode_ctl bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'The microcode_ctl packages provide microcode updates for Intel and AMD of 20201110 (BZ#1907899)', '2021-02-22 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2021:0629 https://access.redhat.com/security/cve/CVE-2020-8696', 'Moderate', 'Medium', 'microcode_ctl', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '4:20191115-4.20210216.1.el8_2', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x553bafb1e5ac9dd5cac1376e3653ee37', 'RHBA-2021:0629: microcode_ctl bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'The microcode_ctl packages provide microcode updates for Intel and AMD of 20201110 (BZ#1907899)', '2021-02-22 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2021:0629 https://access.redhat.com/security/cve/CVE-2020-8696', 'Moderate', 'Medium', 'microcode_ctl', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '4:20191115-4.20210216.1.el8_2', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x934f09894f62153ce052f8a102e6bd72', 'RHBA-2021:0629: microcode_ctl bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'The microcode_ctl packages provide microcode updates for Intel and AMD of 20201110 (BZ#1907899)', '2021-02-22 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2021:0629 https://access.redhat.com/security/cve/CVE-2020-8696', 'Moderate', 'Medium', 'microcode_ctl', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '4:20191115-4.20210216.1.el8_2', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x34b3caf78ef058cc398f0c8d6f67d0ff', 'RHEA-2019:3845: microcode_ctl bug fix and enhancement update (Important)', 'RHEL8-rhel-8.2-aus', 'The microcode_ctl packages provide microcode updates for Intel x86 processors. Users of microcode_ctl are advised to upgrade to these updated packages, which add this enhancement.', '2019-11-12 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:3845 https://access.redhat.com/security/cve/CVE-2019-0117', 'Important', 'High', 'microcode_ctl', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '4:20190618-1.20191112.1.el8_1', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xb737fe53d8bb31da095a12f44d0d73f4', 'RHEA-2019:3845: microcode_ctl bug fix and enhancement update (Important)', 'RHEL8-rhel-8.2-aus', 'The microcode_ctl packages provide microcode updates for Intel x86 processors. Users of microcode_ctl are advised to upgrade to these updated packages, which add this enhancement.', '2019-11-12 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:3845 https://access.redhat.com/security/cve/CVE-2019-0117', 'Important', 'High', 'microcode_ctl', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '4:20190618-1.20191112.1.el8_1', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x6cdfb5ebbbca16d4304cb72c962f4d4a', 'RHEA-2019:3845: microcode_ctl bug fix and enhancement update (Important)', 'RHEL8-rhel-8.2-aus', 'The microcode_ctl packages provide microcode updates for Intel x86 processors. Users of microcode_ctl are advised to upgrade to these updated packages, which add this enhancement.', '2019-11-12 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:3845 https://access.redhat.com/security/cve/CVE-2019-0117', 'Important', 'High', 'microcode_ctl', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '4:20190618-1.20191112.1.el8_1', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xae781b06839b094e1863f614b8aa2150', 'RHEA-2019:3845: microcode_ctl bug fix and enhancement update (Important)', 'RHEL8-rhel-8.2-aus', 'The microcode_ctl packages provide microcode updates for Intel x86 processors. Users of microcode_ctl are advised to upgrade to these updated packages, which add this enhancement.', '2019-11-12 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:3845 https://access.redhat.com/security/cve/CVE-2019-0117', 'Important', 'High', 'microcode_ctl', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '4:20190618-1.20191112.1.el8_1', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x02c2ee9622c28e6fdc9e6dc21e5ac36b', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x10d4b4d93e4610f301aca6a84676ef5d', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd8d3e3ff0551f24ac58a32fed29b72f5', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1455351f8a3cf0f93fcdc382bd10f7e1', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x71f025c3135cb733b2190a76e57ebbec', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-devel', '', '', 'i686|ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe8b5eecd1eb64a93f4a51daae38d51b1', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-devel', '', '', 'i686|ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8c344c69e42f30ec57f0b801f200ec42', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-devel', '', '', 'i686|ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8e1433a7e830e9c21048c35f196bd49f', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-devel', '', '', 'i686|ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfb961f35e4fbcf4c84edf6a40a5473c2', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-jsc', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x711939c7b44c4f0955ab37f1fcffda5d', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-jsc', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7bd9ec210c9514fcfef0525bf6c121d3', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-jsc', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa57aee426bf83cb9418be6017d9a12ec', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-jsc', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa6bf7a33d998d80ce9cbfa06ee775417', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-jsc-devel', '', '', 'i686|ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8b1e01173b39dfd3eee89631afead51e', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-jsc-devel', '', '', 'i686|ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa1812e8c3cb47afe89662bf88582b2eb', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-jsc-devel', '', '', 'i686|ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xecfff5e8a5000565100d6a6147269645', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-jsc-devel', '', '', 'i686|ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x82c8fa70fb1639fcfbef9bf6a77732f9', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-plugin-process-gtk2', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x229d0aba5e39fbc4d06509f40e047746', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-plugin-process-gtk2', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6c5466c44cf5bc1054c12924d09b0294', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-plugin-process-gtk2', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0e168818748beb3adda0cdfe06921f7e', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-plugin-process-gtk2', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6f13d806edf21a6d6e63423adc19091a', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs', '', 'nodejs:12', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '1:12.14.1-1.module+el8.1.0+5466+30f75629', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8ca3523a9f3a141140dd68749006e9eb', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs', '', 'nodejs:12', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '1:12.14.1-1.module+el8.1.0+5466+30f75629', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x96bd893b1ce0e434b1445a442ae351a5', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs', '', 'nodejs:12', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '1:12.14.1-1.module+el8.1.0+5466+30f75629', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4bc402f0df64089644f1dcd572e5f113', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs', '', 'nodejs:12', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '1:12.14.1-1.module+el8.1.0+5466+30f75629', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xeac4b21ebaf550b6f0dfdf878fb2d5b1', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-devel', '', 'nodejs:12', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '1:12.14.1-1.module+el8.1.0+5466+30f75629', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xebeb317fbcbe2fce12db6e71435ad15e', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-devel', '', 'nodejs:12', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '1:12.14.1-1.module+el8.1.0+5466+30f75629', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xca0b3bea43eabe4ddb7dec0575a2b25a', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-devel', '', 'nodejs:12', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '1:12.14.1-1.module+el8.1.0+5466+30f75629', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb10b0662c79907df2fcbfd41a404d1df', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-devel', '', 'nodejs:12', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '1:12.14.1-1.module+el8.1.0+5466+30f75629', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xeeae8893ff5468a1e56581b416bf58b5', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-docs', '', 'nodejs:12', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '1:12.14.1-1.module+el8.1.0+5466+30f75629', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x42738aae680b412db48995c85769c021', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-docs', '', 'nodejs:12', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '1:12.14.1-1.module+el8.1.0+5466+30f75629', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x08130a4c3dd5d612a62d91fb9a83a0dd', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-docs', '', 'nodejs:12', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '1:12.14.1-1.module+el8.1.0+5466+30f75629', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd03ec462a95fc0e29f0c919eb54cc36e', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-docs', '', 'nodejs:12', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '1:12.14.1-1.module+el8.1.0+5466+30f75629', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4908ab44dbf9af3b140615aa78471988', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-nodemon', '', 'nodejs:12', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.18.3-1.module+el8.1.0+3369+37ae6a45', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8c70f799688c02f03a1c632e29c1ac85', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-nodemon', '', 'nodejs:12', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.18.3-1.module+el8.1.0+3369+37ae6a45', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x044548170bcf7903b3c9ff350e7ba405', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-nodemon', '', 'nodejs:12', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.18.3-1.module+el8.1.0+3369+37ae6a45', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x112344302fc7cac54a7bf707e5e42810', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-nodemon', '', 'nodejs:12', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.18.3-1.module+el8.1.0+3369+37ae6a45', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x18b03a21896635f5221cac22cfb27dc3', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-packaging', '', 'nodejs:12', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:17-3.module+el8.1.0+3369+37ae6a45', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x817cc7037fd8519e501f22cddb96a74a', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-packaging', '', 'nodejs:12', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:17-3.module+el8.1.0+3369+37ae6a45', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9a1c46112feec345322cb31a9052a63f', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-packaging', '', 'nodejs:12', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:17-3.module+el8.1.0+3369+37ae6a45', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x14fa06f74746e7fb8018fc5f05e68e0a', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-packaging', '', 'nodejs:12', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:17-3.module+el8.1.0+3369+37ae6a45', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x64725b17a1f74a6abe0218798e924c49', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'npm', '', 'nodejs:12', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '1:6.13.4-1.12.14.1.1.module+el8.1.0+5466+30f75629', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x90732bf689b72c23cbbf36e9e5c08e52', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'npm', '', 'nodejs:12', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red [...];
Date: 2023-07-04 18:39:57 Duration: 5s679ms Bind query: yes
10 11s80ms 2 3s414ms 7s666ms 5s540ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, i686 | p[...];Times Reported Time consuming queries #10
Day Hour Count Duration Avg duration Jul 04 14 2 11s80ms 5s540ms -
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x4ba09591f94c8c0aa64e90e3a00730e3', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-demo', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0e0dbb6fa3e4b9739647b2bdf0b41bb8', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-demo', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcb8b7f21a131d4aa7ba49cc9b4ab282b', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf6b560ea545923e7673747dc93b7f5dc', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x077d3c6b330fc87224ac9b2496e7e6aa', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-jdbc', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2652274fe29b4ded087aa7f4cf250c50', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-jdbc', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8b6c2a3db5e87cb66381c87d4c8d8bf8', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-plugin', '', '', 'ppc|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x11cb5406f989309606a2ed2d8e3706e7', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-plugin', '', '', 'ppc|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xabffcdd9b69c00822c45d7296d6849b4', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-src', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x685373277e6dae9386524ee088b17e03', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-src', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd3a44c57b8227c1fcf83f4bf7469bdc5', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb8bee463bab77460587ea281fb5112e7', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0a241c809ac50fedef3ee333843f22b1', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfe621dcbe443545e8d7f8921885b233d', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe25234c1e3806cc0bddeb4bdee2a2bea', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9169f107ad064642654d2f0da87b0225', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x13e124fa4b156be7aae2172d0965f7e6', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-irb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x87690be78199a1fbaa1206eae9a409c0', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-irb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x01c0c6c20cdb6dc2405abd24b16950ce', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2facba68eb6124487acbfeeccd14ac30', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x328d4aa9931707ce126764e6e77ccbe3', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-tcltk', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x37198ce17ff859bf92aaa4d7b868cc5a', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-tcltk', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc1bfbddcac3ad54eae60b6ed4f67dda1', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.2.0-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5f65235a3e23aa57134a16a3482c62e8', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.2.0-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x59f92bdaa4e651532cc67dcc09e79ee7', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-io-console', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:0.4.2-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x43be4aa2837254668c1a1e5827e46ede', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-io-console', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:0.4.2-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4833eb8288aa01ed2d2c8199c99f0766', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-json', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.7.7-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x42ad9882cc126ebef03f06bb69931aa6', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-json', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.7.7-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x76af51e944882ee501f1551b051cbd74', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-minitest', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:4.3.2-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa1bf7f71ea8192c7423c28c4900e8e0b', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-minitest', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:4.3.2-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa0efc398028a183bc331fddc44ff8e89', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-psych', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.0-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0a711a12df6a1a78c060dc7cea120057', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-psych', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.0-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x74dd804b9cb34bfd8342605fdc6fb873', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-rake', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:0.9.6-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9e782a2d130dba031c4769702d172e23', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-rake', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:0.9.6-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf33c4061eed5732cb85d476f0099d084', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-rdoc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:4.0.0-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbfaa009c94f0064af28a25c5f9af0e9f', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-rdoc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:4.0.0-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf6f887cd9316b6a70c7d1e55ca67d878', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygems', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.14-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x12df04c62aafb1cd447a469211a0c8e1', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygems', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.14-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe3cbe10a7e3874cdfc6af66205b6f724', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygems-devel', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.14-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd54e20748cbb99de024c8bd85d568e7a', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygems-devel', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.14-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x57e73a87a9b438af42cbe3087255334d', 'RHSA-2014:1919: firefox security update (Critical)', 'RHEL7-rhel-7.3-tus', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-12-02 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1919 https://access.redhat.com/security/cve/CVE-2014-1587 https://access.redhat.com/security/cve/CVE-2014-1590 https://access.redhat.com/security/cve/CVE-2014-1592 https://access.redhat.com/security/cve/CVE-2014-1593 https://access.redhat.com/security/cve/CVE-2014-1594', 'Critical', 'Critical', 'firefox', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:31.3.0-3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x210b065fe20a82d0469d56feecc2f82e', 'RHSA-2014:1919: firefox security update (Critical)', 'RHEL7-rhel-7.3-tus', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-12-02 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1919 https://access.redhat.com/security/cve/CVE-2014-1587 https://access.redhat.com/security/cve/CVE-2014-1590 https://access.redhat.com/security/cve/CVE-2014-1592 https://access.redhat.com/security/cve/CVE-2014-1593 https://access.redhat.com/security/cve/CVE-2014-1594', 'Critical', 'Critical', 'firefox', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:31.3.0-3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1ef558c7ca0769796ee0f253fee5840b', 'RHSA-2014:1956: wpa_supplicant security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'The wpa_supplicant package contains an 802.1X Supplicant with support for which contains a backported patch to correct this issue.', '2014-12-03 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1956 https://access.redhat.com/security/cve/CVE-2014-3686', 'Moderate', 'Medium', 'wpa_supplicant', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:2.0-13.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0c722bcd23341731046dd2fc72f996a6', 'RHSA-2014:1956: wpa_supplicant security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'The wpa_supplicant package contains an 802.1X Supplicant with support for which contains a backported patch to correct this issue.', '2014-12-03 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1956 https://access.redhat.com/security/cve/CVE-2014-3686', 'Moderate', 'Medium', 'wpa_supplicant', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:2.0-13.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7003e53563ecbcb634d56ff750be1316', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfb4c6c5482c6281a21ad9f88b6feaa6f', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x09013d6bb11cc2154acb3f4586d69ad1', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-abi-whitelists', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x30557fdf50ba422aa8a3f9c566898cdf', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-abi-whitelists', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc62b739a14d5f81c3840b77340e1563e', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-bootwrapper', '', '', 'ppc64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xa3d5e40094970c07ce9350138c450399', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-bootwrapper', '', '', 'ppc64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x75779acdb49aacef7aa3df63e42b53b3', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-debug', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7055849c84fa8e9a1216c217d8d8da25', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-debug', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x027c3be2666799d424a61d2b4489986e', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-debug-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa3f90ea0e6188419632a7859e2521fc4', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-debug-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4d5bc43557a896ae880db43140ec2aa3', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3aa8990f9e358c8e35229f13060dffa2', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc00119e646f12f56c90180a0930bbdde', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xeddca3d17bc0e52a70b1fc56fb82424b', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9bf748ef60d6382e725cf59adc9f23fb', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-headers', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x03b9cc4b68c4340d551d4ad21d23e18f', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-headers', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb126a1bf48d5bb8d38701f9420cd1082', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-kdump', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x7bf85b0274b5d9f13dbe330379577640', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-kdump', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xd2764abcb7888c601d82b3ac1b370c91', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-kdump-devel', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xefd9a068a6fd73c3de5cc62675b5decd', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-kdump-devel', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x6213e768576bc521b639492e0bcda71c', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0b60356ea64c996b9ddbf055b6427093', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0beedf4bcb73df5e41f0a41bb619bad8', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools-libs', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7fb9e162855b2fa78f336e7a7898d749', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools-libs', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0aa5498001df0fd19769710b367174cb', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools-libs-devel', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0376eb3a9795126790ed6c7c852a1357', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools-libs-devel', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdc3bbbeb22169f2e401aec03b711812f', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'perf', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9edad094cfa778760ea206f6a5324db1', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'perf', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x97c19da147d2dab768a5e9f41b933216', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'python-perf', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbdfbe7bf3eb547cb0f53c5ef24ade6ca', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'python-perf', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x450fc822b888283be7cad4a395beeb11', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.3-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe589814aa9baf519b35ab9e7ff3c2742', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.3-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x83a3238f7a92b5fc970534d0d0ef8298', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.3-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm-apidocs', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x06a8603bc0938737c37fa699fd6da4b5', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.3-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm-apidocs', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf862a15aa7244f6872acd29f808514dc', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.3-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm-build', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x06523bb6d6b4ffd8cc23321e6b2e64e0', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.3-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm-build', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc7f96ce6cff7da56dd8f8fb503109d28', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.3-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm-build-libs', '', '', 'i686|p[...];
Date: 2023-07-04 18:39:55 Duration: 7s666ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\xb3ec323fd451e797d659d044260744c5', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.2-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-demo', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x62092f422e6bbbe91c30ffb5fad3f05a', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.2-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-demo', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc21815dedb132e1fa0b607267788f8cc', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.2-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf16402c32246e2688020401abd8d4405', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.2-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb9bc56924902271b22d70b539d906750', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.2-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-jdbc', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xde5d5355ab3d838fbff0db8a7251f019', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.2-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-jdbc', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd90157db824ebe8f49d1024d89501ec3', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.2-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-plugin', '', '', 'ppc|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3d173baec59407c52abc77ee0b6e4d4a', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.2-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-plugin', '', '', 'ppc|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xca3a7eb111d27669e5b853421de1d684', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.2-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-src', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x98f0c73274f31d36a2d842c6bb6e9904', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.2-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-src', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb61acb418bb2d563ce697a3489522ea1', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3a75500d602bcb1c5651341a2a5f0e74', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x24b73c9324ec2ee3c72f52a11b870b7a', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa603bbfd06a0d2ee5bd2b3be9197b5f6', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4b3dfda101dfa7627b4223d755c70e5b', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0b1942c54c6917823eb70b717b5a0d90', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0d6cd45eb090570f56dbdee98b1c9f77', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-irb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd9fdeec4f34de54f1b7ef50627280efd', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-irb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x07777ced0afeb046b2c129510a88bc59', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe1f8cac31b49bf6a0b01fd8198d8923b', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb664329da21341e408fc954a1a62cbfd', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-tcltk', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x360b8f289e6a0fe68f96b712c78ea311', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-tcltk', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x02b55081561179d1b35735c4ae41e05d', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.2.0-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9c0bb82a276159bfde942a91cde95064', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.2.0-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf573c07d60be3f00b7fafce8740022e7', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-io-console', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:0.4.2-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7bc987df770d5cde6b9fbd19539931c6', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-io-console', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:0.4.2-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5b3e0d6f3d9a2f6917ac8dd12571828c', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-json', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.7.7-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1fa7ffd11222f565ed1e43abf5e735db', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-json', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.7.7-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd2966cec7269d8093ad6200bca96215d', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-minitest', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:4.3.2-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x77ea36efbf75332ea67e751c347ac5a8', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-minitest', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:4.3.2-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd29049a0f1d7444b25a18667e9deaa63', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-psych', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:2.0.0-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc47994fd72b1bd800d5d897d17c863e1', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-psych', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:2.0.0-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa587f46ed578809869fb8413deee2117', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-rake', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:0.9.6-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xba495cd978063eeb3b93aaa66e335298', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-rake', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:0.9.6-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4dee02281cf7eccc3c127fc4c076a914', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-rdoc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:4.0.0-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0ea87dc3fc1c5dfd81d495dcde43a594', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-rdoc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:4.0.0-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe9baa8e6d344729bdb25f741c28d489b', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygems', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:2.0.14-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x419c03bbba61b25f86ac2283e702d3b6', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygems', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:2.0.14-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2fe8cc1973529584bcdb776a96b593bf', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygems-devel', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:2.0.14-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x92487db2d8ccaaa867c4376c27f1e021', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygems-devel', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:2.0.14-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf448f22461eaf36096684ce65057f597', 'RHSA-2014:1919: firefox security update (Critical)', 'RHEL7-rhel-7.2-tus', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-12-02 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1919 https://access.redhat.com/security/cve/CVE-2014-1587 https://access.redhat.com/security/cve/CVE-2014-1590 https://access.redhat.com/security/cve/CVE-2014-1592 https://access.redhat.com/security/cve/CVE-2014-1593 https://access.redhat.com/security/cve/CVE-2014-1594', 'Critical', 'Critical', 'firefox', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:31.3.0-3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5b765bb7bdc1c6068a78f3f58194b0c1', 'RHSA-2014:1919: firefox security update (Critical)', 'RHEL7-rhel-7.2-tus', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-12-02 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1919 https://access.redhat.com/security/cve/CVE-2014-1587 https://access.redhat.com/security/cve/CVE-2014-1590 https://access.redhat.com/security/cve/CVE-2014-1592 https://access.redhat.com/security/cve/CVE-2014-1593 https://access.redhat.com/security/cve/CVE-2014-1594', 'Critical', 'Critical', 'firefox', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:31.3.0-3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xee37e02957a88e737b9cedb20f7de4e9', 'RHSA-2014:1956: wpa_supplicant security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'The wpa_supplicant package contains an 802.1X Supplicant with support for which contains a backported patch to correct this issue.', '2014-12-03 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1956 https://access.redhat.com/security/cve/CVE-2014-3686', 'Moderate', 'Medium', 'wpa_supplicant', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:2.0-13.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcd4e1e364289ec158705f4fd9096bfbb', 'RHSA-2014:1956: wpa_supplicant security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'The wpa_supplicant package contains an 802.1X Supplicant with support for which contains a backported patch to correct this issue.', '2014-12-03 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1956 https://access.redhat.com/security/cve/CVE-2014-3686', 'Moderate', 'Medium', 'wpa_supplicant', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:2.0-13.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x472312411a7dff131975ee0fd7761f80', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4ddc2513aadec09c1c1976ae8442ede3', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xca4659724fc15b3b6079b960f836c8c3', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-abi-whitelists', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf159b4698ca4ed4f9080a3e6bf10f1b6', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-abi-whitelists', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x33609e6e205f09f217d0078e04a9e8ce', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-bootwrapper', '', '', 'ppc64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xb10d9ca74cf6eb07423fec7cfe7d722c', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-bootwrapper', '', '', 'ppc64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xd06a2d3bc3b938679a6f750b5ab0fb95', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-debug', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa2804093e5e346d84bd6ae541e6f8d91', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-debug', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9c58e4f1c1f5f3f76f6cd4341a8ce5c1', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-debug-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2949620bdb6ea4c8c6d6d37bc20bdf6c', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-debug-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xef5fc6e281137e79988fec40422b39fe', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa885d352377f31bef4128f242064007d', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1a453882a78846c07d71b8313a2219ba', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6cdccd91dfd0af73d0e190ffee27e1ad', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd1e8b948299c93021a10345469d9c3aa', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-headers', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x882a9b7e33cffa90dd8f8cd5b924488e', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-headers', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x18293ede298dd20a307f1fcc60cc351c', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-kdump', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xe10a626384f2a373630423f10520e3b3', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-kdump', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x222464c609ee3adb44dc171c61a63edb', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-kdump-devel', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xd1bb4c5ac501a5138b586e047bf42c4d', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-kdump-devel', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xc51031014c97c22b948486659d828484', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3edbd49e2a5f6a37b8e59c66b0c2efa0', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe69cb3de83af718fb2e67e6a54d2e5c2', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools-libs', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd8ab6d74dba38e8212d51cb555b06b67', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools-libs', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd8fdd8916abeec3ff6454b0db4801aca', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools-libs-devel', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5347601b9b66fab61d6e226f9fc6ee6f', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools-libs-devel', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8af150846a216ec07845155cd0294622', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'perf', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2d99c7967b5acf165eae331f23407598', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'perf', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf88f2b21265859c4638a379028023bee', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'python-perf', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb17c5b4cf33a8b3e437bc915b729e38d', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'python-perf', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe1f39183abb7fa7d01606c1197dc8cf6', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.2-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6142e18b976337919b1f718daef1b9c5', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.2-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3833e3aebbd19c22acfdc57e4b5d802b', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.2-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm-apidocs', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3f01312bad6b409968c0c901528fbfc1', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.2-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm-apidocs', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xad1db45a3ac15c91f03951c7fc7dc406', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.2-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm-build', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x937c004d15d8189e884174be9264f58f', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.2-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm-build', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbe790417d2beb28b1566eea0a64ca44b', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.2-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm-build-libs', '', '', 'i686|p[...];
Date: 2023-07-04 18:40:24 Duration: 3s414ms Bind query: yes
11 10s50ms 2 4s391ms 5s659ms 5s25ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, cpe: ?.? :o:redhat:enterprise_linux: ? : * : * : * : *[...];Times Reported Time consuming queries #11
Day Hour Count Duration Avg duration Jul 04 14 2 10s50ms 5s25ms -
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x3da956c8efc59153772e15829313268f', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfc99ac0927ad85789a839c4b8c2ef85f', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc21737e9172d156ae781dc5d67e07aae', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb02e58bde0ef21e28395ec87d0bf4566', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x60810d0e1d0fbf2a0816ba3e7a88b98a', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-docs', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1dcd804014952168f15421bb0f6931fd', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-docs', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x02c40f84f499d3f0abe1d73c0899d537', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-docs', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5e80293778645cf6250e2afcf93f1a33', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-docs', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6c15a251c938c01a1ac1dc8c4db4ed15', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-lock-sanlock', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x2614f312151bb4b74bbc089bcce5f40a', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-lock-sanlock', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x8c7c6a75ef6654d7f80114b3f42fd5b0', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-lock-sanlock', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x6d7574a28b1757ca99bc5704ac9c1dfa', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-lock-sanlock', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xbdf0fa09c506891295dafa31efe29cb0', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-login-shell', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x66e8605204d66eded11b85293277d655', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-login-shell', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x52bd7a0a6e1c151239020ea5d918cbdc', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-login-shell', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb6a63c006586f8d039a51cfac3a133b1', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-login-shell', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0726aaf916cb7fe1b0135f17cf33b90c', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7a317e7ac353215befa9bb9b4d886e34', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x89e8a16dfe90edc9c7f2f1adbeb55a0b', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbd045086674c9bfa0094b4bbe65f113e', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb0007e91f03c54e0ed175f94d4b9b3ae', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa964746a3592fb022d11a5425e40efe8', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe2be16d96be42f359e8777d6900a42ec', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x964a9b1a72eafc7cf10506ad13f87ec8', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x70a482c69fd492b07993df34093e66b0', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2f417a23a20978d430407595e6152785', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xee94ffe236ad18cc3f533c55ac2f1fc9', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x13da67a3ba3a26b7a74e78fadd2a2c10', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe9b2bff0cb8316af5996366fc4b22736', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-pkcs11-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcb42c0a9571a053eb29701557570335e', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-pkcs11-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x796a7dfff084f6b616805c3d0e76d1bf', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-pkcs11-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x89b02164977e293d6659fbccc47a3653', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-pkcs11-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x246d48e7a67f55c9ce50d0288b02b6e4', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-sysinit', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x147b32c973f1d002fc50f4c23607f528', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-sysinit', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4c13467dadfa8fb19abeb7347d8878d8', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-sysinit', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfb2c6eb4615f1da129843e4ddefb116a', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-sysinit', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3213a94016da698d59f9989bfa3b36bf', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x91adc1360493c8a14ef392054f60e650', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd60d9492b3113a44329e8e5bf889724b', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb4c07c0e19218170f558248c6ee6d704', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x966eb9bfd6946cdce52c5397bc5d57a4', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:4.10.6-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x48b69e982b059fbcbe55bc06954a8aa0', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:4.10.6-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x696581e811e351234f81573d8c09eea6', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:4.10.6-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb36532338add1486ecad901ee9ae6ecf', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:4.10.6-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdb3f188cc444cbce3a221da0c8511acb', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:4.10.6-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa6e3147ab85a00474279705b655f116e', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:4.10.6-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7877cdc0546002c35ab3229def28ed51', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:4.10.6-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4cddfb8a11eb366039615434969e5899', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:4.10.6-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5f842de192820ef452c9729a36ca29e7', 'RHSA-2014:0919: firefox security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0919 https://access.redhat.com/security/cve/CVE-2014-1547 https://access.redhat.com/security/cve/CVE-2014-1555 https://access.redhat.com/security/cve/CVE-2014-1556 https://access.redhat.com/security/cve/CVE-2014-1557', 'Critical', 'Critical', 'firefox', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:24.7.0-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1b8b0c6d21091aba43f7b3f1db79c99b', 'RHSA-2014:0919: firefox security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0919 https://access.redhat.com/security/cve/CVE-2014-1547 https://access.redhat.com/security/cve/CVE-2014-1555 https://access.redhat.com/security/cve/CVE-2014-1556 https://access.redhat.com/security/cve/CVE-2014-1557', 'Critical', 'Critical', 'firefox', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:24.7.0-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3484ffe8f55b61028bba33cde4a3cd8e', 'RHSA-2014:0919: firefox security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0919 https://access.redhat.com/security/cve/CVE-2014-1547 https://access.redhat.com/security/cve/CVE-2014-1555 https://access.redhat.com/security/cve/CVE-2014-1556 https://access.redhat.com/security/cve/CVE-2014-1557', 'Critical', 'Critical', 'firefox', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:24.7.0-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x980e487e15ac688f6d9d48796df72229', 'RHSA-2014:0919: firefox security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0919 https://access.redhat.com/security/cve/CVE-2014-1547 https://access.redhat.com/security/cve/CVE-2014-1555 https://access.redhat.com/security/cve/CVE-2014-1556 https://access.redhat.com/security/cve/CVE-2014-1557', 'Critical', 'Critical', 'firefox', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:24.7.0-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2823a022d9c0a7aed1038aa5949b62d2', 'RHSA-2014:0919: firefox security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0919 https://access.redhat.com/security/cve/CVE-2014-1547 https://access.redhat.com/security/cve/CVE-2014-1555 https://access.redhat.com/security/cve/CVE-2014-1556 https://access.redhat.com/security/cve/CVE-2014-1557', 'Critical', 'Critical', 'xulrunner', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:24.7.0-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe9614087199a7a44a0172ebefd8eedd3', 'RHSA-2014:0919: firefox security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0919 https://access.redhat.com/security/cve/CVE-2014-1547 https://access.redhat.com/security/cve/CVE-2014-1555 https://access.redhat.com/security/cve/CVE-2014-1556 https://access.redhat.com/security/cve/CVE-2014-1557', 'Critical', 'Critical', 'xulrunner', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:24.7.0-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x315f0910f0bc812bdc0e93100fa55d45', 'RHSA-2014:0919: firefox security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0919 https://access.redhat.com/security/cve/CVE-2014-1547 https://access.redhat.com/security/cve/CVE-2014-1555 https://access.redhat.com/security/cve/CVE-2014-1556 https://access.redhat.com/security/cve/CVE-2014-1557', 'Critical', 'Critical', 'xulrunner', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:24.7.0-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3ccdc13a138fe105982069ea531fc7eb', 'RHSA-2014:0919: firefox security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0919 https://access.redhat.com/security/cve/CVE-2014-1547 https://access.redhat.com/security/cve/CVE-2014-1555 https://access.redhat.com/security/cve/CVE-2014-1556 https://access.redhat.com/security/cve/CVE-2014-1557', 'Critical', 'Critical', 'xulrunner', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:24.7.0-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd582e79e17e5bdd1b9ebb849edb82760', 'RHSA-2014:0919: firefox security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0919 https://access.redhat.com/security/cve/CVE-2014-1547 https://access.redhat.com/security/cve/CVE-2014-1555 https://access.redhat.com/security/cve/CVE-2014-1556 https://access.redhat.com/security/cve/CVE-2014-1557', 'Critical', 'Critical', 'xulrunner-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:24.7.0-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa30197e36b7d61704ea0489b4dedf85c', 'RHSA-2014:0919: firefox security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0919 https://access.redhat.com/security/cve/CVE-2014-1547 https://access.redhat.com/security/cve/CVE-2014-1555 https://access.redhat.com/security/cve/CVE-2014-1556 https://access.redhat.com/security/cve/CVE-2014-1557', 'Critical', 'Critical', 'xulrunner-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:24.7.0-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8f2bb1d85b0dbf691b5de1564a9516a2', 'RHSA-2014:0919: firefox security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0919 https://access.redhat.com/security/cve/CVE-2014-1547 https://access.redhat.com/security/cve/CVE-2014-1555 https://access.redhat.com/security/cve/CVE-2014-1556 https://access.redhat.com/security/cve/CVE-2014-1557', 'Critical', 'Critical', 'xulrunner-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:24.7.0-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbb1c89fd676880aec9088d3490362b77', 'RHSA-2014:0919: firefox security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0919 https://access.redhat.com/security/cve/CVE-2014-1547 https://access.redhat.com/security/cve/CVE-2014-1555 https://access.redhat.com/security/cve/CVE-2014-1556 https://access.redhat.com/security/cve/CVE-2014-1557', 'Critical', 'Critical', 'xulrunner-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:24.7.0-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcf1f99c312fa9759084061c822147922', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x684bee67c73536657e262f2770698714', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfc0cc41dadc7ee5155f5b2d134495486', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x227e8187427d0e6736f168f5562dbde1', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x76411f2abba97743de7e25c478e36318', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x10cd874728df6083a8db859af6ed375f', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4388662b00f542b153494817dfd3ea7a', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf740ebf2bf2790462134d5e29e7d50c6', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5f3bfe36b541d23e9034a6566860254f', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd-manual', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7101002ca89a7060045de483b8100e5c', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd-manual', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb4e1255e5b97c3f119b0181eed6bca8e', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd-manual', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xae21d8c5ee86c7f1ea35f5a881d12ac7', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd-manual', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xaa289160afe66df4ef9dc41a5a903235', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf41a7aadf9cc5f1d5f2b80b7adc29f46', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2d69a1b3c474809e9b179bd1f0013f29', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2e7e132414d17b796b7af86194bb2081', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc474cfeff2796b9207ffa0be662f9ac0', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_ldap', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5a4d922e4a9a9d27cceb68ecb06e9957', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_ldap', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7d6b6a63e550e5a7c8a9c619eee5f8c4', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_ldap', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4d44343969c91e7f8b4f60a4346ba0e3', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_ldap', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9ca50ea6fdad7e1d53486836595762eb', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_proxy_html', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '1:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe030bf2963bc5009ffab9a7a8ac0d47b', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_proxy_html', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '1:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3832936419c4764670b47cc44582baac', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_proxy_html', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '1:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x489c96d0ccc454dd275f9b77ef9bebc8', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_proxy_html', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '1:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x649ebcd6c8a718f60057c8ee5b36280f', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_session', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x82dbd576bdfd6ff3dba83bba7668d881', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_session', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcc1b56c3a3b59cce8feb04be14ac57f9', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_session', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x97a075dbfab0bdd5608b5d4e5910bb67', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_session', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x42c592e202318b3b8ec3ebe391c820e1', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_ssl', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '1:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2f652ed6c2a1a480cb95025d8fade679', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_ssl', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '1:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5f617f495e1ed399d00bec209c704e5c', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_ssl', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '1:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x246ea2977920aba32003ff3607d8107f', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_ssl', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '1:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4ce83b902fab58251f8087c169a17618', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x36be201be184d34fbbd866608956bac8', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdbb66ac51306ad5389395d1b4e0f95fd', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x72e56773a5b8c22194b8516d8f5f7fdd', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfbd17743499c14681bc918730ae82282', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-abi-whitelists', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf406ff3ef5797d21d3c04a2472718e8e', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-abi-whitelists', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x461f64e4bb67cba86df175d81649265f', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-abi-whitelists', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa2908d06064d77cf00ae5ba2dd2e8cec', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-abi-whitelists', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb0c85dc6a792e1f94c072439b21aa09c', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-bootwrapper', '', '', 'ppc64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x8d669aab28582de07ef68ec570c40144', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-bootwrapper', '', '', 'ppc64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xe4147dbfe519f00e2d26986865164755', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-bootwrapper', '', '', 'ppc64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x11042cd49d655d440c4effc686cccfe7', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-bootwrapper', '', '', 'ppc64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x036614ffba6924fecac3022e3ac9ab0f', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-debug', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x48ea45569cb8ae97278ae9a51b3fd7ab', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-debug', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x99d2d16cea332eb79a13206bb7603930', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-debug', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd80fc48d7d168c7d293e0e8f21d4ca16', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-debug', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x567638ead4b9abb9bb62aab2bf06b3f1', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-debug-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x33355e3b116821cd73b76f00e4452134', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-debug-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x516a5bb1edcbcfb083d1288281f4adf5', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-debug-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc9e2ccf26cc6ffab790c5903acb32aa2', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-debug-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6718abcde22f36a36a327a8a797ae903', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x167e6afbd44a5b2f0be448d4d2ec615a', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3a7475624537ea8ffb2b261ec9d7dca3', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe04e10079cea830b4d2842ef887cec84', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x42ca04c1c4e3cb5e357093b408cf27d6', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x677ea28126d33b2232008f46a15bcadc', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*[...];
Date: 2023-07-04 18:39:18 Duration: 5s659ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x8badfa5a5650e93326696d8ae4fd90e7', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-qt3', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x95f51c3f31be85c6c27bc0c882818a47', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-qt3', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa1d932a7deb90a2e19892f4113b889b4', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-qt3-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0e362c14238852ee8d47caef1e043b77', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-qt3-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7cd5bec3605b4c6c7ad7bd2f65ddf4b2', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-qt4', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa438e2f8838bd2467634175842dba4aa', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-qt4', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb60a4249e323ebd45b8b9d7729900d4a', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-qt4-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbb0c55e833610a73b64872199c7b917f', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-qt4-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x072c4fe55e17ca4e01bda9fab72a1028', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-tools', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb00e5e6a8ec7e234c1c8a274cef9b36d', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-tools', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xba41fd5d8442fcb59112eda3e6bbc61b', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-ui', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5f9faf159513b1a53521df34e762e159', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-ui', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb83f80a0e77d10d9277c5dee3625995e', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-ui-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf57339d6662e56b2d01cb86bd788c921', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-ui-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x52f494729d77c31de0d690f4d419258f', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-ui-tools', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd871ee97b49aa8a452bd6cd410e4dcf2', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-ui-tools', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6dccb44d3d19a0e7caf9cbd8d35e3b54', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x759f8efe113146828f040d8c44fafe5d', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9f80132b0bca026ea342f642f50a4ac8', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-admin-webapps', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa62f71abdcdbddcb2b910384e3689244', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-admin-webapps', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa7f389cf83d36d88472697d7ec39eaa8', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-docs-webapp', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7223472955ef9c0e92909286bd87124c', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-docs-webapp', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x17404c9b6a3638047391afd68f556128', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-el-2.1-api', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf87a266e6652b90035ec9786645629c5', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-el-2.1-api', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdf000587766e035af78cc94ecaa80027', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-javadoc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x318b5dddae24c209f3cf2950ad56e8c7', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-javadoc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x962d7917296381851e6a6c7ababf5b56', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-jsp-2.1-api', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3a79b013a6a796268b29d9722d8f5b4a', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-jsp-2.1-api', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5e7becfee5a99cdfeb98f53ff2760055', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-lib', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe835e7249aa0e57f66acec1d75abd7ce', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-lib', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf3cb7810946dad4f85c06988609d36a7', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-servlet-2.5-api', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x009e7043142003625806c195683d9b38', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-servlet-2.5-api', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x311752f5b5476b6770788ae86e8e9645', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-webapps', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xaa6661e1da4520e473954b63bdbaa364', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-webapps', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x13ddfe01b6ca11f67e2307d8ae78de4e', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4a080841bc7a01ed0beca5eb28ca6d29', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8490458d68d4dedfb472d112b01429cf', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-bootwrapper', '', '', 'ppc64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x237c7a3ffb3deb15b3979921c1d2d4d1', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-bootwrapper', '', '', 'ppc64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x0388f25a177f5275c3f043aa244e7862', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-debug', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0e744585a10504a3572569f8b5214e21', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-debug', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x16c46f3bbee71f3136cf1ae02c3cf1d8', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-debug-devel', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xeeda21bd555c975e971a2fc6f090d4ae', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-debug-devel', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe35ec19d3443dc4db6f750c61390f0f5', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-devel', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2b4033389b560a7048024ad5602a3140', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-devel', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa36de14a18ff6418201de22d0112461e', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x120c52595d035d0e1f9b68ac41e2ad9e', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6a51dd36476918ee697a5b243cb1b580', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-firmware', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6d3e3adeaae922f6e0eb974da80646b6', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-firmware', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1ae05434fb1908743682e82553bd39b4', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-headers', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5c1ffa11edfe4e2557346aab7a8592ee', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-headers', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0645de8e61cbc7ff413a7efabe79b6a4', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-kdump', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xe10f1d2714ab360d4977b596cb4b3f64', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-kdump', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xc18d5d572d950460b269295a460f951e', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-kdump-devel', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x9cd4704180ab3ec2396d309230ddd4b5', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-kdump-devel', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x0dd6183dd70fe8421a68876b08369ebe', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'perf', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x196bb6f23660bb5279c517b522e65355', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'perf', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x96c75fcebcbfcce5854825c9c7ced70c', 'RHSA-2011:0839: gimp security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The GIMP (GNU Image Manipulation Program) is an image composition and restarted for the update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0839 https://access.redhat.com/security/cve/CVE-2010-4540 https://access.redhat.com/security/cve/CVE-2010-4541 https://access.redhat.com/security/cve/CVE-2010-4542 https://access.redhat.com/security/cve/CVE-2010-4543', 'Moderate', 'Medium', 'gimp', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '2:2.6.9-4.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd22f87c37db5a5e44926ac4c920d6f6a', 'RHSA-2011:0839: gimp security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The GIMP (GNU Image Manipulation Program) is an image composition and restarted for the update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0839 https://access.redhat.com/security/cve/CVE-2010-4540 https://access.redhat.com/security/cve/CVE-2010-4541 https://access.redhat.com/security/cve/CVE-2010-4542 https://access.redhat.com/security/cve/CVE-2010-4543', 'Moderate', 'Medium', 'gimp', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '2:2.6.9-4.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa6f60cb9e2b1a4a7284ae25a447b4177', 'RHSA-2011:0839: gimp security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The GIMP (GNU Image Manipulation Program) is an image composition and restarted for the update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0839 https://access.redhat.com/security/cve/CVE-2010-4540 https://access.redhat.com/security/cve/CVE-2010-4541 https://access.redhat.com/security/cve/CVE-2010-4542 https://access.redhat.com/security/cve/CVE-2010-4543', 'Moderate', 'Medium', 'gimp-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '2:2.6.9-4.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x498e227f290e8d4c705c237505899dfd', 'RHSA-2011:0839: gimp security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The GIMP (GNU Image Manipulation Program) is an image composition and restarted for the update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0839 https://access.redhat.com/security/cve/CVE-2010-4540 https://access.redhat.com/security/cve/CVE-2010-4541 https://access.redhat.com/security/cve/CVE-2010-4542 https://access.redhat.com/security/cve/CVE-2010-4543', 'Moderate', 'Medium', 'gimp-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '2:2.6.9-4.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x419205150eacc8ff25b192b209e6b446', 'RHSA-2011:0839: gimp security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The GIMP (GNU Image Manipulation Program) is an image composition and restarted for the update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0839 https://access.redhat.com/security/cve/CVE-2010-4540 https://access.redhat.com/security/cve/CVE-2010-4541 https://access.redhat.com/security/cve/CVE-2010-4542 https://access.redhat.com/security/cve/CVE-2010-4543', 'Moderate', 'Medium', 'gimp-devel-tools', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '2:2.6.9-4.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcb958b2bb363ff1302b4cc58e82bd115', 'RHSA-2011:0839: gimp security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The GIMP (GNU Image Manipulation Program) is an image composition and restarted for the update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0839 https://access.redhat.com/security/cve/CVE-2010-4540 https://access.redhat.com/security/cve/CVE-2010-4541 https://access.redhat.com/security/cve/CVE-2010-4542 https://access.redhat.com/security/cve/CVE-2010-4543', 'Moderate', 'Medium', 'gimp-devel-tools', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '2:2.6.9-4.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd24b29add80a7eef8ebf322ee2ac5042', 'RHSA-2011:0839: gimp security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The GIMP (GNU Image Manipulation Program) is an image composition and restarted for the update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0839 https://access.redhat.com/security/cve/CVE-2010-4540 https://access.redhat.com/security/cve/CVE-2010-4541 https://access.redhat.com/security/cve/CVE-2010-4542 https://access.redhat.com/security/cve/CVE-2010-4543', 'Moderate', 'Medium', 'gimp-help-browser', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '2:2.6.9-4.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcd66ad2e55c55d1fd0baa6e0ffc86527', 'RHSA-2011:0839: gimp security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The GIMP (GNU Image Manipulation Program) is an image composition and restarted for the update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0839 https://access.redhat.com/security/cve/CVE-2010-4540 https://access.redhat.com/security/cve/CVE-2010-4541 https://access.redhat.com/security/cve/CVE-2010-4542 https://access.redhat.com/security/cve/CVE-2010-4543', 'Moderate', 'Medium', 'gimp-help-browser', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '2:2.6.9-4.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x99f2a3ac8deec9d760b54a35c697ac0b', 'RHSA-2011:0839: gimp security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The GIMP (GNU Image Manipulation Program) is an image composition and restarted for the update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0839 https://access.redhat.com/security/cve/CVE-2010-4540 https://access.redhat.com/security/cve/CVE-2010-4541 https://access.redhat.com/security/cve/CVE-2010-4542 https://access.redhat.com/security/cve/CVE-2010-4543', 'Moderate', 'Medium', 'gimp-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '2:2.6.9-4.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2ad5096cb505c20a7ecd5fcd794b5f26', 'RHSA-2011:0839: gimp security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The GIMP (GNU Image Manipulation Program) is an image composition and restarted for the update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0839 https://access.redhat.com/security/cve/CVE-2010-4540 https://access.redhat.com/security/cve/CVE-2010-4541 https://access.redhat.com/security/cve/CVE-2010-4542 https://access.redhat.com/security/cve/CVE-2010-4543', 'Moderate', 'Medium', 'gimp-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '2:2.6.9-4.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf20683972acb0564b2290f357ad3c10e', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb7487c712b5714638dd878ae29ab7fe6', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb4b901accdcad67905343d8c8a0e6923', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-client', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb9042336bdfeafa9514349e5ffa02f84', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-client', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x71d1b1f45878d942a1ceb01aca26e095', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-grapher', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe86e5f3aaea5a397f00744d7bdb143b6', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-grapher', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6e8875ca7059df0ee6bcee8cf2f5e69d', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-initscript', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x71fffa84351fc6dff5da8fb58bb12fab', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-initscript', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x112be3a5653b27e6204d5a4d702204bb', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-runtime', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1d208bd365ab325cbf8c3392784e7305', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-runtime', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5e1653c9a8c25215aef0c16cf47aaf14', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-sdt-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0e0b55991264ffc75089b063970430e2', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-sdt-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x61647687fd4f8fe2dde4670c5d16d75e', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-server', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0c4900dbe9d6b27237f77d6be06f2077', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-server', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4fb558b039d947251a0d9480fa37782d', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-testsuite', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaa3201899d8628d34476c149d3575a91', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-testsuite', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x747c6decbef8a2c96c31597055879a5b', 'RHSA-2011:0843: postfix security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Postfix is a Mail Transport Agent (MTA), supporting LDAP, SMTP AUTH (SASL), update, the postfix service will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0843 https://access.redhat.com/security/cve/CVE-2011-1720', 'Moderate', 'Medium', 'postfix', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '2:2.6.6-2.2.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf3d50ad32bc7127258a1aab9982ef60f', 'RHSA-2011:0843: postfix security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Postfix is a Mail Transport Agent (MTA), supporting LDAP, SMTP AUTH (SASL), update, the postfix service will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0843 https://access.redhat.com/security/cve/CVE-2011-1720', 'Moderate', 'Medium', 'postfix', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '2:2.6.6-2.2.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe6a013c2fcf755f1e59f9b13f77fc250', 'RHSA-2011:0843: postfix security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Postfix is a Mail Transport Agent (MTA), supporting LDAP, SMTP AUTH (SASL), update, the postfix service will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0843 https://access.redhat.com/security/cve/CVE-2011-1720', 'Moderate', 'Medium', 'postfix-perl-scripts', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '2:2.6.6-2.2.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa94d9e525042e9b288db4233aec9bcd6', 'RHSA-2011:0843: postfix security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Postfix is a Mail Transport Agent (MTA), supporting LDAP, SMTP AUTH (SASL), update, the postfix service will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0843 https://access.redhat.com/security/cve/CVE-2011-1720', 'Moderate', 'Medium', 'postfix-perl-scripts', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '2:2.6.6-2.2.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcc0ce7be86077bc1d0fe23cdff8d0cc9', 'RHSA-2011:0844: apr security update (Low)', 'RHEL6-rhel-6.5-aus', 'The Apache Portable Runtime (APR) is a portability library used by the such as httpd, must be restarted for this update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0844 https://access.redhat.com/security/cve/CVE-2011-1928', 'Low', 'Low', 'apr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:1.3.9-3.el6_1.2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xab2a35aaecc2835093b939c1b729c7f5', 'RHSA-2011:0844: apr security update (Low)', 'RHEL6-rhel-6.5-aus', 'The Apache Portable Runtime (APR) is a portability library used by the such as httpd, must be restarted for this update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0844 https://access.redhat.com/security/cve/CVE-2011-1928', 'Low', 'Low', 'apr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:1.3.9-3.el6_1.2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1360f214496b0d1e1b66146eb5c4ea13', 'RHSA-2011:0844: apr security update (Low)', 'RHEL6-rhel-6.5-aus', 'The Apache Portable Runtime (APR) is a portability library used by the such as httpd, must be restarted for this update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0844 https://access.redhat.com/security/cve/CVE-2011-1928', 'Low', 'Low', 'apr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:1.3.9-3.el6_1.2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x635d87a380f9cebabd225451bad8a178', 'RHSA-2011:0844: apr security update (Low)', 'RHEL6-rhel-6.5-aus', 'The Apache Portable Runtime (APR) is a portability library used by the such as httpd, must be restarted for this update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0844 https://access.redhat.com/security/cve/CVE-2011-1928', 'Low', 'Low', 'apr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:1.3.9-3.el6_1.2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcbad674fe93e0b9122cadd7599e54eea', 'RHSA-2011:0845: bind security update (Important)', 'RHEL6-rhel-6.5-aus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0845 https://access.redhat.com/security/cve/CVE-2011-1910', 'Important', 'High', 'bind', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '32:9.7.3-2.el6_1.P1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2c8811c29ad91ec3f756d7cb57756f87', 'RHSA-2011:0845: bind security update (Important)', 'RHEL6-rhel-6.5-aus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0845 https://access.redhat.com/security/cve/CVE-2011-1910', 'Important', 'High', 'bind', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '32:9.7.3-2.el6_1.P1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc2b23fe65966b214245fc263c75cb9a3', 'RHSA-2011:0845: bind security update (Important)', 'RHEL6-rhel-6.5-aus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0845 https://access.redhat.com/security/cve/CVE-2011-1910', 'Important', 'High', 'bind-chroot', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '32:9.7.3-2.el6_1.P1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2a759e3d4719e6054683c457dcc5c41a', 'RHSA-2011:0845: bind security update (Important)', 'RHEL6-rhel-6.5-aus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0845 https://access.redhat.com/security/cve/CVE-2011-1910', 'Important', 'High', 'bind-chroot', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '32:9.7.3-2.el6_1.P1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7d31a5dbab7848f92d204ba57246e3ab', 'RHSA-2011:0845: bind security update (Important)', 'RHEL6-rhel-6.5-aus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0845 https://access.redhat.com/security/cve/CVE-2011-1910', 'Important', 'High', 'bind-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '32:9.7.3-2.el6_1.P1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf9d9c97eb7fd7bd1aff4ef3f0101316f', 'RHSA-2011:0845: bind security update (Important)', 'RHEL6-rhel-6.5-aus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0845 https://access.redhat.com/security/cve/CVE-2011-1910', 'Important', 'High', 'bind-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '32:9.7.3-2.el6_1.P1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfd39a99f331070d464d2c83a2f5a9879', 'RHSA-2011:0845: bind security update (Important)', 'RHEL6-rhel-6.5-aus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0845 https://access.redhat.com/security/cve/CVE-2011-1910', 'Important', 'High', 'bind-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '32:9.7.3-2.el6_1.P1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7ae112359e81dbd7c5c22c10335bb4f3', 'RHSA-2011:0845: bind security update (Important)', 'RHEL6-rhel-6.5-aus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0845 https://access.redhat.com/security/cve/CVE-2011-1910', 'Important', 'High', 'bind-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '32:9.7.3-2.el6_1.P1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6558eaf1970bf9f66d629c4f471b7655', 'RHSA-2011:0845: bind security update (Important)', 'RHEL6-rhel-6.5-aus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0845 https://access.redhat.com/security/cve/CVE-2011-1910', 'Important', 'High', 'bind-sdb', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '32:9.7.3-2.el6_1.P1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x87f2004d6b7c3202db07dc91842be3bc', 'RHSA-2011:0845: bind security update (Important)', 'RHEL6-rhel-6.5-aus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0845 https://access.redhat.com/security/cve/CVE-2011-1910', 'Important', 'High', 'bind-sdb', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '32:9.7.3-2.el6_1.P1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6754fa8a041791df4ccd428d5118232d', 'RHSA-2011:0845: bind security update (Important)', 'RHEL6-rhel-6.5-aus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0845 https://access.redhat.com/security/cve/CVE-2011-1910', 'Important', 'High', 'bind-utils', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '32:9.7.3-2.el6_1.P1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9bd2dca244497089d347364ac77c4686', 'RHSA-2011:0845: bind security update (Important)', 'RHEL6-rhel-6.5-aus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0845 https://access.redhat.com/security/cve/CVE-2011-1910', 'Important', 'High', 'bind-utils', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '32:9.7.3-2.el6_1.P1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9aa4bc4756a3497be2fea7687ee9020b', 'RHSA-2011:0850: flash-plugin security update (Important)', 'RHEL6-rhel-6.5-aus', 'The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash upgrades Flash Player to version 10.3.181.22', '2011-06-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0850 https://access.redhat.com/security/cve/CVE-2011-2107', 'Important', 'High', 'flash-plugin', '', '', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:10.3.181.22-1.el6', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xcfa88b175cb211965f6ae705920a63ad', 'RHSA-2011:0850: flash-plugin security update (Important)', 'RHEL6-rhel-6.5-aus', 'The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash upgrades Flash Player to version 10.3.181.22', '2011-06-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0850 https://access.redhat.com/security/cve/CVE-2011-2107', 'Important', 'High', 'flash-plugin', '', '', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:10.3.181.22-1.el6', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x8269ef556fc5229cdfff930ea67b7ef9', 'RHSA-2011:0856: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6.5-aus', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0856 https://access.redhat.com/security/cve/CVE-2011-0862 https://access.redhat.com/security/cve/CVE-2011-0864 https://access.redhat.com/security/cve/CVE-2011-0865 https://access.redhat.com/security/cve/CVE-2011-0867 https://access.redhat.com/security/cve/CVE-2011-0868 https://access.redhat.com/security/cve/CVE-2011-0869 https://access.redhat.com/security/cve/CVE-2011-0871', 'Critical', 'Critical', 'java-1.6.0-openjdk', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '1:1.6.0.0-1.39.1.9.8.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa31209034007356f8f5be1e616c5cdcb', 'RHSA-2011:0856: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6.5-aus', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0856 https://access.redhat.com/security/cve/CVE-2011-0862 https://access.redhat.com/security/cve/CVE-2011-0864 https://access.redhat.com/security/cve/CVE-2011-0865 https://access.redhat.com/security/cve/CVE-2011-0867 https://access.redhat.com/security/cve/CVE-2011-0868 https://access.redhat.com/security/cve/CVE-2011-0869 https://access.redhat.com/security/cve/CVE-2011-0871', 'Critical', 'Critical', 'java-1.6.0-openjdk', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '1:1.6.0.0-1.39.1.9.8.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x092589b2989c935a078fea15fce4bb83', 'RHSA-2011:0856: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6.5-aus', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0856 https://access.redhat.com/security/cve/CVE-2011-0862 https://access.redhat.com/security/cve/CVE-2011-0864 https://access.redhat.com/security/cve/CVE-2011-0865 https://access.redhat.com/security/cve/CVE-2011-0867 https://access.redhat.com/security/cve/CVE-2011-0868 https://access.redhat.com/security/cve/CVE-2011-0869 https://access.redhat.com/security/cve/CVE-2011-0871', 'Critical', 'Critical', 'java-1.6.0-openjdk-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '1:1.6.0.0-1.39.1.9.8.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0e7b6c20c2773d1d81434daf0d4dc6d1', 'RHSA-2011:0856: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6.5-aus', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0856 https://access.redhat.com/security/cve/CVE-2011-0862 https://access.redhat.com/security/cve/CVE-2011-0864 https://access.redhat.com/security/cve/CVE-2011-0865 https://access.redhat.com/security/cve/CVE-2011-0867 https://access.redhat.com/security/cve/CVE-2011-0868 https://access.redhat.com/security/cve/CVE-2011-0869 https://access.redhat.com/security/cve/CVE-2011-0871', 'Critical', 'Critical', 'java-1.6.0-openjdk-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '1:1.6.0.0-1.39.1.9.8.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x284eeb62fdfbe0f01ee5c68092813411', 'RHSA-2011:0856: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6.5-aus', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0856 https://access.redhat.com/security/cve/CVE-2011-0862 https://access.redhat.com/security/cve/CVE-2011-0864 https://access.redhat.com/security/cve/CVE-2011-0865 https://access.redhat.com/security/cve/CVE-2011-0867 https://access.redhat.com/security/cve/CVE-2011-0868 https://access.redhat.com/security/cve/CVE-2011-0869 https://access.redhat.com/security/cve/CVE-2011-0871', 'Critical', 'Critical', 'java-1.6.0-openjdk-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '1:1.6.0.0-1.39.1.9.8.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8c110bfc7c7a85c3edd14b39e17cc40a', 'RHSA-2011:0856: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6.5-aus', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0856 https://access.redhat.com/security/cve/CVE-2011-0862 https://access.redhat.com/security/cve/CVE-2011-0864 https://access.redhat.com/security/cve/CVE-2011-0865 https://access.redhat.com/security/cve/CVE-2011-0867 https://access.redhat.com/security/cve/CVE-2011-0868 https://access.redhat.com/security/cve/CVE-2011-0869 https://access.redhat.com/security/cve/CVE-2011-0871', 'Critical', 'Critical', 'java-1.6.0-openjdk-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '1:1.6.0.0-1.39.1.9.8.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x11dc331f2229f218e857c3e655c3db84', 'RHSA-2011:0856: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6.5-aus', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0856 https://access.redhat.com/security/cve/CVE-2011-0862 https://access.redhat.com/security/cve/CVE-2011-0864 https://access.redhat.com/security/cve/CVE-2011-0865 https://access.redhat.com/security/cve/CVE-2011-0867 https://access.redhat.com/security/cve/CVE-2011-0868 https://access.redhat.com/security/cve/CVE-2011-0869 https://access.redhat.com/security/cve/CVE-2011-0871', 'Critical', 'Critical', 'java-1.6.0-openjdk-javadoc', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '1:1.6.0.0-1.39.1.9.8.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3ec1cd4d8ad6e5e0d229e5d18887493f', 'RHSA-2011:0856: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6.5-aus', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0856 https://access.redhat.com/security/cve/CVE-2011-0862 https://access.redhat.com/security/cve/CVE-2011-0864 https://access.redhat.com/security/cve/CVE-2011-0865 https://access.redhat.com/security/cve/CVE-2011-0867 https://access.redhat.com/security/cve/CVE-2011-0868 https://access.redhat.com/security/cve/CVE-2011-0869 https://access.redhat.com/security/cve/CVE-2011-0871', 'Critical', 'Critical', 'java-1.6.0-openjdk-javadoc', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '1:1.6.0.0-1.39.1.9.8.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x07a1ea847c256a8059730d1cf965f53c', 'RHSA-2011:0856: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6.5-aus', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0856 https://access.redhat.com/security/cve/CVE-2011-0862 https://access.redhat.com/security/cve/CVE-2011-0864 https://access.redhat.com/security/cve/CVE-2011-0865 https://access.redhat.com/security/cve/CVE-2011-0867 https://access.redhat.com/security/cve/CVE-2011-0868 https://access.redhat.com/security/cve/CVE-2011-0869 https://access.redhat.com/security/cve/CVE-2011-0871', 'Critical', 'Critical', 'java-1.6.0-openjdk-src', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '1:1.6.0.0-1.39.1.9.8.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd92faf30dca2864c34bf8e9b527ac04a', 'RHSA-2011:0856: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6.5-aus', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0856 https://access.redhat.com/security/cve/CVE-2011-0862 https://access.redhat.com/security/cve/CVE-2011-0864 https://access.redhat.com/security/cve/CVE-2011-0865 https://access.redhat.com/security/cve/CVE-2011-0867 https://access.redhat.com/security/cve/CVE-2011-0868 https://access.redhat.com/security/cve/CVE-2011-0869 https://access.redhat.com/security/cve/CVE-2011-0871', 'Critical', 'Critical', 'java-1.6.0-openjdk-src', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '1:1.6.0.0-1.39.1.9.8.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbccb11787b71867a1b8fe1864c6fed9b', 'RHSA-2011:0858: xerces-j2 security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The xerces-j2 packages provide the Apache Xerces2 Java Parser, a Parser must be restarted for this update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0858 https://access.redhat.com/security/cve/CVE-2009-2625', 'Moderate', 'Medium', 'xerces-j2', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:2.7.1-12.6.el6_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe4748d5a7a4f51b101c862be6661e81b', 'RHSA-2011:0858: xerces-j2 security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The xerces-j2 packages provide the Apache Xerces2 Java Parser, a Parser must be restarted for this update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0858 https://access.redhat.com/security/cve/CVE-2009-2625', 'Moderate', 'Medium', 'xerces-j2', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:2.7.1-12.6.el6_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb2d46c0c2bbb69a87c3d33f6176c4ce0', 'RHSA-2011:0858: xerces-j2 security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The xerces-j2 packages provide the Apache Xerces2 Java Parser, a Parser must be restarted for this update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0858 https://access.redhat.com/security/cve/CVE-2009-2625', 'Moderate', 'Medium', 'xerces-j2-demo', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:2.7.1-12.6.el6_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcfb84ab5b680c1bea31c781ffbc5670c', 'RHSA-2011:0858: xerces-j2 security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The xerces-j2 packages provide the Apache Xerces2 Java Parser, a Parser must be restarted for this update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0858 https://access.redhat.com/security/cve/CVE-2009-2625', 'Moderate', 'Medium', 'xerces-j2-demo', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*[...];
Date: 2023-07-04 18:38:23 Duration: 4s391ms Bind query: yes
12 9s944ms 1 9s944ms 9s944ms 9s944ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, https: / / access.redh[...];Times Reported Time consuming queries #12
Day Hour Count Duration Avg duration Jul 04 14 1 9s944ms 9s944ms -
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x10407dc66e0363fca3c37bf49a1315a9', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly16.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5bfa2bd8aed79c1d9d30e289fec06a25', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly16.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd7c9dc482d09385454cc6a2cd2e8637e', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly16.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x749fecac7c9f8ba004b60d143be4aff6', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly16.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x40321c510b676b589bfe9a4ab7f03c45', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly17.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x403fd184006fb28cb79668a7dfce704f', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly17.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6148f263e1683d444d001b3ee30f0a0f', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly17.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3f09d51c207b55338209f758bca01d0a', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly17.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x59bfcafd6451d50015c9b880caf772e9', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly17.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa16f110a5b49a326f5a2e7b371cbab1a', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly17.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8234e27523b7e243c2e0094e6b6b9ee5', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly18.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x37a51d265769cf4ef0cfb0bab403fc76', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly18.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x476fef3ad97cf47d44bde8e5fa94d2e8', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly18.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x172a73f49c943853bea8eb27ef870012', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly18.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3419bfa174a0538f28a75faf478fad05', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly18.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc39b4092d15076f7bb2bc54123eafadc', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly18.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x443aa34b1be71520fbc8d57f8ec9e8f4', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly8.2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5d09e74777d0e74978cac6800e424454', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly8.2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbee6cc228cc1df5d09cf08f600cd4669', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly8.2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8dd8fd7955ab0ca47d104e569d637755', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly8.2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe237cf7734926cb5b05dbfe8b5e8886c', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly8.2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfd0c668a5ee8f142f18eb9a217130857', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly8.2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa1474d967f9c8bfcad158209cc9a89f2', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly9.0', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2dc4e330e580babc24d2c167bc3da33c', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly9.0', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3ec5c8f3b75a0377b0916e60e89078f3', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly9.0', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7d2adef343c6da8ffae58114dcc92040', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly9.0', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x890df469f0c008e6c2e4b122abd05f3b', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly9.0', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x268b52d5374c572103d4ea3e8335eb33', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly9.0', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x088146eb06f468dd8e054ed71c3940fa', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-undertow', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:2.0.30-3.SP3_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7296fb08ed35ea68aa723262f81fd3b3', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-undertow', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:2.0.30-3.SP3_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfbcf0269dee70891418612af9e55bf89', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-undertow', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6', 'rhel-cpe-repository', '', '0:2.0.30-3.SP3_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1d43977fcffc529975c0929f55c8ee1c', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-undertow', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:2.0.30-3.SP3_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x254c7b5e6d37dcad9fd7608eb6c31257', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-undertow', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6', 'rhel-cpe-repository', '', '0:2.0.30-3.SP3_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x86e964d6bf7b9e2d9453fec22d62e550', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-undertow', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el6', 'rhel-cpe-repository', '', '0:2.0.30-3.SP3_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xec4041aa1ed6dae59d86fe5f748812a0', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1c19349b5fb204946cc65d00c019a33c', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xba4e23235c7700c93eed8339f34b564a', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xeba3473bc3018b4a7c8b797b8d872d6b', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf54dbd488bb804c2715369a0b1fc34e2', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcb48ec14b014a1e67a5eeeec9c64558d', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el6', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5954c1e265fd40a4c06cce5629ca5e07', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x545a03f7a865539beaa485122ce09247', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf8bb0d70dec0ab408322215f32fc7f86', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3c73cbb307d53c9f24cdb6ae6c9d74c2', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0f8efa7c7357bec21ecf2e0edfed03ec', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfdbb32df4c22712dc6b93b03c3627103', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el6', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc9be0c3c3182aef4d2c595d43b323b44', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate-entitymanager', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2305a9d2506dcb18a17680e133146458', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate-entitymanager', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x48cb263d7525dce6867783b5cd28281b', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redh[...];
Date: 2023-07-04 18:39:52 Duration: 9s944ms Bind query: yes
13 9s781ms 4 150ms 7s293ms 2s445ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, for detailed information on changes in this re[...];Times Reported Time consuming queries #13
Day Hour Count Duration Avg duration Jul 04 14 4 9s781ms 2s445ms -
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x9c5c44989b1c4dfdc6bdbaffeda82761', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x07582fadf78216c2b182b102a48b6300', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x159f101ac6a7aff2bc3c01fcd87f0177', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2d0b7adb7378bc43b3215fd67c34cee3', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x56c85ee42957202c2f93ed73f8890c32', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xce800bf2e07d6706de39e0fccb4ae88a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x992c049336c5b6db5945a5c01b5f1683', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0117272805102356c823d5578eb8f5b5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc71295f1a06112f17c0e22c66db33ab8', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9e7cc16f4e258f0a3de23587581d43a7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbbf2423aa38be727ab82a6679c36d36c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9e9247faa08792937061ff04b4c81442', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe92c82fd1b3dbd4639e2a291dfd075c4', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa05628ade44860902279e24313423a92', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf9eff09f67fc640d000e43ccd1d02d31', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb3d78ea0c3b97e6726fab6e1b4c82f04', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x09178218ff9257c1efb38f0705a38781', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8b6ebc63b239e0e7f097845ac75a2e01', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x83fd66877c1f7f8648b6393aaad8228d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2da6561322a92630d5bb4be3dfe1b6b3', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7084a459465ae50686d7127c97a15d84', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6e3f1b97348c45c1fa97d40a67224db0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x51ca20614a7909041ee9cea485516532', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x64ffb2ed7a9e4b3057e2ce010663bd4b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3f5ac798baa87a58c5a220cacef485c9', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb0b95117599ecaf08866229fdaadcb89', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa7a5cd2bb8a276a170e849a6b0f7fdf4', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x05affdb274e571924379acc72b354ed5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbcf072349c687433dd3ac6e4fb8ae204', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x84dde84e9c8f91c5f670276507eac6f5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0b609f1c8acc094d32db7879dd2617f7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa2dc9377157c6bcb60a3cb4850b6d9e5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xeafea302e4d76f0d73da7ef9eec05735', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb6d94580be389e57ef2fd38a9e7e3f96', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x967ae28a858e0a4e0e967fc198e0a64a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x23e169258e27384a7f399ab564b5c2ba', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3e542f015d931a933d5fb87ecfddcf7e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x24f23316c26e18a49fe9e3640d960d90', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x02f53e6ba203100f00e29d0b260eb876', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x258b4af5150abd4829489b0046abb715', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5d814aac9e075f74c8ecf2081455051a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf9be79c370493be095037a554db0d9d7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe25bf7c62c2c7b129129f9a35b1e6876', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2c5f309975ab26961f6fbe2724f9e442', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x446667a8187fb46f6a8ab9ec991e7c8c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x803a3849cf68bb427e7b010def4a508c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3a3c0071c30733eb75d6fe203fca9695', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x99321d1cc7688ed6de03a1ae05268300', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc0af2f0d1d2aebe80c489a079d96cdb5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa02fbd62d53a41bcaa37a6ae53a66d09', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbff6943e3bb50803af3e491d3d67ba5f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x59f9c6c044ffcd59a06bd633dffc9823', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd3ba659e8a0d83caaa6701f0a2cf6756', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0071f0ab473ead1d7974279e65e702ad', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6fb9c22cb51690af3751a50943a0d5ab', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x80b7d6dde6bef9f15149c1bd108e45a0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8c8d53dc2d19060da9a50fa14de0fb9c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0cbff66adee5ce6adc522566184b3caf', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x70a994761270ccd5069e294520655198', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xea97807990a883ba891e0802e1e542ed', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x458b3ad7e0ba564ebf127d994b2c7ccd', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x59e4db0384552080cccde43662185678', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6d1dcd4b5dab3ff625639785cd2b4b60', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4913469ac6df62329a075e36a5b24341', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x79fe2dd14b11cb4023b71038ddfeb3a2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x577f756b27254ebfbafec53f780544d6', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa5d36d7fd411b4315f7d9a090a0edee9', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa87b2f333b2461f87be4f60cb2ea7586', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf86527408a10f274d11fcbc72a12c88d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe5ac6f610eb4811ce0380ec32e1e8ee7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6183913e7979c7a7a57fa55456b9f821', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x15090f9823857fbf108436d8be5f2d76', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa227494a1acb04cd288f42eab64dc660', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf1fc44984d0640e2298637dd708479ad', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd8462fb6a5ff0660583823e12e6cf1e2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x39acb597283db30f832dd28157cf5220', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6e466d811a11289aba2941d1955af135', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x35ae3e134f1beaa19d6d3f76f40334f8', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd971b9ad6b78cbb940a0566a38c5f83f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4a96cd7b28386d8b860e997f57984050', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x04038f9947f7b1f397b950868ab7d2bc', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xefd533b13848d2c917aa91926c92d698', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3e6fa59996bb2ba8f3efbd88f0cce9d0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9307a7937aa8439331c9de475723807f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa59e21b54f0205a28b99c4a265c0f43b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6d7a0551070f1637a9a36f6a297be357', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x41c7cded2267900d5bc13e9975483cf3', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2f3e9296c5590a6c51b29c5c9405465c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x937feffa95afb595313187e1126327dc', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd22f970134bc28906ae981a3edf90a9c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4f3dc74c038e29ca627b8a3128f53915', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa0536aa4e0a6e482c6c508947dc1957a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x356cfae0089670915a93790058030bd7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdb5c0273c58fde2d567762d72be91b24', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1ba6d64a827a499cabf9e119c1c36a60', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x270e0027e9792414520adb85a7c6fa6f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbf6b6316fabb81d0f27c003dd290cbc2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x15eac55c329d48eb40790d1a323d0fad', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x66a90e441a60dc12341c6e9835d2f8ed', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1fc77c3e552926e1602530d74c281546', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this re[...];
Date: 2023-07-04 18:39:51 Duration: 7s293ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x14e63711a965aaffc9783198d8ea5769', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc22033af713a6fd605a0833470396649', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb715cb284e3c57ef76bf50cc6044c2be', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x04731402c9903551ca2fef658649ce09', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x880316c9467911b0ed9d1f27cae1d030', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf8113dc7805765de14a486d0cce9055c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x809b2b399d30e5bfdb4b5069d191bfa0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5c58dbb31dd1da125fac2b8e712b551e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7f274e35a98ff4c80ea9fd52b84d2934', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1f870b701a110c001a105952d3bac84c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf83294e6f913982c847d9b82e8bda82a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcbc1b4a899112bce8e6c46afbcd8fd2a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf494b46b8271c8b8cd3fbc6cc260ec9a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2e8994c669b9da9a282d148c74bd783e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3ad2e95dc1788526e29047fc0712393a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfaceedd60faf34b069cbde4ac5279b6c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa21ce9451b57ba8cf95c6a13d5a645db', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x880f802879fbec7199fd67fe42bd77be', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x296fbf542711b5155a6bbb39a7d6e4d0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbfe210fc6e033177a35a5e35d050e7ee', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x583c106a49d49c1bf84d50d6e7796b3b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x137676a6b438b9158f9aa8f8830f443f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0807e9723ce05c7d9af10c8c38d12528', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x541f33d3c7e1c881c6c91d5fd562d5eb', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0bccdfcf55c25854a6da996ee9a279fa', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0b094551353dfd79a9a8731d9d65d9ae', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xda3cc249a120d4a930bf8125ef38eac6', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe1e6e2022efa699ca88de7e8d63c4e94', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfa6faefdf986d0a908c36d93a01d52f3', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0ca034b6ad63f0103c95f26f6c05c6f2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6ed979dc7dc72cb2e7d098d97e63818a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd0898924181e9c2fd1e2028ee91221ec', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3d04a9f6aa0c60edfb4f76e6afd1e50d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8395aba2afdf7851eb09d4b2d13d70f8', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x10ffaf09b5ca37e7556ae151c57ee5e6', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe137866e8fc1260f3efe031e67b94dfa', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4989567affd2b9c421c510821ebcd7e8', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbb5edd7ae469d08ff6b64f798176ec8a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xad6f7ebbf8d8f2cca68306588be42f3b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa92fcc2fe13ecb66195d5eec638e6d8c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc4cb0d591d5abc4cc21e46971768c757', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe3c532de21e01ec6260950a69fd173c8', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcafee7dd6dec3004c616c65418d9585b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x342e3045440fc4b344cea2d069ac21bf', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8b0e3498e85cc09b921421003e057cbc', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe1102335048531912678e46830b10617', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0c1f84a28a3ad5af285dbd7c00b155d3', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa340135e6333b9c9d0fde1a25caaeafa', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe0000fd6da4f0d5b9ef8fb5f67d85776', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x07ca1d8808291af6d081297dfda1b928', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x49b33cb62a7cb3f7a2d0f9f703602962', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xefad91115c334b50a93a1f0a38c0704c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3001e918e2fe529a9c4068274cce07db', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1ada20ee2e04276c5ad90e347bc03eb3', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3c42ad066f39500852f8da31771ba928', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8509e641209547d18a6f0a458af19efe', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8238cdfb2f3bbfff2f0f36c22199a25a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xff7f4d15ad5ee427e99a0edcbde75ef2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x003cdce1cc3248cbbe7308fb9ccc24a0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x20c737951e9c3d8157ecfa52b5b968fc', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd3b2f9e93a9311ac758130c3890d0737', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaccf9771c30e44dce004fafe2a7be389', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd4d1fcf7958b4587609dd81e18c60f02', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x49d44a26db6e76ef26015ef22305802e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbab69182f74a2bf23ee1860981ec4cff', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4e23eac553252243708ed985fc56f316', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf93ced9aed05e1b6924a7e30d59f50da', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x568c8091283f1651b6ff57f061d8c18e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x91abffa8f2c2f551ccbc720dccab53f2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1911a68437609990d7ceff62012d7082', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x51312eeb3c6c1a729cf4030feee4309a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfa499465c778cbbc4a01bfd65199f77b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xab5a430d9f40ca8215cbf647de8ff088', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb1b61b18894d4a7feec64b30f55b5528', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa6cd1e21bd7cab7bf966b50c3466f0ea', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbc8dbf7df4e42c602ead42f010a49fd8', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe254466430f51a9d3377e81b6a831cf2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb5c2a2c90e03c594f3d7fad793e5e320', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9bf6e98fb1835d53d193a647300561aa', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x549925c7a5b8cbb59ba7e47c1923103c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdab7a50b555c56f8dda42e21aa63ced4', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb03ae248e5e2c51b34751f1f3102d536', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfde94ebb14d942f3783be4f45c9ca22a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb5e7a13ce53024a6ae2d6bfd6e2d5f79', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xba658fb2c32c4032667b154013070abe', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x297ebde977c8568e8c0173f8fa60ed20', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd0ac510c0287230836e0e2093e308f4b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x10444c8b8660c0f86485edf7e53b52fa', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x182312f69e4028fdb6ea217dc99c1282', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbc9bb01ee3116e94952df76ce0a2cf5f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x92ce8f5a453bfc313273c2cc0c0dcba0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe7cb9b32f12f6c47e09d6ba69cc24b72', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfb9844b69884c63bc9cb1a1185398c1a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcd1c50285ad0636755de428ba581b4bb', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0fe9e15b3400e332a1e51ff786d8a4e7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1a682ec14600cfba3d39333ed2df0963', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xad71e0a5091ea2c4e6e56d943dc06fb5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfb937c26d7f2dd25cca4260b41c0a3ad', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3d65ad29df076789584f6581a86e2c46', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe0f659ca1c17425a5bf0cef03d25b5b8', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this re[...];
Date: 2023-07-04 18:39:02 Duration: 1s717ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\xe5165fe670f2d04c4dec773992351c51', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9f1f8a3a88c48b5f44258f8c26f99e28', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb35dda01b0af869f65a456d2f29e3b3a', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x52c25d530e506562d2676077a2453ee2', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x043264f7ed30000fe9c69053358554ff', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x682516ff8774d174eba98dcd05b55f80', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xab4878d9cdbdd041023b1565dd7db92c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x829721a98cb3e8575e15027a97342a90', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x984819d939899bb4086114e3e8790a71', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe02adabe99ae476b6989215687ec4301', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x04bbbc1e0073fdab8ad6d1976ce29964', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4937bd974ab364e79338ce674599f50d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa29520292db1aeb3397cb60433817238', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5490befeec3c150cc3025ceebc2f7680', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd1101ecbbbd193a4c986beedc20af5d6', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8c775e0f809dff12af0146ac1b86d056', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x42d5c1b3d245ccbc9cfff8134444a572', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf78dbae83b2ac68d6481bd53967d463e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe9d3246af4ac4408fe29d160b8714c19', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8eae24d0a28c07e8a39b270f261d3386', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf954acaceab29c181aca7ebdf4fc42ba', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1c05dc47c378d0515d99686deb1b1469', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdf3b138b41ec123d1153fc67713f53cc', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfeaeb146b6cbbdc37097b0dc84e195b7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1659a748ffcb0cbd789a966e692b2e42', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x10534f70132aa95af4a623ff30cde2fd', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x708852da43ac64b90c1ade0822cdb7c1', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x12c868b216fa38f2206c09957070ba63', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x48294a923feea98577044dbd1babd60e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4899dca85e78682b238e29ae722e9fb3', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x04d08d1f88cb9276bb84e142b33a1040', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x625ce6c34406415882f6c8b243be6337', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0ce93eb7da8e46ee77e53e01cbd57b65', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x836dbd39efa4d454f10a7c0fa624eaa1', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x284d592563ceb1b2e595ca19cc428c7b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x849c79f54cb8a67d7c818ff2ae66cdc4', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x72adab57344c15525938aff1a8bde3ee', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdbfb77060ddb2313a1d9cf8fb0ef996e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x96188d75b1636b5b91cbe10aeb2cf5d5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7693b557be7635a70ba8449d70272dff', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x70d35ccaa7fad488590bfe0062e8e08f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfe49e5b8e991bba528616603989572f3', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa60869327693f12f67cb36c7c068dbc5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc33f4bd75ceb22a347e0edb34e334752', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9d68408e8e87549285928e64b456aa72', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x16451d43f9aa60b7836e5c792ac69b36', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5c6e1da59233aff806b7325bcdb75aaa', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x73bb70131f031593fcca5161a1f7e6dc', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xde091fb3f19d91eb71aa914912254692', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa2807190edb319fd7d8ae41f5912c801', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x74f34267f7a7b9d4b64c47685c69d420', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc612149eef36343300dce0871c8d20e6', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcc6987830697b6cb2a3eda513eca17ce', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x15f72eb077f1a55db876365c027c2b0a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfde6b92ca76e42b48aa873baaef7162e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0c0be27aaef88c6979e5c211bc2d0615', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x91040ce006b55634c1ea14a9defb377b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x30b1b4d0d981cef9f685a43a2d0097a1', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x85520a646d5f7aa7dc538bdcee022dd9', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8abd4b8bf533f305b99ecf80ee6db9d2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa7ab7db870e3a45750d2d4527afefbf1', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf71147d8f634ebfd852037e9406e2798', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6d50ae33668b3c35cb39ed09150ec4dd', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x41979dc1abd0dc6af262ba7a1e8fffd6', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1b480c676c22f69073b59ae827b9eb76', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9e8a441a1a2abe9d73493a3b92788458', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3ad964dfc4af0c2d9298d628eb35ffda', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1eb9d2951db08bb3048e18dda16189da', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd1b74bf3bd83cec896eddb1b161cbd8e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4b3152368510e39c3af9d9696ba9e94a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4e8ce65294d1ae804d4400bacb071334', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0014f99dab02b1b1c77c9f95124fdaa1', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd19e1c94a233f2c1304e957bd31ed805', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6070e215c5053246ab2863ceded65959', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x342b71c8c0c0f662c5ed68c8052d1db1', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0af617a3b031cf60b0c73dfcd840f983', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdd76b105961e435241a547b958e21c52', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xefdc450ae0bec8ea041e216ae80c305c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x26cac7e14f5c1734045d5d6e07bc0dc7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x545a6decc9141384bb954fe7b9effdde', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4ce34a06832a1de0dcdf8a409efe700d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xca337f9c5accb0cfc151c1d616522df4', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe10d9bdb7ca0a59ff0ff718ddddd9244', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3c825d8207ec8906fd3d06cb548efa49', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1be4bfc3f792316ecdd60cc64fd10b17', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe7d9bf41f5cbac2b0d19e836462c7865', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x55c559ae637f47819d0f6e918d0668bb', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x83eb7c1a4884005c5c36e0792dbe66c3', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x354198153f289edcd1f6973a30f776ae', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc1f2d056bb50d80d3a32a17a53877e45', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb9d210579fcb48cd6db1a00a51e0baea', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf2b3ca93d3c7c194bef0e9bde19503fa', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x89e9c329f5817285fc6d248b50cf6a9e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2ab316b860c7e22ae7b2751a0e28602c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc2dea2d4f0033869661bde08d9a0ac44', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1653692cae3ebd1a6ec3cbe474a32b55', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8d8faab31b47a407fadce9d4b3a34bc2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x66b0bdc8ff9fbd6b88ab0b3bc3a643bb', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4316430059f2eccb1872c9e8fd93faba', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3537e738869e89fb98ec04ed31baca26', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this re[...];
Date: 2023-07-04 18:36:31 Duration: 619ms Bind query: yes
14 9s150ms 1 9s150ms 9s150ms 9s150ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, xfdd28b6fe7bee1632b24dc8e9ed[...];Times Reported Time consuming queries #14
Day Hour Count Duration Avg duration Jul 04 14 1 9s150ms 9s150ms -
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x41157a171274e8fac6ce5a78162eff13', 'RHBA-2011:1656: mod_nss bug fix update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The mod_nss module provides strong cryptography for the Apache HTTP Server via the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, using the Network Security Services (NSS) security library. Users of mod_nss are advised to upgrade to this updated package, which fixes these bugs.', '2011-12-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2011:1656 https://access.redhat.com/security/cve/CVE-2011-4973', 'Moderate', 'Medium', 'mod_nss', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.0.8-13.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x799a0d4aeaf0d1542c38453f7e8637b0', 'RHBA-2012:0763: glibc bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Users of glibc are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0763 https://access.redhat.com/security/cve/CVE-2012-6686', 'Moderate', 'Medium', 'glibc', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.12-1.80.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa456872337872ba24f1f1eff474ae6b0', 'RHBA-2012:0763: glibc bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Users of glibc are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0763 https://access.redhat.com/security/cve/CVE-2012-6686', 'Moderate', 'Medium', 'glibc-common', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.12-1.80.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x816835af9b6e486a97961836e8b5691a', 'RHBA-2012:0763: glibc bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Users of glibc are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0763 https://access.redhat.com/security/cve/CVE-2012-6686', 'Moderate', 'Medium', 'glibc-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.12-1.80.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x26ce31750df85faf81d839f65bffc35e', 'RHBA-2012:0763: glibc bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Users of glibc are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0763 https://access.redhat.com/security/cve/CVE-2012-6686', 'Moderate', 'Medium', 'glibc-headers', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.12-1.80.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9efd7fb83d629d1b5b680134c26b1487', 'RHBA-2012:0763: glibc bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Users of glibc are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0763 https://access.redhat.com/security/cve/CVE-2012-6686', 'Moderate', 'Medium', 'glibc-static', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.12-1.80.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x51f404f8c8cf8d6481c1b61b933da0fd', 'RHBA-2012:0763: glibc bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Users of glibc are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0763 https://access.redhat.com/security/cve/CVE-2012-6686', 'Moderate', 'Medium', 'glibc-utils', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.12-1.80.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa1908b5da9ca7d9273907984fc15ed78', 'RHBA-2012:0763: glibc bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Users of glibc are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0763 https://access.redhat.com/security/cve/CVE-2012-6686', 'Moderate', 'Medium', 'nscd', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.12-1.80.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x396106a9cff1009cc7f9392c7d28948b', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x88d4cf3b9f17bc6bc355e79dd2b4fb21', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius-krb5', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4b950d0e56f65a2fd994043f5370c719', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius-ldap', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4d0c578be9c44766e94c25736f4b6311', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius-mysql', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7de219ae488f0a7dde11f137814e0d7d', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius-perl', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5e965282cde7612f9ec06e674cb2807f', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius-postgresql', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2798d1aa389778d825fe4a12cfcd043c', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius-python', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x830b0c2a3a1e0de572a9c3ff54a4f297', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius-unixODBC', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9215b3749993f5cc1264dce92a82f5bf', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius-utils', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x20abf00c601382b0b9c9738110c01cab', 'RHBA-2013:0363: sudo bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The sudo (super user do) utility allows system administrators to give certain users the ability to run commands as root. Users of sudo are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2013-02-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:0363 https://access.redhat.com/security/cve/CVE-2013-1776', 'Low', 'Low', 'sudo', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.8.6p3-7.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa068cd200d007af8c688aa0b6401bad3', 'RHBA-2013:0363: sudo bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The sudo (super user do) utility allows system administrators to give certain users the ability to run commands as root. Users of sudo are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2013-02-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:0363 https://access.redhat.com/security/cve/CVE-2013-1776', 'Low', 'Low', 'sudo-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.8.6p3-7.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6045b7931286bb5cb5ba0f7958ff47e2', 'RHBA-2013:0386: tuned bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'The tuned packages contain a daemon that tunes system settings dynamically. It does so by monitoring the usage of several system components periodically. Users of tuned are advised to upgrade to these updated packages, which fix these bugs.', '2013-02-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:0386 https://access.redhat.com/security/cve/CVE-2012-6136', 'Low', 'Low', 'tuned', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.2.19-11.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x30c7a6fb6fdb77515fe2b10ad8ebe5fe', 'RHBA-2013:0386: tuned bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'The tuned packages contain a daemon that tunes system settings dynamically. It does so by monitoring the usage of several system components periodically. Users of tuned are advised to upgrade to these updated packages, which fix these bugs.', '2013-02-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:0386 https://access.redhat.com/security/cve/CVE-2012-6136', 'Low', 'Low', 'tuned-utils', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.2.19-11.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3a383ff12ad607c1d128668f52eb5ccf', 'RHBA-2013:1581: libvirt bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. All libvirt users are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1581 https://access.redhat.com/security/cve/CVE-2013-7336', 'Moderate', 'Medium', 'libvirt', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.10.2-29.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xde78cdd48efcdb8d9aea1e8b3413d44e', 'RHBA-2013:1581: libvirt bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. All libvirt users are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1581 https://access.redhat.com/security/cve/CVE-2013-7336', 'Moderate', 'Medium', 'libvirt-client', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.10.2-29.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x054820ad542f7c67c9a2d6e36f7ca6dd', 'RHBA-2013:1581: libvirt bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. All libvirt users are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1581 https://access.redhat.com/security/cve/CVE-2013-7336', 'Moderate', 'Medium', 'libvirt-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.10.2-29.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa63421c39095cb9f6ff4af787231ec55', 'RHBA-2013:1581: libvirt bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. All libvirt users are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1581 https://access.redhat.com/security/cve/CVE-2013-7336', 'Moderate', 'Medium', 'libvirt-lock-sanlock', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.10.2-29.el6', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x1acd1ff51cc512f366568409b4f35507', 'RHBA-2013:1581: libvirt bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. All libvirt users are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1581 https://access.redhat.com/security/cve/CVE-2013-7336', 'Moderate', 'Medium', 'libvirt-python', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.10.2-29.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd65befbb633a9c2a6d9cde057823926e', 'RHBA-2013:1647: mysql bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Users of mysql are advised to upgrade to these updated packages, which fix these bugs. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1647 https://access.redhat.com/security/cve/CVE-2013-1861 https://access.redhat.com/security/cve/CVE-2013-3802 https://access.redhat.com/security/cve/CVE-2013-3804 https://access.redhat.com/security/cve/CVE-2013-3839', 'Low', 'Low', 'mysql', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:5.1.71-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4cb8f61e667f6d8c94bf847c6d0cc542', 'RHBA-2013:1647: mysql bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Users of mysql are advised to upgrade to these updated packages, which fix these bugs. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1647 https://access.redhat.com/security/cve/CVE-2013-1861 https://access.redhat.com/security/cve/CVE-2013-3802 https://access.redhat.com/security/cve/CVE-2013-3804 https://access.redhat.com/security/cve/CVE-2013-3839', 'Low', 'Low', 'mysql-bench', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:5.1.71-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x04a56c11be15b9a037c63c02a3740085', 'RHBA-2013:1647: mysql bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Users of mysql are advised to upgrade to these updated packages, which fix these bugs. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1647 https://access.redhat.com/security/cve/CVE-2013-1861 https://access.redhat.com/security/cve/CVE-2013-3802 https://access.redhat.com/security/cve/CVE-2013-3804 https://access.redhat.com/security/cve/CVE-2013-3839', 'Low', 'Low', 'mysql-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:5.1.71-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8d5f5aee6922f0358b1ccdfe4764edd0', 'RHBA-2013:1647: mysql bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Users of mysql are advised to upgrade to these updated packages, which fix these bugs. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1647 https://access.redhat.com/security/cve/CVE-2013-1861 https://access.redhat.com/security/cve/CVE-2013-3802 https://access.redhat.com/security/cve/CVE-2013-3804 https://access.redhat.com/security/cve/CVE-2013-3839', 'Low', 'Low', 'mysql-embedded', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:5.1.71-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc2e84030432128900c5d6c44bd06205c', 'RHBA-2013:1647: mysql bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Users of mysql are advised to upgrade to these updated packages, which fix these bugs. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1647 https://access.redhat.com/security/cve/CVE-2013-1861 https://access.redhat.com/security/cve/CVE-2013-3802 https://access.redhat.com/security/cve/CVE-2013-3804 https://access.redhat.com/security/cve/CVE-2013-3839', 'Low', 'Low', 'mysql-embedded-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:5.1.71-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x50d9d9c3a6138108ed54657a124d68dc', 'RHBA-2013:1647: mysql bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Users of mysql are advised to upgrade to these updated packages, which fix these bugs. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1647 https://access.redhat.com/security/cve/CVE-2013-1861 https://access.redhat.com/security/cve/CVE-2013-3802 https://access.redhat.com/security/cve/CVE-2013-3804 https://access.redhat.com/security/cve/CVE-2013-3839', 'Low', 'Low', 'mysql-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:5.1.71-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe3e1f75a35fce4aa37da1a5838095aa5', 'RHBA-2013:1647: mysql bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Users of mysql are advised to upgrade to these updated packages, which fix these bugs. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1647 https://access.redhat.com/security/cve/CVE-2013-1861 https://access.redhat.com/security/cve/CVE-2013-3802 https://access.redhat.com/security/cve/CVE-2013-3804 https://access.redhat.com/security/cve/CVE-2013-3839', 'Low', 'Low', 'mysql-server', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:5.1.71-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x169302cc1b283ce47a8367f7de5cbcc6', 'RHBA-2013:1647: mysql bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Users of mysql are advised to upgrade to these updated packages, which fix these bugs. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1647 https://access.redhat.com/security/cve/CVE-2013-1861 https://access.redhat.com/security/cve/CVE-2013-3802 https://access.redhat.com/security/cve/CVE-2013-3804 https://access.redhat.com/security/cve/CVE-2013-3839', 'Low', 'Low', 'mysql-test', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:5.1.71-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x45ae3e2cd2e113387adad634efc75e91', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaa1c58d9deb9934a1b7986ca96f5ae57', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf67f9cd3c28788e62aa1c9c1ede7abe1', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-python', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x853843d7a21ccbc399e5adb3186c429d', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5c2398ce1d9644d31b06366e3c896612', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa7f38b4786dd2a6fb8bc10acb0adc089', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x83e040fe16777f5e6dabd3f7d3c5ec4f', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x04e4117c50dd71ea0d14666a1af131a0', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-python', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfd90d72126780f1accea5444d66a3c6b', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'python-sssdconfig', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xaf683900a75f13813f0070dcf31382ad', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe58a2b67dc0fd4c5b4609082bed68f0e', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ad', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x099c172af092cf0b766296d51502df93', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-client', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0392e58d33ef04596c940db5e98791c5', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9a0459090b4ec6757e1d4493390030c6', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common-pac', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe392e73cbffcf18c20a3f30ad7b73017', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-dbus', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9cb15afbc90ab7d7e0e9697c77588f9a', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ipa', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x36472032fee359804f56fb2fe4c6d4c6', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8c0ff7ef11f94616eda2454742282d4d', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5-common', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x21b19c396aa4f68b334658d82b8a33ce', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ldap', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9321d8ccea0b96c851dc8fefd3111092', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-proxy', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd2faa7885b921f87aee20500e1cd1d33', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-tools', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf1329e8b52de92f4706521d9791c24f6', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xcb-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.6-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcbda7ba591ccd03a1c2b1b0f3055db86', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xcb-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.6-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x801f97e71a38e4acd76973702970fe8c', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-acecad', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.5.0-7.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x92e40c14de13d684cc6d46bae9a42785', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-aiptek', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.4.1-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd48cabb575cdcada3529e4421584d516', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-ast', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.98.0-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa8ccaa8547f7f21a831333a42505d396', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-elographics', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.4.1-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8f4b3e16475a32a9c6351f6e0ffbbad7', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-dummy', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.6-15.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x175dff9435342ca7cbabd27324ba8f61', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-fpit', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.4.0-6.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xba883a027094194ddf6400dbe43ba3ec', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-hyperpen', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.4.1-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa8d3c2972e3c29ac346939c192d57283', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-geode', '', '', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.11.15-1.el6', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xd8ae1e065f7490407f4612d436323b07', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-keyboard', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.8.0-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x08da45f9a082395d2723a6799dee610c', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-mouse', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.9.0-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1951153acc78849ca41c7b1b172b698f', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-mouse-devel', '', '', 'i686|ppc|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.9.0-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xffc33b98c65d6cf799f06c03eda0a4c4', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-mutouch', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.3.0-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4dbd7dfec8f8616749fef9f712c5f83d', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-neomagic', '', '', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.2.7-7.el6', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xa2d38ab84e42deb1775116261b28d22b', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-nouveau', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '1:1.0.10-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x64d491e1595a716e85c419299da01820', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-penmount', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.5.0-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb7dbf849b4c017c0bf47ca2120799c8e', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-nv', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.20-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xde0a95db5594f902439b4142ddca97a3', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-openchrome', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.3-6.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa817e1a9d8a85f16836f4f2b83d6d629', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-openchrome-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.3-6.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x14d3ad68f58459af5c2897a5891148fc', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-void', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.4.0-23.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9fa495272dde3383ae175d322f686572', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'libpciaccess', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.13.3-0.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7a5a858a46b7c08691faf47654c482a9', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'libpciaccess-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.13.3-0.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5b1220e9f67e20ee30a662be9c881a4f', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'libwacom', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.8-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2d558a85865c4bc9e22b5b3a40bc0f42', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'libwacom-data', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.8-1.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4b447c558302a5bd28c9b4c0538fda9e', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'libwacom-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.8-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1ce03d115f8c668ce73d5721083badf4', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-apm', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.2.5-10.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf2074d055d34d778fad8310edc08b498', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-cirrus', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.5.2-2.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb2c8645cb86c62865e9cf6ca2aebf20a', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-i128', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.3.6-10.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2baebe5744d4fdfe6f5d9aff78224bc7', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-mach64', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:6.9.4-8.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x13ae1a39fc77099ec39bfcaac248685b', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-rendition', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:4.2.5-10.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdd085b9a107258cc39461a24723b60ac', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-sis', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.10.7-10.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x51cda96874bf42ac75405f718b7075fe', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-savage', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.3.7-2.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7b354f45e4a1c776ffda9e3cf5b51af4', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-sisusb', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.9.6-10.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x950c777a4774e06e7b964b135623bfde', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-trident', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.3.6-10.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc47b2a93b7f353bd3a0b94b7abd3d131', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-s3virge', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.10.6-10.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb89e4387dc5aa5c778b82b3d1e5d7c4b', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-voodoo', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.2.5-10.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4409d6544c809e5094d93ae254f4f076', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-siliconmotion', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.7.7-9.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdb5ec79c486729abf4d1b670ad1c2821', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-vesa', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.3.2-15.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7864ac35e910c6ca205f2e6418b239bb', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'mesa-private-llvm', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:3.4-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa985af3c6c54bba8df23da96d74110c6', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'mesa-private-llvm-devel', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:3.4-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x82d12acc4a8a32b0924e15744837af79', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-v4l', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.2.0-36.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x96d250a1ad5b060accfbb0062852a669', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'pixman', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.32.4-4.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x820d053afafe65292d21ad550c60ef96', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'pixman-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.32.4-4.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcf98c33d1954feae066ba5470756555f', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-modesetting', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.8.0-14.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4e64546f8088c29626c6fc466ae27ee0', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-ati', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:7.3.99-2.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x95f495cef03eb867d98b3304eb17f94a', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-ati-firmware', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:7.3.99-2.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd681ce9b2c86448d46456fe6babaee16', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-synaptics', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.7.6-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9cea5c7b54671395272630f3c4859700', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-synaptics-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.7.6-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xed2dc6a0ad4ff904a49745464c579a8e', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xcb-util-image', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.9-4.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa1e882b085d4b238be213368b31155e4', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xcb-util-image-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.9-4.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xac6a20e97838b8cdfc81d6c8d93af33d', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xcb-util-keysyms', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.9-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa3890dc20012b9a70b63aa1af2ecb076', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xcb-util-keysyms-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.9-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xffa068fd31aa0372d2a17ee739f37bd3', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xcb-util-wm', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.9-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdd92824d76a80021ee00171540c3b1f5', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xcb-util-wm-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.9-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb2b318a906dd9b4e28682e648db22ab8', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-glamor', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.6.0-5.20140506gitf78901e.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x80b72511a954089b43f9f689d41d4800', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-glamor-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.6.0-5.20140506gitf78901e.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcf8b2c17f8abd256ac82035e0129c20a', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'libdrm', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.4.52-4.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcbe2c36e0a92f50a4111033a4dbbd42b', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'libdrm-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.4.52-4.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8d6ff2fc91117abd4b2d1be9d30b39b7', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-wacom', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.23.0-4.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0a472f0ea21aba7b0966631501abe9c1', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-wacom-devel', '', '', 'i686|ppc|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.23.0-4.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x68d84509bc9e6f5f1365bb72bb3bb216', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'glx-utils', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:10.1.2-2.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x14955f0a46bbf4184316ad0abd67acb0', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'mesa-demos', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:10.1.2-2.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfdd28b6fe7bee1632b24dc8e9ed[...];
Date: 2023-07-04 18:39:53 Duration: 9s150ms Bind query: yes
15 8s946ms 2 3s201ms 5s744ms 4s473ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?,[...];Times Reported Time consuming queries #15
Day Hour Count Duration Avg duration Jul 04 14 2 8s946ms 4s473ms -
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x1b66e4f92db3b477ba506601e2f8226c', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'runc', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:1.0.0-66.rc10.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x14ae0d56eec7764aff15dfbd0e0fd928', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'runc', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:1.0.0-66.rc10.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xafc011088732e6f38a6f2de2be690140', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'runc', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.0.0-66.rc10.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc47dab2d3cba92b602f6586da0bf6d26', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'runc', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.0.0-66.rc10.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb0c5455f423ddb221157edccc60e0c22', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf9fea878de430760dfd41553e003d629', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x25508bc62107c696d20647575b03c51a', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x04ccb098e59eb31f720d7345eaebaf12', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x841988463295fc3b1657828d8eaf4515', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x447998fe1e0a500d2df59da689ab6a8e', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0469a0cd207d92058ce2786afc851f45', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x256a96c6cbb7bb4bcee94059dde97e92', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x41a7250839cf724584c70c3f8349cce3', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb9f577f227cf88eac6a502e96713ced0', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc56515421696d16d8d232bf8f2073b53', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc5502258c450866b7bfabcd45938ae36', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xae5e77c264f7572564758656ee927120', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe9ea906cb5ce92c6dea26a8c7cf8b124', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa30e86f1d5595bbc9c9a2d95bd3430d2', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x47ecb116c9a0ba9ac4121370e14d4602', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd466e6b1983849d19f84220e212f479d', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x18599da79106ec8e1b6629e0ecd0d649', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x87494b0ff35f7b10ae6bd8b49e58c7f5', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd5972d4f3c596c7d5614554dcfc66941', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbdf810ade722c2a65a1f05b084136583', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x852f7afc39013e3f35da4685ed46b078', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8dab544424f2aa83e0c4a0a48c7f2fcd', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa04555a12b760d7f287c70a945ee616c', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3e9ad624bf18e88afe34869a41ef9b0d', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x33c0b4a06ec1287f4242fb340b976dc8', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf057b6e3c201e691b4bc0212979a44bd', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd47d14abada8bcee624c47a6ad1f0881', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf2135ed481c3b80a118171a3b21e5a2c', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf82205ad61fc025c403fd69d84da6565', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x062b3a801b5887a923b6994cf275509d', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3ec59e2b0b32504433c5fc6918c7e4c0', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x89ab38bde53be7191877e8dcffcee948', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc95cea9a7e7c102c54a31fcc1ce7c2b7', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x91ea7a7fdbe5723d8cf4191c706d315c', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa8565cb21e1ac5a5a87f4a85553fdeb0', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x92f58708f7a870b2de177547bcd979a5', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8c54534a90935e94b01f011b24dddeca', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb2fbc8e65c6f266805679eaa3394c501', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2a3d4e4c797b698723ff555840ce6e01', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5b23e42d66c28eb83f03bdfd802cd9ae', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb5ef45e85ffa4fd87571b3659510ca1c', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x169fcb4b93f2d01b93e6d84b36919f37', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6fb49815df0de529b0007e799207366c', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x73b65b50bbce373f168957240b8b6dba', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe0690c6812e972759a6c03cbbc85d48d', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5c035fc3b2a4754fcad283a13991e83b', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x91af7c1ce8555b0906b36aaffdda494e', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa5d913f13998915a214690ebb718224f', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x69c5c44d291949b2286b362cef4503c6', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2fb998a63a47ac71226b0cc1799c92d4', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe85d18e580d0332edc8ccbf3ead5f86a', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x01c1d63d152954c7a50beacbb0795383', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8fa3b0a3c29804ea55f1ded4fa4f64d0', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf151ca965caf3d57d7ad7a2936369ec1', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1760b26e88a9115eb70e63a79958e5db', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3ca8072dc440e1934e4c6dbed3be0a92', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x14039779abeb01d75c0616e5adfa56b8', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x05c0f41a7705ed2d1e7c1cc25e7de2b0', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xff5196cbe4eb0eb6ba40148e45d457ec', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd86df5264122348fb18173b5aa7d8246', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9db8dac5432ae09e5e8af329aedf5812', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6fbd80fb345c07dd199c73aca79d3c92', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa1a8261598b88c9dfcd8c24804dc1348', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa8fdec44f521b202577973849462c1f7', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x44db947d0307bc30d945b3def880f187', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xae2270d6ed7f14727ad2eb294f1132ae', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8fc5f51ff13e6d5e4a088197979f029b', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb4fed5cc96b0766b1fbee56e29d0dea5', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x872af110342d1e55b3acd487860ad7e9', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xef1f825f3a0f4aa1884915127284bc8e', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x46243b778601cbfaf9ce1ebb68ce13e3', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa47f0608c72b3795a2dd285dc6ead6e1', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3cf3ad6063f1db41d7f96e5e8594a8b9', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xac42ad63ffd69caab7d53f3efec5a85c', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x45eb9d336f192fc430119854236e9805', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x395c90ab3125486aa60dfd322f451564', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa073d7f0843294cadf1a95fcecef0884', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8eb73d6f1cb9120bdbe4962557706738', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd9e9a67bddfbdb54f516801d27b75884', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb9803c3de4b0f3c30b53e9f2a7964520', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcfd47b9dd46a6aa016a7dd3fab3d6256', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf7c118a5578f9893975aba3c3b751457', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5e4e200468642567dbfd74c1df93495a', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x034356bddec42415f28dbeb45c261a15', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcb4aeffcfe3fd96abd0118bb1acab48a', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9da7a31aa2c910cae61a9dd00da6f3db', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe2263eacf56cab4dc6bd9bfdbd602256', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8d1bbf9920273a75157ded1b10713bcc', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf36de214c74d011698ee20433c8fdc58', 'RHSA-2022:1643: xmlrpc-c security update (Important)',[...];
Date: 2023-07-04 18:38:24 Duration: 5s744ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x9996e87ee4a6565b3afb5983c96987ac', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'runc', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.0.0-66.rc10.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8e1d4d28776dc082226d036fc5438dbf', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'runc', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.0.0-66.rc10.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1515ff20b97b70c291a5dd5a9f3a3952', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'runc', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.0.0-66.rc10.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x84b199b7a944777e36a8b1f8eff05e71', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'runc', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.0.0-66.rc10.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x98e65d9b1e8005a1a12e06192d452f8b', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe467fe38a00ae419dd6c248966f007fc', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x165708e83ee28c736c9422383f59cd02', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4a7a6cd61c789c917a621e343df7c944', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd806b918437a765152d4de1b7c074ad0', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x240176b693b76673cb18f70d0705beb7', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4b3b38097703f932a257bb07d00661ca', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x77f5f1e7c058835be3e03e6977ac8889', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2ae0b93d31c065776f4bc599934b0c7d', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1ca0db88909c7af7cac20ed209c6d576', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x74dafb8c7360273fa2c75faae6b75076', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd4c952bf27dfe99b8f997e154aeb0971', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfdb18ef511c98e4221e2346fea4e13cb', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x02c8977d86c22502689b50cfcca0e31b', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1c8c6ae52b3c82673cc69fb7b27e5a02', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe8eb365e4711f0ccb50e25b6634d9c0b', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa17dc3493f87cb78226e35057611b2c3', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x22ab93710ffe7506e2bcec7847643164', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3b6b0dfe772e033c404cd85a3d309b18', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3dd9e11abe4cba3af4d2a10cdcda1662', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc7d0f407ca720abd1013188f622583e6', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3db88c6e74943cf2da8401047a1e015b', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb96c061a7f4b7daace5ae15f8cd929fb', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x52604782d3bcb8f6b4af4d7d13f34315', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x213ed5aa2615aedb6d35f8ccca49434a', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe81a8dbfeb98beba7ebbc87c1a174dd7', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa6f4428c9a34b63e80c44ebf5e6b9ff9', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcd954a6bfd87bf3f3a7e6d183d58c037', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x815b512eda06738aa1cfa57e9490eaab', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xed8a948b1509b780e524b1cbf40de789', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8a4fd3e4a2b82101c314b883375f537d', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa74f6f866a60ee181524c505c9b5ddd2', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf6882cb82c841d776486fb43c3bf69e8', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb8dadacbfb96accb519a31ea9689890d', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdc68d7e71998ef348532a0dfe3c0bf1b', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf8dff8f866b826aa2bcb4939c4bc283d', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd42b2e5f8d28abfc98fa53421d7fdee3', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4f04a1e3c9353389b64afad7fc0d4a0c', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7edd97d126669e2891b245df71500d3b', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4785fac035164d6c919c245d2a3f08fa', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4b8dcc88a4b7888135e669010748c79d', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x76a5e2aec26379786242a867b2e1c535', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x18927e2a999e5fa9bf5ff798f27b99ae', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6e5338dccd43033325b91e9de42c2068', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x60546e7988246cc008a5e5ae22661285', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x144258535c35f034ce05e6475b11e370', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8d973ed212c3799babae3c9992b5c47f', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x823160ea2b25c87c505fd9c634e6c327', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5e97ac893f19051ab996f2b54a9f83cf', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb9e7402276b2fe2d505ffa6a3d7e572e', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa747ff3a35c1daf094f4e5003df9a5d0', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd293729d84117a69b374d81297c57df3', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x315449260e9a6baa295bc0e1f4a503f6', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x393a7c07da47e64226018d04d2ca152a', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7540ca97734d15e2797fc33ea65c1bf2', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd000267fb296db62a28c559e8411b36c', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7962b482d844d7fe7918bf6f7cc0939a', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd9768e94359bbf5f4f2e9c54c2e85928', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfe43d5ac8be4b3185cc2b0260f1eeb03', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x459764739e42c54dad1506b03da7454d', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2c28dbd425ddf4cf3e7b928a574bf986', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf28c3ecbaf9a4d505b5e9dbd4bb06dc1', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x80677f1f6bb85ee24b9b3b89e9faf8cc', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x12ba9c592c7cf4eb1373aa3428fbbee8', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xed1053a1c2dfd176ff8efbd886510230', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe19bdaa0850b3b6ad8419a5125187330', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdda4cd549199156a7108ae4aa11a1c0d', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd881cb689b83e0eebb15af62d81ac6ef', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x517c375d2e2af6383e4a0c2607a61af9', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0aec5ab6b0f186f6dc9ef8a70ba6db13', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x53901d2cd1adeb8c65f2df4289751cd5', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd837e565afae9a0ee7aa3478c204485e', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x700aa80ca132480afad1aa78d8b0c8d0', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x825d388602d24a836a4be3a0888500d5', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8c12681fcd0997d3959809cfc373e7f7', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4ce2882ef68b2550808968dc14e385c9', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xed6139546e6b3ae6cdd28623cdbc5966', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0cf1b347915df9013fad88b57c7b3200', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5db7082838c8e6adcb7ab90b99855a75', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3210d6b26318dbb1b6a4497a73c77f38', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4aad6dddd46075e9586a97f6d33cecfe', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfa802d52dda048882bc63ee56c1f1ebe', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9aa29b6021840868d936a1895fcb86f5', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x278aff96ad01a5d368498cfb033649ba', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x71bd6fddaf59d3962b57eaf6dc14d44f', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x45b6f6fbc7a8afb55bf555e25e357fee', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7dd3b0f9a7e4cc979e0b194e889900ed', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb04b7ec4862fef8acdf6d08bdba5a403', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xec882d995ba186debb0a1e172d2993a9', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x889c4317d544f77c57b814ec89cbe37f', 'RHSA-2022:1643: xmlrpc-c security update (Important)',[...];
Date: 2023-07-04 18:48:19 Duration: 3s201ms Bind query: yes
16 8s895ms 5 256ms 5s970ms 1s779ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, mode[...];Times Reported Time consuming queries #16
Day Hour Count Duration Avg duration Jul 04 14 5 8s895ms 1s779ms -
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x92e17e25a20d03222beb21c043f230af', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-gphoto2', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb14c5b756923093d4fd2f2b57b939f99', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-gphoto2', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x66309918eb0aa5c4befc56ccadb8ddbf', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-gphoto2', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd552b9eaa131b92e2e36c20d301b0630', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-gphoto2', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb0e17b5968f8d174ac91edbc2fd1ecec', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-gphoto2', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5df5ecac5473bc50ccc3ff77d129a3b7', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-gphoto2', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x63f0d5d5f047678ee3464a0b53373b4e', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-mtp', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x68fb9de1bb12841a4b027e57d6f2a4ed', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-mtp', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd72ed1b5b66fec9b71260789743c3526', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-mtp', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1c8a07cb148d077ad257451bfe19cbc1', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-mtp', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x230a9159918f1625855220a62337d06a', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-mtp', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4d73190689f40a889ffc1e60d55c0944', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-mtp', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbcf81e56ed2857acc5ae97600b3570dc', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-mtp', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb31be1e7d7452644690a173cc8b9545a', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-smb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5d1baab98fbc63aa57a8599eb6598ad6', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-smb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe95d14e8ef8f1e4abbc8ab351638f5cf', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-smb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe585f31ed096a6ee59c1e37717713e87', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-smb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfb841d04cbb061b78a55f689dd129859', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-smb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x192865b114d531005c7eb1b0493a0091', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-smb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0eadc94ecc06fe8c94048384feb0f711', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-smb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x80f3882a8921a9d08e1276700ddd5958', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0f1c97b3522a54b50fc47259b2087148', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6358410a67434ce045c2af45ec4f7c81', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xda1f5c27f52a7d8edd406935f9e6877f', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x89e4c36722c8e236110542a859365d7c', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfbcd586eed5c56b87360877e0f6514c9', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3c8d88cb468cfb7a8bde0887d4ccb126', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x241df4ceb8fcbbe6ba09adb070eba576', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-demo', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5f210ddac819894672e5e18b57e7d560', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-demo', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x809482102d8c1352eef7331a0b3ea855', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-demo', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x950c6c4deccc24fba8cf6a2177d4ce40', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-demo', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x07e3ee2eb74a1c287bdc1ab053aebf22', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-demo', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x51aadbd558702763e893f2009068261b', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-demo', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x688ee8c906c63e22198701804795411e', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-demo', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x412813f43f33974b464a8f5804213242', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x493a72772517687ae9d7ab6297486b67', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfd9155dad4b1191afeb4da1a46ce30f2', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3481ab179ea4fb158eace45065aa5403', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8825955287f4132028ee009453d15844', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6452fb12435a934a32cf6d2df96bd2d4', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xeb57cb9f426aa9d241044842dc831165', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x450a110f7d53df0b06ec11ae085dcfc1', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-headless', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xec908a0da4018b9d53c7a4b62e438bf1', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-headless', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9ca69cbbab2192537531200c3f3165aa', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-headless', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbf2f8240c349844d7eb71526e43b9172', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-headless', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x69e0be8eee6abf3ca3ee18a17783999a', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-headless', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3409e337f01f95e27d8d3959db3e5612', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-headless', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x81c1fb4b49e8ba0c53aea55131d74aff', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-headless', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7e8059994e33d0032f66db7e81a49e3c', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7a53be305f2f3f6346014806fe3d2e0d', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2c142c84265478caf1940a83cdc1a824', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x31297a200a2f5dd19caf3c87649cf21c', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2e70a1c3ee03c131b9a0e27b5de46804', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfadc469a2f74cca3fcdc67c692fb4e78', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x73cddf1cfd6b997674fc78c98f86eb5a', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x444411b3d7a1366bbdbc69786e28b41c', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc-zip', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x810f216c7e5e4d3aa31b8f451d018aea', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc-zip', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5cd062df1dbfc42dc2717362681288a3', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc-zip', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2690d9cd8a717f8daca632b2b3c8b657', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc-zip', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x98e948a079527b1d4ca3292fb53d0a32', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc-zip', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf5241adacf052eb6ddebc96d229ae74e', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc-zip', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x15cac600effc4c3b1f263ad5b29551d9', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc-zip', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8df3d76e695441e1aabcbddb6aecc392', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-jmods', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x34de3437e32f952ffa3cbfb7947ed8f6', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-jmods', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x23ab9228dc9caf2fcac079ad93c10259', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-jmods', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa160635d2f5944e23634df59d1417ea2', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-jmods', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x200885098af2f6630eb7922aa19bc244', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-jmods', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd0fe84a1c0495eb0d7458276096dc11d', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-jmods', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0fe8385c383d2d52ca13aedb600582ba', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-jmods', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcb6d89da60a326e504952c86470723da', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-src', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x98bde1d6639215eec133d252922ab28b', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-src', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x94f4fb762629e2a5cbeadf3e9954725c', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-src', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4c0b968b4a19bcef07df9e5084d5806b', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-src', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb2435b7dbb4ec15cd399165ad3f711a9', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-src', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x799d5c713d5f657b7174ba2b5f6735c3', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-src', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfbe094a7ecd5c652ea2e5b05cd14e8e7', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-src', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x853ad4c5861b156e0963c469a0c20abe', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'go-toolset', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x049b43ed609d6c0806d0450d9c24c3cb', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'go-toolset', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x306775a967ac97220fd78d00b8d4c0ed', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'go-toolset', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x86df4f7d50af1dbcc542a0007e76fb0b', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'go-toolset', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x84f87a2b0c348fce20ae9a1d86b74908', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'go-toolset', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8bc6adf2c6a600f153c2af04a8310cea', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'go-toolset', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3df555c9e952534d701d0e951ca56ead', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'go-toolset', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x95f9deaab7ef4b11590e44a8a9a1837c', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'golang', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x901b4f0accb441ba40ea877ea39397d5', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'golang', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7d35be99a35479606126e91842bfb977', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'golang', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5a18ef4379c8b653c966f3d2db8ce46f', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'golang', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2057a01ee8c988a8d507d5a4d6a6edde', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'golang', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x61a7839bf9e5838f568c6a0349b05959', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'golang', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x03c9e32d0d9a2b6d2664e314128b5bab', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'golang', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5986ff13aafb6b36b192d277bed7a9c3', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'golang-bin', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc5ba8cf0267a07f95da5a51bbebeff9e', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'golang-bin', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf25621753e2b7d73ae59a9ce56aee2db', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'golang-bin', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7a389a990a5288df032c223a945162fa', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'golang-bin', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6e4cfcb0a386801ce991240ab853dad3', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Mode[...];
Date: 2023-07-04 18:39:12 Duration: 5s970ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x99db9d37ff472fb04d2d2b475a80e452', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fa', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa678f0a08fced89b1eb45dbdf0c87863', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fa', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe7abc2a06d56aac1438a7558bfb2787e', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fa', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbeaa4b98b02f2ba7ad32f61530bff74d', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fa', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbd1e6cb463ea156abf93715db7e05c02', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fa', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9ee3b04d187a088f19b34fe60f027998', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x648812237fefb00e1417bc0559c4d5da', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc8f3b96ecac340728b820fb68e1403be', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5d484c3dceecc88e64e3520529d87f24', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4f390de4b343927f84553c0c42752f26', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4d8262e74556f61431998860f26d7ad5', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbfe3013d063d30510680cbed5e5441fc', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0d85ed8d0ed2afea85f46978aa40b650', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x497351f437e7c42ddbc9da49b89499ac', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x879276f2a9483a764e9e99e7b4cf6f2c', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3283e814095dbbc84b85ea825dc8a03d', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ga', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x102d7ef31c2d4ec92df49fd3e5d7fbab', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ga', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x124afae3f99007193923e19ec67fdcc8', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ga', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb2447a4800a25c62ce8bb938fe815f3e', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ga', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x713f88e79fb6db2d97276c130159472f', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ga', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x32158ba337fbe135fc8c5c63ef0d4499', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xce0fecf872dc587be308b963420d7922', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x82c6e5521a603a7db40c4d88467e7979', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3bb5940541fbb7d9a527be5c2bc1b121', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1c35eca874fe8929763ee6369f6db9c4', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf283aebf543a5c98c36d0c81c7adb7a0', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hu', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa89e92ac15b9305bbfb9e2fb33e3ea79', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hu', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x45aa4ccc4865f475ca8b17d11dcf8e04', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hu', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5da6e572e8ce01d2763a816fe95b64a4', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hu', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9b6556f278aab6efe7e3ccfc0a48459f', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hu', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcdee0b96737484c2614082a7f1b799e0', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-is', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf4f874ae7786372db4943cf24fd01da9', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-is', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdda5d9ee5caafd305b25ba83d3a05695', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-is', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xda56734f7571255d4a8dba5c26f3ced0', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-is', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd175fe160b64c169205f2c332b61131c', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-is', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9570c38021464b0477f15e4072fddb12', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-it', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0d9d53323c6bf3c61b503d5e8b6bdd15', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-it', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x690c2b6db3e17402b93ae94c5a46cf80', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-it', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9323b61c37c7aca38bf9a7bf37bdaf7c', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-it', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfffb881a85058b36cfb917a5a001f644', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-it', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0e0029e50ebe91ff41df09df29a8d3c9', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ja', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8948f723048a6ca7b1b5708263064ede', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ja', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x44b8c9ab2ae61baecb370202c7de06ce', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ja', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x264011a443f568ee44d4e31d1f2eb50b', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ja', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xef2f1633a3da3e89d46e64d3b680651f', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ja', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1fff4297500d36e7ce54af6e1da59c40', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ko', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3d9a7efbd2cdbcc2ad2ff37c041a7703', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ko', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x419aa662eaa335d09380eb0b4f823029', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ko', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x60742d2b91bd864b74b101b176dafcad', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ko', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7b5b339e5f769c36994a467442ef3c7e', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ko', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7e643c52918f7e51246808d08b5fcf63', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe7f2f1bd122fb79e6ed94d304655e458', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x78584538d7704907196971fa5ee02b7a', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb8f577a01393808a71b33e42d1ad7aa1', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xead5715d5fd739c9440f366051e197ec', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd8fbf46bf0f52040a113fd2ad6a74655', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf2cb48e465479c2c0861f2ae71e45b48', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdcc9caf165a1ee1e182c464b2596ca8f', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1fc69cb3f5e81fe3fb5023c8b15b118f', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3a60e9238c614349e2fe1903054d3671', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3c034dfe4a62ff62b665c5dba8f3e491', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-mn', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd51699127186b9d8c030dc15e92c9c20', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-mn', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8ac985ccfe4d999ad91e42d6d016d440', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-mn', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfa0b1d28a97a4e1d05c55bec34ae697f', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-mn', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdb0fadcfcc775db12599166e6bcc5bec', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-mn', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x97980a44e8264234e423eda496a146e4', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-nl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x20c0a7865c90ccb76073e6c3b525174f', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-nl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0641ea4ffa4ce3d9117996836977a26b', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-nl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf2074651284e6ed7cab8c9e4d51b1bd0', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-nl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9cebc60e0998f42da5021bbcb4513f8d', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-nl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdf58ce769ea4347ed942f8e125212c8e', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x25b14a60fe838b70e1a1860b6906dfa8', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x09f09aa991bc1f1e5bc9c2303a1fa32c', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x28e133850c07d6015c6a5cb81bb599c1', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x20858e6cf36dec7ef78585b77c8b99c0', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbb9c7aa7423441645edcda41a7640d24', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4b5c668698fa17136007e95ee7e16b11', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9910fbf9034c80b2156dc511bcb140ad', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc6ff00d62773eb409f93aaceee374e53', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa6c78df1574dc8800616aaf9d6a5e885', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbf357bca5f8a4fb9c3027d70162f53cf', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ro', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x19fdc0ef297e8ca588a9d706b3a5d4cf', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ro', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0902a2179329296e1e1b0724bf485b14', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ro', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4e395ec2b00e6c6bdc7223420808059e', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ro', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x057a934e5a59c0abe64e8902e612ed7d', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ro', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x80efcec988cc78b06eef4aca5a15f4e0', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ru', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8306519e413d2bd15d169fddf9674af2', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ru', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9d5871b5f9e1550c0ce7959bf1a46984', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ru', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc5934486f372d2c229e049a9acd34231', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ru', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa7ea393d4b73566f11345515665fcec5', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ru', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9770a57e3629dc9e160cf60c1682bb44', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-sk', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x76959aa5715deaf4b790357fe8dfadca', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-sk', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc4425ae034440b7cebcdeea62403e33d', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-sk', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd5b5a745e53bdaa6a267140dd0ad1d49', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-sk', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x216d4cffea506e6a91bbbba2968d143b', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Mode[...];
Date: 2023-07-04 18:36:50 Duration: 1s252ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x45cda362f4ea7462bcce1dad7e0d5134', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fa', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf61587fc3c60279099c42e3a1effca3b', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fa', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8e9b2057f6ff0ab8559abc7b3de41d3f', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fa', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x564a1b029cdd31b99d257eed2b14878a', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fa', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x89b8115920f2b763bb6fa2a307e33466', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fa', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf157cec7d6f671c9d7174c401936b76d', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x52dec9b3e196a8197eee2e99205af696', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x737fdd2711c27fb35765ce13b57ff26b', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8dc08b7c42d6de4976dd58c5c30b2b7e', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa429ae1b3d96373fe4b7b767e0694ff7', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0b43c04afa192da654cabfe38adf7b99', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd056c7476d23cb542f8475798d6d1815', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbfbc2947f3f57143e9ef104e9833ffb8', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3fb326efea1a13018573a0c7f688fd63', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4ab2006d85651c20ad92e52172a1cd50', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x79773e778788337fe284571abe48d5be', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ga', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf23705b5525dd86215fcbde6f20dd3cb', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ga', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x01054f66f9da2d20df1e4719867fae39', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ga', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb39fd5538c19707515af7f3a1e39e3c3', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ga', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x43fa249cff639c2371365e027a77ebfc', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ga', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x939409f6fcbdde44121e8a81f100fbf2', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x22db2841258803a771f6004eba809cb0', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x40e0a209e9faf307fc02a6c720d30761', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x320d00b7040cb5ae79b712979f761ded', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7fc2efc0b795cfb04b5f8c7ab3aec023', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xacb7edfbf4df4ec1c5155c292c6f5356', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hu', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9667450068b6364372ac0fe470358814', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hu', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x73ffa45fbc4b37a7151173c3b3e2e5c6', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hu', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x97fceed62c8f18780eb44f85d7adf6be', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hu', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0b1b7ddf1524d1d15d70e263347bdaa6', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hu', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x76266ad53676dfd4b2f7be6dd7fb55f5', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-is', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc1848651501b930163db08d037f141e0', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-is', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xce99cb59d9eb9be04538ae96ab5c6b9c', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-is', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8d8c9b3a9ec22178d214b6f61fd1884a', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-is', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcd30685d9399eef5b1f8557da365f25a', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-is', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x867fd8aaeb4a0276d376f35431154465', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-it', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd424f09cbcae0abb7a7e40bac814ca17', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-it', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3cb2c7c0c2d2fdf05a147b1cefd105e4', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-it', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1994fe9814bf1863219292cd98589e5d', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-it', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc845b5f989d9e78d6f53d870ef197118', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-it', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x14ed57d10c6be1965807d27a209363ea', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ja', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7cc3cfca4bbaab89f859ab9c0f2ba134', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ja', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x41bfa31e6326433631bdd78403ef4eb0', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ja', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb7237801e3c55e0b0876bbc64cc44b64', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ja', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x44b83387186c725d5d141663fddafcd6', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ja', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe6a863938292b9bfb2e426a692011db4', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ko', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf3cd7cb591f0cd974db3762ed5d56a9b', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ko', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3e9a9bd37602edd83fe02418d273f597', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ko', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc63a3e222dcc98ae240ced88d5818274', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ko', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4f26cd7e538001735e48fb4c68a203df', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ko', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0a920e43183c7249e960290c3dad4544', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7e759f04ce5cbdf3ac54a8d112ee42f7', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb166af04d197ff10399e4d9108d2341b', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x33ed538d289d7cb0e8dbc2dda134628a', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc5846cd5fa08b4da94e6ed8065175624', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf537b18c1de9afec6c27bc873b9de940', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbf115ab8995adfd5aa018fc008e9102c', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb1c141dbd193d9177e5a81970a2ce54b', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7000f28d370243b3ee14f15d1f7ed049', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb3f7d0a144ec3694d0b9f1a9435f784b', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x13a2258ec00d5814f8ba70518d4e3772', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-mn', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x72ab3040d4fb01c7f0cc60339ebf5e0e', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-mn', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x34be67882c9c7cabaaa8911003af5bbc', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-mn', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x289cf39f07ec93ffbb662b39e01323ad', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-mn', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdbbdbae25ce2fc313c417e2dc6574a11', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-mn', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x302ac5a42cf2c4b909702c54425f8513', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-nl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa0b47c0268dd4ed83c4ec0b5c3d52a21', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-nl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2d3291683348e3c994c0b720d3b2cfd4', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-nl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x39ce1dcace097ebcf71208a5e11b6afd', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-nl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe0a5abf900116606b2917e4cc94de823', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-nl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1652d487f7285308839673d3655f90f9', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2b6ab607a65fa6853706665da51e5e63', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0ec8dbb554b9a25bfeb5510725c8346d', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf1cac61f6bfbef9c11cd386364b692c3', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd63949c80aece52357d01f47355120da', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdb8641e79f0ce5f6a83c2c4bf386df83', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1363c24085cca4413ed87961e68eb77f', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbfaa055f2f4ade8119d082f3babbc09b', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0497137b43fda0a71dd990cf3f182b32', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x798b634ba4e6a5f4afa8f951c30c87c9', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8ad3842030da3e4f54db80b862360b29', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ro', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7b9543151f6c116da453721dbfc2fc5f', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ro', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcb473e030420f7db70ecd76b1a49535d', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ro', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x48a3ceea51f2cc67cfe5f83ce84493ad', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ro', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0194761d35935e142b229efe18e0baac', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ro', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x80afd734d8022a5848eeb68be09f83e9', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ru', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf49c92db552bac6364a3d4efc4fea0cf', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ru', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x26a0c2ead238a2220fb3d8e808056854', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ru', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x323a8fb05964ef9f9aa7106da76e8983', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ru', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x19da0a12b0bc85c8cf4da6a1b52917ea', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ru', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbd7a09fd6ec2682948d65df12177faa0', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-sk', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4a4a1df7376b1b0a3ab060f138451427', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-sk', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6a19fa9b25f37553d874563ee976805d', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-sk', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfdbb29ee20579ba5739f2f9cdc2a7cab', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-sk', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6d03657cd24439f3f751df5d2c91320d', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Mode[...];
Date: 2023-07-04 18:37:21 Duration: 1s89ms Bind query: yes
17 8s636ms 1 8s636ms 8s636ms 8s636ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, https: / / access.redhat.com / errata / rhsa - 2023: ? https: / / access.redhat.com / security / cve / cve - 2022 - 23521 https: / / access.redhat.com / security / cve / cve[...];Times Reported Time consuming queries #17
Day Hour Count Duration Avg duration Jul 04 14 1 8s636ms 8s636ms -
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\xdf50f6701c6896c7d4a3913e3dc9f36e', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe64c4b5d41feaf725a7863e710333e34', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x250773d0f2e2a6c8664304473f0d8bcb', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4d632f3165ad2c0fed1b6760a550a9cc', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5cd5a8e953b7742b776b2126ee6a4697', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb0d1984093d149b5aec45ce4d0b741ed', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa7b783844fe6ec3a04eade04090cf43e', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x197f2faf81b9609a4cdcdbf9805d612b', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x77f67e4d807c1e2760b54dd265b1eada', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb56127cddbbb27a3e5393b80fce73eb6', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xeac4179aa959f68f08d887238d0d3f8d', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x072fcd827c425ea0abe7bafcc150514c', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe1ed92fe9adaa140fd6a4f77f358d60f', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x80234f8656c431a8d1f6236ac5c6e866', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf45446966ff981a6e758d909294c9a36', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf2fc35e9978f26f6b21150e4a61bf0fa', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5ce58ca05da5f1b4420a323d014bc4db', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x868ea871fb6449e92dedd5cb34921c1b', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x74edf32858d9f890dba214a2a7bdc39d', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3066939e96c2343450ce97f81bab780f', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xac03dffca16749f6ff0f7faea88b129f', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x69e16066b8dfbadbdcb83f202506c7c6', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfd71a98927f60c3a0e22fff99d9b3cee', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x439c57179ebe58ee89f202ac9693fa81', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbee219a223bb3a28fd1f279ae7f7eda6', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4b7933e23db4163fafe4bd30e9f5c9d6', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf10bb0b56a1deb6e26c1d8b71ddf142c', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1cd32c05d4d2cb08eab88eb057704e06', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc2d2255b8b9e9edb59f783c724865909', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8a881a162c87893d7c2b758b017b8f07', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb7fd23c77e3fa08beb9b18b328343f13', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0449f541296ff890055e849de1c1c158', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xad965155e7ad1c1413a4b600ced119d9', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x85d398eea9be26d6a8fa231f0821210f', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x72038959c25eb26ef799f9e1f9eecf8d', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x02cbed00a83fb7d2756c45e1d48c9f65', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x062c6b236bed03f89b23fa5d11cf5927', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf4681d1ba026830049aceed5a40d7bc2', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2c5ced01d06900f03bc8dc6fd8574e3a', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x91a0493b266fc427a35bba3761aaba1c', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x89eb17c8c5aa3bafa46d05d7708a77fc', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x12e95f3ca03233eb2c853e36b254a5d1', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5ca226f90379855cc4792e78d5a2c93a', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc212e6c246a4b48f7101fade65d51f6f', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x412502ed0e3e20b43463f9801f32e421', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf5b8f0486cf4c3469691614a4e43fd7e', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x68ac3f0f18adaf76b8ab2867c843ba2d', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xccdf13184cfa60a6423053a5e14aa7c4', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb5dc36a49801dd51e2360e4d2273915c', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0b4513bd95363b72e6e59ffa4719f978', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfdb25bf7cb626c770638b20b6aacf119', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x96841bd97f4ec7dc1be3415d7b50918b', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6830da9e3a001cb7ed432f7d8c572853', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xff169aaa7619db3234309b7a1547c628', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x993b15f672b9316308b446ffc3a4e56e', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9b10b456619265506d2a9a714e79e3ae', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc32682f754fb2b8552fd495c74cfd85d', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7f30fbb56e14f332619ff37b11f615c7', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x645c08bfbdba8188440e9876774861e2', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbb4a1699af7a40fef03e576e30f3ee04', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x61b0b2749c587595aedc7024a9c1c588', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x93dff8409768a0e0764d596f7b7e0cad', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x115d32acd89d9380682a123e22a0a7a2', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x005c3206abdbb7f865248e0589034d62', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6822e035904832c2721d03deaf51a3ff', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1c04b401b7d3f30e866b85e48db8a812', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xab36e56bdab0391442369fd2f3a4720b', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb6c5dbb4e7dfe99382f42af2c8e4cb1d', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa3936004518d5283df3293651b90db50', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9793dfebeca9321d5011dab44f6ef3fc', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1134a1fce80ae2dcfe3080dd82b9dbb5', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd7e0e2f9331566e5819446eec2c4def3', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7fbb18a44021627f3d89b7c4ea82a466', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3f50ee1513a7cab3ca9223f325065623', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3979849fe73aafac238b47e4e9bf83b4', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x505519e74e466ca3449d0f646d65fd18', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x52e7f3ef267883eaa67c317a765980cc', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfe6120025ea49a4ce2b28d94a884a191', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x36aa69b4942e5adc2e86194ae8c45297', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2c7307441c2254609d96c2b3da8928c0', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb9fe6ce8b8f9b37384ffa8980dc80f25', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x63d1f6905b604fa09cfc17110175b58a', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa0eb77aca3ea23d95a7d544d7e70fb3d', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaae53463e0cb74484c43eda252dd7a2b', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe469f7837dfa827398605ec1724e64d1', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903', 'Important', 'High', 'git', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:2.31.1-3.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5c05493252de8a4300aaed91fecadb32', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903', 'Important', 'High', 'git', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:2.31.1-3.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x51b158f1e97ba820eda23af5af7aacc3', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903', 'Important', 'High', 'git', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:2.31.1-3.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x13aa8067cd53f6867c322d38a5b645fd', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903', 'Important', 'High', 'git', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:2.31.1-3.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xeb77cc304f2905c786a59e2005bcab14', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903', 'Important', 'High', 'git', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:2.31.1-3.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x00740ef4840f8261a0a8a44eff3dfa4b', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903', 'Important', 'High', 'git', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:2.31.1-3.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x401f8d646845222932ded9d1e18ca04e', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE[...];
Date: 2023-07-04 18:39:16 Duration: 8s636ms Bind query: yes
18 8s597ms 5 141ms 3s874ms 1s719ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, https: / / access.redhat.com / errata / rhba - 2019: ? https: / / access.redhat.com / security / cve / cve - 2019 - 8320 https: / / access.redhat.com / secu[...];Times Reported Time consuming queries #18
Day Hour Count Duration Avg duration Jul 04 14 5 8s597ms 1s719ms -
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x0a1e2dfe7bb7d3465f1a9630caec1282', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa9e0980c5649bf19c15d252e17889b34', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa7eb56b760d31cc1a9aa5499e6f6ad7b', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfbee03b84d00ccc68ef343e3f9eba6be', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb59707ae64d6d584128c4d1ee812af15', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x199409b5f9e74f8621c3dd21db08a76d', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfe1e25706a959511f1c7d3b182075b37', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x85396b8478c0b637f0fbb8087b1b6710', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0f7df8a4e272292c60867cfd8f1df3eb', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc84c1d75ddd282a1ef1fa9867d7c3232', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x00d7fff1b34d056004030da751b04250', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9042a496d45bf9ac1e8aa6c79de5fb5f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfef584d41020e05680985ce3a8037645', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd8a2c53abfc6fd35a8d1805038d35a3d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8ae860f88d94dc435c0969d199b76d5f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfd252ac3d91f75925fad9c3440330f55', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x158ef29f4233b039269825b8e915da30', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x259ed6d01bb96bf7a4a095d07a417ddd', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x35116fb0288ea4d8c1b2da551480dc1e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x19f25f47189d28148e5886316e5464c4', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5e6741a8ba6bc44a50fca796b1318bea', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd959c6225184dc773df4fc5e7426e606', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x59d44020db7dd6d66d00bec10cc5c701', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0805af46cbb630b40f30c556d433b4ae', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x96d00479df0275a03fe842fad6d8d0a6', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6e7771cfb54ce1b22735cfd76253ed11', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x967ce0f3ecd05501c029624bae1d3bb1', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x81109700d695d34d82e393d22dc64963', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7d4db549960a34ce3033370ef1a07a96', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x12b963f8952f48951f1b6409ae4c4956', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xeab762ed579c35345f10c169cf15538a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x597e9ef2e0c1aa0a3cbab9ab1449f328', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe08a48e9e26cce39410345f6800c9c8a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1711c73a85b31dded948f1e7a2dd88b6', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfe922ffb4f82035b8771727b671fa7dc', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdfb595b5a77200d549948c42c70d7a07', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9a1c5c3585d1ed1370b0cf101ed16d5c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe09070e23672c2b9e125d412409fdbf5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x502fe5d689b73a93ac4367b2ff2cf129', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6f16260c31c99af0272667d470733e18', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x88e8e8c5e239a4708149565a101728d8', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2f31732ea8188d1df64ccb46f0068e28', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8629bda43442b42597537540ed768087', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9693fa01aaae8e5a64177ea8027a2ac8', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd4280b955b4f25c05b49de89a451295e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5e5bcc0ff2e1443129248e11df185087', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x182b21410c00aa2e0b2b0a8d5cd55c1f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x326a8f046148f41c53b9c5d9af328971', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf4c7868372452bab543fa84c4a3aa4c2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb66c92bb559ab262ce642e67c824ec8a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd9a985defa2b93f6c43e5d1d60cbb7a2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3a6350a75aa79aa2fcbf9002e62ef10d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe514443d43310d3e10da8d9f6ffc385f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa64b9f4bcbf3626836da686ad9644bb7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x50ec941987ab334180179e5142ad220a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xce0fda15c618a3fa53fdf556b1868321', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc064e39396558b0d100e5510593eb248', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4785f6d947945c6710a7399172a76dc7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd0035c8ec22c01ac015c8c6a248b8273', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x67ce29641e05a921b8300e8bb153eb0d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfda235e53d75f368d4293bac32fe8d18', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9dc5c3411f81680ee6c4e39c38d1b1c5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x188a090e74d1b83958b37f01f8ca2b05', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4e6d9f8b69ba6f2565c05852faa15bd0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd28023560f4208ba2d6757b99be1654c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x76393f8b38f9065ec689617a506f377f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5a524f911c113e9ea28902c29171e0a0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcf37b8635345804bd2096f474fce223b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb5b5af47d61e94cdb3e9861d692d6385', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7e68f4114dfec3909377e25f1f055da4', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa8a025f882b79cf14fc9e93428b69afe', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x314aab67d943fd6e9c0dfd45d31d70ee', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7d405e32a7dbdf3d92f1a682c08e84e5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xeb0f8eb114942d68a5b80ddfd43b791a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x329f6b60d4e7a143f0aaf7893b64c0ac', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd7b57d5e88a961592a35a91bad5db3ac', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6cc076a46feedee7f63ccc672a850812', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3ffc062f5dbc4d1d7bdbf85309def9f3', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbca9c943e5e559feea64bc45b1e054b0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd3aa3919cf8727cbb984a995026567b1', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe9ae07f109bfa94bb4429dc01b697307', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb34f1180a844c78348cbb1d70761100a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x51c059a2c52347c453f3f0a59ef2e8ff', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf2f494ef6b8f70d9dbf0db366fd949af', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x25a91318818f06a2e4aa4575eed57a6e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd9fee121c1fb686a95ec954e1e01153b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9fc9f8b7f633e7fa6cf9af644663f380', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcdb4e5203375fb8f7f6e4822a81a3632', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa07d9985cb0162d08d46593be250c25a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7f7f475faa95f5b14c20d63eb840b033', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbb0e84ed5af0c518495df9b35b90a323', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4fba59aa22748ff0831748533115ffab', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x732caf26bd3c46f127a0438eea95d944', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc6162a8c2b51075455daec7c384296d0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6989166d93e5aa5269b207e237d74435', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa4ac527232c6a7450c56efaaa71ce366', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x57b394691be4c0f6aa6c1d31509ca494', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3f4cf018dc7045a27147762ca1cd9494', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x941fe659f39e812ac7987f01475f8119', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x20550abfaeb47aeb1d707c92a2b5c8ad', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/secu[...];
Date: 2023-07-04 18:40:04 Duration: 3s874ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x45336ea585ddfb1ca68691646a7be17e', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x21d8660966f359b70fe02e122ac31918', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdeb8a06ed432f481a6e8954f31c05892', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x75bdfabc08bb39107d069fc7cf756514', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd3ee5e1bcd03998a27671a9e2cc41157', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x23eab81a1e5398e0e5608475dae8cce4', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x929ed4868fe23cc6d5c37fff85a6f217', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x60eb0378379ee4950f19e478ea595c8b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x71d4e4cf48cc25ee5ced0db6c53e659e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9a0a9aae397cc2bdf4c09a585ae9e120', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4dc263d3a8900faa6f6667d5d1eaddad', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x04c9181f846ae2984f25e48438be9ab8', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x96ff36cb6741b371a3da8e1135450353', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xee2aa0f61e58a7791511ab20589c9b14', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x71bc3eebc1b9554946cfdfff6a61829e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x881dabed2768e6dba0abc047ba7603f9', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x01566318ec580be7a442cc868fa08696', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x42faa48a2390eb4f80e633b72f11c841', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x396de83974bfc0c16ac06359390afca6', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe6f4be522f41359f48fdb2032e093b2d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1252d8935eb0562b1db9466ee8ad2a7d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd8061535e96c1f8c551c6db07cbd1f21', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xce65df5e03ebece408adc0bda59d72af', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5482621cf27ecc2b7fd189a346e5941e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x508142797c88c4382b8f300b75b39b98', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x835cddbc081ebb9bcb432d93e75f9efa', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xee8172b013dd47c1e6a01805b7925b57', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8550ef784faa83c89cff41bad9ebaf44', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x50d909a03168f2d2bee8d856e1832eed', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x785260436e17962927ab1b835c06f217', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x76210b99c49d725eada10bf3085e9e43', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa70bad2c2c4a1841a1ca1f852aa4441c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x180a984b9c6491acbe614c92057647a6', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe1838bc47dc472b470c4f0f72e2fe775', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3da326bf25f625ca76530919ebabc422', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6a75144976b8da2e79420dd4c52d8e6a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0c8e526994d3e42e7825148444ca685e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x66d2ab83d78b590d4922bbc11d9f510d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x77f0a1bf49c9faf15cb7a5558cda084a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb73e995bbd71e5a677fc65297fcf36e4', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x67b796d33ae91936ab38b02346ab4df7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf6119d158ac4612f8c9819abd0959dc2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0eb7b6ce9e77f1e73201cffaf3e7194e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x90e235186f01e47c5944dcb2b55d446a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x562110e51f67584c486ba6a49b5bc4fd', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb8d73ad33ec9db4dd2ae129897d18084', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3893dd8aac9190d3602dda49048d65ef', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x18243332a3d6fcc2f3d5a309dcef0d60', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfd9edbbfa5dbb289180ebda3ae2ba8d7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x75635711c3c478004407c1eb50cdf781', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x48bc00e959f3ca0df8f24b0d52de835d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6fce6d471c7822ce32520c19719e654b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa49b53505a6a931f246c5bda018d62bd', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe23e1f175d0beb26081a3f65e5fa23bc', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x43f64b9b2ca3ce43c8b834f6a38e2922', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3e57dea6a1300ffd7c05f84bf55537da', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe69983c280cc62fde95f2a6e93da1da7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x62e5178c8dfdf19a4e5310c27415daeb', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcea50efbcbe531a70a685c1a8946c2f9', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7922142b1b9a1e1b857b3a4cd76a1295', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9cb0cb427528b9b801860e1bb4f5ceaf', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb13d3d1549e795c264bb4b2d0ca6ba9a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf5cb6a85ce059893c31e95357cfc2c94', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x18cc3a9533ce475b37f6c9c7bab87340', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa9ea36d39272333112f84c6e08a248b9', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x205ce3e234a9edbd01160ba9e183e8b1', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x90c1d5cf091a2640df2deb12390b8480', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x399ff351526605f3569e1ec6bbbceffc', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4c619136c908cbd6d32e5527d28b8899', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5c2843e584e4898ca2c9878b7df91554', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6f0dac3432cf9225f1ca18995a2301e2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5bc01d94f68dc28214bf81e6975f58a8', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x04d4d3e0ff018b401adc8d621eeb9438', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x05dc83169f82148531271851262b8f33', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcd8d7ac651c826a0571213e4961bfaae', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe965cd9a7645805106631f93a8b37297', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x93bd313015d876ab249de91d1e26fa74', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xac4fde9825ecace66ddc086d8e98e28b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe01d17ba2b837d0c404449f8f2c3c3f5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa5b362d3ca82a7867075b5b9920f1a6b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe0422fbb472ac6a51b483d1c8640dbcc', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdaa961e726b8c0ffacca6f34283bd674', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe9eadd1cac58cdcfc5de990a4a722620', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x489072d703b271538a1c7e852f963ffd', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3c45da9de15407c26b81220bbcc14e9e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x416ff9fc31268ae0f0dab47b61822ab8', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc7e04894ee5f6421d476155304231187', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2bb0ca59a11fe2d4f9c9a7fefebe1c37', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7e67fd518b0caecf71bccc744a8b5c4e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6955fdc3eba5f2a996de7c478d0de57c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3cb760e49b7750448cd6f364061743e3', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf8f15997ba078a8c9b38576c671da3cb', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x33eff1f3363c927af63332bc7cee0973', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x33019e0bdf9b632334989c229d77ffe3', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x710533c0a1f332cc795b3d509a6a6ae9', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe9ee1614db6f0f0094b15abf1e30a2da', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe587f097c34642a1234d50d241899b76', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xba07aa0af1737836ebdf5fb034c7492f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdba597e934ad2538e0e36ca55e956681', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x21c6ae44f077cf88f6d3a41a4b450c4d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/secu[...];
Date: 2023-07-04 18:40:13 Duration: 2s974ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x76512afaf81cdd73d170961f8bc4d9b8', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbb98faf8446a2b5facc1cd7549d627fc', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe8f331967cf7c1478534b48daeeb0bde', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x15909e77674c2512655ba553d31e03ee', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x623d54fe85a0cdc6d5a29f7be2ea73f9', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcb302feffba48e5dcc4fa599ed2bab4b', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3ac9de04059e17c7b3cf1e0e54b5d608', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x280b6faaa43f719d1fc8c0b0d9f3c1ab', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd16984a0b02be54ae9807f5bf5d62331', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5a22d756aacc70f4187df17f2fedb690', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x36bb52a28d79f159e287934dba12b28f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x50b8ab6c72c6477d407ca3dd3429a3b2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x46fa42443555aa551a7b1c343ffe7551', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc07d8340b1049704dd63ddad0b5f7e85', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4c1205e3f5e449f45a2eaea0d7cd272d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8d5fc7d7f5dd9e42dbd479d000d5eb38', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xafe5b5741da1f07dad6b17664c49a54c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x584cfcb1447726e1086a3c6c2f6f9c62', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8e597f869f70414c0975aae8524de602', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe71337d9e5938fb49e0342c031457ee0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2a9b811f3287d88177308e1af09f1616', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x146ff4e5f6f7eda15bfebf1623a203df', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc7a0d8320bf5b2f9487c760d453ef1e0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb853c0e29db5f61f5259c5c7255e8b6a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7196f849bf1056f9e076e0984a3e4511', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2c493ece0fd556e196bebe93e9083e26', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x17c3f4ad7fe578a4c2c6efb00185966e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd7d7dfe94d77abd6afb4297f688cf29d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf6c1f937187fcb5e637eb5f3769a1da1', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe827c5a221d130c9630568fe82300608', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd232476da1e391d9218806ae863b1d09', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7bc04e605de60b447e74fd2f8596afc7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x39545b9d644537940a7d4c77c3b69122', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x50c1ece00069fe41a0868f95e0c22a9a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbec3a7581de5886929d46bcc67d1f69c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1c133fa3596da545e5994febcf2d655d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x01dd47970dc5080d22a10317005c444e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2fe97a2b9b3192a247d44536d15f877b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3eb419db350e9d0cdc2d678e43fb6ad9', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x285b33829c94239d8c1e3fea26b5f943', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2d1738d2dbfe4ed3b1af3f0ecf63fe53', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5b0a1f915460887dbbc0459091da9312', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8f3039abae742d6c4252e92eefefa2f0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9027af5f1b6eba54da09ecf6e6729f26', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb5e2a960205fdcb380cc2b7a073ac30c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3010684d8ef684efc7c3a27bb358905f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc2d99e37faf907be62a965a295d16ace', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xed541021e5ff5adb875faab006cb2527', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6828be7ccc9f719be9aba80c909873ad', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6b3fa7dcab6290d10f093b70248e005e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7dfa5a9b2eee0632f5487d127d08ca78', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xeb3cac72d1160cda837f5553731f7b29', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6588df67a272dd6d40b46853f6f50a7b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x03b72f005df351dea957d872def16111', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3e000a3e9d839aab164d7ba4f301ec65', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x695c4c91e39afd6833eee305c19f08a2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x04bbb491b2a6f24a6d57e76afa22ddb7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7619438277bc77664afa39f217d68687', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcc7a83cd2abb4330f3e492198c1ddb78', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6a6a21018defab8a8d42e49eca338436', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd94f183db099261de2e14d3bf1850291', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x799fe097dc7e7a81193c0fc8c73a4f35', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x70061db3928b35e59e61a66f5db7401e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc7b2fb731697273be5f403f9d78a55d4', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf0981019a01f7627b788c4c696c6e103', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x383dbe86cad274994242874aac08c36d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb8acece35ad552222a6cfc3e44fe0c11', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5c6ccc2cbc7a19c65a79b118fc7ecf17', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x79b3a2c1e776345b97bb9d101709e202', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe0e6b21ef53c28bf223d11ffae6484b7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe33fc27d7e3841d8fdf00a40550dcacb', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6be843ae41c5f4dc4084151530c3031e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x187a640c09ec5b63488a445f5b84a45b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe503fb3120ac8fbdeec3eb277ccabac4', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x73306c476cad62c6b11d66c048780073', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x32b5d15e1b53c8a06456bed7200372db', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x84ec2dc6e3413db2173f44e25cb6094c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0648d072a5624f422a8ab07c54fdb06d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x777ca7f5352b144078ea1d485c92f7e9', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xaa6b0f0bb0d481f5b46252a42e8a9615', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xde73e053f523fc3cbe439d4f363c6967', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa318c2b635d6c82bb8dc20d0353ce7bd', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7a18ac69505970c5a8dc385ad2845e0b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x05365273c0d4e22ae215e084ef80d7e0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x38585b964f1604ff664c95f65e10f72b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x82eff1ff57c9559917e3f93eebfb1a74', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x133c00b22287b9a1c38be28af3686f75', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x53090bfe951e0a528c7e2bf9a98de5b7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xebf4d321dbe46e5b2e502175db700865', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe9e087869b9464d041f5d84cfe00f7db', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x531696276296192556d2b4ac2f25d43f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xaa0fe0a1001130bb33c293b5d6e11003', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb72f30642a44e077f0689e32e239bb67', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf0658976046334eea2a0beb413a1c23c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb74bd8141f4447b5c3713b441728e4e9', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc4216e4a7a1901d57c5e465336d930a7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x50b89a6e4f82f894d53284cfa6145018', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8b2b4b238b893d8dd30687f3f0264d97', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xee7aa825fbffafff78fec601422f9e11', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb659a2b223a6478089516b8b9e12b153', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/secu[...];
Date: 2023-07-04 18:38:53 Duration: 1s340ms Bind query: yes
19 8s518ms 5 190ms 4s340ms 1s703ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, cpe:[...];Times Reported Time consuming queries #19
Day Hour Count Duration Avg duration Jul 04 14 5 8s518ms 1s703ms -
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x18ea0b22e439a7960c5d984f3c6eebc8', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-idoverride-memberof-plugin', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:0.0.4-6.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1d085c58111d73df4dfeba5fdafe2676', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x79ab5f5869410cdcd594132bc8039f28', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0b4fe067979eb6a7529b8aa594a02960', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6dda8f785ada64612b58e8f1ea750198', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfdc101e415760dde1674570afd1fa439', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6c9b0d62fe8ef2bb528c3c236722869b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3f11813a91154c6539ca721edc0ddb28', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x09bad404efed0959a374add29a30878b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe8c12d03db048c8bdc15e912be0a84d7', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc71631dff9c1df72c930cbae66d2d614', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1b3430c853dc1ed74f46347ddc1ae1e2', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfdac06ca1ce853859334a93fd806fd56', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4d955b61eb813d9b70393b95a45ef066', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3638bf9be5d2279ee782f46019a6ce7a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8867fab15e5e38f6112c9bb515d69aec', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7229d2cc12a3584dfd46e76bbc773591', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x38da49b4b487f226ad9a3c552048f4fb', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc3ae4712bf43de3a989f973ff2494e33', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9dbef8bcbde966356600365feebd5625', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbed59b8217732cc61f2d26caccd8dd27', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x09b5caea52c05a9567d719f2f6b98675', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf5d9509b344d9dbc194bcbf6be466e3f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x238f5242e31c950bac6e5cddf3d46769', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfd6139a6d08a10de89a5385cc238c57c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd8b07ff48b0c9f99ab58eb5cc7c0125a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0bda576c554719fc8e1c626f021c2ff7', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0b37ca003ab705e259dfda6b2cb0353b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4e301af639a46ab0f916b2b0cf4ae0ee', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5d17a3241e8963fa82001846acf8d1b8', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x17a0ba2f85a02cac5d4c41234e6eac51', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1f55dec385084fc3a509163ba21f4bec', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x17638347fb6da108c6d9d1c68a96476c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc117429f2f34820c0253fdde0c102742', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xff3306bda14c861cb4c06e34a8986a0d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x43f3b1bbb0001119b5667752c732b6d7', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaf304eafacb4e8f8ef4c59874ada491e', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf9962cd827b6819cb0a2a1c38d9bee1a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbd44c0aa054e1877f027ffef646f6823', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8cc4a95db1f0013960ba32c50038a282', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x87f28184b869db62a168d5fbe489c4dc', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1ba85dafb99a82b1407d8422e42ff34e', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbc7936e8d5755aeea4f7341fc5b75020', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x387318ad29c9efceafb73c256eb07e19', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf736049f52010902df8bc6f825f0251c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdbe63e0c4535e6520b3ccb5f77d7322c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe073fb23a313ac97c8845c1f1fba6e9a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x671d3cb48a8029523eee6b9f691f3dd0', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0873c6cf8b1bc51e5da13dff599601c6', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x86e9900cb08539f977d6f5c118c3b791', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa533b9eb100bb4d4af1ea5cf8aa8e58c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdd8a1352a988a430b59dc686093620b4', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9fb59e0b96444a18aa2f5c8c7cc975c1', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbd302d7f2f88fbc03a20f6eea45b01f0', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5fa5021029a6739cc8eec4c04dbb197f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2831896585f0c076dde6aeca9b2e0237', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x49dc8cc35460e13025d630667a00731c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe64a2dba0c61180654c3f7abbe1391e9', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb83b8befbad3908464d85c401fc5b340', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfa5c200f5eb44e7f4ff2c2221de4dd45', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd025e988b9f8cc5bffc20e92ca4ab22a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x002b626866acbe11d85913efff604b0c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd5907087cdd8a6ab7a7206db0c53d7c7', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2f3f5e890aaab12f471434d86d811f4b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf0ef8451b8edfbe9beca28b7ad874ac0', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xae1076da754ed68337586342ca0c944b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3d23edec6e322e80487ee105cc473ed9', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb274d2509ab3f9347f90ce0cc1a85347', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa1dd3c65f5e9808bb232397f984e6124', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbfa19444bb440f82e2bf7f43c520fddb', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe3a86e6da9efb7c4f4b6682b2f9fdd1c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5fa7146e1cd95ec179bd333eede52f0b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdbdf105f6800b29a70ec41e5b4dcfa4e', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xaf9f1d78abe5d51d5f11aa4042a71b26', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x627a6622abebc72370d8af57144f1755', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd8c418622bdbea24b28344458c8848f5', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3ed9fab54afe942110e3cad2398d91c3', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe6ec280c6f45e2e8a74a86246e2f2b0c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x910cea21f21e3709f0c8113897426fcc', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x59843228123df95ffb09f524240d594f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x281f45e973586d06a738a7da0d52197d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb6d185f32957ac698052b6a2f99786c2', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4aae2170da706b5a6e55d5c3168fa241', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd443056ba1c80252af04db54d14d55bb', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x270aea9ff93d637f4465f0c57224192f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbebd54e5365ada6c633031e209767180', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xec39d153f9f64afbd0d1823602ce74e1', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf41eb0e12a92532ab8b4efb3dddc34bb', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x10d897ab575d5959d0730a7c8044d8dd', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf306fabe801fb592af046af92e98bb6a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6892c0429d2e25b76ee8a853df7f4510', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1a598f2bab2e3f41a21251bac8dfc247', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1fa290a936b91311bd5630422d07dc55', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa5c8a195b771ea25eac150454fa5a695', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xae4ada28a7379a8f8593dad3e77eed6a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6175fb7aacedd4a3ce067ae078baece5', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3d32b59fd473dde59176f6ff2f2e9479', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8acdb88eaa19351d9eb5b721408e3512', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa4733664007cf049a8f83adf6b702e1a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0ff6dd19c2355779d9f2517cdbcb7bad', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1643f9fd57f68c0bccff345a063bd4f1', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xeb0c6e3c3644a90d16cac3f788cfcb53', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf2a0ea68aff6f29674f82b27d6f0fc40', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x200ce56c914b96c27968c409821ec1d8', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8a09b1cd6be205bb427cc942da504c43', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x41504d445f788fef2b1b889426ff2467', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe1d58bb5da6ff96ba914e38e0cb30e4f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb32f518258fea9223144f923ec2c5251', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0223ab084b48f01a5b343eb278643d0b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x185a7fe1147d3eb684989823cff6ee33', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x79f6483d6e4028be3fdf56b73af006dc', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd7945f501411e09b8e5dee405396101d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x61129a990290262a1db8104a9ddcbb1e', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb620d9fa4f2ba45c83e518fe2cb70019', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5fc29a3800af7b82f764bec8301351d9', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xff0eea8f1021d2083a8ef0b4a0e6183d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb2540b713282f489fcd1dd37aab024d6', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3af2a2404b83d45512b99d76ad14c81c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf3e89076fafecff535f043028fbf8e59', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x49efec806a8e6591121ccee533ef8f9d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6d0df7316a27dce4e46669717859cd03', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe90983fba029f91e9a96a8337349ea00', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x856e98f63eaff86a2c0cce5d2f254d56', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xec2eb866a39c00124fdbf074f1cba34c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x49767e5765e4d1d54d1597049ef8de7f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbeef023a319ecf69f5f52752bcc5e386', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0d6f540cdbc2d336b6b77ea317e3e676', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:[...];
Date: 2023-07-04 18:40:18 Duration: 4s340ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\xac9ba1efdd7074fc7a025efe1277079d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-idoverride-memberof-plugin', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.0.4-6.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd060f6ff47636bdabddfcb449264323c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x79816f7cf69efd00036a6a2fd0e31e31', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5c91c0f98983c9c7918e5c7a0ac6f26a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc2b8aebb29172228127a470e81895afa', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7ccc03a52f16ed929e69333cf600f006', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x727925b272a270d899ba0f0900702608', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd8d30a1db9bf773b22da52a8e7366600', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb0047e82ff2f84ba68eaf49adc908857', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaf00a25677a18460959bba984fcd918d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x91035770aab19f8b849ef470b6784ee3', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x908406c56f93a6452daf2fa9a071f91c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9720c245cf8a327206bd42e1b2a620f8', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfdb3c6e8eb0afba60a0da5be9ad4a054', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbb933df999ca65291db5c7c88a6fa9a8', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xad3163f82d31a94c916bf57020a8a5ed', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcba61ae31ac45d1df2469a16c1850cf9', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd37faefffc12845d39359d3936c8e610', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe45e686e91b66f53b86240899735e32b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf02168bfb432145a83d8d871a2bb7a94', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8695aeebeef04396109ba287d7c13582', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x17a43a408b475cad334aaf91b058d231', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0b655fb35027ab099e671fd2d9679de4', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcbcfbb4216960d36d79312f0227b4b0d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1ee114a239e6e2f02bc30e16d5211ca5', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7ea3997ae0bc1c8b38fe6d081d30550a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9f92b80005a2ae151e103e052bb821f4', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x29daa82709b1c20557e96e4841cf5661', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5faef92e2eaf184fa93f663853b17c76', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xaf076cb533ea75cc96067ba4d6e7d411', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9b5f5319a322dc8ce195afbf4ad886b7', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1d538cd0bad54923d237a0298582dcac', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x386ec91fb69579e0cb7d71f240287284', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9a934272024eed71556cbc6312b7260d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x05876260b12f5f318df03ccefe53884f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6f3eff1045c599ebc493f1afef1c2e4f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf957e0d0426d5ccbd4a630e13e3ced23', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x56e01e95bd4d822c48fae3de6bf1efff', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9ce1d814e59a094b4e3b139e4c2e0d8a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xabc76e71794a336ba304b597c63f971d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x05601913f80febf6dad6c20e7db8c7e6', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x89cbb234222180f527de0e1185c0ecd3', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x597645c3c56798b8f0d766e8c15f4afb', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0c2eeaec051b372ec7d0ed9b60654ae7', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1d0cdc45b515481963c6625cf2758312', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa4edafc05fa7779ed33823e49ffe934d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf6291a1c0ce6d65e3e7d45ad627915fc', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1a2209b944e546fae324a6bc255cdf2f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x893067afa6389928cc80505c650530dc', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfd16a5043914e51a329073eeb312cc17', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf4295b78ef3dcd87dab519afc586f310', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x112e8f0e54e7b37d77b825ffef651a98', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc26e6ce2456dac051d263cc356656dd9', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1a62e9ce62e89c0a0f2e4d4f44e3fc22', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4e2729eb42033ef73ef87a4d9df8a07e', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x77292d767d8ce5ae7e5eba634ebcc605', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9c96710f553d74f2fb90c83f169d51d3', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xde5a5d642e88b2080432d1868e00855b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2743d8c01646d1df22b5348c3cb330a8', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf34572ae2883388ebd76a30a68253ef3', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x942095507a1239bcea654131278e658b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x46871d300ecb532dc3517c0ea2c15433', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfbee6bab70716681f4de71ea1f52e253', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb3110f7ec3753f02a16975f7782c7f23', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0bf1474a80af17d980a15450cc503388', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcbf1358fbcc64ef7ca8525af321aa08f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf69d75c554bbb164627abd6f55ded584', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8f295e1b106157a19f31091857c4c903', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe819e76b2665bde68799d5c173e50d65', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x419a605436f44ab0dae17c36cf0f9a2f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcb7e1876f449dba88a360e760606f872', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x453cce4138e1aa3da834de4420328277', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe53d050f997db7e8256ea80144eb2f6b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3925f19488e2133f3d44805a0ab4ebf8', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x37c6ad88343f969d8581141ce2374913', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x06837139af6b5348afd327b724bff620', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc6396ac42b5107f2c7b5b5b47abe068e', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1547955feda73bc549d9cc3c880245b2', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x66e112845456f5c95e10772f88e2268d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1fea1d114f5be1e334a1b2a388f0510a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x56af9dbda8b353e1e7f81e89f7d14af9', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x160ed1b6c0e938ec84042af812e57053', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1299e0d0e38ade651bce3d7e4e6b5130', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x65b81f43d444493e072ed40788f5f13d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4dfb1f65f4764f4060351b927d016363', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x43eddde787ad564dd0e03afdfd0178c0', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x077f8be5fff4750aa66b14535fc3d0d7', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x60180cdae8999e17defb8983e53f6131', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd01837ed54c48fb7784fbd2f6f1ee28f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc745e0a9302fab845331075f12a6d5c1', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x77f26dc0b7aaa90cc44692ab06ad5df0', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc166540575108e5fe87809cdb5ffe20c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x10431165cfb54364228abb61f3157c7d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6341ed3bb7e8284a0353e7c26746d1bd', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x472d48df56122ee83c70f70f75aa8d74', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4932e7614e53f534cd5e49c194b05e7b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd8ddcffe27448fd63241d27b2612aa59', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xac65117c9bc43853ecc1681718277ebc', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7e10f7f4285ea02d550f2320fe37953c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd4d3dd5df4c715a7d26303bd7c157988', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf18d9c8d9a999f47d26daff8d54f7e1c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x37e2af1b4054e30f727b6af68df11132', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x27a21549f3afc2f98a4c309a959ea6d0', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6ff801c163bcbc45dbd4f1ffd0e861e9', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe0694822b3909704eb54b192e48c2de6', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x91b7bc14ef8ee7ec9e0f375ae45f17a7', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8be1997005989d4b583c6fcbc13996ae', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x11c56a7ce55bd332e60ce6215c7c63d9', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc018affabe406d71785d048c0dab595c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1aec410d486d37c1938690e7e315c426', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9f220e1197fc0de276a7f9186cca7df2', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x619e3cf2b1cc7d7fa5f753556b109796', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4e8c49ac41edde3126955103588ac4fa', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x73843f59058365cbe526f60b196caba2', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x518a6cbe029d45d21f5407392b89ef6f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5485bf7c31d49b45e5675afe87beb6a1', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbe9e55a71e12a4ac7c1f93daad11cd34', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x25a045892bbdfecaa9b300e78c099e61', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf3272c8bd42d95b5b9915d0f7ba1b197', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1dd248680cf124223cbd2b9d6d2298f3', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcf69d5e803052bd379cd09c75077202b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x60de993f940297622de3618a0be8eb4e', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7f8b99f7c3ed640530bcdcebe8c49567', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x984641252358aba0bd386691f4990974', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x48a0a470195fedc8f797ec6edd9c1bd3', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9423190a66cae724033b11d4d8c83fa2', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x31d0c306646d1dd63fe0e6a25a2cb1a8', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:[...];
Date: 2023-07-04 18:40:06 Duration: 1s826ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x8b16cb3e76ec4ef038e4e3c8e0f03e28', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-idoverride-memberof-plugin', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:0.0.4-6.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x226221828a4d9f819ac33af20c71dd06', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x005bc96bbbc9b34ee2b9e54f636382e5', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6c5846e7310a1215d5d25afa2888750c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc1c8d2367550bb82024eaf49b8735179', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xeab10d8f6aa39fa00e5017fe2e622902', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x147ceb1f6e4d7118b4f906e85d65e63e', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb2eb42da22a9c37b050ccc224e681d65', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x26e82cf78177b0c1b03d4e4a65e54c7c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc43514be7aba9835be132bd2ac621ddd', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe3b96d64016714b8c51523f3db546db4', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3f1e5295561a52444d87595335f8d198', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x75a7f4500a2e5ba98ea728eb7167338b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x59a2b9daa56a9c8bcd95efd3828a54f4', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd9f614f34c20a0849fd15cf7b540362c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe4272343d0777849cc6138f1c29aa4bf', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1706c6dcfed45efc4aec0b5751b2ae43', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3969d9d665dfc3d8f02d3915b081f7a1', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x44a024a1ecc4acdaefc681fbe540f081', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xeaa9776777151eefaab6fef248188409', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0fd8683feaaaff315e0c2bd19d480536', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xee0c21653b00b49daa67df97094f1a71', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x42c57c6b3065aa9800779e11f2fab9ab', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbda7d9c19cc65aa51105d9e93a67845a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2f52ab15505f40ce5e98118180ec7479', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5516a2f7e59b57071afa77853d53c5f4', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4c527105cb6f9e53bafc2a86467f20a8', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xed7a2243e0101c9c800c72004aaa904d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x01d74fcb493d7b70a96ee8a1f422f67c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcf2177f9581aa87a3c9b9324ab90710c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6970425e6fe8bf951c08086aa53f779f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5d198446fb4ec36f8d914d4c43dbdee2', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x74ecef013abcd870e368a34c756cadb6', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbcde83e5c4ee60f924b55b7aa5f6b3e0', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7714d0cb9242cebbce7ce3427d8979cd', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xabd8f7074805f14a24ed9fe511f5c66d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x18492abd609a95bdf63156b66ad5564f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6ab63bfd50b0fcbc3a9d066cc38f8066', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa66722124c12a187aaa16cd6cbd9ee8b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x10ad34946e668a724c49102fe471e94d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x022bc902ab8445e0b42952f6d65c076f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc907820cab5345e8c64b2e396e316389', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x69db0c47d44876381465fe888ff9dbdb', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcbab1b0d00b003f73b66dbee6018481b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8e08235f24aaee689a2419d00e49254a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa1b0026314f122acb0dbfe57680cfd36', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xee0057664c6f6b91162c643942c6f854', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd277b930a52e68db4bfdce6186f53657', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf8794d9a183e2228f2763ec8dd19b77b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3c25ba47d71a2e1c3c69adbecf51c1be', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x561d12a95a8f63724d404c6366237802', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7ac5b1c034b0efce2e17096139c3d332', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6b566c7c9de30ab63103d2aee1c77666', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1f51af5e304e192c7a4c92411b46a12f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8f0ddcd7fdf05aae1d6ffa29643b233c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3d776644b6f09613a9a3abe8a34107da', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9305aa71fb6976453d47895e426490b6', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0c5ebf1f5d0f480bf6d0e672187be194', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9a3b967d8dd3d9508a289119eb260f4e', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc3cbbfa2ad5b7cf6a2f2ea8cb315e77d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd2b02db90489c326885b8e20d7e21218', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfb9ee7fdff901a4c07d1de67a9c229b3', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xde2e4f78413ccdf741589d7c3624e78d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3774ad1187ba6350af47b6a644ac50c8', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb0b1f6c8bbda85dfe9f4d96bb32dddca', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x27b0cc48526409ed65d246504d2230f2', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2b96a029ef920afaf0b5709de9121ca5', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x993463cc51e2cdb6010aadf9cc5b399e', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0b4db5c5d9b28f1e30bbda8d9534a8c0', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x202bed7521c5553a87a9f235f855abf1', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8c7a570d50fb962aac15436420ff668a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x75743d00e5fefbdb6879236e2f1bd41d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3d0549857276218fc8448b8be7929209', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5c5f12297f23dd94e54bc61a76944e94', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x54c0da63da8d507105219add29be7374', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x69b49fede5439da1c8bef0a2f4af84fd', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1dc7838393aa92f3a1fd73a537457f54', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x43d9e464852c5820b2d14f37ed9c02d7', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x322567b01861593bc966aba90c5190c1', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf0e2b616bffbf26a34024d9c1b530865', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3003ea55e2aa2cb3bb45cd02531a88b0', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x88a3fb7a2f709471874c7b4ff3182312', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x39be60f2f0f4993c1976fc76351c3fdd', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb7dc02dbba2bbf33b05aa5fd093d76bc', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0d88703791f3fbe5c964fbaf1c6dccff', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3c9c2e70852e9d1144886213d89fc181', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc6da78b64a49157704367be60a2e6298', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1bfab3bfe6cab0a9e7d18a058d9f2fb3', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xce654b63eace7263b29ee337cf3a175a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x69b03327db648a141712b5cbd7adc5eb', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7dcf76c5c2113fb5638f5250a2620ecd', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x58dcbe00710194461266587693c82801', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x13034d1feb3f5e0eb5ec1fc695468cb8', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x21e3858c411d5a4b3c48663499b3eeb5', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfc90d642cee948c5023085f27ce215de', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdfe8b2aeededf39ad57c9d25ae7dbb62', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbad8ba971d251c85be08aed30813bedd', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4cb67d4729b04c1abd9f6d1564e34b98', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x633fa89feadf969daaa7a4d277ece44c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc241c22b07dde86622b51ccf34229a5e', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x96f05d512e2c68379c73d1c32454d1be', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x963480c4063879a761ccabe5cbe02d1c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x59b3f2003191c8aeac879f10dad648dc', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xebf0221a429d78a3aea06beaf2a4ef01', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfb650e1295111b91974dcdf78572208a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbff81aea59d1300c9590655c4177883f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfe4a8dd9bcf7f2c32173f4cb6b6d194a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1e5399a4f6e1c1b27fdda3a55e341f39', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4231cae028915d18aeb1652a05ce00c9', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdfa2d18ed69035339bf6039fa1070920', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x69461857def6d9681936371bcbdc35cd', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8c4caf54c33568e55a42cd0bfee3b5b5', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5463fed71b09ec78950a71f0ceaeaefe', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xca1df9e9af8c5315087c9e9cb7e97b36', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x84358af6037b51e16e7f07ddd1b0e66c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x57cdefcfae9d462d560944cc2167db24', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x382a77fcc08c02e7891a6fbb19155a5b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x81a17fbd0d588fb2279024a829f9ca9b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe59658159a03023ac6a46ea3cee06361', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd5c6754fdac36aeedd2f661b70669728', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x783a894a4d4e3aab093a3e9b7b7a8a1f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x279cc32bc4af2569164959cc4334564c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdfc5826e221889c6f4317314501be9e5', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xec50ef0054422b94b1daf1d89c20fe22', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xadde3a0e467df200c2a203ad704ec601', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb10840ff6f96cd889ef2b2a20910b380', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0f108c447673a851f6a7ad36d9c7588a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:[...];
Date: 2023-07-04 18:38:55 Duration: 1s96ms Bind query: yes
20 8s509ms 2 587ms 7s921ms 4s254ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, the berkeley internet name domain (bind) is an implementation of the domain name system (dns) protocols. bind includes a dns server (named); a resolver library (routines for applications to use when interfacing with dns); and tools for verifying that the dns server is operating correctly. for detailed information on changes in this release, see the red h[...];Times Reported Time consuming queries #20
Day Hour Count Duration Avg duration Jul 04 14 2 8s509ms 4s254ms -
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\xee16e5b709fbdb12689c7688aab2bd67', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcfda2c518aa24f5eb35ea6d72c6f08d1', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaf91862e55c9cc0c05b434971d044918', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7b586d5e6c69bca6695c78fff974aeba', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x483c93a86aaae8e6d030fb274a1f4c2d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb3390c9cbc4959fdf37c0a32e0ad3de2', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa5f851858ac7810ab8acbd72e02ee778', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x71608cbeba11adb99cd84f78cab68d6d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7149b31d3f195cc787cd6c0e3ceb799c', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x37056ef6fa1707ea87fb2d3f18ca533d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4f4efbb1c8e75f7e4678b45c97fa8775', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5aae70e9eda187fb4b78d97ffdeacd4d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xae39ee9314cedc45a2002b636a721dce', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x073cbf85ff50a5b7d16909b1a2d1095e', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcba602389cd5eb0d856c2c6336644620', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x047d9e7a71045de4c5b738e5ecea3ecc', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2e8287089b94676464ed939d897839e4', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd2e4d82703bca79020f322d007b91845', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7549447ab68ee3f9eb68dedadb60d6c2', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd65c4e26e6c38943345fb05eda599e1b', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb17d837e22103a0365df26c71186202d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcb0b801adba8d53f133344df70da30d5', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7e26a39d6ca0129ad2d42c78fdc891bd', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb42f609e4c47b9255ff4739ae486d031', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x218a13a0506ab94178e986ac0b0e66ed', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbaa1db9ce780d62e27d8d30508d80124', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x13beea1e27bbc0fc80e6574e159ffb8a', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa94e8fdfa58fb47e88ddc5a95780034e', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa803b1a081bbb8404d64d518c454121e', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2a9ceb61016da7509ceaac156a695842', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa6f7eeaf82e36d7d8ce4317f4df23748', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x35f06c69aaacaa81663beba8af569857', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8539820b8f9e0dc8bc94100d3f52703d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x875e2b664fbd400bc23e490da6269138', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8b5ee9b045f1599f2767ab4cedcc1822', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7b85342c00c3263ca29d2b1e77af9771', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfb6c7b1008c30233447dc5d4003ae680', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x02ea0bffb109722466cc01e93ff55cd2', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x53fe879d73faf9bfe9729490758fe416', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x47700bda8dea9d53b6a7479c50d5f039', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa60d2323fa988648b3adc876f561b931', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcef67f6f9fa7adbf45b79c98c2f6a4eb', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x662bd034ff2b8ceb7beac91e7bef5b85', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x07f3eb01b18ba99d416c5174ccae9349', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2f457f8c9f6ddfa01f8215de3fc2bb78', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x862a4261bb1ed4a05bbcca0828f1e211', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc9276a527e2b33561af4475f2722a861', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5a13b5b2001a34100a370ebedd51c79a', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x10802ab03f9318fc2fb52b0811bffce6', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x43dfa3f273dd39fc126eba2399b8ce0d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x82807b1a69910cc8b96eb73c6b29e8d1', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x86a5fd556b449424faad35d48184ec4e', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3b6759b77212f8cd704904eea2d61110', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x54c6fdaa9acd85d8874de3cf00da5b13', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcb353aa7b3ae1f9113c9f8ae8b747b7f', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6461f35d78dfa0bd78c453f283b01e01', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7edbb9f59bf677ea7f66de059fba2aa4', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x32e1638c1a56aa77d03239cd42cd0904', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x184209d030853c6361e2de63861f1598', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0af3eaace9357aadc58199aa39bb8685', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x276ff4618d9abd079e3357ff3fc4e993', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0527526cb681e4a53d77cfd3c42bf4c2', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa44f45286e47146ba58915af8b9da056', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd9c7491e9516e354a2a3098f339bc42f', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x774caf504b2eaf37ad6f7452c403e8ff', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x82135e5ebfe67d2af5a038752a5d33d5', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4d8c2165cbc7621623551003ebbe0a34', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4ba220428e2c017023016464e80f02eb', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3550ea99fea294e347970ecc21903dc6', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xce5fa538421d9f9df77030e0a642ce8b', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xed30b421450a245796a2dc4b8c1ff433', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x740256e5a9f4feef611641f8c738c815', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa58e395069157d7371981fab45053c6b', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xae920a2ba488ec9e9672ba3227651dbc', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x741107cc26abd451e2d742bbd7b19fff', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x24fcdae6feff2d55d81006f55695e465', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa05f65824f543d89486834675bfaaa8b', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcad8e126c1234a223aac0b79f58133aa', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x20cd5d59f85cc93b54fbf0e48ab5dfda', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc54534001ca3e93c5235c00d564c653b', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc98a0638b162010fd1327716434fe23c', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7b4311de265278ed837b01e16867acad', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb46b07a6d2254baa1ace5a044129713a', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9e9dd711ea568fe641b06f5c99c8f60c', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x59ee8d0a0cb3ab065c846f633b46fd75', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x479af0f4fc4585827f7f7cfeb355bcd4', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xac6b81406a814ac2775413b058d4ef43', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa89213ccb3739aa9564be382d804d72a', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5aecada0bf8fb2b062a63e57679e6e3f', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x787c42cedcd64053a65fb685a34418b9', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red H[...];
Date: 2023-07-04 18:39:50 Duration: 7s921ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x3cbe6eca1479ab24e63859f61665d5f6', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3e4fcf3f40d2110154ca66bccb2ca78b', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0f4b0c0752b8a9b97abeff98c0fd9325', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2e549d1a9ffd846861811d14764d7829', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfef0fd253b9531d89db9e8ac3a561088', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc68712e0a68e745debda9a85df5324d9', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd07cdf2f0887de3d492f4db477c6a852', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x165383db2c7a8ec2ea19def073ee226b', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa6a228481b225147412c6192129ab280', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x07e57f9ae076d748d7e85995921db6f3', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7b283c39f1a48f6ae67684a8dfc937cb', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x06ce8d4f2d2f6628d7b9fbe3bfddbe3c', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfd184b5878e90cf57957c4a4f56cea3f', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0564e9b7998f38d1d69a032fe3463de4', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe66c10b8770b6b4a61efed0ecbb52d92', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x668548c0f74a05a27da8488df89e6c81', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x11c144c5cd35413b472508c671e144d5', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb85d7fd94edcc574a05fed9a8c564edf', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x725a55dbef07536f9164f4960ccbbd7e', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x06bb8b39b9742463683b9e8b48f5e1e5', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2bd3ed153b4e489d2eeb4131568deefd', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x12f8fbce666db64af88390d502982dba', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0892f2dee43121a44b65a41bc0d35829', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf2688cf6e3c3c79fb20a31cfbf5ea6fb', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x97b69e23ae395a9d1fa61771d2b2083d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2e1941b3e06cecdfaa3ecde79ddc1898', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd4c273f0eaa23dc8575030fa881bd1f7', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3aa50c158dc80016257bb1eec4dcff79', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfb44b19556b9bbbd075ecc38587b125b', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4aa06fa001cf09107323afac8357d5ff', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x41b19a78e715d7416360a3e01f0f8d88', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2815228f793eac7f850b3ae7acdc15cc', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8289041a8497546ce3b736d3c335afa7', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0cecce91ba0cf5cde8cf409275fe045d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf45a619974f3cae977eaee8d85e3c5c5', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9ee9e7873fd1e9481f41513b4f25d80f', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x244bac0d437e77e876c9b31eba78261b', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x61497bfd77571cb4bd2a5902b831a16b', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfd79575797e4299f0da79bcff41e1516', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa23793c3eb4f50bc8c5c784e45b599a9', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x849375ca453f95be42ec959ce4abf9cb', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1a9db7642dd13bbb45bb135aeb0b865d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb5ce248bc61aff4e545dd1888992db97', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x26ccd740d0f26a85aab4fc4852960fd7', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x77d008c38115217e69c4011fe6476ad3', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdc0083a1ff5f11f2c2ba4f3056ea2017', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfdf8b17a6e835d136ab311d6be07fc31', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x57fa16d08bd34c9a94d25005226ffe62', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x74600a3e78504cc1468b9f5ebc7a3a3c', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x935211e9a672a4e978cdefd6b5a580b1', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xae4e8daec7df0e1951a6fea8f33e2b7c', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x861957ebc6ea58ef0cc1290065889de4', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x31c2ba9995a7145d8a3e6820b90ab245', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x24d1c63e9b4617ffb6cc5e0020956bcc', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x164be00d557ab30ca2e967fac44d4f57', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x03476934b245176ab1f2636369b3574f', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x605ec5e6cb4c8ca9d68248c1118b6d8e', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf482d4e3963b0211eefe86f21b56ff5a', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc93da4fb0b9ece0f4324ebb4dcf1b918', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcabcb310e782bf6175f286c16cd1297f', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x500e49a2b037b17dcbbefbd7e458c2e8', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x02b3d9f67dbeebe7561b388df154b4b5', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfaec48d1f16f8dae124aba86c7aedab7', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc89676c932c82170afcca68d9c9fd357', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa1193937303f95f09f741b1730b86877', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1ff8e1d7935046b60614080fda35ad77', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdc8f2d49797bf5138a179740485be931', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x49da939b3d7a2bcf990503f4f6b3c283', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb920eb5bdafd5bc12065e6329b79cd16', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdd979f1cbfd7d70f99372ebf26d4d87d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x263b2cb6785693da2eb512e3246a01df', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x55b8c42251d8c7aa3750b9369e929a65', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc1e8bbe84ab10c1fb10e6f864318b94a', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x15e22016e8e4cbdb6416c7b69562e808', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x90068a92a4995ec8aef46053a44b718a', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf14a566444e5269c2896c35278a76d9c', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe31062bb19c704dfb274bc308bb619ea', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf19dbd83f35f01cb13be3e017dff67f9', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbce1fe67be2f4571005967c8d06ff4e2', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc2f1c3df78921f63675d4fafc86d5d32', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa5271b46aaa36c2a53ef97efb45655ba', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xec2a364d5596e6caf62d3c6ffbedadd5', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xeac9f3eb313b22624b335d70d418e4fd', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x59e1f454450e28467751af03466b170d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x49f0dabaa7ee7ab0d2a22f30c1fbe821', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x285d68637debf223cc61414eb13bfd6e', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf3c446bfdba1453022253f63694111b4', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x82649cd06cdd71ea785a9fda5a24273c', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x11fcb5aa67ca69cee5a8bd60062e15e8', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x489eb8a8d689bd1da97c88e705e0620a', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red H[...];
Date: 2023-07-04 18:35:35 Duration: 587ms Bind query: yes
Most frequent queries (N)
Rank Times executed Total duration Min duration Max duration Avg duration Query 1 5,387,543 1h10m22s 0ms 2s134ms 0ms insert into uo_vuln (uo, vuln) values (?, ( select id from vuln where hash_kind = ? and hash = ?)) on conflict do nothing;Times Reported Time consuming queries #1
Day Hour Count Duration Avg duration Jul 04 14 5,387,543 1h10m22s 0ms -
INSERT INTO uo_vuln (uo, vuln) VALUES ('240', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xe0985c3977fdc77854e430ae9822ef7c')) ON CONFLICT DO NOTHING;
Date: 2023-07-04 18:47:39 Duration: 2s134ms Bind query: yes
-
INSERT INTO uo_vuln (uo, vuln) VALUES ('455', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xc3a5da79b853d490a30519638168a76f')) ON CONFLICT DO NOTHING;
Date: 2023-07-04 18:47:39 Duration: 2s134ms Bind query: yes
-
INSERT INTO uo_vuln (uo, vuln) VALUES ('349', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xdc4850040e6bebaa66a87a623f0677ab')) ON CONFLICT DO NOTHING;
Date: 2023-07-04 18:47:39 Duration: 2s134ms Bind query: yes
2 132,428 1m8s 0ms 1s649ms 0ms insert into uo_enrich (enrich, updater, uo, date) values (( select id from enrichment where hash_kind = ? and hash = ? and updater = ?), ?, ?, transaction_timestamp()) on conflict do nothing;Times Reported Time consuming queries #2
Day Hour Count Duration Avg duration Jul 04 14 132,428 1m8s 0ms -
INSERT INTO uo_enrich (enrich, updater, uo, date) VALUES (( SELECT id FROM enrichment WHERE hash_kind = 'md5' AND hash = '\x8fcfa6a5f64e25d3f95e1f322615c9d2' AND updater = 'clair.cvss'), $3, '207', transaction_timestamp()) ON CONFLICT DO NOTHING;
Date: 2023-07-04 18:36:19 Duration: 1s649ms Bind query: yes
-
INSERT INTO uo_enrich (enrich, updater, uo, date) VALUES (( SELECT id FROM enrichment WHERE hash_kind = 'md5' AND hash = '\x6d8c1f5f6e2ef57c03fdf9570f4b9ef2' AND updater = 'clair.cvss'), $3, '207', transaction_timestamp()) ON CONFLICT DO NOTHING;
Date: 2023-07-04 18:38:15 Duration: 1s450ms Bind query: yes
-
INSERT INTO uo_enrich (enrich, updater, uo, date) VALUES (( SELECT id FROM enrichment WHERE hash_kind = 'md5' AND hash = '\xe6b5b3855f0e71ed71ce6acd7c8ff2ff' AND updater = 'clair.cvss'), $3, '207', transaction_timestamp()) ON CONFLICT DO NOTHING;
Date: 2023-07-04 18:37:18 Duration: 1s189ms Bind query: yes
3 132,422 1m13s 0ms 1s294ms 0ms insert into enrichment (hash_kind, hash, updater, tags, data) values (?, ?, ?, ?, ?) on conflict (hash_kind, hash) do nothing;Times Reported Time consuming queries #3
Day Hour Count Duration Avg duration Jul 04 14 132,422 1m13s 0ms -
INSERT INTO enrichment (hash_kind, hash, updater, tags, data) VALUES ('md5', '\x3f7d7cefd56fb0af4ea2160f331c004b', 'clair.cvss', '{CVE-2019-15986}', '{"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.7, "attackVector": "LOCAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}') ON CONFLICT (hash_kind, hash) DO NOTHING;
Date: 2023-07-04 18:36:49 Duration: 1s294ms Bind query: yes
-
INSERT INTO enrichment (hash_kind, hash, updater, tags, data) VALUES ('md5', '\xaab4109cec72fae530120b1ab8b73c8b', 'clair.cvss', '{CVE-2019-9821}', '{"scope": "UNCHANGED", "version": "3.0", "baseScore": 8.1, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}') ON CONFLICT (hash_kind, hash) DO NOTHING;
Date: 2023-07-04 18:37:00 Duration: 711ms Bind query: yes
-
INSERT INTO enrichment (hash_kind, hash, updater, tags, data) VALUES ('md5', '\xa66c6961281db4ae55d617f4ee2b3f4a', 'clair.cvss', '{CVE-2021-24378}', '{"scope": "CHANGED", "version": "3.1", "baseScore": 4.8, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "HIGH", "confidentialityImpact": "LOW"}') ON CONFLICT (hash_kind, hash) DO NOTHING;
Date: 2023-07-04 18:37:31 Duration: 706ms Bind query: yes
4 3,803 70ms 0ms 0ms 0ms begin;Times Reported Time consuming queries #4
Day Hour Count Duration Avg duration Jul 04 14 3,803 70ms 0ms [ User: clair - Total duration: 1ms - Times executed: 43 ]
[ Application: libvuln - Total duration: 1ms - Times executed: 43 ]
-
begin;
Date: 2023-07-04 18:39:27 Duration: 0ms
-
begin;
Date: 2023-07-04 18:39:40 Duration: 0ms
-
begin;
Date: 2023-07-04 18:38:59 Duration: 0ms
5 2,223 20ms 0ms 0ms 0ms select lock from pg_try_advisory_lock(?) lock where lock = true;Times Reported Time consuming queries #5
Day Hour Count Duration Avg duration Jul 04 14 2,223 20ms 0ms -
SELECT lock FROM pg_try_advisory_lock('-6159899678148014059') lock WHERE lock = true;
Date: 2023-07-04 18:40:28 Duration: 0ms Bind query: yes
-
SELECT lock FROM pg_try_advisory_lock('3187820024485633949') lock WHERE lock = true;
Date: 2023-07-04 18:39:39 Duration: 0ms Bind query: yes
-
SELECT lock FROM pg_try_advisory_lock('3826751150323989133') lock WHERE lock = true;
Date: 2023-07-04 18:39:17 Duration: 0ms Bind query: yes
6 2,088 3m27s 0ms 1s958ms 99ms commit;Times Reported Time consuming queries #6
Day Hour Count Duration Avg duration Jul 04 14 2,088 3m27s 99ms -
commit;
Date: 2023-07-04 18:39:33 Duration: 1s958ms
-
commit;
Date: 2023-07-04 18:40:46 Duration: 1s831ms
-
commit;
Date: 2023-07-04 18:40:46 Duration: 1s831ms
7 2,042 22ms 0ms 0ms 0ms select lock from pg_advisory_unlock(?) lock where lock = true;Times Reported Time consuming queries #7
Day Hour Count Duration Avg duration Jul 04 14 2,042 22ms 0ms -
SELECT lock FROM pg_advisory_unlock('6566326377784935540') lock WHERE lock = true;
Date: 2023-07-04 18:40:29 Duration: 0ms Bind query: yes
-
SELECT lock FROM pg_advisory_unlock('6787972234854831374') lock WHERE lock = true;
Date: 2023-07-04 18:40:15 Duration: 0ms Bind query: yes
-
SELECT lock FROM pg_advisory_unlock('6196417692943008247') lock WHERE lock = true;
Date: 2023-07-04 18:40:49 Duration: 0ms Bind query: yes
8 1,715 477ms 0ms 52ms 0ms select ref, updater, fingerprint, date from update_operation where updater = any (?) and kind = ? order by id desc;Times Reported Time consuming queries #8
Day Hour Count Duration Avg duration Jul 04 14 1,715 477ms 0ms -
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ('{photon-updater-photon1}') AND kind = 'vulnerability' ORDER BY id DESC;
Date: 2023-07-04 18:41:02 Duration: 52ms Bind query: yes
-
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ('{RHEL7-dotnet-2.2-including-unpatched}') AND kind = 'vulnerability' ORDER BY id DESC;
Date: 2023-07-04 18:41:05 Duration: 38ms Bind query: yes
-
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ('{RHEL7-dotnet-6.0-including-unpatched}') AND kind = 'vulnerability' ORDER BY id DESC;
Date: 2023-07-04 18:40:39 Duration: 32ms Bind query: yes
9 1,713 53ms 0ms 0ms 0ms rollback;Times Reported Time consuming queries #9
Day Hour Count Duration Avg duration Jul 04 14 1,713 53ms 0ms -
rollback;
Date: 2023-07-04 18:41:11 Duration: 0ms
-
rollback;
Date: 2023-07-04 18:40:00 Duration: 0ms
-
rollback;
Date: 2023-07-04 18:40:35 Duration: 0ms
10 1,653 2m15s 0ms 1s885ms 81ms insert into updater_status (updater_name, last_attempt, last_success, last_run_succeeded, last_attempt_fingerprint) values (?, ?, ?, ?, ?) on conflict (updater_name) do update set last_attempt = ?, last_success = ?, last_run_succeeded = ?, last_attempt_fingerprint = ? returning updater_name;Times Reported Time consuming queries #10
Day Hour Count Duration Avg duration Jul 04 14 1,653 2m15s 81ms -
INSERT INTO updater_status (updater_name, last_attempt, last_success, last_run_succeeded, last_attempt_fingerprint) VALUES ('RHEL6-rhel-6-extras', '2023-07-04 18:39:31.481111+00', $2, 'true', '{"Etag":"\"d6027a87257c4753a606d67725005cdd\"","Date":"Fri, 30 Jun 2023 21:35:51 GMT"}') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_success = $2, last_run_succeeded = 'true', last_attempt_fingerprint = $3 RETURNING updater_name;
Date: 2023-07-04 18:39:33 Duration: 1s885ms Bind query: yes
-
INSERT INTO updater_status (updater_name, last_attempt, last_success, last_run_succeeded, last_attempt_fingerprint) VALUES ('RHEL7-openshift-3.10', '2023-07-04 18:39:31.477477+00', $2, 'true', '{"Etag":"\"b060a1bfb8d505f2204f9673a6186ef1\"","Date":"Sat, 01 Jul 2023 07:28:36 GMT"}') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_success = $2, last_run_succeeded = 'true', last_attempt_fingerprint = $3 RETURNING updater_name;
Date: 2023-07-04 18:39:33 Duration: 1s778ms Bind query: yes
-
INSERT INTO updater_status (updater_name, last_attempt, last_success, last_run_succeeded, last_attempt_fingerprint) VALUES ('RHEL7-ansible-2.5', '2023-07-04 18:39:31.899678+00', $2, 'true', '{"Etag":"\"51a323b1fcd3e5e3e61ca77fb12411dd\"","Date":"Sat, 01 Jul 2023 07:34:09 GMT"}') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_success = $2, last_run_succeeded = 'true', last_attempt_fingerprint = $3 RETURNING updater_name;
Date: 2023-07-04 18:39:34 Duration: 1s601ms Bind query: yes
11 354 29s560ms 0ms 1s665ms 83ms insert into update_operation (updater, fingerprint, kind) values (?, ?, ?) returning id, ref;Times Reported Time consuming queries #11
Day Hour Count Duration Avg duration Jul 04 14 354 29s560ms 83ms -
INSERT INTO update_operation (updater, fingerprint, kind) VALUES ('RHEL6-rhsso-including-unpatched', '{"Etag":"\"349623598899226c6eb4ebb7289d35bd\"","Date":"Tue, 04 Jul 2023 12:51:24 GMT"}', 'vulnerability') RETURNING id, ref;
Date: 2023-07-04 18:39:33 Duration: 1s665ms Bind query: yes
-
INSERT INTO update_operation (updater, fingerprint, kind) VALUES ('RHEL7-openstack-14', '{"Etag":"\"0ff35622be2e5c2ca764c85e29bb2be1\"","Date":"Sat, 01 Jul 2023 07:29:47 GMT"}', 'vulnerability') RETURNING id, ref;
Date: 2023-07-04 18:39:33 Duration: 1s254ms Bind query: yes
-
INSERT INTO update_operation (updater, fingerprint, kind) VALUES ('osv/npm', '"21b1b656743a59c5e8d6c1c6f028abee"', 'vulnerability') RETURNING id, ref;
Date: 2023-07-04 18:41:43 Duration: 865ms Bind query: yes
12 352 7ms 0ms 0ms 0ms ; ? - 07 - 04 ? : ? : ?.? utc[?] debug: autovacuum: processing database "postgres";Times Reported Time consuming queries #12
Day Hour Count Duration Avg duration Jul 04 08 23 0ms 0ms 09 60 1ms 0ms 10 58 1ms 0ms 11 59 1ms 0ms 12 60 1ms 0ms 13 58 1ms 0ms 14 34 0ms 0ms -
; 2023 - 07 - 04 14:11:45.352 UTC[326] DEBUG: autovacuum: processing database "postgres";
Date: 2023-07-04 14:11:42 Duration: 0ms
-
; 2023 - 07 - 04 14:53:25.930 UTC[449] DEBUG: autovacuum: processing database "postgres";
Date: 2023-07-04 14:53:22 Duration: 0ms
-
; 2023 - 07 - 04 17:36:48.735 UTC[935] DEBUG: autovacuum: processing database "postgres";
Date: 2023-07-04 17:36:47 Duration: 0ms
13 334 6ms 0ms 0ms 0ms ; ? - 07 - 04 ? : ? : ?.? utc[?] debug: autovacuum: processing database "clair";Times Reported Time consuming queries #13
Day Hour Count Duration Avg duration Jul 04 08 21 0ms 0ms 09 58 1ms 0ms 10 52 1ms 0ms 11 56 1ms 0ms 12 59 1ms 0ms 13 60 1ms 0ms 14 28 0ms 0ms -
; 2023 - 07 - 04 17:45:28.816 UTC[961] DEBUG: autovacuum: processing database "clair";
Date: 2023-07-04 17:45:27 Duration: 0ms
-
; 2023 - 07 - 04 14:47:05.985 UTC[430] DEBUG: autovacuum: processing database "clair";
Date: 2023-07-04 14:47:02 Duration: 0ms
-
; 2023 - 07 - 04 17:37:28.701 UTC[937] DEBUG: autovacuum: processing database "clair";
Date: 2023-07-04 17:37:27 Duration: 0ms
14 324 6ms 0ms 0ms 0ms ; ? - 07 - 04 ? : ? : ?.? utc[?] debug: autovacuum: processing database "template1";Times Reported Time consuming queries #14
Day Hour Count Duration Avg duration Jul 04 08 25 0ms 0ms 09 49 0ms 0ms 10 56 1ms 0ms 11 54 1ms 0ms 12 56 1ms 0ms 13 49 0ms 0ms 14 35 0ms 0ms -
; 2023 - 07 - 04 15:15:46.271 UTC[516] DEBUG: autovacuum: processing database "template1";
Date: 2023-07-04 15:15:42 Duration: 0ms
-
; 2023 - 07 - 04 17:41:08.756 UTC[948] DEBUG: autovacuum: processing database "template1";
Date: 2023-07-04 17:41:07 Duration: 0ms
-
; 2023 - 07 - 04 16:44:07.964 UTC[777] DEBUG: autovacuum: processing database "template1";
Date: 2023-07-04 16:44:07 Duration: 0ms
15 93 522ms 0ms 267ms 5ms insert into uo_vuln (uo, vuln) values (?, ( select id from vuln where hash_kind = ? and hash = ?)) on conflict do nothing; ? - 07 - 04 ? : ? : ?.? utc[?] debug: checkpoint sync: number = ? file = base / ? / ? time = ?.? ms;Times Reported Time consuming queries #15
Day Hour Count Duration Avg duration Jul 04 14 93 522ms 5ms -
INSERT INTO uo_vuln (uo, vuln) VALUES ('476', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xf2da568ac20e9b8cb3a56c483927d55a')) ON CONFLICT DO NOTHING; 2023 - 07 - 04 18:41:49.915 UTC[15] DEBUG: checkpoint sync: number = 38 file = base / 16384 / 16919 time = 0.007 ms;
Date: 2023-07-04 18:41:49 Duration: 267ms Bind query: yes
-
INSERT INTO uo_vuln (uo, vuln) VALUES ('349', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xc8947e062a3a2500bb34c3391f7edb3d')) ON CONFLICT DO NOTHING; 2023 - 07 - 04 18:49:15.522 UTC[15] DEBUG: checkpoint sync: number = 4 file = base / 16384 / 16925 time = 0.028 ms;
Date: 2023-07-04 18:49:15 Duration: 59ms Bind query: yes
-
INSERT INTO uo_vuln (uo, vuln) VALUES ('268', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xf22c40d47c7f4c27db1125374751694d')) ON CONFLICT DO NOTHING; 2023 - 07 - 04 18:46:05.056 UTC[15] DEBUG: checkpoint sync: number = 15 file = base / 16384 / 16953 time = 28.637 ms;
Date: 2023-07-04 18:46:05 Duration: 34ms Bind query: yes
16 69 0ms 0ms 0ms 0ms select exists ( select ? from scanner where name = ? and version = ? and kind = ?);Times Reported Time consuming queries #16
Day Hour Count Duration Avg duration Jul 04 14 69 0ms 0ms -
SELECT EXISTS ( SELECT 1 FROM scanner WHERE name = 'dpkg' AND version = '5' AND kind = 'package');
Date: 2023-07-04 18:41:02 Duration: 0ms Bind query: yes
-
SELECT EXISTS ( SELECT 1 FROM scanner WHERE name = 'dpkg' AND version = '5' AND kind = 'package');
Date: 2023-07-04 18:37:46 Duration: 0ms Bind query: yes
-
SELECT EXISTS ( SELECT 1 FROM scanner WHERE name = 'dpkg' AND version = '5' AND kind = 'package');
Date: 2023-07-04 18:38:46 Duration: 0ms Bind query: yes
17 33 0ms 0ms 0ms 0ms ; ? - 07 - 04 ? : ? : ?.? utc[?] debug: checkpoint skipped because system is idle ? - 07 - 04 ? : ? : ?.? utc[?] debug: autovacuum: processing database "template1";Times Reported Time consuming queries #17
Day Hour Count Duration Avg duration Jul 04 09 10 0ms 0ms 10 4 0ms 0ms 11 5 0ms 0ms 12 3 0ms 0ms 13 11 0ms 0ms -
; 2023 - 07 - 04 17:05:08.003 UTC[15] DEBUG: checkpoint skipped because system is idle 2023 - 07 - 04 17:05:08.279 UTC[840] DEBUG: autovacuum: processing database "template1";
Date: 2023-07-04 17:05:07 Duration: 0ms
-
; 2023 - 07 - 04 13:25:04.491 UTC[15] DEBUG: checkpoint skipped because system is idle 2023 - 07 - 04 13:25:04.788 UTC[186] DEBUG: autovacuum: processing database "template1";
Date: 2023-07-04 13:25:02 Duration: 0ms
-
; 2023 - 07 - 04 14:00:04.976 UTC[15] DEBUG: checkpoint skipped because system is idle 2023 - 07 - 04 14:00:05.385 UTC[291] DEBUG: autovacuum: processing database "template1";
Date: 2023-07-04 14:00:02 Duration: 0ms
18 30 0ms 0ms 0ms 0ms select version from libvuln_migrations where version = ?;Times Reported Time consuming queries #18
Day Hour Count Duration Avg duration Jul 04 14 30 0ms 0ms -
SELECT version FROM libvuln_migrations WHERE version = 1;
Date: 2023-07-04 18:41:02 Duration: 0ms Bind query: yes
-
SELECT version FROM libvuln_migrations WHERE version = 1;
Date: 2023-07-04 18:38:47 Duration: 0ms Bind query: yes
-
SELECT version FROM libvuln_migrations WHERE version = 1;
Date: 2023-07-04 18:37:47 Duration: 0ms Bind query: yes
19 28 1s395ms 0ms 356ms 49ms insert into updater_status (updater_name, last_attempt, last_run_succeeded, last_attempt_fingerprint, last_error) values (?, ?, ?, ?, ?) on conflict (updater_name) do update set last_attempt = ?, last_run_succeeded = ?, last_attempt_fingerprint = ?, last_error = ? returning updater_name;Times Reported Time consuming queries #19
Day Hour Count Duration Avg duration Jul 04 14 28 1s395ms 49ms -
INSERT INTO updater_status (updater_name, last_attempt, last_run_succeeded, last_attempt_fingerprint, last_error) VALUES ('RHEL7-openshift-3.1', '2023-07-04 18:41:17.759863+00', 'false', '', 'failed to begin transaction: failed to connect to `host=postgres-clair user=clair database=clair`: server error (FATAL: sorry, too many clients already (SQLSTATE 53300))') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_run_succeeded = 'false', last_attempt_fingerprint = $3, last_error = $4 RETURNING updater_name;
Date: 2023-07-04 18:41:18 Duration: 356ms Bind query: yes
-
INSERT INTO updater_status (updater_name, last_attempt, last_run_succeeded, last_attempt_fingerprint, last_error) VALUES ('RHEL6-rhel-6.5-tus', '2023-07-04 18:41:19.546381+00', 'false', '', 'failed to begin transaction: failed to connect to `host=postgres-clair user=clair database=clair`: server error (FATAL: sorry, too many clients already (SQLSTATE 53300))') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_run_succeeded = 'false', last_attempt_fingerprint = $3, last_error = $4 RETURNING updater_name;
Date: 2023-07-04 18:41:19 Duration: 268ms Bind query: yes
-
INSERT INTO updater_status (updater_name, last_attempt, last_run_succeeded, last_attempt_fingerprint, last_error) VALUES ('RHEL9-rhel-9.0-eus', '2023-07-04 18:41:20.268711+00', 'false', '', 'failed to begin transaction: failed to connect to `host=postgres-clair user=clair database=clair`: server error (FATAL: sorry, too many clients already (SQLSTATE 53300))') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_run_succeeded = 'false', last_attempt_fingerprint = $3, last_error = $4 RETURNING updater_name;
Date: 2023-07-04 18:41:20 Duration: 188ms Bind query: yes
20 23 300ms 0ms 268ms 13ms insert into uo_vuln (uo, vuln) values (?, ( select id from vuln where hash_kind = ? and hash = ?)) on conflict do nothing; ? - 07 - 04 ? : ? : ?.? utc[?] debug: checkpoint sync: number = ? file = base / ? / ? _fsm time = ?.? ms;Times Reported Time consuming queries #20
Day Hour Count Duration Avg duration Jul 04 14 23 300ms 13ms -
INSERT INTO uo_vuln (uo, vuln) VALUES ('268', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\x4d8b89873db8b780afd3e28b9088d507')) ON CONFLICT DO NOTHING; 2023 - 07 - 04 18:41:49.916 UTC[15] DEBUG: checkpoint sync: number = 39 file = base / 16384 / 2840_fsm time = 0.019 ms;
Date: 2023-07-04 18:41:49 Duration: 268ms Bind query: yes
-
INSERT INTO uo_vuln (uo, vuln) VALUES ('465', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xca8122caa65185af1932d1f270c25420')) ON CONFLICT DO NOTHING; 2023 - 07 - 04 18:44:29.095 UTC[15] DEBUG: checkpoint sync: number = 11 file = base / 16384 / 16925_fsm time = 0.008 ms;
Date: 2023-07-04 18:44:29 Duration: 20ms Bind query: yes
-
INSERT INTO uo_vuln (uo, vuln) VALUES ('206', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xd40a184a1ee7a14fce7520e3821ce97a')) ON CONFLICT DO NOTHING; 2023 - 07 - 04 18:43:56.092 UTC[15] DEBUG: checkpoint sync: number = 9 file = base / 16384 / 16925_fsm time = 0.002 ms;
Date: 2023-07-04 18:43:55 Duration: 9ms Bind query: yes
Normalized slowest queries (N)
Rank Min duration Max duration Avg duration Times executed Total duration Query 1 0ms 6m7s 19s421ms 19 6m9s delete from vuln v1 using vuln v2 left join uo_vuln uvl on v2.id = uvl.vuln where uvl.vuln is null and v2.updater = ? and v1.id = v2.id;Times Reported Time consuming queries #1
Day Hour Count Duration Avg duration Jul 04 14 19 6m9s 19s421ms -
DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = 'suse-updater-suse.linux.enterprise.server.11' AND v1.id = v2.id;
Date: 2023-07-04 18:47:48 Duration: 6m7s Bind query: yes
-
DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = 'RHEL7-rhel-7.4-tus' AND v1.id = v2.id;
Date: 2023-07-04 18:41:41 Duration: 687ms Bind query: yes
-
DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = 'RHEL7-jboss-eap-6' AND v1.id = v2.id;
Date: 2023-07-04 18:41:40 Duration: 389ms Bind query: yes
2 9s944ms 9s944ms 9s944ms 1 9s944ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, https: / / access.redh[...];Times Reported Time consuming queries #2
Day Hour Count Duration Avg duration Jul 04 14 1 9s944ms 9s944ms -
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x10407dc66e0363fca3c37bf49a1315a9', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly16.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5bfa2bd8aed79c1d9d30e289fec06a25', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly16.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd7c9dc482d09385454cc6a2cd2e8637e', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly16.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x749fecac7c9f8ba004b60d143be4aff6', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly16.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x40321c510b676b589bfe9a4ab7f03c45', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly17.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x403fd184006fb28cb79668a7dfce704f', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly17.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6148f263e1683d444d001b3ee30f0a0f', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly17.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3f09d51c207b55338209f758bca01d0a', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly17.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x59bfcafd6451d50015c9b880caf772e9', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly17.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa16f110a5b49a326f5a2e7b371cbab1a', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly17.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8234e27523b7e243c2e0094e6b6b9ee5', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly18.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x37a51d265769cf4ef0cfb0bab403fc76', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly18.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x476fef3ad97cf47d44bde8e5fa94d2e8', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly18.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x172a73f49c943853bea8eb27ef870012', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly18.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3419bfa174a0538f28a75faf478fad05', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly18.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc39b4092d15076f7bb2bc54123eafadc', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly18.0-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x443aa34b1be71520fbc8d57f8ec9e8f4', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly8.2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5d09e74777d0e74978cac6800e424454', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly8.2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbee6cc228cc1df5d09cf08f600cd4669', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly8.2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8dd8fd7955ab0ca47d104e569d637755', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly8.2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe237cf7734926cb5b05dbfe8b5e8886c', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly8.2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfd0c668a5ee8f142f18eb9a217130857', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly8.2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa1474d967f9c8bfcad158209cc9a89f2', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly9.0', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2dc4e330e580babc24d2c167bc3da33c', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly9.0', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3ec5c8f3b75a0377b0916e60e89078f3', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly9.0', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7d2adef343c6da8ffae58114dcc92040', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly9.0', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x890df469f0c008e6c2e4b122abd05f3b', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly9.0', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x268b52d5374c572103d4ea3e8335eb33', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-jboss-server-migration-wildfly9.0', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el6', 'rhel-cpe-repository', '', '0:1.7.1-5.Final_redhat_00006.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x088146eb06f468dd8e054ed71c3940fa', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-undertow', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:2.0.30-3.SP3_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7296fb08ed35ea68aa723262f81fd3b3', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-undertow', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:2.0.30-3.SP3_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfbcf0269dee70891418612af9e55bf89', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-undertow', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6', 'rhel-cpe-repository', '', '0:2.0.30-3.SP3_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1d43977fcffc529975c0929f55c8ee1c', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-undertow', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:2.0.30-3.SP3_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x254c7b5e6d37dcad9fd7608eb6c31257', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-undertow', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6', 'rhel-cpe-repository', '', '0:2.0.30-3.SP3_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x86e964d6bf7b9e2d9453fec22d62e550', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-undertow', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el6', 'rhel-cpe-repository', '', '0:2.0.30-3.SP3_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xec4041aa1ed6dae59d86fe5f748812a0', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1c19349b5fb204946cc65d00c019a33c', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xba4e23235c7700c93eed8339f34b564a', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xeba3473bc3018b4a7c8b797b8d872d6b', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf54dbd488bb804c2715369a0b1fc34e2', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcb48ec14b014a1e67a5eeeec9c64558d', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el6', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5954c1e265fd40a4c06cce5629ca5e07', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x545a03f7a865539beaa485122ce09247', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf8bb0d70dec0ab408322215f32fc7f86', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el6', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3c73cbb307d53c9f24cdb6ae6c9d74c2', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0f8efa7c7357bec21ecf2e0edfed03ec', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfdbb32df4c22712dc6b93b03c3627103', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7::el6', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc9be0c3c3182aef4d2c595d43b323b44', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate-entitymanager', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2305a9d2506dcb18a17680e133146458', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2511 https://access.redhat.com/security/cve/CVE-2018-14371 https://access.redhat.com/security/cve/CVE-2019-0205 https://access.redhat.com/security/cve/CVE-2019-0210 https://access.redhat.com/security/cve/CVE-2019-10172 https://access.redhat.com/security/cve/CVE-2019-12423 https://access.redhat.com/security/cve/CVE-2019-14887 https://access.redhat.com/security/cve/CVE-2019-17573 https://access.redhat.com/security/cve/CVE-2020-10688 https://access.redhat.com/security/cve/CVE-2020-10705 https://access.redhat.com/security/cve/CVE-2020-10719 https://access.redhat.com/security/cve/CVE-2020-1695 https://access.redhat.com/security/cve/CVE-2020-1719 https://access.redhat.com/security/cve/CVE-2020-1729 https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/cve/CVE-2020-1757 https://access.redhat.com/security/cve/CVE-2020-6950 https://access.redhat.com/security/cve/CVE-2020-7226 https://access.redhat.com/security/cve/CVE-2020-8840 https://access.redhat.com/security/cve/CVE-2020-9546 https://access.redhat.com/security/cve/CVE-2020-9547 https://access.redhat.com/security/cve/CVE-2020-9548', 'Important', 'High', 'eap7-hibernate-entitymanager', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/a:redhat:jboss_enterprise_application_platform:7.2', 'rhel-cpe-repository', '', '0:5.3.16-1.Final_redhat_00001.1.el6eap', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x48cb263d7525dce6867783b5cd28281b', 'RHSA-2020:2511: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update (Important)', 'RHEL6-jboss-eap-7', 'Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.', '2020-06-11 00:00:00+00', 'https://access.redh[...];
Date: 2023-07-04 18:39:52 Duration: 9s944ms Bind query: yes
3 9s150ms 9s150ms 9s150ms 1 9s150ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, xfdd28b6fe7bee1632b24dc8e9ed[...];Times Reported Time consuming queries #3
Day Hour Count Duration Avg duration Jul 04 14 1 9s150ms 9s150ms -
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x41157a171274e8fac6ce5a78162eff13', 'RHBA-2011:1656: mod_nss bug fix update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The mod_nss module provides strong cryptography for the Apache HTTP Server via the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, using the Network Security Services (NSS) security library. Users of mod_nss are advised to upgrade to this updated package, which fixes these bugs.', '2011-12-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2011:1656 https://access.redhat.com/security/cve/CVE-2011-4973', 'Moderate', 'Medium', 'mod_nss', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.0.8-13.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x799a0d4aeaf0d1542c38453f7e8637b0', 'RHBA-2012:0763: glibc bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Users of glibc are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0763 https://access.redhat.com/security/cve/CVE-2012-6686', 'Moderate', 'Medium', 'glibc', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.12-1.80.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa456872337872ba24f1f1eff474ae6b0', 'RHBA-2012:0763: glibc bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Users of glibc are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0763 https://access.redhat.com/security/cve/CVE-2012-6686', 'Moderate', 'Medium', 'glibc-common', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.12-1.80.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x816835af9b6e486a97961836e8b5691a', 'RHBA-2012:0763: glibc bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Users of glibc are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0763 https://access.redhat.com/security/cve/CVE-2012-6686', 'Moderate', 'Medium', 'glibc-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.12-1.80.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x26ce31750df85faf81d839f65bffc35e', 'RHBA-2012:0763: glibc bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Users of glibc are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0763 https://access.redhat.com/security/cve/CVE-2012-6686', 'Moderate', 'Medium', 'glibc-headers', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.12-1.80.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9efd7fb83d629d1b5b680134c26b1487', 'RHBA-2012:0763: glibc bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Users of glibc are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0763 https://access.redhat.com/security/cve/CVE-2012-6686', 'Moderate', 'Medium', 'glibc-static', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.12-1.80.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x51f404f8c8cf8d6481c1b61b933da0fd', 'RHBA-2012:0763: glibc bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Users of glibc are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0763 https://access.redhat.com/security/cve/CVE-2012-6686', 'Moderate', 'Medium', 'glibc-utils', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.12-1.80.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa1908b5da9ca7d9273907984fc15ed78', 'RHBA-2012:0763: glibc bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The glibc packages provide the standard C and standard math libraries used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Users of glibc are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0763 https://access.redhat.com/security/cve/CVE-2012-6686', 'Moderate', 'Medium', 'nscd', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.12-1.80.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x396106a9cff1009cc7f9392c7d28948b', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x88d4cf3b9f17bc6bc355e79dd2b4fb21', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius-krb5', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4b950d0e56f65a2fd994043f5370c719', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius-ldap', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4d0c578be9c44766e94c25736f4b6311', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius-mysql', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7de219ae488f0a7dde11f137814e0d7d', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius-perl', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5e965282cde7612f9ec06e674cb2807f', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius-postgresql', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2798d1aa389778d825fe4a12cfcd043c', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius-python', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x830b0c2a3a1e0de572a9c3ff54a4f297', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius-unixODBC', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9215b3749993f5cc1264dce92a82f5bf', 'RHBA-2012:0881: freeradius bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'FreeRADIUS is an open-source Remote Authentication Dial In User Service (RADIUS) server which allows RADIUS clients to perform authentication against the RADIUS server. The RADIUS server may optionally perform accounting of its operations using the RADIUS protocol. All users of freeradius are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2012-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2012:0881 https://access.redhat.com/security/cve/CVE-2011-4966', 'Low', 'Low', 'freeradius-utils', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.12-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x20abf00c601382b0b9c9738110c01cab', 'RHBA-2013:0363: sudo bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The sudo (super user do) utility allows system administrators to give certain users the ability to run commands as root. Users of sudo are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2013-02-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:0363 https://access.redhat.com/security/cve/CVE-2013-1776', 'Low', 'Low', 'sudo', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.8.6p3-7.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa068cd200d007af8c688aa0b6401bad3', 'RHBA-2013:0363: sudo bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The sudo (super user do) utility allows system administrators to give certain users the ability to run commands as root. Users of sudo are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2013-02-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:0363 https://access.redhat.com/security/cve/CVE-2013-1776', 'Low', 'Low', 'sudo-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.8.6p3-7.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6045b7931286bb5cb5ba0f7958ff47e2', 'RHBA-2013:0386: tuned bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'The tuned packages contain a daemon that tunes system settings dynamically. It does so by monitoring the usage of several system components periodically. Users of tuned are advised to upgrade to these updated packages, which fix these bugs.', '2013-02-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:0386 https://access.redhat.com/security/cve/CVE-2012-6136', 'Low', 'Low', 'tuned', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.2.19-11.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x30c7a6fb6fdb77515fe2b10ad8ebe5fe', 'RHBA-2013:0386: tuned bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'The tuned packages contain a daemon that tunes system settings dynamically. It does so by monitoring the usage of several system components periodically. Users of tuned are advised to upgrade to these updated packages, which fix these bugs.', '2013-02-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:0386 https://access.redhat.com/security/cve/CVE-2012-6136', 'Low', 'Low', 'tuned-utils', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.2.19-11.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3a383ff12ad607c1d128668f52eb5ccf', 'RHBA-2013:1581: libvirt bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. All libvirt users are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1581 https://access.redhat.com/security/cve/CVE-2013-7336', 'Moderate', 'Medium', 'libvirt', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.10.2-29.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xde78cdd48efcdb8d9aea1e8b3413d44e', 'RHBA-2013:1581: libvirt bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. All libvirt users are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1581 https://access.redhat.com/security/cve/CVE-2013-7336', 'Moderate', 'Medium', 'libvirt-client', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.10.2-29.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x054820ad542f7c67c9a2d6e36f7ca6dd', 'RHBA-2013:1581: libvirt bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. All libvirt users are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1581 https://access.redhat.com/security/cve/CVE-2013-7336', 'Moderate', 'Medium', 'libvirt-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.10.2-29.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa63421c39095cb9f6ff4af787231ec55', 'RHBA-2013:1581: libvirt bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. All libvirt users are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1581 https://access.redhat.com/security/cve/CVE-2013-7336', 'Moderate', 'Medium', 'libvirt-lock-sanlock', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.10.2-29.el6', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x1acd1ff51cc512f366568409b4f35507', 'RHBA-2013:1581: libvirt bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. All libvirt users are advised to upgrade to these updated packages, which fix these bugs and add this enhancement.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1581 https://access.redhat.com/security/cve/CVE-2013-7336', 'Moderate', 'Medium', 'libvirt-python', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.10.2-29.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd65befbb633a9c2a6d9cde057823926e', 'RHBA-2013:1647: mysql bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Users of mysql are advised to upgrade to these updated packages, which fix these bugs. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1647 https://access.redhat.com/security/cve/CVE-2013-1861 https://access.redhat.com/security/cve/CVE-2013-3802 https://access.redhat.com/security/cve/CVE-2013-3804 https://access.redhat.com/security/cve/CVE-2013-3839', 'Low', 'Low', 'mysql', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:5.1.71-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4cb8f61e667f6d8c94bf847c6d0cc542', 'RHBA-2013:1647: mysql bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Users of mysql are advised to upgrade to these updated packages, which fix these bugs. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1647 https://access.redhat.com/security/cve/CVE-2013-1861 https://access.redhat.com/security/cve/CVE-2013-3802 https://access.redhat.com/security/cve/CVE-2013-3804 https://access.redhat.com/security/cve/CVE-2013-3839', 'Low', 'Low', 'mysql-bench', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:5.1.71-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x04a56c11be15b9a037c63c02a3740085', 'RHBA-2013:1647: mysql bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Users of mysql are advised to upgrade to these updated packages, which fix these bugs. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1647 https://access.redhat.com/security/cve/CVE-2013-1861 https://access.redhat.com/security/cve/CVE-2013-3802 https://access.redhat.com/security/cve/CVE-2013-3804 https://access.redhat.com/security/cve/CVE-2013-3839', 'Low', 'Low', 'mysql-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:5.1.71-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8d5f5aee6922f0358b1ccdfe4764edd0', 'RHBA-2013:1647: mysql bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Users of mysql are advised to upgrade to these updated packages, which fix these bugs. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1647 https://access.redhat.com/security/cve/CVE-2013-1861 https://access.redhat.com/security/cve/CVE-2013-3802 https://access.redhat.com/security/cve/CVE-2013-3804 https://access.redhat.com/security/cve/CVE-2013-3839', 'Low', 'Low', 'mysql-embedded', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:5.1.71-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc2e84030432128900c5d6c44bd06205c', 'RHBA-2013:1647: mysql bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Users of mysql are advised to upgrade to these updated packages, which fix these bugs. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1647 https://access.redhat.com/security/cve/CVE-2013-1861 https://access.redhat.com/security/cve/CVE-2013-3802 https://access.redhat.com/security/cve/CVE-2013-3804 https://access.redhat.com/security/cve/CVE-2013-3839', 'Low', 'Low', 'mysql-embedded-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:5.1.71-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x50d9d9c3a6138108ed54657a124d68dc', 'RHBA-2013:1647: mysql bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Users of mysql are advised to upgrade to these updated packages, which fix these bugs. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1647 https://access.redhat.com/security/cve/CVE-2013-1861 https://access.redhat.com/security/cve/CVE-2013-3802 https://access.redhat.com/security/cve/CVE-2013-3804 https://access.redhat.com/security/cve/CVE-2013-3839', 'Low', 'Low', 'mysql-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:5.1.71-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe3e1f75a35fce4aa37da1a5838095aa5', 'RHBA-2013:1647: mysql bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Users of mysql are advised to upgrade to these updated packages, which fix these bugs. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1647 https://access.redhat.com/security/cve/CVE-2013-1861 https://access.redhat.com/security/cve/CVE-2013-3802 https://access.redhat.com/security/cve/CVE-2013-3804 https://access.redhat.com/security/cve/CVE-2013-3839', 'Low', 'Low', 'mysql-server', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:5.1.71-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x169302cc1b283ce47a8367f7de5cbcc6', 'RHBA-2013:1647: mysql bug fix update (Low)', 'RHEL6-rhel-6.1-eus', 'MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. Users of mysql are advised to upgrade to these updated packages, which fix these bugs. After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.', '2013-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2013:1647 https://access.redhat.com/security/cve/CVE-2013-1861 https://access.redhat.com/security/cve/CVE-2013-3802 https://access.redhat.com/security/cve/CVE-2013-3804 https://access.redhat.com/security/cve/CVE-2013-3839', 'Low', 'Low', 'mysql-test', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:5.1.71-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x45ae3e2cd2e113387adad634efc75e91', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaa1c58d9deb9934a1b7986ca96f5ae57', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf67f9cd3c28788e62aa1c9c1ede7abe1', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-python', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x853843d7a21ccbc399e5adb3186c429d', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5c2398ce1d9644d31b06366e3c896612', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa7f38b4786dd2a6fb8bc10acb0adc089', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x83e040fe16777f5e6dabd3f7d3c5ec4f', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x04e4117c50dd71ea0d14666a1af131a0', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-python', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfd90d72126780f1accea5444d66a3c6b', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'python-sssdconfig', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xaf683900a75f13813f0070dcf31382ad', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe58a2b67dc0fd4c5b4609082bed68f0e', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ad', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x099c172af092cf0b766296d51502df93', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-client', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0392e58d33ef04596c940db5e98791c5', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9a0459090b4ec6757e1d4493390030c6', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common-pac', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe392e73cbffcf18c20a3f30ad7b73017', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-dbus', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9cb15afbc90ab7d7e0e9697c77588f9a', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ipa', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x36472032fee359804f56fb2fe4c6d4c6', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8c0ff7ef11f94616eda2454742282d4d', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5-common', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x21b19c396aa4f68b334658d82b8a33ce', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ldap', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9321d8ccea0b96c851dc8fefd3111092', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-proxy', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd2faa7885b921f87aee20500e1cd1d33', 'RHBA-2014:1375: sssd bug fix and enhancement update (Low)', 'RHEL6-rhel-6.1-eus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage bugs and add these enhancements.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1375 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-tools', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.11.6-30.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf1329e8b52de92f4706521d9791c24f6', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xcb-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.6-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcbda7ba591ccd03a1c2b1b0f3055db86', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xcb-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.6-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x801f97e71a38e4acd76973702970fe8c', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-acecad', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.5.0-7.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x92e40c14de13d684cc6d46bae9a42785', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-aiptek', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.4.1-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd48cabb575cdcada3529e4421584d516', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-ast', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.98.0-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa8ccaa8547f7f21a831333a42505d396', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-elographics', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.4.1-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8f4b3e16475a32a9c6351f6e0ffbbad7', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-dummy', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.6-15.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x175dff9435342ca7cbabd27324ba8f61', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-fpit', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.4.0-6.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xba883a027094194ddf6400dbe43ba3ec', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-hyperpen', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.4.1-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa8d3c2972e3c29ac346939c192d57283', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-geode', '', '', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.11.15-1.el6', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xd8ae1e065f7490407f4612d436323b07', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-keyboard', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.8.0-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x08da45f9a082395d2723a6799dee610c', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-mouse', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.9.0-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1951153acc78849ca41c7b1b172b698f', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-mouse-devel', '', '', 'i686|ppc|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.9.0-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xffc33b98c65d6cf799f06c03eda0a4c4', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-mutouch', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.3.0-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4dbd7dfec8f8616749fef9f712c5f83d', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-neomagic', '', '', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.2.7-7.el6', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xa2d38ab84e42deb1775116261b28d22b', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-nouveau', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '1:1.0.10-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x64d491e1595a716e85c419299da01820', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-penmount', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.5.0-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb7dbf849b4c017c0bf47ca2120799c8e', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-nv', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.1.20-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xde0a95db5594f902439b4142ddca97a3', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-openchrome', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.3-6.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa817e1a9d8a85f16836f4f2b83d6d629', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-openchrome-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.3-6.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x14d3ad68f58459af5c2897a5891148fc', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-void', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.4.0-23.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9fa495272dde3383ae175d322f686572', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'libpciaccess', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.13.3-0.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7a5a858a46b7c08691faf47654c482a9', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'libpciaccess-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.13.3-0.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5b1220e9f67e20ee30a662be9c881a4f', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'libwacom', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.8-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2d558a85865c4bc9e22b5b3a40bc0f42', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'libwacom-data', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.8-1.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4b447c558302a5bd28c9b4c0538fda9e', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'libwacom-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.8-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1ce03d115f8c668ce73d5721083badf4', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-apm', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.2.5-10.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf2074d055d34d778fad8310edc08b498', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-cirrus', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.5.2-2.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb2c8645cb86c62865e9cf6ca2aebf20a', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-i128', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.3.6-10.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2baebe5744d4fdfe6f5d9aff78224bc7', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-mach64', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:6.9.4-8.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x13ae1a39fc77099ec39bfcaac248685b', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-rendition', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:4.2.5-10.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdd085b9a107258cc39461a24723b60ac', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-sis', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.10.7-10.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x51cda96874bf42ac75405f718b7075fe', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-savage', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.3.7-2.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7b354f45e4a1c776ffda9e3cf5b51af4', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-sisusb', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.9.6-10.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x950c777a4774e06e7b964b135623bfde', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-trident', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.3.6-10.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc47b2a93b7f353bd3a0b94b7abd3d131', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-s3virge', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.10.6-10.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb89e4387dc5aa5c778b82b3d1e5d7c4b', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-voodoo', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.2.5-10.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4409d6544c809e5094d93ae254f4f076', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-siliconmotion', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.7.7-9.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdb5ec79c486729abf4d1b670ad1c2821', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-vesa', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.3.2-15.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7864ac35e910c6ca205f2e6418b239bb', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'mesa-private-llvm', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:3.4-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa985af3c6c54bba8df23da96d74110c6', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'mesa-private-llvm-devel', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:3.4-3.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x82d12acc4a8a32b0924e15744837af79', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-v4l', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.2.0-36.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x96d250a1ad5b060accfbb0062852a669', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'pixman', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.32.4-4.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x820d053afafe65292d21ad550c60ef96', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'pixman-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.32.4-4.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcf98c33d1954feae066ba5470756555f', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-modesetting', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.8.0-14.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4e64546f8088c29626c6fc466ae27ee0', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-ati', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:7.3.99-2.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x95f495cef03eb867d98b3304eb17f94a', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-ati-firmware', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:7.3.99-2.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd681ce9b2c86448d46456fe6babaee16', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-synaptics', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.7.6-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9cea5c7b54671395272630f3c4859700', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-synaptics-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:1.7.6-1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xed2dc6a0ad4ff904a49745464c579a8e', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xcb-util-image', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.9-4.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa1e882b085d4b238be213368b31155e4', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xcb-util-image-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.9-4.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xac6a20e97838b8cdfc81d6c8d93af33d', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xcb-util-keysyms', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.9-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa3890dc20012b9a70b63aa1af2ecb076', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xcb-util-keysyms-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.9-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xffa068fd31aa0372d2a17ee739f37bd3', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xcb-util-wm', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.9-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdd92824d76a80021ee00171540c3b1f5', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xcb-util-wm-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.3.9-5.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb2b318a906dd9b4e28682e648db22ab8', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-glamor', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.6.0-5.20140506gitf78901e.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x80b72511a954089b43f9f689d41d4800', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-glamor-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.6.0-5.20140506gitf78901e.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcf8b2c17f8abd256ac82035e0129c20a', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'libdrm', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.4.52-4.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcbe2c36e0a92f50a4111033a4dbbd42b', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'libdrm-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:2.4.52-4.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8d6ff2fc91117abd4b2d1be9d30b39b7', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-wacom', '', '', 'i686|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.23.0-4.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0a472f0ea21aba7b0966631501abe9c1', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'xorg-x11-drv-wacom-devel', '', '', 'i686|ppc|ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:0.23.0-4.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x68d84509bc9e6f5f1365bb72bb3bb216', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'glx-utils', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:10.1.2-2.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x14955f0a46bbf4184316ad0abd67acb0', 'RHBA-2014:1376: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update (Moderate)', 'RHEL6-rhel-6.1-eus', 'The xcb-util package provides a number of libraries that use the libxcb library, updated packages, which fix these bugs and add this enhancement.', '2014-10-13 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2014:1376 https://access.redhat.com/security/cve/CVE-2013-1994', 'Moderate', 'Medium', 'mesa-demos', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_eus:6.1', 'rhel-cpe-repository', '', '0:10.1.2-2.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfdd28b6fe7bee1632b24dc8e9ed[...];
Date: 2023-07-04 18:39:53 Duration: 9s150ms Bind query: yes
4 8s636ms 8s636ms 8s636ms 1 8s636ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, https: / / access.redhat.com / errata / rhsa - 2023: ? https: / / access.redhat.com / security / cve / cve - 2022 - 23521 https: / / access.redhat.com / security / cve / cve[...];Times Reported Time consuming queries #4
Day Hour Count Duration Avg duration Jul 04 14 1 8s636ms 8s636ms -
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\xdf50f6701c6896c7d4a3913e3dc9f36e', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe64c4b5d41feaf725a7863e710333e34', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x250773d0f2e2a6c8664304473f0d8bcb', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4d632f3165ad2c0fed1b6760a550a9cc', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5cd5a8e953b7742b776b2126ee6a4697', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb0d1984093d149b5aec45ce4d0b741ed', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa7b783844fe6ec3a04eade04090cf43e', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x197f2faf81b9609a4cdcdbf9805d612b', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x77f67e4d807c1e2760b54dd265b1eada', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb56127cddbbb27a3e5393b80fce73eb6', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xeac4179aa959f68f08d887238d0d3f8d', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x072fcd827c425ea0abe7bafcc150514c', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '0:1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe1ed92fe9adaa140fd6a4f77f358d60f', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x80234f8656c431a8d1f6236ac5c6e866', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf45446966ff981a6e758d909294c9a36', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf2fc35e9978f26f6b21150e4a61bf0fa', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5ce58ca05da5f1b4420a323d014bc4db', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x868ea871fb6449e92dedd5cb34921c1b', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x74edf32858d9f890dba214a2a7bdc39d', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3066939e96c2343450ce97f81bab780f', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xac03dffca16749f6ff0f7faea88b129f', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x69e16066b8dfbadbdcb83f202506c7c6', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfd71a98927f60c3a0e22fff99d9b3cee', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x439c57179ebe58ee89f202ac9693fa81', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kpatch-patch-5_14_0-162_6_1', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbee219a223bb3a28fd1f279ae7f7eda6', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4b7933e23db4163fafe4bd30e9f5c9d6', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf10bb0b56a1deb6e26c1d8b71ddf142c', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1cd32c05d4d2cb08eab88eb057704e06', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc2d2255b8b9e9edb59f783c724865909', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8a881a162c87893d7c2b758b017b8f07', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb7fd23c77e3fa08beb9b18b328343f13', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0449f541296ff890055e849de1c1c158', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xad965155e7ad1c1413a4b600ced119d9', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x85d398eea9be26d6a8fa231f0821210f', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x72038959c25eb26ef799f9e1f9eecf8d', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x02cbed00a83fb7d2756c45e1d48c9f65', 'RHSA-2023:0348: kpatch-patch security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0348 https://access.redhat.com/security/cve/CVE-2022-2959 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-43945', 'Important', 'High', 'kernel', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '0:5.14.0-162.6.1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x062c6b236bed03f89b23fa5d11cf5927', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf4681d1ba026830049aceed5a40d7bc2', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2c5ced01d06900f03bc8dc6fd8574e3a', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x91a0493b266fc427a35bba3761aaba1c', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x89eb17c8c5aa3bafa46d05d7708a77fc', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x12e95f3ca03233eb2c853e36b254a5d1', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5ca226f90379855cc4792e78d5a2c93a', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc212e6c246a4b48f7101fade65d51f6f', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x412502ed0e3e20b43463f9801f32e421', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf5b8f0486cf4c3469691614a4e43fd7e', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x68ac3f0f18adaf76b8ab2867c843ba2d', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xccdf13184cfa60a6423053a5e14aa7c4', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb5dc36a49801dd51e2360e4d2273915c', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0b4513bd95363b72e6e59ffa4719f978', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfdb25bf7cb626c770638b20b6aacf119', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x96841bd97f4ec7dc1be3415d7b50918b', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6830da9e3a001cb7ed432f7d8c572853', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xff169aaa7619db3234309b7a1547c628', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x993b15f672b9316308b446ffc3a4e56e', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9b10b456619265506d2a9a714e79e3ae', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc32682f754fb2b8552fd495c74cfd85d', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7f30fbb56e14f332619ff37b11f615c7', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x645c08bfbdba8188440e9876774861e2', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbb4a1699af7a40fef03e576e30f3ee04', 'RHSA-2023:0383: libXpm security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'X.Org X11 libXpm runtime library. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-4883', 'Important', 'High', 'libXpm-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '0:3.5.13-8.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x61b0b2749c587595aedc7024a9c1c588', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x93dff8409768a0e0764d596f7b7e0cad', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x115d32acd89d9380682a123e22a0a7a2', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x005c3206abdbb7f865248e0589034d62', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6822e035904832c2721d03deaf51a3ff', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1c04b401b7d3f30e866b85e48db8a812', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xab36e56bdab0391442369fd2f3a4720b', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb6c5dbb4e7dfe99382f42af2c8e4cb1d', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa3936004518d5283df3293651b90db50', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9793dfebeca9321d5011dab44f6ef3fc', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1134a1fce80ae2dcfe3080dd82b9dbb5', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd7e0e2f9331566e5819446eec2c4def3', 'RHSA-2023:0476: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-01-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871 https://access.redhat.com/security/cve/CVE-2022-46877 https://access.redhat.com/security/cve/CVE-2023-23598 https://access.redhat.com/security/cve/CVE-2023-23599 https://access.redhat.com/security/cve/CVE-2023-23601 https://access.redhat.com/security/cve/CVE-2023-23602 https://access.redhat.com/security/cve/CVE-2023-23603 https://access.redhat.com/security/cve/CVE-2023-23605', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '0:102.7.1-1.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7fbb18a44021627f3d89b7c4ea82a466', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3f50ee1513a7cab3ca9223f325065623', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3979849fe73aafac238b47e4e9bf83b4', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x505519e74e466ca3449d0f646d65fd18', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x52e7f3ef267883eaa67c317a765980cc', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfe6120025ea49a4ce2b28d94a884a191', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x36aa69b4942e5adc2e86194ae8c45297', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::resilientstorage', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2c7307441c2254609d96c2b3da8928c0', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb9fe6ce8b8f9b37384ffa8980dc80f25', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::sap_hana', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x63d1f6905b604fa09cfc17110175b58a', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::supplementary', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa0eb77aca3ea23d95a7d544d7e70fb3d', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaae53463e0cb74484c43eda252dd7a2b', 'RHSA-2023:0608: thunderbird security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Mozilla Thunderbird is a standalone mail and newsgroup client. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430', 'Important', 'High', 'thunderbird', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/o:redhat:enterprise_linux:9::baseos', 'rhel-cpe-repository', '', '0:102.7.1-2.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe469f7837dfa827398605ec1724e64d1', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903', 'Important', 'High', 'git', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9', 'rhel-cpe-repository', '', '0:2.31.1-3.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5c05493252de8a4300aaed91fecadb32', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903', 'Important', 'High', 'git', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::appstream', 'rhel-cpe-repository', '', '0:2.31.1-3.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x51b158f1e97ba820eda23af5af7aacc3', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903', 'Important', 'High', 'git', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::crb', 'rhel-cpe-repository', '', '0:2.31.1-3.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x13aa8067cd53f6867c322d38a5b645fd', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903', 'Important', 'High', 'git', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::highavailability', 'rhel-cpe-repository', '', '0:2.31.1-3.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xeb77cc304f2905c786a59e2005bcab14', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903', 'Important', 'High', 'git', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::nfv', 'rhel-cpe-repository', '', '0:2.31.1-3.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x00740ef4840f8261a0a8a44eff3dfa4b', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-41903', 'Important', 'High', 'git', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:enterprise_linux:9::realtime', 'rhel-cpe-repository', '', '0:2.31.1-3.el9_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x401f8d646845222932ded9d1e18ca04e', 'RHSA-2023:0611: git security update (Important)', 'RHEL9-rhel-9-including-unpatched', 'Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-02-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE[...];
Date: 2023-07-04 18:39:16 Duration: 8s636ms Bind query: yes
5 5s679ms 6s57ms 5s868ms 2 11s737ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, red[...];Times Reported Time consuming queries #5
Day Hour Count Duration Avg duration Jul 04 14 2 11s737ms 5s868ms -
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\xf535bcab636f5aa6086cc3731872ad70', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-osgi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8ebe10e23458cd0b366b78f95823e189', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-osgi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xebd2761b68aa049e97e3ad3d42d65d02', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-osgi-configadmin', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x86a38589c290d55ab7ff016bea2d365a', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-osgi-configadmin', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x23eee55aaf09d5dffc429dbe014d0eef', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-osgi-service', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6b2a7dae15793b0b077c5a2679ab5921', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-osgi-service', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3b9d4501e05a64e9c70a4c370c147615', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-picketlink', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf3677040c6db4aead719d8a7d6bbeb5c', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-picketlink', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa2768fe899567ea1e44a119b4e54e01d', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-platform-mbean', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc4bc52c3e7b15c40ff31f42beb31c821', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-platform-mbean', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb9eb2a010e90121888d4fe49d79e6b9c', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-pojo', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdea8037feb16021f27e48804d8aab321', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-pojo', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4509eed6bf9b9398f6546dd4afc17465', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-process-controller', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x14a0c0e6d68aed2c42efd022a4bb9f4d', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-process-controller', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x395c0432957c71fd82e95cba296ad850', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-protocol', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe55c429082f51e8c0312feb3ba48559f', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-protocol', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xff6b8a55cafe3226b10fab41d76a72ff', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-remoting', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xccb170094f0b15070129f46c2cfdaa0c', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-remoting', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4d54738599a91402b22f4b190daccd8c', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-sar', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xebf429c01b36d03a6e94d810931a3312', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-sar', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x475713e7578c102fe35be9c8545a2aa0', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-security', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x132bf2b3c6a09f414df87bdb40060f3e', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-security', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3575b0459b28f7dbe3dd88dfb8fc73e5', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9200cd1d086abce12aa87cc12bd6897c', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-server', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x88eebe91596cdac4e128e70126300391', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-system-jmx', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x917d78f3381f498f9b8281f84f7bf78e', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-system-jmx', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa7f3c4a942f6e5fe016d15bf13150cbb', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-threads', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3945b39b8cf884bfd5e724636126b80f', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-threads', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x40eb81999df1714cdefc0a13e288992a', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-transactions', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x25821591a4693daa870d7502333c6f2d', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-transactions', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf1a7da4e1f0212dcd239e81099afe1c9', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-version', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x51377358c46f3632ac323f8be904ddb7', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-version', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x75c19bd55aa11d61d4f40ec688b3de46', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-web', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x57d49574220989d356d02a79917e3b94', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-web', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8b5858dd52016cc5f1c213136604fbc9', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-webservices', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd21c065b250d9fd4c5288a83df93a97f', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-webservices', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x467651a48c80b2f7a41563ec5b235dd1', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-weld', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x931a0dfe146198053826ff103aab2909', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-weld', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcf39181fe4cbb581339c189d248c87d7', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-xts', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd3ba4db9732fa61efece034853378207', 'RHSA-2017:1548: Red Hat JBoss Enterprise Application Platform 6.4.16 update on RHEL 7 (Moderate)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java for the JSP Servlet. (CVE-2016-6796)', '2017-06-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1548 https://access.redhat.com/security/cve/CVE-2016-5018 https://access.redhat.com/security/cve/CVE-2016-6796 https://access.redhat.com/security/cve/CVE-2017-2595', 'Moderate', 'Medium', 'jboss-as-xts', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.16-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xce877f4790216e4814c6979e639d6f91', 'RHSA-2017:1658: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.', '2017-06-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/security/cve/CVE-2016-2177 https://access.redhat.com/security/cve/CVE-2016-2178 https://access.redhat.com/security/cve/CVE-2016-6304 https://access.redhat.com/security/cve/CVE-2016-8610', 'Important', 'High', 'jbcs-httpd24-openssl', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '1:1.0.2h-13.jbcs.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8f182153a5ab5c25c9464d78b563e1f5', 'RHSA-2017:1658: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.', '2017-06-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/security/cve/CVE-2016-2177 https://access.redhat.com/security/cve/CVE-2016-2178 https://access.redhat.com/security/cve/CVE-2016-6304 https://access.redhat.com/security/cve/CVE-2016-8610', 'Important', 'High', 'jbcs-httpd24-openssl', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '1:1.0.2h-13.jbcs.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd6ea535b5cad43707ab1bbe93daf355f', 'RHSA-2017:1658: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.', '2017-06-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/security/cve/CVE-2016-2177 https://access.redhat.com/security/cve/CVE-2016-2178 https://access.redhat.com/security/cve/CVE-2016-6304 https://access.redhat.com/security/cve/CVE-2016-8610', 'Important', 'High', 'jbcs-httpd24-openssl-devel', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '1:1.0.2h-13.jbcs.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x352ac509a60d17499bd90127b14786ec', 'RHSA-2017:1658: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.', '2017-06-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/security/cve/CVE-2016-2177 https://access.redhat.com/security/cve/CVE-2016-2178 https://access.redhat.com/security/cve/CVE-2016-6304 https://access.redhat.com/security/cve/CVE-2016-8610', 'Important', 'High', 'jbcs-httpd24-openssl-devel', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '1:1.0.2h-13.jbcs.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2ee65ae8a8332d70851de866b4fc00b9', 'RHSA-2017:1658: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.', '2017-06-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/security/cve/CVE-2016-2177 https://access.redhat.com/security/cve/CVE-2016-2178 https://access.redhat.com/security/cve/CVE-2016-6304 https://access.redhat.com/security/cve/CVE-2016-8610', 'Important', 'High', 'jbcs-httpd24-openssl-libs', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '1:1.0.2h-13.jbcs.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x32f13a687d07e356d656071323d9b43a', 'RHSA-2017:1658: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.', '2017-06-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/security/cve/CVE-2016-2177 https://access.redhat.com/security/cve/CVE-2016-2178 https://access.redhat.com/security/cve/CVE-2016-6304 https://access.redhat.com/security/cve/CVE-2016-8610', 'Important', 'High', 'jbcs-httpd24-openssl-libs', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '1:1.0.2h-13.jbcs.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdc45271eba673bc20c45eee2abee3f38', 'RHSA-2017:1658: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.', '2017-06-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/security/cve/CVE-2016-2177 https://access.redhat.com/security/cve/CVE-2016-2178 https://access.redhat.com/security/cve/CVE-2016-6304 https://access.redhat.com/security/cve/CVE-2016-8610', 'Important', 'High', 'jbcs-httpd24-openssl-perl', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '1:1.0.2h-13.jbcs.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3655f391886b24f0f53e83da0d1fe3a3', 'RHSA-2017:1658: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.', '2017-06-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/security/cve/CVE-2016-2177 https://access.redhat.com/security/cve/CVE-2016-2178 https://access.redhat.com/security/cve/CVE-2016-6304 https://access.redhat.com/security/cve/CVE-2016-8610', 'Important', 'High', 'jbcs-httpd24-openssl-perl', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '1:1.0.2h-13.jbcs.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa486195048275b1e8ed18d36400d3145', 'RHSA-2017:1658: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.', '2017-06-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/security/cve/CVE-2016-2177 https://access.redhat.com/security/cve/CVE-2016-2178 https://access.redhat.com/security/cve/CVE-2016-6304 https://access.redhat.com/security/cve/CVE-2016-8610', 'Important', 'High', 'jbcs-httpd24-openssl-static', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '1:1.0.2h-13.jbcs.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa4e9a6d680b2a35f8fa5245f94c80f2a', 'RHSA-2017:1658: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.', '2017-06-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/security/cve/CVE-2016-2177 https://access.redhat.com/security/cve/CVE-2016-2178 https://access.redhat.com/security/cve/CVE-2016-6304 https://access.redhat.com/security/cve/CVE-2016-8610', 'Important', 'High', 'jbcs-httpd24-openssl-static', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '1:1.0.2h-13.jbcs.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x929661c5d9e0a2568a2f1cfe225a6f4a', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jbossweb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.5.24-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x42a854b23849d7e2bf2288f707f71b6e', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jbossweb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.5.24-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa19af29f89daff1b192df2970614bb46', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-vfs2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:3.2.12-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe8b8103868b3192f81e153b2307d84c6', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-vfs2', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:3.2.12-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdeb998e8c990374d1a5a3824bd8f7eb0', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-metadata', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.2.3-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x32ed6971b4b835a0d0e146a68140535f', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-metadata', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.2.3-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6512506d061e6cd722100605302c743f', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-metadata-appclient', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.2.3-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4ea6412ea63875a92deef1c590b831cd', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-metadata-appclient', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.2.3-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfe4bf85616be864a1ed3d792ced26e22', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-metadata-common', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.2.3-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6b13cdeeba292f402c847b0cff01f752', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-metadata-common', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.2.3-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x75b9e0a83ae65b3eb3c7335a3d02aac7', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-metadata-ear', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.2.3-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6b26c9997e8f788a10543f49486c1a5c', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-metadata-ear', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.2.3-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6e15c895c5ab3caa35236b39ac574a84', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-metadata-ejb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.2.3-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7b88a139ebe40c0d723ad701e5753064', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-metadata-ejb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.2.3-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb1b4765b9a0ff3a0f711cb1cbd1e9622', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-metadata-web', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:7.2.3-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8e173316ed40ba416a82bd1eef40eb60', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-metadata-web', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:7.2.3-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x82397e64059d7cf9ca30ccecd50d64db', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-marshalling', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:1.4.10-3.SP3_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x450de7790071f55036ec038597cb22d0', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-marshalling', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:1.4.10-3.SP3_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x587dd3fb39bfe3948720ac0870a76f4d', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'infinispan', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:5.2.22-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x622f74419528d6038ffea68e2489bf3d', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'infinispan', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:5.2.22-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0c175cccda9d3e0462df067d78317703', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'infinispan-cachestore-jdbc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:5.2.22-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xffee4d795bece121c090c7915b82cfdf', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'infinispan-cachestore-jdbc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:5.2.22-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdf42f29bd8d89e9de6676c9611995a0b', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'infinispan-cachestore-remote', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:5.2.22-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x430521abf6602929ee01a2852dffeebd', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'infinispan-cachestore-remote', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:5.2.22-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6a1153a43a27f470d143d7ada37a7086', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'infinispan-client-hotrod', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:5.2.22-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcc243aff9b7216baadc9230bfd4798f3', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'infinispan-client-hotrod', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:5.2.22-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0e317e6f5bc72acb7e3a1bd9fa280c7a', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'infinispan-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:5.2.22-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc411574a344f0415a374cd25d5ae4017', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'infinispan-core', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:5.2.22-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xda33403667f340763e78045e3e51e22e', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'hibernate4-core-eap6', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:4.2.27-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf12f4872ac1e37f227dd766210b1662d', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'hibernate4-core-eap6', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:4.2.27-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xec06a09252bd2b9408ad926fe337e1b5', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'hibernate4-eap6', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:4.2.27-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6c3539fcf4c5509d94a3325499cf2f54', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'hibernate4-eap6', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:4.2.27-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd08048837cf9b6a804dec3d53ad728cf', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'hibernate4-entitymanager-eap6', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:4.2.27-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd4268f80e1acef4d3cfd3d94b2783a0e', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'hibernate4-entitymanager-eap6', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:4.2.27-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x10bf96aba95e7faa05c2d748c165e0b9', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'hibernate4-envers-eap6', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:4.2.27-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd47a06652f817f9d9437bfc711cb67e6', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'hibernate4-envers-eap6', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:4.2.27-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x62ae3c75d10617daad515e9440ea5cf2', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'hibernate4-infinispan-eap6', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:4.2.27-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3a04993fa452d7b2fbeda17862a9bdde', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'hibernate4-infinispan-eap6', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:4.2.27-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x85e9ac06bf05062184ebe2cde185cb33', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-remoting3', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:3.3.10-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8d82af7231e829e3247774210a91d43c', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-remoting3', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:3.3.10-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xaada746ca054f4babbef3d797bc0fe5d', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'hornetq', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:2.3.25-22.SP20_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x25b9b8accf90d1baf6fbec8dbbe001b6', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'hornetq', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:2.3.25-22.SP20_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1e598e66ee2b91d2bd42701a70934f50', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-modules', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:1.3.10-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xec31a112cbe1e69727b850cfb79c9377', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'jboss-modules', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:1.3.10-1.Final_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2ff89df35b41104aa81205025201a074', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'apache-cxf', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:2.7.18-7.SP6_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2d64cd04e620b36e131f89ba3cb422de', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'apache-cxf', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:2.7.18-7.SP6_redhat_1.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7027105cf782834c95d2fa91133adc35', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'codehaus-jackson', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:1.9.9-11.redhat_5.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x69d305c9d2d2dc9e824e773213024021', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'codehaus-jackson', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:1.9.9-11.redhat_5.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x551187be9636cae6f9812e579840d37c', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'codehaus-jackson-core-asl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:1.9.9-11.redhat_5.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x407236891d7baf95a56c716086adf81a', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'codehaus-jackson-core-asl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6::el7', 'rhel-cpe-repository', '', '0:1.9.9-11.redhat_5.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc37fada9713088e84ceb7f1c6d9442e3', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'codehaus-jackson-jaxrs', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:jboss_enterprise_application_platform:6', 'rhel-cpe-repository', '', '0:1.9.9-11.redhat_5.1.ep6.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf1bbbbac74b4b713cb288f32b0b46bad', 'RHSA-2017:2636: Red Hat JBoss Enterprise Application Platform 6.4.17 update on RHEL 7 (Important)', 'RHEL7-jboss-eap-6', 'Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Red Hat would like to thank Liao Xinxi (NSFOCUS) for reporting CVE-2017-7525.', '2017-09-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2017:2636 https://access.redhat.com/security/cve/CVE-2017-5645 https://access.redhat.com/security/cve/CVE-2017-5664 https://access.redhat.com/security/cve/CVE-2017-7525', 'Important', 'High', 'codehaus-jackson-jaxrs', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red [...];
Date: 2023-07-04 18:39:52 Duration: 6s57ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x5a28b266ea81e9941e0dcc8233909a0b', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-vmware', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7e6670eeb27899ce44ec558fe278bd18', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-vmware', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x35c93d95dc6dd6aec6f8d67d5fc3c0ca', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-vmware', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3cca38ccd8a0883a4b3503c0d0646071', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-vmware', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfdd56d5dc57556019eefa964e774b8e8', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-weblog', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd5d56dc20fa01c61548266c4533e0a46', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-weblog', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf3f606951ed7eb60eb1e4883beb624ef', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-weblog', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd12b0eb11a11b56831b2c5ec16b81b1f', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-weblog', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6d57c097f16909b8062b95a1659e6dbe', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-zimbra', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5ca4ea88130d1599438a966988bfd26a', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-zimbra', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa661d8c19bff53460cae38b8706cdcc2', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-zimbra', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc8d2841e0784aa55480fea9dffc05289', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-zimbra', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5a73e0de5dc32929e834f8deb522c615', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-zswap', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb095a501295f682aa33115d4f0e88479', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-zswap', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc5f58b5d5a300b9b6184bb9c1133a5a8', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-zswap', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc4731f6d889094f1d1528365d7a52def', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-pmda-zswap', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x24c017fb34c6c99f3eea561347e26ca8', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-selinux', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf990b7f59a5ee345796c288881534b75', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-selinux', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa21890f0e6bfe62472fd1c8ac56ad619', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-selinux', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5febfc8010ab549566b3f6134eceb25d', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-selinux', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6b7db3d3167d31c2ed275eb94c1881c8', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-system-tools', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3c1435518dfa35a0a2e433ff58fc3636', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-system-tools', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0a67c36376c30e7b1b67cbb46da2ec52', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-system-tools', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa0cac87c21e5bfef10a3af8b5e230d41', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-system-tools', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7e9aa5de6762dc899116eaf3b1681da7', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-testsuite', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7da258b11e34b2ea61582b931ad365d3', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-testsuite', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb6fefc03bca8f534d88cf9b528efddc7', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-testsuite', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0f81b1142d6963bc17eb456d1168d2ce', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-testsuite', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3a65b42c2eec0369fd36d6b0d487ccbb', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-zeroconf', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdce200c4ae518ccf3c805f6e43a227e5', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-zeroconf', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa429a1a8e6b15fea6044f26a75cc44ea', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-zeroconf', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbff4d54358f49efe89aae04fc52e4865', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'pcp-zeroconf', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x285f64e5e015d81cf3cd16962ec1d2a9', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-LogImport', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x44df49b07c38962cda72e68a9d03e8df', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-LogImport', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb91bff0b217955411acbbc4449f19c25', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-LogImport', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xea7feec32dab5c31b687a7e2dd2cc43c', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-LogImport', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1b3b889e2c439fc43a109868cc637f5a', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-LogSummary', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x21e9cf84d3c5f7311174caa72f7f0203', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-LogSummary', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x45c657ce0b06ed638619cae7805a14c9', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-LogSummary', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc5a22e2a9fa3fc317a789283929e7077', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-LogSummary', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8a19f9e27d143cec34db7cb74b8be5d5', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-MMV', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x109eaaa51cf720e30e0acaa82af5014f', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-MMV', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd2f460863c9e7786eea25250a7f6712e', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-MMV', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x66b38e7293c3ce9af82c1f8c67d9135b', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-MMV', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaeb5296af7e9f815cc895321e4dd6f98', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-PMDA', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1ed91d7a11bffd08396d025567394a21', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-PMDA', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf498fbca6c2ff3851354d53d25f407db', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-PMDA', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4cdf3b844e9caa2917f48cb34e2a4203', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'perl-PCP-PMDA', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9e2d782243068c2fe10c880ffaec49d7', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'python3-pcp', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x86a606e66db97d6ebd66bdcde1db34af', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'python3-pcp', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf601a67d3e8b291a09f2865d7a5a62bb', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'python3-pcp', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x420f7fcdf0d82a87a17cf2fb6b78c826', 'RHBA-2020:1628: pcp bug fix and enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2020:1628 https://access.redhat.com/security/cve/CVE-2019-3695 https://access.redhat.com/security/cve/CVE-2019-3696', 'Low', 'Low', 'python3-pcp', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.0.2-5.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3b38ec79a58abd71ec807484cc082b86', 'RHBA-2021:0629: microcode_ctl bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'The microcode_ctl packages provide microcode updates for Intel and AMD of 20201110 (BZ#1907899)', '2021-02-22 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2021:0629 https://access.redhat.com/security/cve/CVE-2020-8696', 'Moderate', 'Medium', 'microcode_ctl', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '4:20191115-4.20210216.1.el8_2', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x936d6fb37f77bdbe26cce2aa9961497e', 'RHBA-2021:0629: microcode_ctl bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'The microcode_ctl packages provide microcode updates for Intel and AMD of 20201110 (BZ#1907899)', '2021-02-22 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2021:0629 https://access.redhat.com/security/cve/CVE-2020-8696', 'Moderate', 'Medium', 'microcode_ctl', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '4:20191115-4.20210216.1.el8_2', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x553bafb1e5ac9dd5cac1376e3653ee37', 'RHBA-2021:0629: microcode_ctl bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'The microcode_ctl packages provide microcode updates for Intel and AMD of 20201110 (BZ#1907899)', '2021-02-22 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2021:0629 https://access.redhat.com/security/cve/CVE-2020-8696', 'Moderate', 'Medium', 'microcode_ctl', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '4:20191115-4.20210216.1.el8_2', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x934f09894f62153ce052f8a102e6bd72', 'RHBA-2021:0629: microcode_ctl bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'The microcode_ctl packages provide microcode updates for Intel and AMD of 20201110 (BZ#1907899)', '2021-02-22 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2021:0629 https://access.redhat.com/security/cve/CVE-2020-8696', 'Moderate', 'Medium', 'microcode_ctl', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '4:20191115-4.20210216.1.el8_2', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x34b3caf78ef058cc398f0c8d6f67d0ff', 'RHEA-2019:3845: microcode_ctl bug fix and enhancement update (Important)', 'RHEL8-rhel-8.2-aus', 'The microcode_ctl packages provide microcode updates for Intel x86 processors. Users of microcode_ctl are advised to upgrade to these updated packages, which add this enhancement.', '2019-11-12 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:3845 https://access.redhat.com/security/cve/CVE-2019-0117', 'Important', 'High', 'microcode_ctl', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '4:20190618-1.20191112.1.el8_1', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xb737fe53d8bb31da095a12f44d0d73f4', 'RHEA-2019:3845: microcode_ctl bug fix and enhancement update (Important)', 'RHEL8-rhel-8.2-aus', 'The microcode_ctl packages provide microcode updates for Intel x86 processors. Users of microcode_ctl are advised to upgrade to these updated packages, which add this enhancement.', '2019-11-12 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:3845 https://access.redhat.com/security/cve/CVE-2019-0117', 'Important', 'High', 'microcode_ctl', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '4:20190618-1.20191112.1.el8_1', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x6cdfb5ebbbca16d4304cb72c962f4d4a', 'RHEA-2019:3845: microcode_ctl bug fix and enhancement update (Important)', 'RHEL8-rhel-8.2-aus', 'The microcode_ctl packages provide microcode updates for Intel x86 processors. Users of microcode_ctl are advised to upgrade to these updated packages, which add this enhancement.', '2019-11-12 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:3845 https://access.redhat.com/security/cve/CVE-2019-0117', 'Important', 'High', 'microcode_ctl', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '4:20190618-1.20191112.1.el8_1', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xae781b06839b094e1863f614b8aa2150', 'RHEA-2019:3845: microcode_ctl bug fix and enhancement update (Important)', 'RHEL8-rhel-8.2-aus', 'The microcode_ctl packages provide microcode updates for Intel x86 processors. Users of microcode_ctl are advised to upgrade to these updated packages, which add this enhancement.', '2019-11-12 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:3845 https://access.redhat.com/security/cve/CVE-2019-0117', 'Important', 'High', 'microcode_ctl', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '4:20190618-1.20191112.1.el8_1', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x02c2ee9622c28e6fdc9e6dc21e5ac36b', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x10d4b4d93e4610f301aca6a84676ef5d', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd8d3e3ff0551f24ac58a32fed29b72f5', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1455351f8a3cf0f93fcdc382bd10f7e1', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x71f025c3135cb733b2190a76e57ebbec', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-devel', '', '', 'i686|ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe8b5eecd1eb64a93f4a51daae38d51b1', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-devel', '', '', 'i686|ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8c344c69e42f30ec57f0b801f200ec42', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-devel', '', '', 'i686|ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8e1433a7e830e9c21048c35f196bd49f', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-devel', '', '', 'i686|ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfb961f35e4fbcf4c84edf6a40a5473c2', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-jsc', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x711939c7b44c4f0955ab37f1fcffda5d', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-jsc', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7bd9ec210c9514fcfef0525bf6c121d3', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-jsc', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa57aee426bf83cb9418be6017d9a12ec', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-jsc', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa6bf7a33d998d80ce9cbfa06ee775417', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-jsc-devel', '', '', 'i686|ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8b1e01173b39dfd3eee89631afead51e', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-jsc-devel', '', '', 'i686|ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa1812e8c3cb47afe89662bf88582b2eb', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-jsc-devel', '', '', 'i686|ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xecfff5e8a5000565100d6a6147269645', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-jsc-devel', '', '', 'i686|ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x82c8fa70fb1639fcfbef9bf6a77732f9', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-plugin-process-gtk2', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x229d0aba5e39fbc4d06509f40e047746', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-plugin-process-gtk2', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6c5466c44cf5bc1054c12924d09b0294', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-plugin-process-gtk2', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0e168818748beb3adda0cdfe06921f7e', 'RHEA-2019:4262: webkit2gtk3 enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'This update adds the following enhancement: Users of webkit2gtk3 are advised to upgrade to this updated package, which adds this enhancement.', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2019:4262 https://access.redhat.com/security/cve/CVE-2019-8644 https://access.redhat.com/security/cve/CVE-2019-8649 https://access.redhat.com/security/cve/CVE-2019-8658 https://access.redhat.com/security/cve/CVE-2019-8669 https://access.redhat.com/security/cve/CVE-2019-8674 https://access.redhat.com/security/cve/CVE-2019-8678 https://access.redhat.com/security/cve/CVE-2019-8680 https://access.redhat.com/security/cve/CVE-2019-8683 https://access.redhat.com/security/cve/CVE-2019-8684 https://access.redhat.com/security/cve/CVE-2019-8688 https://access.redhat.com/security/cve/CVE-2019-8707 https://access.redhat.com/security/cve/CVE-2019-8719 https://access.redhat.com/security/cve/CVE-2019-8733 https://access.redhat.com/security/cve/CVE-2019-8763 https://access.redhat.com/security/cve/CVE-2019-8765 https://access.redhat.com/security/cve/CVE-2019-8821 https://access.redhat.com/security/cve/CVE-2019-8822', 'Moderate', 'Medium', 'webkit2gtk3-plugin-process-gtk2', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.24.4-2.el8_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6f13d806edf21a6d6e63423adc19091a', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs', '', 'nodejs:12', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '1:12.14.1-1.module+el8.1.0+5466+30f75629', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8ca3523a9f3a141140dd68749006e9eb', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs', '', 'nodejs:12', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '1:12.14.1-1.module+el8.1.0+5466+30f75629', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x96bd893b1ce0e434b1445a442ae351a5', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs', '', 'nodejs:12', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '1:12.14.1-1.module+el8.1.0+5466+30f75629', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4bc402f0df64089644f1dcd572e5f113', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs', '', 'nodejs:12', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '1:12.14.1-1.module+el8.1.0+5466+30f75629', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xeac4b21ebaf550b6f0dfdf878fb2d5b1', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-devel', '', 'nodejs:12', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '1:12.14.1-1.module+el8.1.0+5466+30f75629', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xebeb317fbcbe2fce12db6e71435ad15e', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-devel', '', 'nodejs:12', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '1:12.14.1-1.module+el8.1.0+5466+30f75629', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xca0b3bea43eabe4ddb7dec0575a2b25a', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-devel', '', 'nodejs:12', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '1:12.14.1-1.module+el8.1.0+5466+30f75629', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb10b0662c79907df2fcbfd41a404d1df', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-devel', '', 'nodejs:12', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '1:12.14.1-1.module+el8.1.0+5466+30f75629', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xeeae8893ff5468a1e56581b416bf58b5', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-docs', '', 'nodejs:12', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '1:12.14.1-1.module+el8.1.0+5466+30f75629', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x42738aae680b412db48995c85769c021', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-docs', '', 'nodejs:12', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '1:12.14.1-1.module+el8.1.0+5466+30f75629', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x08130a4c3dd5d612a62d91fb9a83a0dd', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-docs', '', 'nodejs:12', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '1:12.14.1-1.module+el8.1.0+5466+30f75629', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd03ec462a95fc0e29f0c919eb54cc36e', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-docs', '', 'nodejs:12', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '1:12.14.1-1.module+el8.1.0+5466+30f75629', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4908ab44dbf9af3b140615aa78471988', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-nodemon', '', 'nodejs:12', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.18.3-1.module+el8.1.0+3369+37ae6a45', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8c70f799688c02f03a1c632e29c1ac85', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-nodemon', '', 'nodejs:12', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.18.3-1.module+el8.1.0+3369+37ae6a45', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x044548170bcf7903b3c9ff350e7ba405', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-nodemon', '', 'nodejs:12', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.18.3-1.module+el8.1.0+3369+37ae6a45', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x112344302fc7cac54a7bf707e5e42810', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-nodemon', '', 'nodejs:12', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.18.3-1.module+el8.1.0+3369+37ae6a45', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x18b03a21896635f5221cac22cfb27dc3', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-packaging', '', 'nodejs:12', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:17-3.module+el8.1.0+3369+37ae6a45', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x817cc7037fd8519e501f22cddb96a74a', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-packaging', '', 'nodejs:12', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:17-3.module+el8.1.0+3369+37ae6a45', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9a1c46112feec345322cb31a9052a63f', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-packaging', '', 'nodejs:12', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:17-3.module+el8.1.0+3369+37ae6a45', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x14fa06f74746e7fb8018fc5f05e68e0a', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'nodejs-packaging', '', 'nodejs:12', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:17-3.module+el8.1.0+3369+37ae6a45', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x64725b17a1f74a6abe0218798e924c49', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'npm', '', 'nodejs:12', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '1:6.13.4-1.12.14.1.1.module+el8.1.0+5466+30f75629', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x90732bf689b72c23cbbf36e9e5c08e52', 'RHEA-2020:0330: nodejs:12 enhancement update (Low)', 'RHEL8-rhel-8.2-aus', 'The following packages have been upgraded to a later upstream version: nodejs (12.14.1). (BZ#1791067)', '2020-02-04 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2020:0330 https://access.redhat.com/security/cve/CVE-2019-16775 https://access.redhat.com/security/cve/CVE-2019-16776 https://access.redhat.com/security/cve/CVE-2019-16777', 'Low', 'Low', 'npm', '', 'nodejs:12', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red [...];
Date: 2023-07-04 18:39:57 Duration: 5s679ms Bind query: yes
6 3s414ms 7s666ms 5s540ms 2 11s80ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, i686 | p[...];Times Reported Time consuming queries #6
Day Hour Count Duration Avg duration Jul 04 14 2 11s80ms 5s540ms -
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x4ba09591f94c8c0aa64e90e3a00730e3', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-demo', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0e0dbb6fa3e4b9739647b2bdf0b41bb8', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-demo', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcb8b7f21a131d4aa7ba49cc9b4ab282b', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf6b560ea545923e7673747dc93b7f5dc', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x077d3c6b330fc87224ac9b2496e7e6aa', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-jdbc', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2652274fe29b4ded087aa7f4cf250c50', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-jdbc', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8b6c2a3db5e87cb66381c87d4c8d8bf8', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-plugin', '', '', 'ppc|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x11cb5406f989309606a2ed2d8e3706e7', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-plugin', '', '', 'ppc|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xabffcdd9b69c00822c45d7296d6849b4', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-src', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x685373277e6dae9386524ee088b17e03', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.3-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-src', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd3a44c57b8227c1fcf83f4bf7469bdc5', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb8bee463bab77460587ea281fb5112e7', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0a241c809ac50fedef3ee333843f22b1', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfe621dcbe443545e8d7f8921885b233d', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe25234c1e3806cc0bddeb4bdee2a2bea', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9169f107ad064642654d2f0da87b0225', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x13e124fa4b156be7aae2172d0965f7e6', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-irb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x87690be78199a1fbaa1206eae9a409c0', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-irb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x01c0c6c20cdb6dc2405abd24b16950ce', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2facba68eb6124487acbfeeccd14ac30', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x328d4aa9931707ce126764e6e77ccbe3', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-tcltk', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x37198ce17ff859bf92aaa4d7b868cc5a', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-tcltk', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc1bfbddcac3ad54eae60b6ed4f67dda1', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.2.0-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5f65235a3e23aa57134a16a3482c62e8', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.2.0-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x59f92bdaa4e651532cc67dcc09e79ee7', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-io-console', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:0.4.2-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x43be4aa2837254668c1a1e5827e46ede', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-io-console', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:0.4.2-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4833eb8288aa01ed2d2c8199c99f0766', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-json', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.7.7-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x42ad9882cc126ebef03f06bb69931aa6', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-json', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.7.7-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x76af51e944882ee501f1551b051cbd74', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-minitest', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:4.3.2-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa1bf7f71ea8192c7423c28c4900e8e0b', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-minitest', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:4.3.2-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa0efc398028a183bc331fddc44ff8e89', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-psych', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.0-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0a711a12df6a1a78c060dc7cea120057', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-psych', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.0-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x74dd804b9cb34bfd8342605fdc6fb873', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-rake', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:0.9.6-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9e782a2d130dba031c4769702d172e23', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-rake', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:0.9.6-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf33c4061eed5732cb85d476f0099d084', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-rdoc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:4.0.0-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbfaa009c94f0064af28a25c5f9af0e9f', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-rdoc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:4.0.0-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf6f887cd9316b6a70c7d1e55ca67d878', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygems', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.14-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x12df04c62aafb1cd447a469211a0c8e1', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygems', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.14-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe3cbe10a7e3874cdfc6af66205b6f724', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygems-devel', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:2.0.14-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd54e20748cbb99de024c8bd85d568e7a', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygems-devel', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:2.0.14-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x57e73a87a9b438af42cbe3087255334d', 'RHSA-2014:1919: firefox security update (Critical)', 'RHEL7-rhel-7.3-tus', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-12-02 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1919 https://access.redhat.com/security/cve/CVE-2014-1587 https://access.redhat.com/security/cve/CVE-2014-1590 https://access.redhat.com/security/cve/CVE-2014-1592 https://access.redhat.com/security/cve/CVE-2014-1593 https://access.redhat.com/security/cve/CVE-2014-1594', 'Critical', 'Critical', 'firefox', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:31.3.0-3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x210b065fe20a82d0469d56feecc2f82e', 'RHSA-2014:1919: firefox security update (Critical)', 'RHEL7-rhel-7.3-tus', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-12-02 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1919 https://access.redhat.com/security/cve/CVE-2014-1587 https://access.redhat.com/security/cve/CVE-2014-1590 https://access.redhat.com/security/cve/CVE-2014-1592 https://access.redhat.com/security/cve/CVE-2014-1593 https://access.redhat.com/security/cve/CVE-2014-1594', 'Critical', 'Critical', 'firefox', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:31.3.0-3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1ef558c7ca0769796ee0f253fee5840b', 'RHSA-2014:1956: wpa_supplicant security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'The wpa_supplicant package contains an 802.1X Supplicant with support for which contains a backported patch to correct this issue.', '2014-12-03 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1956 https://access.redhat.com/security/cve/CVE-2014-3686', 'Moderate', 'Medium', 'wpa_supplicant', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:2.0-13.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0c722bcd23341731046dd2fc72f996a6', 'RHSA-2014:1956: wpa_supplicant security update (Moderate)', 'RHEL7-rhel-7.3-tus', 'The wpa_supplicant package contains an 802.1X Supplicant with support for which contains a backported patch to correct this issue.', '2014-12-03 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1956 https://access.redhat.com/security/cve/CVE-2014-3686', 'Moderate', 'Medium', 'wpa_supplicant', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:2.0-13.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7003e53563ecbcb634d56ff750be1316', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfb4c6c5482c6281a21ad9f88b6feaa6f', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x09013d6bb11cc2154acb3f4586d69ad1', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-abi-whitelists', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x30557fdf50ba422aa8a3f9c566898cdf', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-abi-whitelists', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc62b739a14d5f81c3840b77340e1563e', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-bootwrapper', '', '', 'ppc64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xa3d5e40094970c07ce9350138c450399', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-bootwrapper', '', '', 'ppc64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x75779acdb49aacef7aa3df63e42b53b3', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-debug', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7055849c84fa8e9a1216c217d8d8da25', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-debug', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x027c3be2666799d424a61d2b4489986e', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-debug-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa3f90ea0e6188419632a7859e2521fc4', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-debug-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4d5bc43557a896ae880db43140ec2aa3', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3aa8990f9e358c8e35229f13060dffa2', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc00119e646f12f56c90180a0930bbdde', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xeddca3d17bc0e52a70b1fc56fb82424b', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9bf748ef60d6382e725cf59adc9f23fb', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-headers', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x03b9cc4b68c4340d551d4ad21d23e18f', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-headers', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb126a1bf48d5bb8d38701f9420cd1082', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-kdump', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x7bf85b0274b5d9f13dbe330379577640', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-kdump', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xd2764abcb7888c601d82b3ac1b370c91', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-kdump-devel', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xefd9a068a6fd73c3de5cc62675b5decd', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-kdump-devel', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x6213e768576bc521b639492e0bcda71c', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0b60356ea64c996b9ddbf055b6427093', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0beedf4bcb73df5e41f0a41bb619bad8', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools-libs', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7fb9e162855b2fa78f336e7a7898d749', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools-libs', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0aa5498001df0fd19769710b367174cb', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools-libs-devel', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0376eb3a9795126790ed6c7c852a1357', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools-libs-devel', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdc3bbbeb22169f2e401aec03b711812f', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'perf', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9edad094cfa778760ea206f6a5324db1', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'perf', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x97c19da147d2dab768a5e9f41b933216', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'python-perf', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbdfbe7bf3eb547cb0f53c5ef24ade6ca', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.3-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'python-perf', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x450fc822b888283be7cad4a395beeb11', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.3-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe589814aa9baf519b35ab9e7ff3c2742', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.3-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x83a3238f7a92b5fc970534d0d0ef8298', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.3-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm-apidocs', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x06a8603bc0938737c37fa699fd6da4b5', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.3-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm-apidocs', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf862a15aa7244f6872acd29f808514dc', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.3-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm-build', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x06523bb6d6b4ffd8cc23321e6b2e64e0', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.3-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm-build', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc7f96ce6cff7da56dd8f8fb503109d28', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.3-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm-build-libs', '', '', 'i686|p[...];
Date: 2023-07-04 18:39:55 Duration: 7s666ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\xb3ec323fd451e797d659d044260744c5', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.2-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-demo', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x62092f422e6bbbe91c30ffb5fad3f05a', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.2-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-demo', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc21815dedb132e1fa0b607267788f8cc', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.2-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf16402c32246e2688020401abd8d4405', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.2-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb9bc56924902271b22d70b539d906750', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.2-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-jdbc', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xde5d5355ab3d838fbff0db8a7251f019', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.2-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-jdbc', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd90157db824ebe8f49d1024d89501ec3', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.2-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-plugin', '', '', 'ppc|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3d173baec59407c52abc77ee0b6e4d4a', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.2-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-plugin', '', '', 'ppc|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xca3a7eb111d27669e5b853421de1d684', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.2-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-src', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x98f0c73274f31d36a2d842c6bb6e9904', 'RHSA-2014:1880: java-1.7.1-ibm security update (Critical)', 'RHEL7-rhel-7.2-tus', 'IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment of IBM Java must be restarted for the update to take effect.', '2014-11-20 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1880 https://access.redhat.com/security/cve/CVE-2014-3065 https://access.redhat.com/security/cve/CVE-2014-3566 https://access.redhat.com/security/cve/CVE-2014-4288 https://access.redhat.com/security/cve/CVE-2014-6456 https://access.redhat.com/security/cve/CVE-2014-6457 https://access.redhat.com/security/cve/CVE-2014-6458 https://access.redhat.com/security/cve/CVE-2014-6476 https://access.redhat.com/security/cve/CVE-2014-6492 https://access.redhat.com/security/cve/CVE-2014-6493 https://access.redhat.com/security/cve/CVE-2014-6502 https://access.redhat.com/security/cve/CVE-2014-6503 https://access.redhat.com/security/cve/CVE-2014-6506 https://access.redhat.com/security/cve/CVE-2014-6511 https://access.redhat.com/security/cve/CVE-2014-6512 https://access.redhat.com/security/cve/CVE-2014-6515 https://access.redhat.com/security/cve/CVE-2014-6527 https://access.redhat.com/security/cve/CVE-2014-6531 https://access.redhat.com/security/cve/CVE-2014-6532 https://access.redhat.com/security/cve/CVE-2014-6558', 'Critical', 'Critical', 'java-1.7.1-ibm-src', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:1.7.1.2.0-1jpp.3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb61acb418bb2d563ce697a3489522ea1', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3a75500d602bcb1c5651341a2a5f0e74', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x24b73c9324ec2ee3c72f52a11b870b7a', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa603bbfd06a0d2ee5bd2b3be9197b5f6', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4b3dfda101dfa7627b4223d755c70e5b', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0b1942c54c6917823eb70b717b5a0d90', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0d6cd45eb090570f56dbdee98b1c9f77', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-irb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd9fdeec4f34de54f1b7ef50627280efd', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-irb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x07777ced0afeb046b2c129510a88bc59', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe1f8cac31b49bf6a0b01fd8198d8923b', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb664329da21341e408fc954a1a62cbfd', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-tcltk', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x360b8f289e6a0fe68f96b712c78ea311', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'ruby-tcltk', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:2.0.0.353-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x02b55081561179d1b35735c4ae41e05d', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.2.0-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9c0bb82a276159bfde942a91cde95064', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.2.0-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf573c07d60be3f00b7fafce8740022e7', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-io-console', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:0.4.2-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7bc987df770d5cde6b9fbd19539931c6', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-io-console', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:0.4.2-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5b3e0d6f3d9a2f6917ac8dd12571828c', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-json', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.7.7-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1fa7ffd11222f565ed1e43abf5e735db', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-json', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.7.7-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd2966cec7269d8093ad6200bca96215d', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-minitest', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:4.3.2-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x77ea36efbf75332ea67e751c347ac5a8', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-minitest', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:4.3.2-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd29049a0f1d7444b25a18667e9deaa63', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-psych', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:2.0.0-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc47994fd72b1bd800d5d897d17c863e1', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-psych', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:2.0.0-22.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa587f46ed578809869fb8413deee2117', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-rake', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:0.9.6-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xba495cd978063eeb3b93aaa66e335298', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-rake', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:0.9.6-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4dee02281cf7eccc3c127fc4c076a914', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-rdoc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:4.0.0-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0ea87dc3fc1c5dfd81d495dcde43a594', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygem-rdoc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:4.0.0-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe9baa8e6d344729bdb25f741c28d489b', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygems', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:2.0.14-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x419c03bbba61b25f86ac2283e702d3b6', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygems', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:2.0.14-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2fe8cc1973529584bcdb776a96b593bf', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygems-devel', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:2.0.14-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x92487db2d8ccaaa867c4376c27f1e021', 'RHSA-2014:1912: ruby security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Ruby is an extensible, interpreted, object-oriented, scripting language. of Ruby need to be restarted for this update to take effect.', '2014-11-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1912 https://access.redhat.com/security/cve/CVE-2014-4975 https://access.redhat.com/security/cve/CVE-2014-8080 https://access.redhat.com/security/cve/CVE-2014-8090', 'Moderate', 'Medium', 'rubygems-devel', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:2.0.14-22.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf448f22461eaf36096684ce65057f597', 'RHSA-2014:1919: firefox security update (Critical)', 'RHEL7-rhel-7.2-tus', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-12-02 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1919 https://access.redhat.com/security/cve/CVE-2014-1587 https://access.redhat.com/security/cve/CVE-2014-1590 https://access.redhat.com/security/cve/CVE-2014-1592 https://access.redhat.com/security/cve/CVE-2014-1593 https://access.redhat.com/security/cve/CVE-2014-1594', 'Critical', 'Critical', 'firefox', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:31.3.0-3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5b765bb7bdc1c6068a78f3f58194b0c1', 'RHSA-2014:1919: firefox security update (Critical)', 'RHEL7-rhel-7.2-tus', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-12-02 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1919 https://access.redhat.com/security/cve/CVE-2014-1587 https://access.redhat.com/security/cve/CVE-2014-1590 https://access.redhat.com/security/cve/CVE-2014-1592 https://access.redhat.com/security/cve/CVE-2014-1593 https://access.redhat.com/security/cve/CVE-2014-1594', 'Critical', 'Critical', 'firefox', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:31.3.0-3.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xee37e02957a88e737b9cedb20f7de4e9', 'RHSA-2014:1956: wpa_supplicant security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'The wpa_supplicant package contains an 802.1X Supplicant with support for which contains a backported patch to correct this issue.', '2014-12-03 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1956 https://access.redhat.com/security/cve/CVE-2014-3686', 'Moderate', 'Medium', 'wpa_supplicant', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:2.0-13.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcd4e1e364289ec158705f4fd9096bfbb', 'RHSA-2014:1956: wpa_supplicant security update (Moderate)', 'RHEL7-rhel-7.2-tus', 'The wpa_supplicant package contains an 802.1X Supplicant with support for which contains a backported patch to correct this issue.', '2014-12-03 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1956 https://access.redhat.com/security/cve/CVE-2014-3686', 'Moderate', 'Medium', 'wpa_supplicant', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:2.0-13.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x472312411a7dff131975ee0fd7761f80', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4ddc2513aadec09c1c1976ae8442ede3', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xca4659724fc15b3b6079b960f836c8c3', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-abi-whitelists', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf159b4698ca4ed4f9080a3e6bf10f1b6', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-abi-whitelists', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x33609e6e205f09f217d0078e04a9e8ce', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-bootwrapper', '', '', 'ppc64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xb10d9ca74cf6eb07423fec7cfe7d722c', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-bootwrapper', '', '', 'ppc64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xd06a2d3bc3b938679a6f750b5ab0fb95', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-debug', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa2804093e5e346d84bd6ae541e6f8d91', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-debug', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9c58e4f1c1f5f3f76f6cd4341a8ce5c1', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-debug-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2949620bdb6ea4c8c6d6d37bc20bdf6c', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-debug-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xef5fc6e281137e79988fec40422b39fe', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa885d352377f31bef4128f242064007d', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1a453882a78846c07d71b8313a2219ba', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6cdccd91dfd0af73d0e190ffee27e1ad', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd1e8b948299c93021a10345469d9c3aa', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-headers', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x882a9b7e33cffa90dd8f8cd5b924488e', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-headers', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x18293ede298dd20a307f1fcc60cc351c', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-kdump', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xe10a626384f2a373630423f10520e3b3', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-kdump', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x222464c609ee3adb44dc171c61a63edb', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-kdump-devel', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xd1bb4c5ac501a5138b586e047bf42c4d', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-kdump-devel', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xc51031014c97c22b948486659d828484', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3edbd49e2a5f6a37b8e59c66b0c2efa0', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe69cb3de83af718fb2e67e6a54d2e5c2', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools-libs', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd8ab6d74dba38e8212d51cb555b06b67', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools-libs', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd8fdd8916abeec3ff6454b0db4801aca', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools-libs-devel', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5347601b9b66fab61d6e226f9fc6ee6f', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'kernel-tools-libs-devel', '', '', 'ppc64|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8af150846a216ec07845155cd0294622', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'perf', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2d99c7967b5acf165eae331f23407598', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'perf', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf88f2b21265859c4638a379028023bee', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'python-perf', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb17c5b4cf33a8b3e437bc915b729e38d', 'RHSA-2014:1971: kernel security and bug fix update (Important)', 'RHEL7-rhel-7.2-tus', '* A flaw was found in the way the Linux kernel''s SCTP implementation (CVE-2014-4652, Low)', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1971 https://access.redhat.com/security/cve/CVE-2013-2929 https://access.redhat.com/security/cve/CVE-2014-1739 https://access.redhat.com/security/cve/CVE-2014-3181 https://access.redhat.com/security/cve/CVE-2014-3182 https://access.redhat.com/security/cve/CVE-2014-3184 https://access.redhat.com/security/cve/CVE-2014-3185 https://access.redhat.com/security/cve/CVE-2014-3186 https://access.redhat.com/security/cve/CVE-2014-3631 https://access.redhat.com/security/cve/CVE-2014-3673 https://access.redhat.com/security/cve/CVE-2014-3687 https://access.redhat.com/security/cve/CVE-2014-3688 https://access.redhat.com/security/cve/CVE-2014-4027 https://access.redhat.com/security/cve/CVE-2014-4652 https://access.redhat.com/security/cve/CVE-2014-4654 https://access.redhat.com/security/cve/CVE-2014-4655 https://access.redhat.com/security/cve/CVE-2014-4656 https://access.redhat.com/security/cve/CVE-2014-5045 https://access.redhat.com/security/cve/CVE-2014-6410', 'Important', 'High', 'python-perf', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.10.0-123.13.1.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe1f39183abb7fa7d01606c1197dc8cf6', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.2-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6142e18b976337919b1f718daef1b9c5', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.2-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3833e3aebbd19c22acfdc57e4b5d802b', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.2-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm-apidocs', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3f01312bad6b409968c0c901528fbfc1', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.2-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm-apidocs', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xad1db45a3ac15c91f03951c7fc7dc406', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.2-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm-build', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x937c004d15d8189e884174be9264f58f', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.2-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm-build', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:4.11.1-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbe790417d2beb28b1566eea0a64ca44b', 'RHSA-2014:1976: rpm security update (Important)', 'RHEL7-rhel-7.2-tus', 'The RPM Package Manager (RPM) is a powerful command line driven package update to take effect.', '2014-12-09 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:1976 https://access.redhat.com/security/cve/CVE-2013-6435 https://access.redhat.com/security/cve/CVE-2014-8118', 'Important', 'High', 'rpm-build-libs', '', '', 'i686|p[...];
Date: 2023-07-04 18:40:24 Duration: 3s414ms Bind query: yes
7 4s391ms 5s659ms 5s25ms 2 10s50ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, cpe: ?.? :o:redhat:enterprise_linux: ? : * : * : * : *[...];Times Reported Time consuming queries #7
Day Hour Count Duration Avg duration Jul 04 14 2 10s50ms 5s25ms -
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x3da956c8efc59153772e15829313268f', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfc99ac0927ad85789a839c4b8c2ef85f', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc21737e9172d156ae781dc5d67e07aae', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb02e58bde0ef21e28395ec87d0bf4566', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x60810d0e1d0fbf2a0816ba3e7a88b98a', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-docs', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1dcd804014952168f15421bb0f6931fd', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-docs', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x02c40f84f499d3f0abe1d73c0899d537', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-docs', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5e80293778645cf6250e2afcf93f1a33', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-docs', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6c15a251c938c01a1ac1dc8c4db4ed15', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-lock-sanlock', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x2614f312151bb4b74bbc089bcce5f40a', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-lock-sanlock', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x8c7c6a75ef6654d7f80114b3f42fd5b0', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-lock-sanlock', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x6d7574a28b1757ca99bc5704ac9c1dfa', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-lock-sanlock', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xbdf0fa09c506891295dafa31efe29cb0', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-login-shell', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x66e8605204d66eded11b85293277d655', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-login-shell', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x52bd7a0a6e1c151239020ea5d918cbdc', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-login-shell', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb6a63c006586f8d039a51cfac3a133b1', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-login-shell', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0726aaf916cb7fe1b0135f17cf33b90c', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7a317e7ac353215befa9bb9b4d886e34', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x89e8a16dfe90edc9c7f2f1adbeb55a0b', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbd045086674c9bfa0094b4bbe65f113e', 'RHSA-2014:0914: libvirt security and bug fix update (Moderate)', 'RHEL7-rhel-7.7-e4s', 'The libvirt library is a C API for managing and interacting with the restarted automatically.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0914 https://access.redhat.com/security/cve/CVE-2014-0179 https://access.redhat.com/security/cve/CVE-2014-5177', 'Moderate', 'Medium', 'libvirt-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:1.1.1-29.el7_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb0007e91f03c54e0ed175f94d4b9b3ae', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa964746a3592fb022d11a5425e40efe8', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe2be16d96be42f359e8777d6900a42ec', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x964a9b1a72eafc7cf10506ad13f87ec8', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x70a482c69fd492b07993df34093e66b0', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2f417a23a20978d430407595e6152785', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xee94ffe236ad18cc3f533c55ac2f1fc9', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x13da67a3ba3a26b7a74e78fadd2a2c10', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe9b2bff0cb8316af5996366fc4b22736', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-pkcs11-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcb42c0a9571a053eb29701557570335e', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-pkcs11-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x796a7dfff084f6b616805c3d0e76d1bf', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-pkcs11-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x89b02164977e293d6659fbccc47a3653', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-pkcs11-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x246d48e7a67f55c9ce50d0288b02b6e4', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-sysinit', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x147b32c973f1d002fc50f4c23607f528', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-sysinit', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4c13467dadfa8fb19abeb7347d8878d8', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-sysinit', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfb2c6eb4615f1da129843e4ddefb116a', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-sysinit', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3213a94016da698d59f9989bfa3b36bf', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x91adc1360493c8a14ef392054f60e650', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd60d9492b3113a44329e8e5bf889724b', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb4c07c0e19218170f558248c6ee6d704', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nss-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:3.15.4-7.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x966eb9bfd6946cdce52c5397bc5d57a4', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:4.10.6-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x48b69e982b059fbcbe55bc06954a8aa0', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:4.10.6-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x696581e811e351234f81573d8c09eea6', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:4.10.6-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb36532338add1486ecad901ee9ae6ecf', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:4.10.6-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdb3f188cc444cbce3a221da0c8511acb', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:4.10.6-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa6e3147ab85a00474279705b655f116e', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:4.10.6-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7877cdc0546002c35ab3229def28ed51', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:4.10.6-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4cddfb8a11eb366039615434969e5899', 'RHSA-2014:0916: nss and nspr security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Network Security Services (NSS) is a set of libraries designed to support NSS or NSPR must be restarted for this update to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0916 https://access.redhat.com/security/cve/CVE-2014-1544', 'Critical', 'Critical', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:4.10.6-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5f842de192820ef452c9729a36ca29e7', 'RHSA-2014:0919: firefox security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0919 https://access.redhat.com/security/cve/CVE-2014-1547 https://access.redhat.com/security/cve/CVE-2014-1555 https://access.redhat.com/security/cve/CVE-2014-1556 https://access.redhat.com/security/cve/CVE-2014-1557', 'Critical', 'Critical', 'firefox', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:24.7.0-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1b8b0c6d21091aba43f7b3f1db79c99b', 'RHSA-2014:0919: firefox security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0919 https://access.redhat.com/security/cve/CVE-2014-1547 https://access.redhat.com/security/cve/CVE-2014-1555 https://access.redhat.com/security/cve/CVE-2014-1556 https://access.redhat.com/security/cve/CVE-2014-1557', 'Critical', 'Critical', 'firefox', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:24.7.0-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3484ffe8f55b61028bba33cde4a3cd8e', 'RHSA-2014:0919: firefox security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0919 https://access.redhat.com/security/cve/CVE-2014-1547 https://access.redhat.com/security/cve/CVE-2014-1555 https://access.redhat.com/security/cve/CVE-2014-1556 https://access.redhat.com/security/cve/CVE-2014-1557', 'Critical', 'Critical', 'firefox', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:24.7.0-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x980e487e15ac688f6d9d48796df72229', 'RHSA-2014:0919: firefox security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0919 https://access.redhat.com/security/cve/CVE-2014-1547 https://access.redhat.com/security/cve/CVE-2014-1555 https://access.redhat.com/security/cve/CVE-2014-1556 https://access.redhat.com/security/cve/CVE-2014-1557', 'Critical', 'Critical', 'firefox', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:24.7.0-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2823a022d9c0a7aed1038aa5949b62d2', 'RHSA-2014:0919: firefox security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0919 https://access.redhat.com/security/cve/CVE-2014-1547 https://access.redhat.com/security/cve/CVE-2014-1555 https://access.redhat.com/security/cve/CVE-2014-1556 https://access.redhat.com/security/cve/CVE-2014-1557', 'Critical', 'Critical', 'xulrunner', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:24.7.0-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe9614087199a7a44a0172ebefd8eedd3', 'RHSA-2014:0919: firefox security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0919 https://access.redhat.com/security/cve/CVE-2014-1547 https://access.redhat.com/security/cve/CVE-2014-1555 https://access.redhat.com/security/cve/CVE-2014-1556 https://access.redhat.com/security/cve/CVE-2014-1557', 'Critical', 'Critical', 'xulrunner', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:24.7.0-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x315f0910f0bc812bdc0e93100fa55d45', 'RHSA-2014:0919: firefox security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0919 https://access.redhat.com/security/cve/CVE-2014-1547 https://access.redhat.com/security/cve/CVE-2014-1555 https://access.redhat.com/security/cve/CVE-2014-1556 https://access.redhat.com/security/cve/CVE-2014-1557', 'Critical', 'Critical', 'xulrunner', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:24.7.0-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3ccdc13a138fe105982069ea531fc7eb', 'RHSA-2014:0919: firefox security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0919 https://access.redhat.com/security/cve/CVE-2014-1547 https://access.redhat.com/security/cve/CVE-2014-1555 https://access.redhat.com/security/cve/CVE-2014-1556 https://access.redhat.com/security/cve/CVE-2014-1557', 'Critical', 'Critical', 'xulrunner', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:24.7.0-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd582e79e17e5bdd1b9ebb849edb82760', 'RHSA-2014:0919: firefox security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0919 https://access.redhat.com/security/cve/CVE-2014-1547 https://access.redhat.com/security/cve/CVE-2014-1555 https://access.redhat.com/security/cve/CVE-2014-1556 https://access.redhat.com/security/cve/CVE-2014-1557', 'Critical', 'Critical', 'xulrunner-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:24.7.0-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa30197e36b7d61704ea0489b4dedf85c', 'RHSA-2014:0919: firefox security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0919 https://access.redhat.com/security/cve/CVE-2014-1547 https://access.redhat.com/security/cve/CVE-2014-1555 https://access.redhat.com/security/cve/CVE-2014-1556 https://access.redhat.com/security/cve/CVE-2014-1557', 'Critical', 'Critical', 'xulrunner-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:24.7.0-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8f2bb1d85b0dbf691b5de1564a9516a2', 'RHSA-2014:0919: firefox security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0919 https://access.redhat.com/security/cve/CVE-2014-1547 https://access.redhat.com/security/cve/CVE-2014-1555 https://access.redhat.com/security/cve/CVE-2014-1556 https://access.redhat.com/security/cve/CVE-2014-1557', 'Critical', 'Critical', 'xulrunner-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:24.7.0-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbb1c89fd676880aec9088d3490362b77', 'RHSA-2014:0919: firefox security update (Critical)', 'RHEL7-rhel-7.7-e4s', 'Mozilla Firefox is an open source web browser. XULRunner provides the XUL the update, Firefox must be restarted for the changes to take effect.', '2014-07-22 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0919 https://access.redhat.com/security/cve/CVE-2014-1547 https://access.redhat.com/security/cve/CVE-2014-1555 https://access.redhat.com/security/cve/CVE-2014-1556 https://access.redhat.com/security/cve/CVE-2014-1557', 'Critical', 'Critical', 'xulrunner-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:24.7.0-1.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcf1f99c312fa9759084061c822147922', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x684bee67c73536657e262f2770698714', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfc0cc41dadc7ee5155f5b2d134495486', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x227e8187427d0e6736f168f5562dbde1', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x76411f2abba97743de7e25c478e36318', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x10cd874728df6083a8db859af6ed375f', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4388662b00f542b153494817dfd3ea7a', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf740ebf2bf2790462134d5e29e7d50c6', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5f3bfe36b541d23e9034a6566860254f', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd-manual', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7101002ca89a7060045de483b8100e5c', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd-manual', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb4e1255e5b97c3f119b0181eed6bca8e', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd-manual', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xae21d8c5ee86c7f1ea35f5a881d12ac7', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd-manual', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xaa289160afe66df4ef9dc41a5a903235', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf41a7aadf9cc5f1d5f2b80b7adc29f46', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2d69a1b3c474809e9b179bd1f0013f29', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2e7e132414d17b796b7af86194bb2081', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'httpd-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc474cfeff2796b9207ffa0be662f9ac0', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_ldap', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5a4d922e4a9a9d27cceb68ecb06e9957', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_ldap', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7d6b6a63e550e5a7c8a9c619eee5f8c4', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_ldap', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4d44343969c91e7f8b4f60a4346ba0e3', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_ldap', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9ca50ea6fdad7e1d53486836595762eb', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_proxy_html', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '1:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe030bf2963bc5009ffab9a7a8ac0d47b', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_proxy_html', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '1:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3832936419c4764670b47cc44582baac', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_proxy_html', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '1:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x489c96d0ccc454dd275f9b77ef9bebc8', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_proxy_html', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '1:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x649ebcd6c8a718f60057c8ee5b36280f', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_session', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x82dbd576bdfd6ff3dba83bba7668d881', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_session', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcc1b56c3a3b59cce8feb04be14ac57f9', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_session', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x97a075dbfab0bdd5608b5d4e5910bb67', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_session', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x42c592e202318b3b8ec3ebe391c820e1', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_ssl', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '1:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2f652ed6c2a1a480cb95025d8fade679', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_ssl', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '1:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5f617f495e1ed399d00bec209c704e5c', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_ssl', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '1:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x246ea2977920aba32003ff3607d8107f', 'RHSA-2014:0921: httpd security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The httpd packages provide the Apache HTTP Server, a powerful, efficient, updated packages, the httpd daemon will be restarted automatically.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0921 https://access.redhat.com/security/cve/CVE-2013-4352 https://access.redhat.com/security/cve/CVE-2014-0117 https://access.redhat.com/security/cve/CVE-2014-0118 https://access.redhat.com/security/cve/CVE-2014-0226 https://access.redhat.com/security/cve/CVE-2014-0231', 'Important', 'High', 'mod_ssl', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '1:2.4.6-18.el7_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4ce83b902fab58251f8087c169a17618', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x36be201be184d34fbbd866608956bac8', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdbb66ac51306ad5389395d1b4e0f95fd', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x72e56773a5b8c22194b8516d8f5f7fdd', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfbd17743499c14681bc918730ae82282', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-abi-whitelists', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf406ff3ef5797d21d3c04a2472718e8e', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-abi-whitelists', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x461f64e4bb67cba86df175d81649265f', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-abi-whitelists', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa2908d06064d77cf00ae5ba2dd2e8cec', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-abi-whitelists', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb0c85dc6a792e1f94c072439b21aa09c', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-bootwrapper', '', '', 'ppc64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x8d669aab28582de07ef68ec570c40144', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-bootwrapper', '', '', 'ppc64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xe4147dbfe519f00e2d26986865164755', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-bootwrapper', '', '', 'ppc64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x11042cd49d655d440c4effc686cccfe7', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-bootwrapper', '', '', 'ppc64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x036614ffba6924fecac3022e3ac9ab0f', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-debug', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x48ea45569cb8ae97278ae9a51b3fd7ab', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-debug', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x99d2d16cea332eb79a13206bb7603930', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-debug', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd80fc48d7d168c7d293e0e8f21d4ca16', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-debug', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x567638ead4b9abb9bb62aab2bf06b3f1', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-debug-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x33355e3b116821cd73b76f00e4452134', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-debug-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x516a5bb1edcbcfb083d1288281f4adf5', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-debug-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc9e2ccf26cc6ffab790c5903acb32aa2', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-debug-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6718abcde22f36a36a327a8a797ae903', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x167e6afbd44a5b2f0be448d4d2ec615a', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3a7475624537ea8ffb2b261ec9d7dca3', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe04e10079cea830b4d2842ef887cec84', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-devel', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_e4s:7.7::server', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x42ca04c1c4e3cb5e357093b408cf27d6', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.7', 'rhel-cpe-repository', '', '0:3.10.0-123.4.4.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x677ea28126d33b2232008f46a15bcadc', 'RHSA-2014:0923: kernel security update (Important)', 'RHEL7-rhel-7.7-e4s', 'The kernel packages contain the Linux kernel, the core of any Linux rebooted for this update to take effect.', '2014-07-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2014:0923 https://access.redhat.com/security/cve/CVE-2014-4699 https://access.redhat.com/security/cve/CVE-2014-4943', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*[...];
Date: 2023-07-04 18:39:18 Duration: 5s659ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x8badfa5a5650e93326696d8ae4fd90e7', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-qt3', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x95f51c3f31be85c6c27bc0c882818a47', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-qt3', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa1d932a7deb90a2e19892f4113b889b4', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-qt3-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0e362c14238852ee8d47caef1e043b77', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-qt3-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7cd5bec3605b4c6c7ad7bd2f65ddf4b2', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-qt4', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa438e2f8838bd2467634175842dba4aa', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-qt4', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb60a4249e323ebd45b8b9d7729900d4a', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-qt4-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbb0c55e833610a73b64872199c7b917f', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-qt4-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x072c4fe55e17ca4e01bda9fab72a1028', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-tools', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb00e5e6a8ec7e234c1c8a274cef9b36d', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-tools', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xba41fd5d8442fcb59112eda3e6bbc61b', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-ui', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5f9faf159513b1a53521df34e762e159', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-ui', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb83f80a0e77d10d9277c5dee3625995e', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-ui-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf57339d6662e56b2d01cb86bd788c921', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-ui-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x52f494729d77c31de0d690f4d419258f', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-ui-tools', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd871ee97b49aa8a452bd6cd410e4dcf2', 'RHSA-2011:0779: avahi security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Avahi is an implementation of the DNS Service Discovery and Multicast DNS avahi-daemon will be restarted automatically.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0779 https://access.redhat.com/security/cve/CVE-2011-1002', 'Moderate', 'Medium', 'avahi-ui-tools', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:0.6.25-11.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6dccb44d3d19a0e7caf9cbd8d35e3b54', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x759f8efe113146828f040d8c44fafe5d', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9f80132b0bca026ea342f642f50a4ac8', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-admin-webapps', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa62f71abdcdbddcb2b910384e3689244', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-admin-webapps', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa7f389cf83d36d88472697d7ec39eaa8', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-docs-webapp', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7223472955ef9c0e92909286bd87124c', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-docs-webapp', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x17404c9b6a3638047391afd68f556128', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-el-2.1-api', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf87a266e6652b90035ec9786645629c5', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-el-2.1-api', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdf000587766e035af78cc94ecaa80027', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-javadoc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x318b5dddae24c209f3cf2950ad56e8c7', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-javadoc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x962d7917296381851e6a6c7ababf5b56', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-jsp-2.1-api', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3a79b013a6a796268b29d9722d8f5b4a', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-jsp-2.1-api', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5e7becfee5a99cdfeb98f53ff2760055', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-lib', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe835e7249aa0e57f66acec1d75abd7ce', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-lib', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf3cb7810946dad4f85c06988609d36a7', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-servlet-2.5-api', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x009e7043142003625806c195683d9b38', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-servlet-2.5-api', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x311752f5b5476b6770788ae86e8e9645', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-webapps', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xaa6661e1da4520e473954b63bdbaa364', 'RHSA-2011:0791: tomcat6 security and bug fix update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Apache Tomcat is a servlet container for the Java Servlet and JavaServer this update to take effect.', '2011-05-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0791 https://access.redhat.com/security/cve/CVE-2010-3718 https://access.redhat.com/security/cve/CVE-2010-4172 https://access.redhat.com/security/cve/CVE-2011-0013', 'Moderate', 'Medium', 'tomcat6-webapps', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:6.0.24-33.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x13ddfe01b6ca11f67e2307d8ae78de4e', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4a080841bc7a01ed0beca5eb28ca6d29', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8490458d68d4dedfb472d112b01429cf', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-bootwrapper', '', '', 'ppc64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x237c7a3ffb3deb15b3979921c1d2d4d1', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-bootwrapper', '', '', 'ppc64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x0388f25a177f5275c3f043aa244e7862', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-debug', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0e744585a10504a3572569f8b5214e21', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-debug', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x16c46f3bbee71f3136cf1ae02c3cf1d8', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-debug-devel', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xeeda21bd555c975e971a2fc6f090d4ae', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-debug-devel', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe35ec19d3443dc4db6f750c61390f0f5', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-devel', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2b4033389b560a7048024ad5602a3140', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-devel', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa36de14a18ff6418201de22d0112461e', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x120c52595d035d0e1f9b68ac41e2ad9e', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-doc', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6a51dd36476918ee697a5b243cb1b580', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-firmware', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6d3e3adeaae922f6e0eb974da80646b6', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-firmware', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1ae05434fb1908743682e82553bd39b4', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-headers', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5c1ffa11edfe4e2557346aab7a8592ee', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-headers', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0645de8e61cbc7ff413a7efabe79b6a4', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-kdump', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xe10f1d2714ab360d4977b596cb4b3f64', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-kdump', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xc18d5d572d950460b269295a460f951e', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-kdump-devel', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x9cd4704180ab3ec2396d309230ddd4b5', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'kernel-kdump-devel', '', '', 's390x', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x0dd6183dd70fe8421a68876b08369ebe', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'perf', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x196bb6f23660bb5279c517b522e65355', 'RHSA-2011:0836: kernel security and bug fix update (Important)', 'RHEL6-rhel-6.5-aus', 'The kernel packages contain the Linux kernel, the core of any Linux Notes. The system must be rebooted for this update to take effect.', '2011-06-01 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0836 https://access.redhat.com/security/cve/CVE-2010-3858 https://access.redhat.com/security/cve/CVE-2011-1598 https://access.redhat.com/security/cve/CVE-2011-1748 https://access.redhat.com/security/cve/CVE-2011-1770 https://access.redhat.com/security/cve/CVE-2011-1771', 'Important', 'High', 'perf', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:2.6.32-131.2.1.el6', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x96c75fcebcbfcce5854825c9c7ced70c', 'RHSA-2011:0839: gimp security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The GIMP (GNU Image Manipulation Program) is an image composition and restarted for the update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0839 https://access.redhat.com/security/cve/CVE-2010-4540 https://access.redhat.com/security/cve/CVE-2010-4541 https://access.redhat.com/security/cve/CVE-2010-4542 https://access.redhat.com/security/cve/CVE-2010-4543', 'Moderate', 'Medium', 'gimp', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '2:2.6.9-4.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd22f87c37db5a5e44926ac4c920d6f6a', 'RHSA-2011:0839: gimp security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The GIMP (GNU Image Manipulation Program) is an image composition and restarted for the update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0839 https://access.redhat.com/security/cve/CVE-2010-4540 https://access.redhat.com/security/cve/CVE-2010-4541 https://access.redhat.com/security/cve/CVE-2010-4542 https://access.redhat.com/security/cve/CVE-2010-4543', 'Moderate', 'Medium', 'gimp', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '2:2.6.9-4.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa6f60cb9e2b1a4a7284ae25a447b4177', 'RHSA-2011:0839: gimp security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The GIMP (GNU Image Manipulation Program) is an image composition and restarted for the update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0839 https://access.redhat.com/security/cve/CVE-2010-4540 https://access.redhat.com/security/cve/CVE-2010-4541 https://access.redhat.com/security/cve/CVE-2010-4542 https://access.redhat.com/security/cve/CVE-2010-4543', 'Moderate', 'Medium', 'gimp-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '2:2.6.9-4.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x498e227f290e8d4c705c237505899dfd', 'RHSA-2011:0839: gimp security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The GIMP (GNU Image Manipulation Program) is an image composition and restarted for the update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0839 https://access.redhat.com/security/cve/CVE-2010-4540 https://access.redhat.com/security/cve/CVE-2010-4541 https://access.redhat.com/security/cve/CVE-2010-4542 https://access.redhat.com/security/cve/CVE-2010-4543', 'Moderate', 'Medium', 'gimp-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '2:2.6.9-4.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x419205150eacc8ff25b192b209e6b446', 'RHSA-2011:0839: gimp security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The GIMP (GNU Image Manipulation Program) is an image composition and restarted for the update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0839 https://access.redhat.com/security/cve/CVE-2010-4540 https://access.redhat.com/security/cve/CVE-2010-4541 https://access.redhat.com/security/cve/CVE-2010-4542 https://access.redhat.com/security/cve/CVE-2010-4543', 'Moderate', 'Medium', 'gimp-devel-tools', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '2:2.6.9-4.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcb958b2bb363ff1302b4cc58e82bd115', 'RHSA-2011:0839: gimp security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The GIMP (GNU Image Manipulation Program) is an image composition and restarted for the update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0839 https://access.redhat.com/security/cve/CVE-2010-4540 https://access.redhat.com/security/cve/CVE-2010-4541 https://access.redhat.com/security/cve/CVE-2010-4542 https://access.redhat.com/security/cve/CVE-2010-4543', 'Moderate', 'Medium', 'gimp-devel-tools', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '2:2.6.9-4.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd24b29add80a7eef8ebf322ee2ac5042', 'RHSA-2011:0839: gimp security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The GIMP (GNU Image Manipulation Program) is an image composition and restarted for the update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0839 https://access.redhat.com/security/cve/CVE-2010-4540 https://access.redhat.com/security/cve/CVE-2010-4541 https://access.redhat.com/security/cve/CVE-2010-4542 https://access.redhat.com/security/cve/CVE-2010-4543', 'Moderate', 'Medium', 'gimp-help-browser', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '2:2.6.9-4.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcd66ad2e55c55d1fd0baa6e0ffc86527', 'RHSA-2011:0839: gimp security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The GIMP (GNU Image Manipulation Program) is an image composition and restarted for the update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0839 https://access.redhat.com/security/cve/CVE-2010-4540 https://access.redhat.com/security/cve/CVE-2010-4541 https://access.redhat.com/security/cve/CVE-2010-4542 https://access.redhat.com/security/cve/CVE-2010-4543', 'Moderate', 'Medium', 'gimp-help-browser', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '2:2.6.9-4.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x99f2a3ac8deec9d760b54a35c697ac0b', 'RHSA-2011:0839: gimp security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The GIMP (GNU Image Manipulation Program) is an image composition and restarted for the update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0839 https://access.redhat.com/security/cve/CVE-2010-4540 https://access.redhat.com/security/cve/CVE-2010-4541 https://access.redhat.com/security/cve/CVE-2010-4542 https://access.redhat.com/security/cve/CVE-2010-4543', 'Moderate', 'Medium', 'gimp-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '2:2.6.9-4.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2ad5096cb505c20a7ecd5fcd794b5f26', 'RHSA-2011:0839: gimp security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The GIMP (GNU Image Manipulation Program) is an image composition and restarted for the update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0839 https://access.redhat.com/security/cve/CVE-2010-4540 https://access.redhat.com/security/cve/CVE-2010-4541 https://access.redhat.com/security/cve/CVE-2010-4542 https://access.redhat.com/security/cve/CVE-2010-4543', 'Moderate', 'Medium', 'gimp-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '2:2.6.9-4.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf20683972acb0564b2290f357ad3c10e', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb7487c712b5714638dd878ae29ab7fe6', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb4b901accdcad67905343d8c8a0e6923', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-client', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb9042336bdfeafa9514349e5ffa02f84', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-client', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x71d1b1f45878d942a1ceb01aca26e095', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-grapher', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe86e5f3aaea5a397f00744d7bdb143b6', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-grapher', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6e8875ca7059df0ee6bcee8cf2f5e69d', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-initscript', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x71fffa84351fc6dff5da8fb58bb12fab', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-initscript', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x112be3a5653b27e6204d5a4d702204bb', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-runtime', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1d208bd365ab325cbf8c3392784e7305', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-runtime', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5e1653c9a8c25215aef0c16cf47aaf14', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-sdt-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0e0b55991264ffc75089b063970430e2', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-sdt-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x61647687fd4f8fe2dde4670c5d16d75e', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-server', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0c4900dbe9d6b27237f77d6be06f2077', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-server', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4fb558b039d947251a0d9480fa37782d', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-testsuite', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaa3201899d8628d34476c149d3575a91', 'RHSA-2011:0842: systemtap security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'SystemTap is an instrumentation system for systems running the Linux backported patch to correct these issues.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0842 https://access.redhat.com/security/cve/CVE-2011-1769 https://access.redhat.com/security/cve/CVE-2011-1781', 'Moderate', 'Medium', 'systemtap-testsuite', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:1.4-6.el6_1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x747c6decbef8a2c96c31597055879a5b', 'RHSA-2011:0843: postfix security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Postfix is a Mail Transport Agent (MTA), supporting LDAP, SMTP AUTH (SASL), update, the postfix service will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0843 https://access.redhat.com/security/cve/CVE-2011-1720', 'Moderate', 'Medium', 'postfix', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '2:2.6.6-2.2.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf3d50ad32bc7127258a1aab9982ef60f', 'RHSA-2011:0843: postfix security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Postfix is a Mail Transport Agent (MTA), supporting LDAP, SMTP AUTH (SASL), update, the postfix service will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0843 https://access.redhat.com/security/cve/CVE-2011-1720', 'Moderate', 'Medium', 'postfix', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '2:2.6.6-2.2.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe6a013c2fcf755f1e59f9b13f77fc250', 'RHSA-2011:0843: postfix security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Postfix is a Mail Transport Agent (MTA), supporting LDAP, SMTP AUTH (SASL), update, the postfix service will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0843 https://access.redhat.com/security/cve/CVE-2011-1720', 'Moderate', 'Medium', 'postfix-perl-scripts', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '2:2.6.6-2.2.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa94d9e525042e9b288db4233aec9bcd6', 'RHSA-2011:0843: postfix security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'Postfix is a Mail Transport Agent (MTA), supporting LDAP, SMTP AUTH (SASL), update, the postfix service will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0843 https://access.redhat.com/security/cve/CVE-2011-1720', 'Moderate', 'Medium', 'postfix-perl-scripts', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '2:2.6.6-2.2.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcc0ce7be86077bc1d0fe23cdff8d0cc9', 'RHSA-2011:0844: apr security update (Low)', 'RHEL6-rhel-6.5-aus', 'The Apache Portable Runtime (APR) is a portability library used by the such as httpd, must be restarted for this update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0844 https://access.redhat.com/security/cve/CVE-2011-1928', 'Low', 'Low', 'apr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:1.3.9-3.el6_1.2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xab2a35aaecc2835093b939c1b729c7f5', 'RHSA-2011:0844: apr security update (Low)', 'RHEL6-rhel-6.5-aus', 'The Apache Portable Runtime (APR) is a portability library used by the such as httpd, must be restarted for this update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0844 https://access.redhat.com/security/cve/CVE-2011-1928', 'Low', 'Low', 'apr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:1.3.9-3.el6_1.2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1360f214496b0d1e1b66146eb5c4ea13', 'RHSA-2011:0844: apr security update (Low)', 'RHEL6-rhel-6.5-aus', 'The Apache Portable Runtime (APR) is a portability library used by the such as httpd, must be restarted for this update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0844 https://access.redhat.com/security/cve/CVE-2011-1928', 'Low', 'Low', 'apr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:1.3.9-3.el6_1.2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x635d87a380f9cebabd225451bad8a178', 'RHSA-2011:0844: apr security update (Low)', 'RHEL6-rhel-6.5-aus', 'The Apache Portable Runtime (APR) is a portability library used by the such as httpd, must be restarted for this update to take effect.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0844 https://access.redhat.com/security/cve/CVE-2011-1928', 'Low', 'Low', 'apr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:1.3.9-3.el6_1.2', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcbad674fe93e0b9122cadd7599e54eea', 'RHSA-2011:0845: bind security update (Important)', 'RHEL6-rhel-6.5-aus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0845 https://access.redhat.com/security/cve/CVE-2011-1910', 'Important', 'High', 'bind', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '32:9.7.3-2.el6_1.P1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2c8811c29ad91ec3f756d7cb57756f87', 'RHSA-2011:0845: bind security update (Important)', 'RHEL6-rhel-6.5-aus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0845 https://access.redhat.com/security/cve/CVE-2011-1910', 'Important', 'High', 'bind', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '32:9.7.3-2.el6_1.P1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc2b23fe65966b214245fc263c75cb9a3', 'RHSA-2011:0845: bind security update (Important)', 'RHEL6-rhel-6.5-aus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0845 https://access.redhat.com/security/cve/CVE-2011-1910', 'Important', 'High', 'bind-chroot', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '32:9.7.3-2.el6_1.P1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2a759e3d4719e6054683c457dcc5c41a', 'RHSA-2011:0845: bind security update (Important)', 'RHEL6-rhel-6.5-aus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0845 https://access.redhat.com/security/cve/CVE-2011-1910', 'Important', 'High', 'bind-chroot', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '32:9.7.3-2.el6_1.P1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7d31a5dbab7848f92d204ba57246e3ab', 'RHSA-2011:0845: bind security update (Important)', 'RHEL6-rhel-6.5-aus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0845 https://access.redhat.com/security/cve/CVE-2011-1910', 'Important', 'High', 'bind-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '32:9.7.3-2.el6_1.P1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf9d9c97eb7fd7bd1aff4ef3f0101316f', 'RHSA-2011:0845: bind security update (Important)', 'RHEL6-rhel-6.5-aus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0845 https://access.redhat.com/security/cve/CVE-2011-1910', 'Important', 'High', 'bind-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '32:9.7.3-2.el6_1.P1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfd39a99f331070d464d2c83a2f5a9879', 'RHSA-2011:0845: bind security update (Important)', 'RHEL6-rhel-6.5-aus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0845 https://access.redhat.com/security/cve/CVE-2011-1910', 'Important', 'High', 'bind-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '32:9.7.3-2.el6_1.P1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7ae112359e81dbd7c5c22c10335bb4f3', 'RHSA-2011:0845: bind security update (Important)', 'RHEL6-rhel-6.5-aus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0845 https://access.redhat.com/security/cve/CVE-2011-1910', 'Important', 'High', 'bind-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '32:9.7.3-2.el6_1.P1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6558eaf1970bf9f66d629c4f471b7655', 'RHSA-2011:0845: bind security update (Important)', 'RHEL6-rhel-6.5-aus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0845 https://access.redhat.com/security/cve/CVE-2011-1910', 'Important', 'High', 'bind-sdb', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '32:9.7.3-2.el6_1.P1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x87f2004d6b7c3202db07dc91842be3bc', 'RHSA-2011:0845: bind security update (Important)', 'RHEL6-rhel-6.5-aus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0845 https://access.redhat.com/security/cve/CVE-2011-1910', 'Important', 'High', 'bind-sdb', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '32:9.7.3-2.el6_1.P1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6754fa8a041791df4ccd428d5118232d', 'RHSA-2011:0845: bind security update (Important)', 'RHEL6-rhel-6.5-aus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0845 https://access.redhat.com/security/cve/CVE-2011-1910', 'Important', 'High', 'bind-utils', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '32:9.7.3-2.el6_1.P1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9bd2dca244497089d347364ac77c4686', 'RHSA-2011:0845: bind security update (Important)', 'RHEL6-rhel-6.5-aus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain will be restarted automatically.', '2011-05-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0845 https://access.redhat.com/security/cve/CVE-2011-1910', 'Important', 'High', 'bind-utils', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '32:9.7.3-2.el6_1.P1.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9aa4bc4756a3497be2fea7687ee9020b', 'RHSA-2011:0850: flash-plugin security update (Important)', 'RHEL6-rhel-6.5-aus', 'The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash upgrades Flash Player to version 10.3.181.22', '2011-06-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0850 https://access.redhat.com/security/cve/CVE-2011-2107', 'Important', 'High', 'flash-plugin', '', '', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:10.3.181.22-1.el6', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xcfa88b175cb211965f6ae705920a63ad', 'RHSA-2011:0850: flash-plugin security update (Important)', 'RHEL6-rhel-6.5-aus', 'The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash upgrades Flash Player to version 10.3.181.22', '2011-06-06 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0850 https://access.redhat.com/security/cve/CVE-2011-2107', 'Important', 'High', 'flash-plugin', '', '', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:10.3.181.22-1.el6', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x8269ef556fc5229cdfff930ea67b7ef9', 'RHSA-2011:0856: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6.5-aus', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0856 https://access.redhat.com/security/cve/CVE-2011-0862 https://access.redhat.com/security/cve/CVE-2011-0864 https://access.redhat.com/security/cve/CVE-2011-0865 https://access.redhat.com/security/cve/CVE-2011-0867 https://access.redhat.com/security/cve/CVE-2011-0868 https://access.redhat.com/security/cve/CVE-2011-0869 https://access.redhat.com/security/cve/CVE-2011-0871', 'Critical', 'Critical', 'java-1.6.0-openjdk', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '1:1.6.0.0-1.39.1.9.8.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa31209034007356f8f5be1e616c5cdcb', 'RHSA-2011:0856: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6.5-aus', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0856 https://access.redhat.com/security/cve/CVE-2011-0862 https://access.redhat.com/security/cve/CVE-2011-0864 https://access.redhat.com/security/cve/CVE-2011-0865 https://access.redhat.com/security/cve/CVE-2011-0867 https://access.redhat.com/security/cve/CVE-2011-0868 https://access.redhat.com/security/cve/CVE-2011-0869 https://access.redhat.com/security/cve/CVE-2011-0871', 'Critical', 'Critical', 'java-1.6.0-openjdk', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '1:1.6.0.0-1.39.1.9.8.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x092589b2989c935a078fea15fce4bb83', 'RHSA-2011:0856: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6.5-aus', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0856 https://access.redhat.com/security/cve/CVE-2011-0862 https://access.redhat.com/security/cve/CVE-2011-0864 https://access.redhat.com/security/cve/CVE-2011-0865 https://access.redhat.com/security/cve/CVE-2011-0867 https://access.redhat.com/security/cve/CVE-2011-0868 https://access.redhat.com/security/cve/CVE-2011-0869 https://access.redhat.com/security/cve/CVE-2011-0871', 'Critical', 'Critical', 'java-1.6.0-openjdk-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '1:1.6.0.0-1.39.1.9.8.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0e7b6c20c2773d1d81434daf0d4dc6d1', 'RHSA-2011:0856: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6.5-aus', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0856 https://access.redhat.com/security/cve/CVE-2011-0862 https://access.redhat.com/security/cve/CVE-2011-0864 https://access.redhat.com/security/cve/CVE-2011-0865 https://access.redhat.com/security/cve/CVE-2011-0867 https://access.redhat.com/security/cve/CVE-2011-0868 https://access.redhat.com/security/cve/CVE-2011-0869 https://access.redhat.com/security/cve/CVE-2011-0871', 'Critical', 'Critical', 'java-1.6.0-openjdk-demo', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '1:1.6.0.0-1.39.1.9.8.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x284eeb62fdfbe0f01ee5c68092813411', 'RHSA-2011:0856: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6.5-aus', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0856 https://access.redhat.com/security/cve/CVE-2011-0862 https://access.redhat.com/security/cve/CVE-2011-0864 https://access.redhat.com/security/cve/CVE-2011-0865 https://access.redhat.com/security/cve/CVE-2011-0867 https://access.redhat.com/security/cve/CVE-2011-0868 https://access.redhat.com/security/cve/CVE-2011-0869 https://access.redhat.com/security/cve/CVE-2011-0871', 'Critical', 'Critical', 'java-1.6.0-openjdk-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '1:1.6.0.0-1.39.1.9.8.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8c110bfc7c7a85c3edd14b39e17cc40a', 'RHSA-2011:0856: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6.5-aus', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0856 https://access.redhat.com/security/cve/CVE-2011-0862 https://access.redhat.com/security/cve/CVE-2011-0864 https://access.redhat.com/security/cve/CVE-2011-0865 https://access.redhat.com/security/cve/CVE-2011-0867 https://access.redhat.com/security/cve/CVE-2011-0868 https://access.redhat.com/security/cve/CVE-2011-0869 https://access.redhat.com/security/cve/CVE-2011-0871', 'Critical', 'Critical', 'java-1.6.0-openjdk-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '1:1.6.0.0-1.39.1.9.8.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x11dc331f2229f218e857c3e655c3db84', 'RHSA-2011:0856: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6.5-aus', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0856 https://access.redhat.com/security/cve/CVE-2011-0862 https://access.redhat.com/security/cve/CVE-2011-0864 https://access.redhat.com/security/cve/CVE-2011-0865 https://access.redhat.com/security/cve/CVE-2011-0867 https://access.redhat.com/security/cve/CVE-2011-0868 https://access.redhat.com/security/cve/CVE-2011-0869 https://access.redhat.com/security/cve/CVE-2011-0871', 'Critical', 'Critical', 'java-1.6.0-openjdk-javadoc', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '1:1.6.0.0-1.39.1.9.8.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3ec1cd4d8ad6e5e0d229e5d18887493f', 'RHSA-2011:0856: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6.5-aus', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0856 https://access.redhat.com/security/cve/CVE-2011-0862 https://access.redhat.com/security/cve/CVE-2011-0864 https://access.redhat.com/security/cve/CVE-2011-0865 https://access.redhat.com/security/cve/CVE-2011-0867 https://access.redhat.com/security/cve/CVE-2011-0868 https://access.redhat.com/security/cve/CVE-2011-0869 https://access.redhat.com/security/cve/CVE-2011-0871', 'Critical', 'Critical', 'java-1.6.0-openjdk-javadoc', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '1:1.6.0.0-1.39.1.9.8.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x07a1ea847c256a8059730d1cf965f53c', 'RHSA-2011:0856: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6.5-aus', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0856 https://access.redhat.com/security/cve/CVE-2011-0862 https://access.redhat.com/security/cve/CVE-2011-0864 https://access.redhat.com/security/cve/CVE-2011-0865 https://access.redhat.com/security/cve/CVE-2011-0867 https://access.redhat.com/security/cve/CVE-2011-0868 https://access.redhat.com/security/cve/CVE-2011-0869 https://access.redhat.com/security/cve/CVE-2011-0871', 'Critical', 'Critical', 'java-1.6.0-openjdk-src', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '1:1.6.0.0-1.39.1.9.8.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd92faf30dca2864c34bf8e9b527ac04a', 'RHSA-2011:0856: java-1.6.0-openjdk security update (Critical)', 'RHEL6-rhel-6.5-aus', 'These packages provide the OpenJDK 6 Java Runtime Environment and the must be restarted for the update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0856 https://access.redhat.com/security/cve/CVE-2011-0862 https://access.redhat.com/security/cve/CVE-2011-0864 https://access.redhat.com/security/cve/CVE-2011-0865 https://access.redhat.com/security/cve/CVE-2011-0867 https://access.redhat.com/security/cve/CVE-2011-0868 https://access.redhat.com/security/cve/CVE-2011-0869 https://access.redhat.com/security/cve/CVE-2011-0871', 'Critical', 'Critical', 'java-1.6.0-openjdk-src', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '1:1.6.0.0-1.39.1.9.8.el6_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbccb11787b71867a1b8fe1864c6fed9b', 'RHSA-2011:0858: xerces-j2 security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The xerces-j2 packages provide the Apache Xerces2 Java Parser, a Parser must be restarted for this update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0858 https://access.redhat.com/security/cve/CVE-2009-2625', 'Moderate', 'Medium', 'xerces-j2', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:2.7.1-12.6.el6_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe4748d5a7a4f51b101c862be6661e81b', 'RHSA-2011:0858: xerces-j2 security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The xerces-j2 packages provide the Apache Xerces2 Java Parser, a Parser must be restarted for this update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0858 https://access.redhat.com/security/cve/CVE-2009-2625', 'Moderate', 'Medium', 'xerces-j2', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5::server', 'rhel-cpe-repository', '', '0:2.7.1-12.6.el6_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb2d46c0c2bbb69a87c3d33f6176c4ce0', 'RHSA-2011:0858: xerces-j2 security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The xerces-j2 packages provide the Apache Xerces2 Java Parser, a Parser must be restarted for this update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0858 https://access.redhat.com/security/cve/CVE-2009-2625', 'Moderate', 'Medium', 'xerces-j2-demo', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:rhel_aus:6.5', 'rhel-cpe-repository', '', '0:2.7.1-12.6.el6_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcfb84ab5b680c1bea31c781ffbc5670c', 'RHSA-2011:0858: xerces-j2 security update (Moderate)', 'RHEL6-rhel-6.5-aus', 'The xerces-j2 packages provide the Apache Xerces2 Java Parser, a Parser must be restarted for this update to take effect.', '2011-06-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2011:0858 https://access.redhat.com/security/cve/CVE-2009-2625', 'Moderate', 'Medium', 'xerces-j2-demo', '', '', 'i686|ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*[...];
Date: 2023-07-04 18:38:23 Duration: 4s391ms Bind query: yes
8 3s201ms 5s744ms 4s473ms 2 8s946ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?,[...];Times Reported Time consuming queries #8
Day Hour Count Duration Avg duration Jul 04 14 2 8s946ms 4s473ms -
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x1b66e4f92db3b477ba506601e2f8226c', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'runc', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:1.0.0-66.rc10.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x14ae0d56eec7764aff15dfbd0e0fd928', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'runc', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:1.0.0-66.rc10.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xafc011088732e6f38a6f2de2be690140', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'runc', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.0.0-66.rc10.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc47dab2d3cba92b602f6586da0bf6d26', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'runc', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.0.0-66.rc10.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb0c5455f423ddb221157edccc60e0c22', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf9fea878de430760dfd41553e003d629', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x25508bc62107c696d20647575b03c51a', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x04ccb098e59eb31f720d7345eaebaf12', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x841988463295fc3b1657828d8eaf4515', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x447998fe1e0a500d2df59da689ab6a8e', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0469a0cd207d92058ce2786afc851f45', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x256a96c6cbb7bb4bcee94059dde97e92', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x41a7250839cf724584c70c3f8349cce3', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb9f577f227cf88eac6a502e96713ced0', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc56515421696d16d8d232bf8f2073b53', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc5502258c450866b7bfabcd45938ae36', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xae5e77c264f7572564758656ee927120', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe9ea906cb5ce92c6dea26a8c7cf8b124', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa30e86f1d5595bbc9c9a2d95bd3430d2', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x47ecb116c9a0ba9ac4121370e14d4602', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd466e6b1983849d19f84220e212f479d', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x18599da79106ec8e1b6629e0ecd0d649', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x87494b0ff35f7b10ae6bd8b49e58c7f5', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd5972d4f3c596c7d5614554dcfc66941', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbdf810ade722c2a65a1f05b084136583', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x852f7afc39013e3f35da4685ed46b078', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8dab544424f2aa83e0c4a0a48c7f2fcd', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa04555a12b760d7f287c70a945ee616c', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3e9ad624bf18e88afe34869a41ef9b0d', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x33c0b4a06ec1287f4242fb340b976dc8', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf057b6e3c201e691b4bc0212979a44bd', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd47d14abada8bcee624c47a6ad1f0881', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf2135ed481c3b80a118171a3b21e5a2c', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf82205ad61fc025c403fd69d84da6565', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x062b3a801b5887a923b6994cf275509d', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3ec59e2b0b32504433c5fc6918c7e4c0', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x89ab38bde53be7191877e8dcffcee948', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc95cea9a7e7c102c54a31fcc1ce7c2b7', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x91ea7a7fdbe5723d8cf4191c706d315c', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa8565cb21e1ac5a5a87f4a85553fdeb0', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x92f58708f7a870b2de177547bcd979a5', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8c54534a90935e94b01f011b24dddeca', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb2fbc8e65c6f266805679eaa3394c501', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2a3d4e4c797b698723ff555840ce6e01', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5b23e42d66c28eb83f03bdfd802cd9ae', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb5ef45e85ffa4fd87571b3659510ca1c', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x169fcb4b93f2d01b93e6d84b36919f37', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6fb49815df0de529b0007e799207366c', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x73b65b50bbce373f168957240b8b6dba', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe0690c6812e972759a6c03cbbc85d48d', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5c035fc3b2a4754fcad283a13991e83b', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x91af7c1ce8555b0906b36aaffdda494e', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa5d913f13998915a214690ebb718224f', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x69c5c44d291949b2286b362cef4503c6', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2fb998a63a47ac71226b0cc1799c92d4', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe85d18e580d0332edc8ccbf3ead5f86a', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x01c1d63d152954c7a50beacbb0795383', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8fa3b0a3c29804ea55f1ded4fa4f64d0', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf151ca965caf3d57d7ad7a2936369ec1', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1760b26e88a9115eb70e63a79958e5db', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-tus', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3ca8072dc440e1934e4c6dbed3be0a92', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x14039779abeb01d75c0616e5adfa56b8', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x05c0f41a7705ed2d1e7c1cc25e7de2b0', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xff5196cbe4eb0eb6ba40148e45d457ec', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd86df5264122348fb18173b5aa7d8246', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9db8dac5432ae09e5e8af329aedf5812', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6fbd80fb345c07dd199c73aca79d3c92', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa1a8261598b88c9dfcd8c24804dc1348', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa8fdec44f521b202577973849462c1f7', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x44db947d0307bc30d945b3def880f187', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xae2270d6ed7f14727ad2eb294f1132ae', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8fc5f51ff13e6d5e4a088197979f029b', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb4fed5cc96b0766b1fbee56e29d0dea5', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x872af110342d1e55b3acd487860ad7e9', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xef1f825f3a0f4aa1884915127284bc8e', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x46243b778601cbfaf9ce1ebb68ce13e3', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa47f0608c72b3795a2dd285dc6ead6e1', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3cf3ad6063f1db41d7f96e5e8594a8b9', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xac42ad63ffd69caab7d53f3efec5a85c', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x45eb9d336f192fc430119854236e9805', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x395c90ab3125486aa60dfd322f451564', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa073d7f0843294cadf1a95fcecef0884', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8eb73d6f1cb9120bdbe4962557706738', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd9e9a67bddfbdb54f516801d27b75884', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb9803c3de4b0f3c30b53e9f2a7964520', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcfd47b9dd46a6aa016a7dd3fab3d6256', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf7c118a5578f9893975aba3c3b751457', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5e4e200468642567dbfd74c1df93495a', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x034356bddec42415f28dbeb45c261a15', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcb4aeffcfe3fd96abd0118bb1acab48a', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9da7a31aa2c910cae61a9dd00da6f3db', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe2263eacf56cab4dc6bd9bfdbd602256', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8d1bbf9920273a75157ded1b10713bcc', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-tus', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf36de214c74d011698ee20433c8fdc58', 'RHSA-2022:1643: xmlrpc-c security update (Important)',[...];
Date: 2023-07-04 18:38:24 Duration: 5s744ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x9996e87ee4a6565b3afb5983c96987ac', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'runc', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.0.0-66.rc10.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8e1d4d28776dc082226d036fc5438dbf', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'runc', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.0.0-66.rc10.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1515ff20b97b70c291a5dd5a9f3a3952', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'runc', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.0.0-66.rc10.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x84b199b7a944777e36a8b1f8eff05e71', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'runc', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.0.0-66.rc10.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x98e65d9b1e8005a1a12e06192d452f8b', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe467fe38a00ae419dd6c248966f007fc', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x165708e83ee28c736c9422383f59cd02', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4a7a6cd61c789c917a621e343df7c944', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd806b918437a765152d4de1b7c074ad0', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x240176b693b76673cb18f70d0705beb7', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4b3b38097703f932a257bb07d00661ca', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x77f5f1e7c058835be3e03e6977ac8889', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2ae0b93d31c065776f4bc599934b0c7d', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1ca0db88909c7af7cac20ed209c6d576', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x74dafb8c7360273fa2c75faae6b75076', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd4c952bf27dfe99b8f997e154aeb0971', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfdb18ef511c98e4221e2346fea4e13cb', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x02c8977d86c22502689b50cfcca0e31b', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'skopeo-tests', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '1:0.1.41-4.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1c8c6ae52b3c82673cc69fb7b27e5a02', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe8eb365e4711f0ccb50e25b6634d9c0b', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa17dc3493f87cb78226e35057611b2c3', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x22ab93710ffe7506e2bcec7847643164', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3b6b0dfe772e033c404cd85a3d309b18', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3dd9e11abe4cba3af4d2a10cdcda1662', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc7d0f407ca720abd1013188f622583e6', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'slirp4netns', '', 'container-tools:2.0', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:0.4.2-3.git21fdece.module+el8.5.0+14796+e4386a39', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3db88c6e74943cf2da8401047a1e015b', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb96c061a7f4b7daace5ae15f8cd929fb', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x52604782d3bcb8f6b4af4d7d13f34315', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x213ed5aa2615aedb6d35f8ccca49434a', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe81a8dbfeb98beba7ebbc87c1a174dd7', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa6f4428c9a34b63e80c44ebf5e6b9ff9', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcd954a6bfd87bf3f3a7e6d183d58c037', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'toolbox', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:0.0.7-1.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x815b512eda06738aa1cfa57e9490eaab', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xed8a948b1509b780e524b1cbf40de789', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8a4fd3e4a2b82101c314b883375f537d', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa74f6f866a60ee181524c505c9b5ddd2', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf6882cb82c841d776486fb43c3bf69e8', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb8dadacbfb96accb519a31ea9689890d', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdc68d7e71998ef348532a0dfe3c0bf1b', 'RHSA-2022:1566: container-tools:2.0 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-26 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1566 https://access.redhat.com/security/cve/CVE-2022-27649 https://access.redhat.com/security/cve/CVE-2022-27651', 'Moderate', 'Medium', 'udica', '', 'container-tools:2.0', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:0.2.1-2.module+el8.5.0+14796+e4386a39', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf8dff8f866b826aa2bcb4939c4bc283d', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd42b2e5f8d28abfc98fa53421d7fdee3', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4f04a1e3c9353389b64afad7fc0d4a0c', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7edd97d126669e2891b245df71500d3b', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4785fac035164d6c919c245d2a3f08fa', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4b8dcc88a4b7888135e669010748c79d', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x76a5e2aec26379786242a867b2e1c535', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x18927e2a999e5fa9bf5ff798f27b99ae', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6e5338dccd43033325b91e9de42c2068', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x60546e7988246cc008a5e5ae22661285', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x144258535c35f034ce05e6475b11e370', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8d973ed212c3799babae3c9992b5c47f', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x823160ea2b25c87c505fd9c634e6c327', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5e97ac893f19051ab996f2b54a9f83cf', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb9e7402276b2fe2d505ffa6a3d7e572e', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa747ff3a35c1daf094f4e5003df9a5d0', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd293729d84117a69b374d81297c57df3', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x315449260e9a6baa295bc0e1f4a503f6', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x393a7c07da47e64226018d04d2ca152a', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7540ca97734d15e2797fc33ea65c1bf2', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd000267fb296db62a28c559e8411b36c', 'RHSA-2022:1642: zlib security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1642 https://access.redhat.com/security/cve/CVE-2018-25032', 'Important', 'High', 'zlib-static', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.2.11-18.el8_5', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7962b482d844d7fe7918bf6f7cc0939a', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd9768e94359bbf5f4f2e9c54c2e85928', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfe43d5ac8be4b3185cc2b0260f1eeb03', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x459764739e42c54dad1506b03da7454d', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2c28dbd425ddf4cf3e7b928a574bf986', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf28c3ecbaf9a4d505b5e9dbd4bb06dc1', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x80677f1f6bb85ee24b9b3b89e9faf8cc', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x12ba9c592c7cf4eb1373aa3428fbbee8', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xed1053a1c2dfd176ff8efbd886510230', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe19bdaa0850b3b6ad8419a5125187330', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdda4cd549199156a7108ae4aa11a1c0d', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd881cb689b83e0eebb15af62d81ac6ef', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x517c375d2e2af6383e4a0c2607a61af9', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0aec5ab6b0f186f6dc9ef8a70ba6db13', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-c++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x53901d2cd1adeb8c65f2df4289751cd5', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd837e565afae9a0ee7aa3478c204485e', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x700aa80ca132480afad1aa78d8b0c8d0', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x825d388602d24a836a4be3a0888500d5', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8c12681fcd0997d3959809cfc373e7f7', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4ce2882ef68b2550808968dc14e385c9', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xed6139546e6b3ae6cdd28623cdbc5966', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0cf1b347915df9013fad88b57c7b3200', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5db7082838c8e6adcb7ab90b99855a75', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3210d6b26318dbb1b6a4497a73c77f38', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4aad6dddd46075e9586a97f6d33cecfe', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfa802d52dda048882bc63ee56c1f1ebe', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9aa29b6021840868d936a1895fcb86f5', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x278aff96ad01a5d368498cfb033649ba', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-client++', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x71bd6fddaf59d3962b57eaf6dc14d44f', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x45b6f6fbc7a8afb55bf555e25e357fee', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7dd3b0f9a7e4cc979e0b194e889900ed', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb04b7ec4862fef8acdf6d08bdba5a403', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xec882d995ba186debb0a1e172d2993a9', 'RHSA-2022:1643: xmlrpc-c security update (Important)', 'RHEL8-rhel-8.8-e4s', 'XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1643 https://access.redhat.com/security/cve/CVE-2022-25235', 'Important', 'High', 'xmlrpc-c-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.51.0-5.el8_5.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x889c4317d544f77c57b814ec89cbe37f', 'RHSA-2022:1643: xmlrpc-c security update (Important)',[...];
Date: 2023-07-04 18:48:19 Duration: 3s201ms Bind query: yes
9 587ms 7s921ms 4s254ms 2 8s509ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, the berkeley internet name domain (bind) is an implementation of the domain name system (dns) protocols. bind includes a dns server (named); a resolver library (routines for applications to use when interfacing with dns); and tools for verifying that the dns server is operating correctly. for detailed information on changes in this release, see the red h[...];Times Reported Time consuming queries #9
Day Hour Count Duration Avg duration Jul 04 14 2 8s509ms 4s254ms -
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\xee16e5b709fbdb12689c7688aab2bd67', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcfda2c518aa24f5eb35ea6d72c6f08d1', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaf91862e55c9cc0c05b434971d044918', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7b586d5e6c69bca6695c78fff974aeba', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x483c93a86aaae8e6d030fb274a1f4c2d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb3390c9cbc4959fdf37c0a32e0ad3de2', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa5f851858ac7810ab8acbd72e02ee778', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x71608cbeba11adb99cd84f78cab68d6d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7149b31d3f195cc787cd6c0e3ceb799c', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x37056ef6fa1707ea87fb2d3f18ca533d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4f4efbb1c8e75f7e4678b45c97fa8775', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5aae70e9eda187fb4b78d97ffdeacd4d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xae39ee9314cedc45a2002b636a721dce', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x073cbf85ff50a5b7d16909b1a2d1095e', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcba602389cd5eb0d856c2c6336644620', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x047d9e7a71045de4c5b738e5ecea3ecc', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2e8287089b94676464ed939d897839e4', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd2e4d82703bca79020f322d007b91845', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7549447ab68ee3f9eb68dedadb60d6c2', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd65c4e26e6c38943345fb05eda599e1b', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb17d837e22103a0365df26c71186202d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcb0b801adba8d53f133344df70da30d5', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7e26a39d6ca0129ad2d42c78fdc891bd', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb42f609e4c47b9255ff4739ae486d031', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x218a13a0506ab94178e986ac0b0e66ed', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbaa1db9ce780d62e27d8d30508d80124', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x13beea1e27bbc0fc80e6574e159ffb8a', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa94e8fdfa58fb47e88ddc5a95780034e', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa803b1a081bbb8404d64d518c454121e', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2a9ceb61016da7509ceaac156a695842', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa6f7eeaf82e36d7d8ce4317f4df23748', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x35f06c69aaacaa81663beba8af569857', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8539820b8f9e0dc8bc94100d3f52703d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x875e2b664fbd400bc23e490da6269138', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8b5ee9b045f1599f2767ab4cedcc1822', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7b85342c00c3263ca29d2b1e77af9771', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfb6c7b1008c30233447dc5d4003ae680', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x02ea0bffb109722466cc01e93ff55cd2', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x53fe879d73faf9bfe9729490758fe416', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x47700bda8dea9d53b6a7479c50d5f039', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa60d2323fa988648b3adc876f561b931', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcef67f6f9fa7adbf45b79c98c2f6a4eb', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x662bd034ff2b8ceb7beac91e7bef5b85', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x07f3eb01b18ba99d416c5174ccae9349', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2f457f8c9f6ddfa01f8215de3fc2bb78', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x862a4261bb1ed4a05bbcca0828f1e211', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc9276a527e2b33561af4475f2722a861', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5a13b5b2001a34100a370ebedd51c79a', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x10802ab03f9318fc2fb52b0811bffce6', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x43dfa3f273dd39fc126eba2399b8ce0d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x82807b1a69910cc8b96eb73c6b29e8d1', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x86a5fd556b449424faad35d48184ec4e', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3b6759b77212f8cd704904eea2d61110', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x54c6fdaa9acd85d8874de3cf00da5b13', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcb353aa7b3ae1f9113c9f8ae8b747b7f', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6461f35d78dfa0bd78c453f283b01e01', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7edbb9f59bf677ea7f66de059fba2aa4', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x32e1638c1a56aa77d03239cd42cd0904', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x184209d030853c6361e2de63861f1598', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0af3eaace9357aadc58199aa39bb8685', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x276ff4618d9abd079e3357ff3fc4e993', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0527526cb681e4a53d77cfd3c42bf4c2', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa44f45286e47146ba58915af8b9da056', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd9c7491e9516e354a2a3098f339bc42f', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x774caf504b2eaf37ad6f7452c403e8ff', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x82135e5ebfe67d2af5a038752a5d33d5', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4d8c2165cbc7621623551003ebbe0a34', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4ba220428e2c017023016464e80f02eb', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3550ea99fea294e347970ecc21903dc6', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xce5fa538421d9f9df77030e0a642ce8b', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xed30b421450a245796a2dc4b8c1ff433', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x740256e5a9f4feef611641f8c738c815', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa58e395069157d7371981fab45053c6b', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xae920a2ba488ec9e9672ba3227651dbc', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x741107cc26abd451e2d742bbd7b19fff', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x24fcdae6feff2d55d81006f55695e465', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa05f65824f543d89486834675bfaaa8b', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcad8e126c1234a223aac0b79f58133aa', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x20cd5d59f85cc93b54fbf0e48ab5dfda', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc54534001ca3e93c5235c00d564c653b', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc98a0638b162010fd1327716434fe23c', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7b4311de265278ed837b01e16867acad', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb46b07a6d2254baa1ace5a044129713a', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9e9dd711ea568fe641b06f5c99c8f60c', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x59ee8d0a0cb3ab065c846f633b46fd75', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x479af0f4fc4585827f7f7cfeb355bcd4', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xac6b81406a814ac2775413b058d4ef43', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa89213ccb3739aa9564be382d804d72a', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5aecada0bf8fb2b062a63e57679e6e3f', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x787c42cedcd64053a65fb685a34418b9', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-e4s', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red H[...];
Date: 2023-07-04 18:39:50 Duration: 7s921ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x3cbe6eca1479ab24e63859f61665d5f6', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3e4fcf3f40d2110154ca66bccb2ca78b', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0f4b0c0752b8a9b97abeff98c0fd9325', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2e549d1a9ffd846861811d14764d7829', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfef0fd253b9531d89db9e8ac3a561088', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc68712e0a68e745debda9a85df5324d9', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd07cdf2f0887de3d492f4db477c6a852', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x165383db2c7a8ec2ea19def073ee226b', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa6a228481b225147412c6192129ab280', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x07e57f9ae076d748d7e85995921db6f3', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7b283c39f1a48f6ae67684a8dfc937cb', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x06ce8d4f2d2f6628d7b9fbe3bfddbe3c', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfd184b5878e90cf57957c4a4f56cea3f', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0564e9b7998f38d1d69a032fe3463de4', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe66c10b8770b6b4a61efed0ecbb52d92', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-export-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x668548c0f74a05a27da8488df89e6c81', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x11c144c5cd35413b472508c671e144d5', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb85d7fd94edcc574a05fed9a8c564edf', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x725a55dbef07536f9164f4960ccbbd7e', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x06bb8b39b9742463683b9e8b48f5e1e5', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2bd3ed153b4e489d2eeb4131568deefd', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x12f8fbce666db64af88390d502982dba', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0892f2dee43121a44b65a41bc0d35829', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf2688cf6e3c3c79fb20a31cfbf5ea6fb', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x97b69e23ae395a9d1fa61771d2b2083d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2e1941b3e06cecdfaa3ecde79ddc1898', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd4c273f0eaa23dc8575030fa881bd1f7', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3aa50c158dc80016257bb1eec4dcff79', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfb44b19556b9bbbd075ecc38587b125b', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-libs-lite', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4aa06fa001cf09107323afac8357d5ff', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x41b19a78e715d7416360a3e01f0f8d88', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2815228f793eac7f850b3ae7acdc15cc', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8289041a8497546ce3b736d3c335afa7', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0cecce91ba0cf5cde8cf409275fe045d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf45a619974f3cae977eaee8d85e3c5c5', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9ee9e7873fd1e9481f41513b4f25d80f', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-license', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x244bac0d437e77e876c9b31eba78261b', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x61497bfd77571cb4bd2a5902b831a16b', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfd79575797e4299f0da79bcff41e1516', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa23793c3eb4f50bc8c5c784e45b599a9', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x849375ca453f95be42ec959ce4abf9cb', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1a9db7642dd13bbb45bb135aeb0b865d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb5ce248bc61aff4e545dd1888992db97', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-lite-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x26ccd740d0f26a85aab4fc4852960fd7', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x77d008c38115217e69c4011fe6476ad3', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdc0083a1ff5f11f2c2ba4f3056ea2017', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfdf8b17a6e835d136ab311d6be07fc31', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x57fa16d08bd34c9a94d25005226ffe62', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x74600a3e78504cc1468b9f5ebc7a3a3c', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x935211e9a672a4e978cdefd6b5a580b1', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xae4e8daec7df0e1951a6fea8f33e2b7c', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x861957ebc6ea58ef0cc1290065889de4', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x31c2ba9995a7145d8a3e6820b90ab245', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x24d1c63e9b4617ffb6cc5e0020956bcc', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x164be00d557ab30ca2e967fac44d4f57', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x03476934b245176ab1f2636369b3574f', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x605ec5e6cb4c8ca9d68248c1118b6d8e', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-devel', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf482d4e3963b0211eefe86f21b56ff5a', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc93da4fb0b9ece0f4324ebb4dcf1b918', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcabcb310e782bf6175f286c16cd1297f', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x500e49a2b037b17dcbbefbd7e458c2e8', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x02b3d9f67dbeebe7561b388df154b4b5', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfaec48d1f16f8dae124aba86c7aedab7', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc89676c932c82170afcca68d9c9fd357', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-libs', '', '', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa1193937303f95f09f741b1730b86877', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1ff8e1d7935046b60614080fda35ad77', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdc8f2d49797bf5138a179740485be931', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x49da939b3d7a2bcf990503f4f6b3c283', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb920eb5bdafd5bc12065e6329b79cd16', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdd979f1cbfd7d70f99372ebf26d4d87d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x263b2cb6785693da2eb512e3246a01df', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-pkcs11-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x55b8c42251d8c7aa3750b9369e929a65', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc1e8bbe84ab10c1fb10e6f864318b94a', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x15e22016e8e4cbdb6416c7b69562e808', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x90068a92a4995ec8aef46053a44b718a', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf14a566444e5269c2896c35278a76d9c', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe31062bb19c704dfb274bc308bb619ea', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf19dbd83f35f01cb13be3e017dff67f9', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbce1fe67be2f4571005967c8d06ff4e2', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc2f1c3df78921f63675d4fafc86d5d32', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa5271b46aaa36c2a53ef97efb45655ba', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xec2a364d5596e6caf62d3c6ffbedadd5', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xeac9f3eb313b22624b335d70d418e4fd', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x59e1f454450e28467751af03466b170d', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x49f0dabaa7ee7ab0d2a22f30c1fbe821', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-sdb-chroot', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x285d68637debf223cc61414eb13bfd6e', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf3c446bfdba1453022253f63694111b4', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x82649cd06cdd71ea785a9fda5a24273c', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x11fcb5aa67ca69cee5a8bd60062e15e8', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://access.redhat.com/security/cve/CVE-2019-6465', 'Low', 'Low', 'bind-utils', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '32:9.11.4-26.P2.el8', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x489eb8a8d689bd1da97c88e705e0620a', 'RHSA-2019:3552: bind security and bug fix update (Low)', 'RHEL8-rhel-8.8-tus', 'The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. For detailed information on changes in this release, see the Red H[...];
Date: 2023-07-04 18:35:35 Duration: 587ms Bind query: yes
10 150ms 7s293ms 2s445ms 4 9s781ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, for detailed information on changes in this re[...];Times Reported Time consuming queries #10
Day Hour Count Duration Avg duration Jul 04 14 4 9s781ms 2s445ms -
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x9c5c44989b1c4dfdc6bdbaffeda82761', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x07582fadf78216c2b182b102a48b6300', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x159f101ac6a7aff2bc3c01fcd87f0177', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2d0b7adb7378bc43b3215fd67c34cee3', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x56c85ee42957202c2f93ed73f8890c32', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xce800bf2e07d6706de39e0fccb4ae88a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x992c049336c5b6db5945a5c01b5f1683', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0117272805102356c823d5578eb8f5b5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc71295f1a06112f17c0e22c66db33ab8', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9e7cc16f4e258f0a3de23587581d43a7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbbf2423aa38be727ab82a6679c36d36c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9e9247faa08792937061ff04b4c81442', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe92c82fd1b3dbd4639e2a291dfd075c4', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa05628ade44860902279e24313423a92', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf9eff09f67fc640d000e43ccd1d02d31', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb3d78ea0c3b97e6726fab6e1b4c82f04', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x09178218ff9257c1efb38f0705a38781', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8b6ebc63b239e0e7f097845ac75a2e01', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x83fd66877c1f7f8648b6393aaad8228d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2da6561322a92630d5bb4be3dfe1b6b3', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7084a459465ae50686d7127c97a15d84', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6e3f1b97348c45c1fa97d40a67224db0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x51ca20614a7909041ee9cea485516532', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x64ffb2ed7a9e4b3057e2ce010663bd4b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3f5ac798baa87a58c5a220cacef485c9', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb0b95117599ecaf08866229fdaadcb89', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa7a5cd2bb8a276a170e849a6b0f7fdf4', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x05affdb274e571924379acc72b354ed5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbcf072349c687433dd3ac6e4fb8ae204', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x84dde84e9c8f91c5f670276507eac6f5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0b609f1c8acc094d32db7879dd2617f7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa2dc9377157c6bcb60a3cb4850b6d9e5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xeafea302e4d76f0d73da7ef9eec05735', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb6d94580be389e57ef2fd38a9e7e3f96', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x967ae28a858e0a4e0e967fc198e0a64a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x23e169258e27384a7f399ab564b5c2ba', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3e542f015d931a933d5fb87ecfddcf7e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x24f23316c26e18a49fe9e3640d960d90', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x02f53e6ba203100f00e29d0b260eb876', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x258b4af5150abd4829489b0046abb715', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5d814aac9e075f74c8ecf2081455051a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf9be79c370493be095037a554db0d9d7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe25bf7c62c2c7b129129f9a35b1e6876', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2c5f309975ab26961f6fbe2724f9e442', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x446667a8187fb46f6a8ab9ec991e7c8c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x803a3849cf68bb427e7b010def4a508c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3a3c0071c30733eb75d6fe203fca9695', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x99321d1cc7688ed6de03a1ae05268300', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc0af2f0d1d2aebe80c489a079d96cdb5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa02fbd62d53a41bcaa37a6ae53a66d09', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbff6943e3bb50803af3e491d3d67ba5f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x59f9c6c044ffcd59a06bd633dffc9823', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd3ba659e8a0d83caaa6701f0a2cf6756', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0071f0ab473ead1d7974279e65e702ad', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6fb9c22cb51690af3751a50943a0d5ab', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x80b7d6dde6bef9f15149c1bd108e45a0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8c8d53dc2d19060da9a50fa14de0fb9c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0cbff66adee5ce6adc522566184b3caf', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x70a994761270ccd5069e294520655198', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xea97807990a883ba891e0802e1e542ed', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x458b3ad7e0ba564ebf127d994b2c7ccd', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x59e4db0384552080cccde43662185678', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6d1dcd4b5dab3ff625639785cd2b4b60', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4913469ac6df62329a075e36a5b24341', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x79fe2dd14b11cb4023b71038ddfeb3a2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x577f756b27254ebfbafec53f780544d6', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa5d36d7fd411b4315f7d9a090a0edee9', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa87b2f333b2461f87be4f60cb2ea7586', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf86527408a10f274d11fcbc72a12c88d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe5ac6f610eb4811ce0380ec32e1e8ee7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6183913e7979c7a7a57fa55456b9f821', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x15090f9823857fbf108436d8be5f2d76', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa227494a1acb04cd288f42eab64dc660', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf1fc44984d0640e2298637dd708479ad', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd8462fb6a5ff0660583823e12e6cf1e2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x39acb597283db30f832dd28157cf5220', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6e466d811a11289aba2941d1955af135', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x35ae3e134f1beaa19d6d3f76f40334f8', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd971b9ad6b78cbb940a0566a38c5f83f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4a96cd7b28386d8b860e997f57984050', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x04038f9947f7b1f397b950868ab7d2bc', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xefd533b13848d2c917aa91926c92d698', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3e6fa59996bb2ba8f3efbd88f0cce9d0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9307a7937aa8439331c9de475723807f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa59e21b54f0205a28b99c4a265c0f43b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6d7a0551070f1637a9a36f6a297be357', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x41c7cded2267900d5bc13e9975483cf3', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2f3e9296c5590a6c51b29c5c9405465c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x937feffa95afb595313187e1126327dc', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd22f970134bc28906ae981a3edf90a9c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4f3dc74c038e29ca627b8a3128f53915', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa0536aa4e0a6e482c6c508947dc1957a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x356cfae0089670915a93790058030bd7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdb5c0273c58fde2d567762d72be91b24', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1ba6d64a827a499cabf9e119c1c36a60', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x270e0027e9792414520adb85a7c6fa6f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbf6b6316fabb81d0f27c003dd290cbc2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x15eac55c329d48eb40790d1a323d0fad', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x66a90e441a60dc12341c6e9835d2f8ed', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.2', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1fc77c3e552926e1602530d74c281546', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-aus', 'For detailed information on changes in this re[...];
Date: 2023-07-04 18:39:51 Duration: 7s293ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x14e63711a965aaffc9783198d8ea5769', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc22033af713a6fd605a0833470396649', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb715cb284e3c57ef76bf50cc6044c2be', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x04731402c9903551ca2fef658649ce09', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x880316c9467911b0ed9d1f27cae1d030', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf8113dc7805765de14a486d0cce9055c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x809b2b399d30e5bfdb4b5069d191bfa0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5c58dbb31dd1da125fac2b8e712b551e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7f274e35a98ff4c80ea9fd52b84d2934', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1f870b701a110c001a105952d3bac84c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf83294e6f913982c847d9b82e8bda82a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcbc1b4a899112bce8e6c46afbcd8fd2a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf494b46b8271c8b8cd3fbc6cc260ec9a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2e8994c669b9da9a282d148c74bd783e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3ad2e95dc1788526e29047fc0712393a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfaceedd60faf34b069cbde4ac5279b6c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa21ce9451b57ba8cf95c6a13d5a645db', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x880f802879fbec7199fd67fe42bd77be', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x296fbf542711b5155a6bbb39a7d6e4d0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbfe210fc6e033177a35a5e35d050e7ee', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x583c106a49d49c1bf84d50d6e7796b3b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x137676a6b438b9158f9aa8f8830f443f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0807e9723ce05c7d9af10c8c38d12528', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x541f33d3c7e1c881c6c91d5fd562d5eb', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0bccdfcf55c25854a6da996ee9a279fa', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0b094551353dfd79a9a8731d9d65d9ae', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xda3cc249a120d4a930bf8125ef38eac6', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe1e6e2022efa699ca88de7e8d63c4e94', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfa6faefdf986d0a908c36d93a01d52f3', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0ca034b6ad63f0103c95f26f6c05c6f2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6ed979dc7dc72cb2e7d098d97e63818a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd0898924181e9c2fd1e2028ee91221ec', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3d04a9f6aa0c60edfb4f76e6afd1e50d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8395aba2afdf7851eb09d4b2d13d70f8', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x10ffaf09b5ca37e7556ae151c57ee5e6', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe137866e8fc1260f3efe031e67b94dfa', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4989567affd2b9c421c510821ebcd7e8', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbb5edd7ae469d08ff6b64f798176ec8a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xad6f7ebbf8d8f2cca68306588be42f3b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa92fcc2fe13ecb66195d5eec638e6d8c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc4cb0d591d5abc4cc21e46971768c757', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe3c532de21e01ec6260950a69fd173c8', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcafee7dd6dec3004c616c65418d9585b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x342e3045440fc4b344cea2d069ac21bf', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8b0e3498e85cc09b921421003e057cbc', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe1102335048531912678e46830b10617', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0c1f84a28a3ad5af285dbd7c00b155d3', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa340135e6333b9c9d0fde1a25caaeafa', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe0000fd6da4f0d5b9ef8fb5f67d85776', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x07ca1d8808291af6d081297dfda1b928', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x49b33cb62a7cb3f7a2d0f9f703602962', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xefad91115c334b50a93a1f0a38c0704c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3001e918e2fe529a9c4068274cce07db', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1ada20ee2e04276c5ad90e347bc03eb3', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3c42ad066f39500852f8da31771ba928', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8509e641209547d18a6f0a458af19efe', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8238cdfb2f3bbfff2f0f36c22199a25a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xff7f4d15ad5ee427e99a0edcbde75ef2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x003cdce1cc3248cbbe7308fb9ccc24a0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x20c737951e9c3d8157ecfa52b5b968fc', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd3b2f9e93a9311ac758130c3890d0737', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaccf9771c30e44dce004fafe2a7be389', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd4d1fcf7958b4587609dd81e18c60f02', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x49d44a26db6e76ef26015ef22305802e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbab69182f74a2bf23ee1860981ec4cff', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4e23eac553252243708ed985fc56f316', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf93ced9aed05e1b6924a7e30d59f50da', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x568c8091283f1651b6ff57f061d8c18e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x91abffa8f2c2f551ccbc720dccab53f2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1911a68437609990d7ceff62012d7082', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x51312eeb3c6c1a729cf4030feee4309a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfa499465c778cbbc4a01bfd65199f77b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xab5a430d9f40ca8215cbf647de8ff088', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb1b61b18894d4a7feec64b30f55b5528', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa6cd1e21bd7cab7bf966b50c3466f0ea', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbc8dbf7df4e42c602ead42f010a49fd8', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe254466430f51a9d3377e81b6a831cf2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb5c2a2c90e03c594f3d7fad793e5e320', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9bf6e98fb1835d53d193a647300561aa', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x549925c7a5b8cbb59ba7e47c1923103c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdab7a50b555c56f8dda42e21aa63ced4', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb03ae248e5e2c51b34751f1f3102d536', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfde94ebb14d942f3783be4f45c9ca22a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb5e7a13ce53024a6ae2d6bfd6e2d5f79', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xba658fb2c32c4032667b154013070abe', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x297ebde977c8568e8c0173f8fa60ed20', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd0ac510c0287230836e0e2093e308f4b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x10444c8b8660c0f86485edf7e53b52fa', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x182312f69e4028fdb6ea217dc99c1282', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbc9bb01ee3116e94952df76ce0a2cf5f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x92ce8f5a453bfc313273c2cc0c0dcba0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe7cb9b32f12f6c47e09d6ba69cc24b72', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfb9844b69884c63bc9cb1a1185398c1a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcd1c50285ad0636755de428ba581b4bb', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0fe9e15b3400e332a1e51ff786d8a4e7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1a682ec14600cfba3d39333ed2df0963', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8::baseos', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xad71e0a5091ea2c4e6e56d943dc06fb5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfb937c26d7f2dd25cca4260b41c0a3ad', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3d65ad29df076789584f6581a86e2c46', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.8', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe0f659ca1c17425a5bf0cef03d25b5b8', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-aus', 'For detailed information on changes in this re[...];
Date: 2023-07-04 18:39:02 Duration: 1s717ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\xe5165fe670f2d04c4dec773992351c51', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9f1f8a3a88c48b5f44258f8c26f99e28', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb35dda01b0af869f65a456d2f29e3b3a', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x52c25d530e506562d2676077a2453ee2', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x043264f7ed30000fe9c69053358554ff', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x682516ff8774d174eba98dcd05b55f80', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xab4878d9cdbdd041023b1565dd7db92c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x829721a98cb3e8575e15027a97342a90', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x984819d939899bb4086114e3e8790a71', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe02adabe99ae476b6989215687ec4301', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x04bbbc1e0073fdab8ad6d1976ce29964', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4937bd974ab364e79338ce674599f50d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa29520292db1aeb3397cb60433817238', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5490befeec3c150cc3025ceebc2f7680', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd1101ecbbbd193a4c986beedc20af5d6', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8c775e0f809dff12af0146ac1b86d056', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x42d5c1b3d245ccbc9cfff8134444a572', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf78dbae83b2ac68d6481bd53967d463e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe9d3246af4ac4408fe29d160b8714c19', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8eae24d0a28c07e8a39b270f261d3386', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf954acaceab29c181aca7ebdf4fc42ba', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1c05dc47c378d0515d99686deb1b1469', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdf3b138b41ec123d1153fc67713f53cc', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfeaeb146b6cbbdc37097b0dc84e195b7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1659a748ffcb0cbd789a966e692b2e42', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x10534f70132aa95af4a623ff30cde2fd', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x708852da43ac64b90c1ade0822cdb7c1', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x12c868b216fa38f2206c09957070ba63', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x48294a923feea98577044dbd1babd60e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4899dca85e78682b238e29ae722e9fb3', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x04d08d1f88cb9276bb84e142b33a1040', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x625ce6c34406415882f6c8b243be6337', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0ce93eb7da8e46ee77e53e01cbd57b65', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x836dbd39efa4d454f10a7c0fa624eaa1', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x284d592563ceb1b2e595ca19cc428c7b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x849c79f54cb8a67d7c818ff2ae66cdc4', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x72adab57344c15525938aff1a8bde3ee', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdbfb77060ddb2313a1d9cf8fb0ef996e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x96188d75b1636b5b91cbe10aeb2cf5d5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7693b557be7635a70ba8449d70272dff', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x70d35ccaa7fad488590bfe0062e8e08f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfe49e5b8e991bba528616603989572f3', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa60869327693f12f67cb36c7c068dbc5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc33f4bd75ceb22a347e0edb34e334752', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9d68408e8e87549285928e64b456aa72', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x16451d43f9aa60b7836e5c792ac69b36', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5c6e1da59233aff806b7325bcdb75aaa', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x73bb70131f031593fcca5161a1f7e6dc', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xde091fb3f19d91eb71aa914912254692', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa2807190edb319fd7d8ae41f5912c801', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x74f34267f7a7b9d4b64c47685c69d420', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc612149eef36343300dce0871c8d20e6', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcc6987830697b6cb2a3eda513eca17ce', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x15f72eb077f1a55db876365c027c2b0a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfde6b92ca76e42b48aa873baaef7162e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0c0be27aaef88c6979e5c211bc2d0615', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x91040ce006b55634c1ea14a9defb377b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x30b1b4d0d981cef9f685a43a2d0097a1', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x85520a646d5f7aa7dc538bdcee022dd9', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8abd4b8bf533f305b99ecf80ee6db9d2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa7ab7db870e3a45750d2d4527afefbf1', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf71147d8f634ebfd852037e9406e2798', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6d50ae33668b3c35cb39ed09150ec4dd', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x41979dc1abd0dc6af262ba7a1e8fffd6', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-json', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:2.1.0-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1b480c676c22f69073b59ae827b9eb76', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9e8a441a1a2abe9d73493a3b92788458', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3ad964dfc4af0c2d9298d628eb35ffda', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1eb9d2951db08bb3048e18dda16189da', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-minitest', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:5.10.3-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd1b74bf3bd83cec896eddb1b161cbd8e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4b3152368510e39c3af9d9696ba9e94a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4e8ce65294d1ae804d4400bacb071334', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0014f99dab02b1b1c77c9f95124fdaa1', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd19e1c94a233f2c1304e957bd31ed805', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6070e215c5053246ab2863ceded65959', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x342b71c8c0c0f662c5ed68c8052d1db1', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0af617a3b031cf60b0c73dfcd840f983', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mongo-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:2.5.1-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdd76b105961e435241a547b958e21c52', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xefdc450ae0bec8ea041e216ae80c305c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x26cac7e14f5c1734045d5d6e07bc0dc7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x545a6decc9141384bb954fe7b9effdde', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4ce34a06832a1de0dcdf8a409efe700d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xca337f9c5accb0cfc151c1d616522df4', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe10d9bdb7ca0a59ff0ff718ddddd9244', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3c825d8207ec8906fd3d06cb548efa49', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-mysql2-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:0.4.10-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1be4bfc3f792316ecdd60cc64fd10b17', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe7d9bf41f5cbac2b0d19e836462c7865', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x55c559ae637f47819d0f6e918d0668bb', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x83eb7c1a4884005c5c36e0792dbe66c3', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-net-telnet', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:0.1.1-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x354198153f289edcd1f6973a30f776ae', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc1f2d056bb50d80d3a32a17a53877e45', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb9d210579fcb48cd6db1a00a51e0baea', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf2b3ca93d3c7c194bef0e9bde19503fa', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-openssl', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:2.1.2-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x89e9c329f5817285fc6d248b50cf6a9e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2ab316b860c7e22ae7b2751a0e28602c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc2dea2d4f0033869661bde08d9a0ac44', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1653692cae3ebd1a6ec3cbe474a32b55', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6::baseos', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8d8faab31b47a407fadce9d4b3a34bc2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x66b0bdc8ff9fbd6b88ab0b3bc3a643bb', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6::appstream', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4316430059f2eccb1872c9e8fd93faba', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-pg-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.0.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3537e738869e89fb98ec04ed31baca26', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'For detailed information on changes in this re[...];
Date: 2023-07-04 18:36:31 Duration: 619ms Bind query: yes
11 1s240ms 4s286ms 2s198ms 6 13s189ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, https: / / ac[...];Times Reported Time consuming queries #11
Day Hour Count Duration Avg duration Jul 04 14 6 13s189ms 2s198ms -
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x71af22db714ffdf86cfb69c295c1e0c9', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:4.10.6-3.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3a001114df7f16b4c17a5ac4048d0b46', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:4.10.6-3.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc63967cb33901812fc83300e1ea3cfcc', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:4.10.6-3.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x913bc458bb3b8144c426f1f8a006432e', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:4.10.6-3.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1919aeadcc43f70966d6ab59c7c6cea8', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa396393aaf17e610712c92793582118d', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe93777a2cac37810a4e5c3ffd42d236c', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3b69d44073aa7be28d07718b954944b4', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc4116ccbbdae317709c27b66dc133fa5', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-pkcs11-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd9927015c5da93d91d6e5249e4a41965', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-pkcs11-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x135fd5d32ba00937e907ef1ce820a15a', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-sysinit', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9f5d23d32829b39da98ede9118d3b7f2', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-sysinit', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa141c1eb9964660aee8f64b51d4748e7', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x24add0a5de0a2f2ad022cbf4403d015d', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1174ff0a1175dfc95782306dec031171', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.16.2.3-2.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x239214ee9e81b780a4ca84d39e59a9ac', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.16.2.3-2.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xed13132844ac23bd1cab4d3e85300b96', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.16.2.3-2.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x93e3bbd4173aed03b767f6d037b666a8', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.16.2.3-2.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5667a17731e957ee51399dc50b20accf', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa5fdbb919f5a6d7a136286d64670db92', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2763edb3654f293630fe6d191c0f9edf', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcfae4fdc1f7dd1cf5040f270e31d3f9b', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x662709e1e9945abd38f4c10cad0be18f', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-freebl', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3d1cdc7cf0ee593e666704915a14597a', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-freebl', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x76d7aa31b06bcef2450fe52268fe2c70', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-freebl-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4a103ce979128a3e0ad086dd2755de8f', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-freebl-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4e7d1a998232e62b974933d6e3e8e33f', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x25d1eb143a4772c71708076ec1110106', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfbb5027e77297817e376c883577ec72d', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-client', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd81b2e760b651a2e20615559a5e8b0f9', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-client', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf105a7048639abcd325e88a035437fe1', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa93298b7ce249b5df66fbb605afa4365', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdc086e7689ddcca9496d277d28dc5034', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-filesystem', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdfbbb52af67ec23e510e4b0920517615', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-filesystem', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0ca7802a5ea320ad8ecf75f12c10874f', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-ipptool', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3e3a7bab57dacca638a749b96fd711ad', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-ipptool', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7e147fb8c504041f867fb7b2e3db1a8b', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9d32c577736757726afd3227ae11d27c', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x862f94493a6db6e168dfbadb9757a981', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-lpd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xea59344130e6d7946912dc895beb7a79', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.2-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-lpd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1ac9f75860e62a781325639820d25eb3', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd3a5ebd52d98e81822c8d207f543058b', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0850eee2b3e294894e79fd00057756da', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x150b7a3e094757d234fe06b132f7ddee', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x24c1642b1dce65fc4daf35caf30b975e', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x35ac11cb2d4e11587ffa5358aa7c7f62', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd02b93f1682093e9a696a3cfd2b2960b', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x40b52df88d07ff8ab516530a465e4b18', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x48bfb2f5a68c41ca89a3a5ff41f55515', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcd57fd245870bb901c6dfcde295a3b0d', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5695368e4485069fc07443a218b88352', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xab603de40dad381019d15722b832e811', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8ea862c2b7390b69fe9b4ffda0165aa8', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x63cac6ab9e9adf4f22236212ae2f4498', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2836faf178ac4a4b9f53ffeae3fabcfa', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6f6c8f1a9ed133a3ef8a160b2fe0adcf', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa2bf19cb8a9473a02b8d5bacfc22e6db', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_simpleifp', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd2218032eac5be926522cb5b2ca290a1', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_simpleifp', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd70bab33a37e5f5103409c57505f6503', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_simpleifp-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5b7081ee71387c71684ac03f3c125f62', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_simpleifp-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe71f40e586d918e0a8d732d70b86fcbc', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'python-sssdconfig', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5af79f2ebf42367fafe4208972f04cc3', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'python-sssdconfig', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xee89ed57d84f0887d0dfb15edc08b2c6', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1917951ad666db5e34a35183d71c59f9', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb59df4a1c4484ece3c7247f5ba1293bb', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ad', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x338619d95041f14b9eecaa11d3344873', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ad', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x67ddb09489fba9f17bed8e650fca145f', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-client', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x444c1b6fab48e0f8e228c94c5a6a6fbf', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-client', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x29e385944ab2004b20403d9208971af2', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0088b80a35c682e56199087ee0fc69bd', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0c65657063a2931a293eeab3d90465aa', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common-pac', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa21f5ae34fd92045e0f9afeb29daaa1d', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common-pac', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7cd0bb8f78195100bb274c3921b716c9', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-dbus', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x42e428ed5f2c1fe9581961aa7037e632', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-dbus', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc70ded859d3646cd4f85128e376a2052', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ipa', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x85f0d985fd8bb17fa962dde65c352e83', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ipa', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x629424d945e3bfd118d5b170d2f5a3ac', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x11c7f0794d1346276d26a5aa88262cad', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf9ab173d965fb849cc6b6094f3e7cae6', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcafadde3e37f239c97f08451c9fdcc1d', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x63336a9ce995358252c464df5899e708', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ldap', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2e7aebcd1dff5bcef723fab101445834', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ldap', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x15c97605152b008cbe4fa21005d16474', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-libwbclient', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2285680082bac3a940c9a52149075fa4', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-libwbclient', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x483d4c345e90596e6083e651b1ada683', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-libwbclient-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x87eaef4bd0cad61b5bf340ee8e6332cf', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-libwbclient-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0bad057e94cae0d1a1037c89f2d542e3', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-proxy', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe9c51a876413379b01c8cdcd0c2a478d', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-proxy', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x70bac87175573e3c3e14e5039f913eb6', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x43d304e201def4625ace8c844f9a9591', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe0bb17e716bb17297b725bfa0dc108da', 'RHBA-2015:0584: tboot bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The tboot packages provide the Trusted Boot (tboot) open source pre-kernel/VMM bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0584 https://access.redhat.com/security/cve/CVE-2014-5118', 'Low', 'Low', 'tboot', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '1:1.8.2-1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xb24834f858c357932a8ae7d0e3905c1d', 'RHBA-2015:0584: tboot bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'The tboot packages provide the Trusted Boot (tboot) open source pre-kernel/VMM bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0584 https://access.redhat.com/security/cve/CVE-2014-5118', 'Low', 'Low', 'tboot', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '1:1.8.2-1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xf072995999ffbfc20907b9ffe85c79b2', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:4.10.8-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6d96e4c54eba470c9a983d754395c0bb', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:4.10.8-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xde826349b838f984a421325677570372', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:4.10.8-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xac11bb0ca3e24ddd39e2e8e99180d5e1', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:4.10.8-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4c515219392dfcf88d265c9600b49d9b', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.18.0-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6565539ea2464a97175d76b835facc8e', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.18.0-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x33aacc5f8c80531d2a9d27032ba1315b', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.18.0-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7fd884cd32f03437b8338bfda7057edf', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.18.0-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd163cd59f200079db5b34234b8945c82', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2', 'rhel-cpe-repository', '', '0:3.18.0-2.2.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xad1b9763e644a45a7c94837d57f42cc2', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.2::server', 'rhel-cpe-repository', '', '0:3.18.0-2.2.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6f0a6454eac37664fe132d753e6d08c0', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.2-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://ac[...];
Date: 2023-07-04 18:40:15 Duration: 4s286ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x4be198bfed4d67e715843ef0b6341d3d', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:4.10.6-3.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa859f020134e17e036866a0e52caae23', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:4.10.6-3.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7b3d9d19bd13f64001108dcb6c24f1bc', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:4.10.6-3.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x899546753ac2bdcb85f7090ff4cd15e4', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:4.10.6-3.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf1f66196117c90438e9cc427b4fae244', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbd42d030ca36fa7698c52381730eb514', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6098f252d371a6c147400160e96a1320', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0a4eefa7fc78469467bd8a9eb9b4d446', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x18ea58748b20424335fb6d9bfe547031', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-pkcs11-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf951fdd6c2ca93135c3553ceb728778f', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-pkcs11-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4a3f43a85eb5e0619e127bb897c4a7de', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-sysinit', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc5b9bd72cd6acd52c384c9ba7619a18d', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-sysinit', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xafe80334141b6179607b21de60292922', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xde0b80b07ba3a3d966abfa343b138819', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb96dc8eee5cd13f088ec2841338c0e99', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-2.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1dab624fa4a45965d3076c9b0d66d6a4', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-2.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x13c4451b9e1e340861e6f14133449685', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-2.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x43aa33c446ea0771b252dc4ed870eb6d', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-2.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5e50b2d98392240ddadf70767617b17e', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x276a4e7f8653a7287c268372b5e951d5', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x961cdbb84bac6bb1a9a3c07734d8445f', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2edcfc7460cdaa71ed3e12d3b909d211', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd49afec5e00de29c0472d250e04a3126', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-freebl', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5abfda2d3aed6a3b76d2f6a21c6a5c5b', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-freebl', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x96b6564d006d5f7f86476510c9ee806c', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-freebl-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x18e4e3881a46058baee73018700e7877', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-freebl-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5f1335e7f682cf9fd5dcd9e01cfa813f', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xab631f4f2722a1aa220ca7f6325c7335', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb9fd18ab531ade6da0015a66b880728a', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-client', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4a65c1eb6a152ce6d16ad4d43a3dc0e6', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-client', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7a12af5c0cf2f2a1f5d01ca0da9cf8d4', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9933f7407bca0619f53e862cbd0c7eef', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdee73c4d47190f2ad15b6749fa416b5f', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-filesystem', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5409df6f0a1ed389389f8e2727151269', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-filesystem', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x798cba6b18e4e79cd9ca648adc60e508', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-ipptool', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x52ec84fedd4482a7cb8e4ffaa5e53079', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-ipptool', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb7a4c4bf148fdf0b646f9dc5004ce05a', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x410e28e84251c48ad7e86ab189e8e736', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4cb056cc5b4b029edc5048add1296806', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-lpd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6c109dcbba0e41d3e538ab3d38b92e83', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-tus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-lpd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdfaa29590e753ba8dbfebff4cf611ceb', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x239003e88376bef2ff87864ba1896ff8', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbb7859598a9f8fe3eb26339b8dbae473', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7680a0daff233aeadaf84c61e2fab944', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfa83b637699c87bf5195c0c80f38ee0b', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa8e2573d0b0ec230e8c098b738a17d86', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8fbbceefbd0331d00918f0a36f45885b', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x876aa3361fd540f625b049612ea2a4de', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcb33a3b1f7cbaab3d359686426bf5079', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfa5069d5435f6e2de5a5146fab926dae', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x622e16aaec75dfb811ea024c885661d0', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x04728281270a337184ff90511b711543', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x19a5d91cc8dde544460f7737437e2e49', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc25eea0e24fe2c20031be98eca6295f5', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x450b87f20946ef164c0e172aba24d855', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe726cf556ebffdafd83f890448c1111a', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0a52bede2316084a76d1dfaf6844bc16', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_simpleifp', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1bfc5bc7bae740e9c81820e2eec4bb79', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_simpleifp', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa6461c14348c771c9ba55b91f8baf4be', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_simpleifp-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x09fb51f2e38987d8e57b75e4d0cd654a', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_simpleifp-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xce73f50f02b8348f014adc3ced26d5df', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'python-sssdconfig', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x289fd31e46edf35c89f7f8ff4e6a2e5a', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'python-sssdconfig', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x92043f7fbb7a1a4199ac5e175a83e3a8', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1746dbdfd3055b8466e7b1842ef31b5d', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x69303a6da11537a6df65874dbb542124', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ad', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf5a24ba24e4c4164ca23525e495fd717', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ad', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x91eb9f3db8ea40aa5e130c00620ecfbd', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-client', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0fbf3167be280a4685f7980e542a22a8', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-client', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x72b28e775b7c9d6a3e57e32d3897e2ca', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc95950c2b61df493d0d6d293330ec2a5', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa27fd9f734a4b0ae562c00f3061e1af0', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common-pac', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x832a5ba8dcbdd98350a8bf0a231e8d35', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common-pac', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xef489f2b35a20f960b1349c6e67a721b', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-dbus', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdfd2917eb8ec7a814857e25d20902ecf', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-dbus', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0f436064a5754cf814b1e93e623ed55b', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ipa', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x78205fdd0b123dcfdf3fe9b4ab1df8a7', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ipa', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0b3322ca2069414067a8bf4e6a2884b7', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaf72ed345df9a421b7c9e489d10564d9', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x48330c66a3a1c1da669a28560814c2d1', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5a0a9bcd44b69ce9938c6daf0d982b4c', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x687ebbb01ea168c79c6348bef210aa62', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ldap', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9d9b6dc5ffdce92417a662eba49234f4', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ldap', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa79f05b04b40ee735bcf77487b892491', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-libwbclient', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x561701a51d32a425924ebc5772456f1e', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-libwbclient', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x848e940d919c08acc1a452a39f877f4b', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-libwbclient-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xee795dca849d84ca7e670bcf7a3b5b23', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-libwbclient-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9366982c215588150a82b986159f425d', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-proxy', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x93b11ead556ca22b5f7200572ce2dbb9', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-proxy', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x31709cfd9a0e61fd09856155a6e95e4f', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3fadd8416655e2a0b7dff07bd16f0cbb', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x864eee1d047f482dcf44c5984d553d6d', 'RHBA-2015:0584: tboot bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The tboot packages provide the Trusted Boot (tboot) open source pre-kernel/VMM bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0584 https://access.redhat.com/security/cve/CVE-2014-5118', 'Low', 'Low', 'tboot', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '1:1.8.2-1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x111b7ec7bed7be9917c326dc434c9375', 'RHBA-2015:0584: tboot bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'The tboot packages provide the Trusted Boot (tboot) open source pre-kernel/VMM bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0584 https://access.redhat.com/security/cve/CVE-2014-5118', 'Low', 'Low', 'tboot', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '1:1.8.2-1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\xfe18fec79615daec1a8b281a89e3bc53', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:4.10.8-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x789f437416d19f4caae192273176c5a1', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:4.10.8-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x288427553c5b69ae3570a164d886ef4e', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:4.10.8-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x36e7e8ed0b8024efa8f2107ba1d418cb', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:4.10.8-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4c3f0e3af9900e8f59c8ee46e9d4576e', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.18.0-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0c89d7b5236d4ea27421e92616794d87', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.18.0-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf2cb885e476cd5cbc78137828130963f', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.18.0-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4cb7c04ffd952d538be576f4fa71a39a', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.18.0-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x397052bff18fb5b083d00b717e3bab0e', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3', 'rhel-cpe-repository', '', '0:3.18.0-2.2.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x46edc7b7598ba0bb1b9eea554751030e', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.3::server', 'rhel-cpe-repository', '', '0:3.18.0-2.2.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7d7ee91a6e1c3d35693e5724a21bbfe6', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-tus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://ac[...];
Date: 2023-07-04 18:39:41 Duration: 2s427ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x6c2220b046d35af0b35959c9465c199d', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:4.10.6-3.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2c5af2fc6f1d5c29c06fb024a6f725e5', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:4.10.6-3.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x166f79982051e65bf5e4fd9a294249fb', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:4.10.6-3.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x639cb635f231b5dc33b29bd3446e811c', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:4.10.6-3.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x468da40e402cde5aef7efdf97fc6f329', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x85c248f923c9b0fcc1c3266fc00684fe', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb02470501ccbabc500c5d77aa2e705c3', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6c5f368019be27adfa7402a61c5d1d10', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3cef56eed74248cb04f0c47ea07b2679', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-pkcs11-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x17d3663db632fb8b22196f19f6eabeee', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-pkcs11-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x88778ec55071ab2053038fea53f3e184', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-sysinit', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7996ebd34884b103c28d5e719f42e61b', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-sysinit', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0cea3fb0a891108fd3cb36fcca374d32', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2a1c293d838fb52a351fd57a30c30059', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-5.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd7fad8b2fb27040d3d47c6d87fb5782b', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-2.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x232e8306373848bacf6d29615b3fa746', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-2.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4032b0f5f655f693aae3f6ea9d9fbed2', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-2.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc3cc0ea9a3c624891426f6bb714b8e3c', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-2.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe1f384c2312540cf2a624290bd694539', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x52d1e80ae3b5c01e24287e11082fa35b', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1745867a8f792f059fca8913249cf6ee', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf32e9cbcb66d472134b7c80118791c11', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x149b0848807002b9596fdb1db2ef9883', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-freebl', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x323d8981a139763e85508375ef7ec890', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-freebl', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa7ca96524b85850ac08021db29c66866', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-freebl-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb1d4173517ce426d172bf657e43ae65e', 'RHBA-2015:0364: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-softokn, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0364 https://access.redhat.com/security/cve/CVE-2014-1545', 'Moderate', 'Medium', 'nss-softokn-freebl-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.16.2.3-9.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb79d284fff818fd7663ff45497cbe101', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaea389fd0ff1c18f16272ced59ec2a98', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9d0fda4e612f566996ca76580fda1402', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-client', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe9b4b9ae533c615de585197ea9a0a692', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-client', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc8c113ad9de6d4ffe49e9b73a657d7d9', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb156d92bfd96e4dbccf70fc12d5585a8', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc012cfabe62c762ab32cb0eaf071a601', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-filesystem', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf126f0ead1db3ee6cb066907c45fbfff', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-filesystem', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2ef59f141d20704b251e1394b2ace0d8', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-ipptool', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x504e3f0f034d1253b27b38ff206290d8', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-ipptool', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5b87e0e029d3c2e30148870444af5a70', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa028d7136d6c0bc94f5cac70d8584dcf', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-libs', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x44d013f2e2b1fbc1fd755bcda6696730', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-lpd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf33c22d16071c9606265fea73e72d3ab', 'RHBA-2015:0386: cups bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.3-aus', 'CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. Users of cups are advised to upgrade to these updated packages, which fix these bugs and add this enhancement. After installing this update, the cupsd daemon will be restarted automatically.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0386 https://access.redhat.com/security/cve/CVE-2014-2856 https://access.redhat.com/security/cve/CVE-2014-3537 https://access.redhat.com/security/cve/CVE-2014-5029 https://access.redhat.com/security/cve/CVE-2014-5030 https://access.redhat.com/security/cve/CVE-2014-5031', 'Moderate', 'Medium', 'cups-lpd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '1:1.6.3-17.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcf5d893886b8be6869f15cbe8a79b855', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8b61bdc25f4620760751744e4c309941', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd2610cf9bdf521db83e04524bd9e4a39', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x79778f2af70bccc2ac0b955eb6bd68c6', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9fb57143b1b92377c6fa99865fbe8cb2', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x94ef7332693f3e7028381a2de1114775', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libipa_hbac-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x976f296d167e7a8ec164bb0cbe2814c8', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x949ff0f8ea04dcad4339a3ba4aa73349', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xde919a91424b7b9efe94672ba6884aa1', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3ecee2aad00222ef0b2358b55ad0efb9', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe3beb99f8cd9843fe2761286da272cbf', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x02921f57bdcf7cf1edc48b5a39a00b62', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8d401e54af3b208a926b9c527cb9db05', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc8d478414e2e21d4908a9112e992e313', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1d19c5795d9056ff7739206ce1dec1ba', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb7be189544ea3235659bfbd5fa58008b', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_nss_idmap-python', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x516662afe1975896501f51d2f7c54d67', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_simpleifp', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2a0e10a8312f4b1fbbb336a4019a2204', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_simpleifp', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x79f65aa3d8511495f646b6a45fc39855', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_simpleifp-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf09de33fb154c2125f78452e62633f0a', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'libsss_simpleifp-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x66e33179010ec204e791da433cd52f37', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'python-sssdconfig', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x967c4553c893fdf0b2c04c395719e0a5', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'python-sssdconfig', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7f70bf78371411c35dbfad3f2a4e67c9', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x29519413251d1f638ed431f630ebaa6b', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd4e3cd2c48bf5bb3a1856320a2e031e5', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ad', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x20678b2ed04e897b02c668f90af763dc', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ad', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfa247b21677991fd92a12b8a1717510d', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-client', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x354df630762e40bae14148533d838fa7', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-client', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe28fb3c863e85c2894c4acfe23a543c4', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0a2228e4cedb3363d3d07ea6d7c1bec8', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9a19972692e1a75041940135492c6c56', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common-pac', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4043550249a307b92d5489d42facb557', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-common-pac', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6b85edfcda59c8d42356efa9424a3299', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-dbus', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd5ea7cad136aba80404d5eb6f03571fe', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-dbus', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xec43fecee5c2c11537c2555508438d5b', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ipa', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9528e6ba5142536c356899adf11aeec0', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ipa', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0d059ec13693d10fed90e7c31d2135b8', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x63923188dfa71b9c5b2fd5938fad5e4e', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc17b46013e08aaee222186d641126b7b', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0eaf51296e740e46ce16234e9274a5fc', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-krb5-common', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf101c8b015bb4953009b2cdf662bc476', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ldap', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd8ef6e660976dc19fdd62b4f119c1fae', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-ldap', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3cf88f3860eb63825a50e0e4a2a3c3a8', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-libwbclient', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf9df18fe6e3c73040ce5165653050343', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-libwbclient', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5833e8a7d91b028e3eb9c6a2885c18d9', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-libwbclient-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7890f400fe4307e9939064b5b1fb6c44', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-libwbclient-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd479f9d3a1c61f99fb980d5a407ca84d', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-proxy', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x76bc84a8cb56a2f6a69dab1dfd5df055', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-proxy', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xeb7ec24b58b69171e7290b1edc5717bf', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4c352c4814d2d8c39a226b68d1d671f8', 'RHBA-2015:0441: sssd bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The System Security Services Daemon (SSSD) provides a set of daemons to manage access to remote directories and authentication mechanisms. Users of sssd are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0441 https://access.redhat.com/security/cve/CVE-2014-0249', 'Low', 'Low', 'sssd-tools', '', '', 'ppc64|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:1.12.2-58.el7', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4fe007122f70189ac457b6cf3f1652ff', 'RHBA-2015:0584: tboot bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The tboot packages provide the Trusted Boot (tboot) open source pre-kernel/VMM bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0584 https://access.redhat.com/security/cve/CVE-2014-5118', 'Low', 'Low', 'tboot', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '1:1.8.2-1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x95650c9bf21ff80b019cb87467b3d6a7', 'RHBA-2015:0584: tboot bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'The tboot packages provide the Trusted Boot (tboot) open source pre-kernel/VMM bugs and add these enhancements.', '2015-03-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0584 https://access.redhat.com/security/cve/CVE-2014-5118', 'Low', 'Low', 'tboot', '', '', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '1:1.8.2-1.el7', 'equals', NULL, VersionRange('{}', '{}')), ('md5', '\x433c1f1fb9b42fab39bff19d35f0fcc2', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:4.10.8-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc146132fc2e678b66b4375f1c6e00ac4', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nspr', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:4.10.8-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbb29ee94345b8b67a957e03329a27a69', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:4.10.8-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfcfc8f52e51e89712e9507797d7e8a96', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nspr-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:4.10.8-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6c73766ef22249ac27af0eae3a527eb7', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.18.0-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xac471bca1d441707590fd3698e4a2e5d', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss-util', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.18.0-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x16823c5322a79e6bb0af3097d2899883', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.18.0-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf8effe167c1661ee7f98ca45b0d1c065', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss-util-devel', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.18.0-1.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x583722b2c7d1dd4e88b2868e347ae1da', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3', 'rhel-cpe-repository', '', '0:3.18.0-2.2.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbc200ec13e33976ba4de57f7de592719', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:0965 https://access.redhat.com/security/cve/CVE-2014-1569', 'Low', 'Low', 'nss', '', '', 'i686|ppc|ppc64|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_aus:7.3::server', 'rhel-cpe-repository', '', '0:3.18.0-2.2.el7_1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbdfcaffa52360d9dfdb2ebc231a71a9a', 'RHBA-2015:0965: nss, nss-util, and nspr bug fix and enhancement update (Low)', 'RHEL7-rhel-7.3-aus', 'Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities. Users of nss, nss-util, and nspr are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-05-12 00:00:00+00', 'https://ac[...];
Date: 2023-07-04 18:38:11 Duration: 2s231ms Bind query: yes
12 256ms 5s970ms 1s779ms 5 8s895ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, mode[...];Times Reported Time consuming queries #12
Day Hour Count Duration Avg duration Jul 04 14 5 8s895ms 1s779ms -
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x92e17e25a20d03222beb21c043f230af', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-gphoto2', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb14c5b756923093d4fd2f2b57b939f99', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-gphoto2', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x66309918eb0aa5c4befc56ccadb8ddbf', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-gphoto2', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd552b9eaa131b92e2e36c20d301b0630', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-gphoto2', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb0e17b5968f8d174ac91edbc2fd1ecec', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-gphoto2', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5df5ecac5473bc50ccc3ff77d129a3b7', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-gphoto2', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x63f0d5d5f047678ee3464a0b53373b4e', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-mtp', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x68fb9de1bb12841a4b027e57d6f2a4ed', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-mtp', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd72ed1b5b66fec9b71260789743c3526', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-mtp', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1c8a07cb148d077ad257451bfe19cbc1', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-mtp', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x230a9159918f1625855220a62337d06a', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-mtp', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4d73190689f40a889ffc1e60d55c0944', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-mtp', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbcf81e56ed2857acc5ae97600b3570dc', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-mtp', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb31be1e7d7452644690a173cc8b9545a', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-smb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5d1baab98fbc63aa57a8599eb6598ad6', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-smb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe95d14e8ef8f1e4abbc8ab351638f5cf', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-smb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe585f31ed096a6ee59c1e37717713e87', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-smb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfb841d04cbb061b78a55f689dd129859', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-smb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x192865b114d531005c7eb1b0493a0091', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-smb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0eadc94ecc06fe8c94048384feb0f711', 'RHSA-2019:1517: gvfs security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1517 https://access.redhat.com/security/cve/CVE-2019-3827', 'Moderate', 'Medium', 'gvfs-smb', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.36.2-2.el8_0.1', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x80f3882a8921a9d08e1276700ddd5958', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0f1c97b3522a54b50fc47259b2087148', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6358410a67434ce045c2af45ec4f7c81', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xda1f5c27f52a7d8edd406935f9e6877f', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x89e4c36722c8e236110542a859365d7c', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfbcd586eed5c56b87360877e0f6514c9', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3c8d88cb468cfb7a8bde0887d4ccb126', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x241df4ceb8fcbbe6ba09adb070eba576', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-demo', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5f210ddac819894672e5e18b57e7d560', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-demo', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x809482102d8c1352eef7331a0b3ea855', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-demo', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x950c6c4deccc24fba8cf6a2177d4ce40', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-demo', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x07e3ee2eb74a1c287bdc1ab053aebf22', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-demo', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x51aadbd558702763e893f2009068261b', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-demo', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x688ee8c906c63e22198701804795411e', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-demo', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x412813f43f33974b464a8f5804213242', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x493a72772517687ae9d7ab6297486b67', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfd9155dad4b1191afeb4da1a46ce30f2', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3481ab179ea4fb158eace45065aa5403', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8825955287f4132028ee009453d15844', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6452fb12435a934a32cf6d2df96bd2d4', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xeb57cb9f426aa9d241044842dc831165', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-devel', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x450a110f7d53df0b06ec11ae085dcfc1', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-headless', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xec908a0da4018b9d53c7a4b62e438bf1', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-headless', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9ca69cbbab2192537531200c3f3165aa', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-headless', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbf2f8240c349844d7eb71526e43b9172', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-headless', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x69e0be8eee6abf3ca3ee18a17783999a', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-headless', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3409e337f01f95e27d8d3959db3e5612', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-headless', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x81c1fb4b49e8ba0c53aea55131d74aff', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-headless', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7e8059994e33d0032f66db7e81a49e3c', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7a53be305f2f3f6346014806fe3d2e0d', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2c142c84265478caf1940a83cdc1a824', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x31297a200a2f5dd19caf3c87649cf21c', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2e70a1c3ee03c131b9a0e27b5de46804', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfadc469a2f74cca3fcdc67c692fb4e78', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x73cddf1cfd6b997674fc78c98f86eb5a', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x444411b3d7a1366bbdbc69786e28b41c', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc-zip', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x810f216c7e5e4d3aa31b8f451d018aea', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc-zip', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5cd062df1dbfc42dc2717362681288a3', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc-zip', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2690d9cd8a717f8daca632b2b3c8b657', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc-zip', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x98e948a079527b1d4ca3292fb53d0a32', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc-zip', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf5241adacf052eb6ddebc96d229ae74e', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc-zip', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x15cac600effc4c3b1f263ad5b29551d9', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-javadoc-zip', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8df3d76e695441e1aabcbddb6aecc392', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-jmods', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x34de3437e32f952ffa3cbfb7947ed8f6', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-jmods', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x23ab9228dc9caf2fcac079ad93c10259', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-jmods', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa160635d2f5944e23634df59d1417ea2', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-jmods', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x200885098af2f6630eb7922aa19bc244', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-jmods', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd0fe84a1c0495eb0d7458276096dc11d', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-jmods', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0fe8385c383d2d52ca13aedb600582ba', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-jmods', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcb6d89da60a326e504952c86470723da', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-src', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x98bde1d6639215eec133d252922ab28b', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-src', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x94f4fb762629e2a5cbeadf3e9954725c', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-src', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4c0b968b4a19bcef07df9e5084d5806b', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-src', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb2435b7dbb4ec15cd399165ad3f711a9', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-src', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x799d5c713d5f657b7174ba2b5f6735c3', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-src', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfbe094a7ecd5c652ea2e5b05cd14e8e7', 'RHSA-2019:1518: java-11-openjdk security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1518 https://access.redhat.com/security/cve/CVE-2019-2602 https://access.redhat.com/security/cve/CVE-2019-2684', 'Moderate', 'Medium', 'java-11-openjdk-src', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '1:11.0.3.7-2.el8_0', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x853ad4c5861b156e0963c469a0c20abe', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'go-toolset', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x049b43ed609d6c0806d0450d9c24c3cb', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'go-toolset', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x306775a967ac97220fd78d00b8d4c0ed', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'go-toolset', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x86df4f7d50af1dbcc542a0007e76fb0b', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'go-toolset', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x84f87a2b0c348fce20ae9a1d86b74908', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'go-toolset', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8bc6adf2c6a600f153c2af04a8310cea', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'go-toolset', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3df555c9e952534d701d0e951ca56ead', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'go-toolset', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x95f9deaab7ef4b11590e44a8a9a1837c', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'golang', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x901b4f0accb441ba40ea877ea39397d5', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'golang', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7d35be99a35479606126e91842bfb977', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'golang', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5a18ef4379c8b653c966f3d2db8ce46f', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'golang', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2057a01ee8c988a8d507d5a4d6a6edde', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'golang', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x61a7839bf9e5838f568c6a0349b05959', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'golang', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x03c9e32d0d9a2b6d2664e314128b5bab', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'golang', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5986ff13aafb6b36b192d277bed7a9c3', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'golang-bin', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc5ba8cf0267a07f95da5a51bbebeff9e', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'golang-bin', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf25621753e2b7d73ae59a9ce56aee2db', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'golang-bin', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7a389a990a5288df032c223a945162fa', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Moderate', 'Medium', 'golang-bin', '', 'go-toolset:rhel8', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.11.5-2.module+el8.0.0+3175+261ae921', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6e4cfcb0a386801ce991240ab853dad3', 'RHSA-2019:1519: go-toolset:rhel8 security update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The go-toolset:rhel8 module provides Go Toolset, a compiler toolset for building applications using the Go language and compiler suite. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2019-06-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:1519 https://access.redhat.com/security/cve/CVE-2019-9741', 'Mode[...];
Date: 2023-07-04 18:39:12 Duration: 5s970ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x99db9d37ff472fb04d2d2b475a80e452', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fa', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa678f0a08fced89b1eb45dbdf0c87863', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fa', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe7abc2a06d56aac1438a7558bfb2787e', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fa', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbeaa4b98b02f2ba7ad32f61530bff74d', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fa', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbd1e6cb463ea156abf93715db7e05c02', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fa', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9ee3b04d187a088f19b34fe60f027998', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x648812237fefb00e1417bc0559c4d5da', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc8f3b96ecac340728b820fb68e1403be', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5d484c3dceecc88e64e3520529d87f24', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4f390de4b343927f84553c0c42752f26', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4d8262e74556f61431998860f26d7ad5', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbfe3013d063d30510680cbed5e5441fc', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0d85ed8d0ed2afea85f46978aa40b650', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x497351f437e7c42ddbc9da49b89499ac', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x879276f2a9483a764e9e99e7b4cf6f2c', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3283e814095dbbc84b85ea825dc8a03d', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ga', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x102d7ef31c2d4ec92df49fd3e5d7fbab', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ga', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x124afae3f99007193923e19ec67fdcc8', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ga', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb2447a4800a25c62ce8bb938fe815f3e', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ga', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x713f88e79fb6db2d97276c130159472f', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ga', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x32158ba337fbe135fc8c5c63ef0d4499', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xce0fecf872dc587be308b963420d7922', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x82c6e5521a603a7db40c4d88467e7979', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3bb5940541fbb7d9a527be5c2bc1b121', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1c35eca874fe8929763ee6369f6db9c4', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf283aebf543a5c98c36d0c81c7adb7a0', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hu', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa89e92ac15b9305bbfb9e2fb33e3ea79', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hu', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x45aa4ccc4865f475ca8b17d11dcf8e04', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hu', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5da6e572e8ce01d2763a816fe95b64a4', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hu', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9b6556f278aab6efe7e3ccfc0a48459f', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hu', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcdee0b96737484c2614082a7f1b799e0', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-is', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf4f874ae7786372db4943cf24fd01da9', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-is', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdda5d9ee5caafd305b25ba83d3a05695', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-is', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xda56734f7571255d4a8dba5c26f3ced0', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-is', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd175fe160b64c169205f2c332b61131c', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-is', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9570c38021464b0477f15e4072fddb12', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-it', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0d9d53323c6bf3c61b503d5e8b6bdd15', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-it', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x690c2b6db3e17402b93ae94c5a46cf80', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-it', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9323b61c37c7aca38bf9a7bf37bdaf7c', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-it', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfffb881a85058b36cfb917a5a001f644', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-it', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0e0029e50ebe91ff41df09df29a8d3c9', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ja', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8948f723048a6ca7b1b5708263064ede', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ja', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x44b8c9ab2ae61baecb370202c7de06ce', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ja', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x264011a443f568ee44d4e31d1f2eb50b', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ja', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xef2f1633a3da3e89d46e64d3b680651f', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ja', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1fff4297500d36e7ce54af6e1da59c40', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ko', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3d9a7efbd2cdbcc2ad2ff37c041a7703', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ko', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x419aa662eaa335d09380eb0b4f823029', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ko', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x60742d2b91bd864b74b101b176dafcad', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ko', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7b5b339e5f769c36994a467442ef3c7e', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ko', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7e643c52918f7e51246808d08b5fcf63', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe7f2f1bd122fb79e6ed94d304655e458', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x78584538d7704907196971fa5ee02b7a', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb8f577a01393808a71b33e42d1ad7aa1', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xead5715d5fd739c9440f366051e197ec', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd8fbf46bf0f52040a113fd2ad6a74655', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf2cb48e465479c2c0861f2ae71e45b48', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdcc9caf165a1ee1e182c464b2596ca8f', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1fc69cb3f5e81fe3fb5023c8b15b118f', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3a60e9238c614349e2fe1903054d3671', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3c034dfe4a62ff62b665c5dba8f3e491', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-mn', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd51699127186b9d8c030dc15e92c9c20', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-mn', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8ac985ccfe4d999ad91e42d6d016d440', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-mn', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfa0b1d28a97a4e1d05c55bec34ae697f', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-mn', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdb0fadcfcc775db12599166e6bcc5bec', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-mn', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x97980a44e8264234e423eda496a146e4', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-nl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x20c0a7865c90ccb76073e6c3b525174f', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-nl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0641ea4ffa4ce3d9117996836977a26b', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-nl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf2074651284e6ed7cab8c9e4d51b1bd0', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-nl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9cebc60e0998f42da5021bbcb4513f8d', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-nl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdf58ce769ea4347ed942f8e125212c8e', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x25b14a60fe838b70e1a1860b6906dfa8', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x09f09aa991bc1f1e5bc9c2303a1fa32c', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x28e133850c07d6015c6a5cb81bb599c1', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x20858e6cf36dec7ef78585b77c8b99c0', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbb9c7aa7423441645edcda41a7640d24', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4b5c668698fa17136007e95ee7e16b11', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9910fbf9034c80b2156dc511bcb140ad', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc6ff00d62773eb409f93aaceee374e53', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa6c78df1574dc8800616aaf9d6a5e885', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbf357bca5f8a4fb9c3027d70162f53cf', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ro', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x19fdc0ef297e8ca588a9d706b3a5d4cf', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ro', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0902a2179329296e1e1b0724bf485b14', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ro', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4e395ec2b00e6c6bdc7223420808059e', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ro', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x057a934e5a59c0abe64e8902e612ed7d', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ro', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x80efcec988cc78b06eef4aca5a15f4e0', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ru', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8306519e413d2bd15d169fddf9674af2', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ru', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9d5871b5f9e1550c0ce7959bf1a46984', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ru', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc5934486f372d2c229e049a9acd34231', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ru', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa7ea393d4b73566f11345515665fcec5', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ru', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9770a57e3629dc9e160cf60c1682bb44', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-sk', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x76959aa5715deaf4b790357fe8dfadca', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-sk', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc4425ae034440b7cebcdeea62403e33d', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-sk', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd5b5a745e53bdaa6a267140dd0ad1d49', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-sk', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.6::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x216d4cffea506e6a91bbbba2968d143b', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.6-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Mode[...];
Date: 2023-07-04 18:36:50 Duration: 1s252ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x45cda362f4ea7462bcce1dad7e0d5134', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fa', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf61587fc3c60279099c42e3a1effca3b', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fa', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8e9b2057f6ff0ab8559abc7b3de41d3f', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fa', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x564a1b029cdd31b99d257eed2b14878a', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fa', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x89b8115920f2b763bb6fa2a307e33466', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fa', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf157cec7d6f671c9d7174c401936b76d', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x52dec9b3e196a8197eee2e99205af696', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x737fdd2711c27fb35765ce13b57ff26b', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8dc08b7c42d6de4976dd58c5c30b2b7e', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa429ae1b3d96373fe4b7b767e0694ff7', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fi', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0b43c04afa192da654cabfe38adf7b99', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd056c7476d23cb542f8475798d6d1815', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbfbc2947f3f57143e9ef104e9833ffb8', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3fb326efea1a13018573a0c7f688fd63', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4ab2006d85651c20ad92e52172a1cd50', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-fr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x79773e778788337fe284571abe48d5be', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ga', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf23705b5525dd86215fcbde6f20dd3cb', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ga', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x01054f66f9da2d20df1e4719867fae39', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ga', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb39fd5538c19707515af7f3a1e39e3c3', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ga', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x43fa249cff639c2371365e027a77ebfc', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ga', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x939409f6fcbdde44121e8a81f100fbf2', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x22db2841258803a771f6004eba809cb0', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x40e0a209e9faf307fc02a6c720d30761', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x320d00b7040cb5ae79b712979f761ded', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7fc2efc0b795cfb04b5f8c7ab3aec023', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hr', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xacb7edfbf4df4ec1c5155c292c6f5356', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hu', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9667450068b6364372ac0fe470358814', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hu', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x73ffa45fbc4b37a7151173c3b3e2e5c6', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hu', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x97fceed62c8f18780eb44f85d7adf6be', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hu', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0b1b7ddf1524d1d15d70e263347bdaa6', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-hu', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x76266ad53676dfd4b2f7be6dd7fb55f5', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-is', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc1848651501b930163db08d037f141e0', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-is', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xce99cb59d9eb9be04538ae96ab5c6b9c', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-is', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8d8c9b3a9ec22178d214b6f61fd1884a', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-is', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcd30685d9399eef5b1f8557da365f25a', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-is', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x867fd8aaeb4a0276d376f35431154465', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-it', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd424f09cbcae0abb7a7e40bac814ca17', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-it', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3cb2c7c0c2d2fdf05a147b1cefd105e4', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-it', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1994fe9814bf1863219292cd98589e5d', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-it', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc845b5f989d9e78d6f53d870ef197118', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-it', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x14ed57d10c6be1965807d27a209363ea', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ja', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7cc3cfca4bbaab89f859ab9c0f2ba134', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ja', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x41bfa31e6326433631bdd78403ef4eb0', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ja', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb7237801e3c55e0b0876bbc64cc44b64', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ja', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x44b83387186c725d5d141663fddafcd6', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ja', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe6a863938292b9bfb2e426a692011db4', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ko', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf3cd7cb591f0cd974db3762ed5d56a9b', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ko', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3e9a9bd37602edd83fe02418d273f597', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ko', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc63a3e222dcc98ae240ced88d5818274', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ko', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4f26cd7e538001735e48fb4c68a203df', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ko', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0a920e43183c7249e960290c3dad4544', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7e759f04ce5cbdf3ac54a8d112ee42f7', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb166af04d197ff10399e4d9108d2341b', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x33ed538d289d7cb0e8dbc2dda134628a', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc5846cd5fa08b4da94e6ed8065175624', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lb', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf537b18c1de9afec6c27bc873b9de940', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbf115ab8995adfd5aa018fc008e9102c', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb1c141dbd193d9177e5a81970a2ce54b', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7000f28d370243b3ee14f15d1f7ed049', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb3f7d0a144ec3694d0b9f1a9435f784b', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-lt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x13a2258ec00d5814f8ba70518d4e3772', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-mn', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x72ab3040d4fb01c7f0cc60339ebf5e0e', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-mn', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x34be67882c9c7cabaaa8911003af5bbc', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-mn', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x289cf39f07ec93ffbb662b39e01323ad', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-mn', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdbbdbae25ce2fc313c417e2dc6574a11', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-mn', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x302ac5a42cf2c4b909702c54425f8513', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-nl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa0b47c0268dd4ed83c4ec0b5c3d52a21', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-nl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2d3291683348e3c994c0b720d3b2cfd4', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-nl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x39ce1dcace097ebcf71208a5e11b6afd', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-nl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe0a5abf900116606b2917e4cc94de823', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-nl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1652d487f7285308839673d3655f90f9', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2b6ab607a65fa6853706665da51e5e63', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0ec8dbb554b9a25bfeb5510725c8346d', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf1cac61f6bfbef9c11cd386364b692c3', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd63949c80aece52357d01f47355120da', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pl', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdb8641e79f0ce5f6a83c2c4bf386df83', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1363c24085cca4413ed87961e68eb77f', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbfaa055f2f4ade8119d082f3babbc09b', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0497137b43fda0a71dd990cf3f182b32', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x798b634ba4e6a5f4afa8f951c30c87c9', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-pt', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8ad3842030da3e4f54db80b862360b29', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ro', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7b9543151f6c116da453721dbfc2fc5f', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ro', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcb473e030420f7db70ecd76b1a49535d', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ro', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x48a3ceea51f2cc67cfe5f83ce84493ad', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ro', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0194761d35935e142b229efe18e0baac', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ro', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x80afd734d8022a5848eeb68be09f83e9', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ru', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf49c92db552bac6364a3d4efc4fea0cf', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ru', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x26a0c2ead238a2220fb3d8e808056854', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ru', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x323a8fb05964ef9f9aa7106da76e8983', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ru', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x19da0a12b0bc85c8cf4da6a1b52917ea', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-ru', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::server', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbd7a09fd6ec2682948d65df12177faa0', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-sk', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4a4a1df7376b1b0a3ab060f138451427', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-sk', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_hana_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6a19fa9b25f37553d874563ee976805d', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-sk', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfdbb29ee20579ba5739f2f9cdc2a7cab', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Moderate', 'Medium', 'autocorr-sk', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_eus:7.4::computenode', 'rhel-cpe-repository', '', '1:4.3.7.2-5.el7', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6d03657cd24439f3f751df5d2c91320d', 'RHBA-2015:2197: libreoffice bug fix and enhancement update (Moderate)', 'RHEL7-rhel-7.4-eus', 'LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Users of libreoffice are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.', '2015-11-23 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2015:2197 https://access.redhat.com/security/cve/CVE-2015-1774', 'Mode[...];
Date: 2023-07-04 18:37:21 Duration: 1s89ms Bind query: yes
13 141ms 3s874ms 1s719ms 5 8s597ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, https: / / access.redhat.com / errata / rhba - 2019: ? https: / / access.redhat.com / security / cve / cve - 2019 - 8320 https: / / access.redhat.com / secu[...];Times Reported Time consuming queries #13
Day Hour Count Duration Avg duration Jul 04 14 5 8s597ms 1s719ms -
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x0a1e2dfe7bb7d3465f1a9630caec1282', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa9e0980c5649bf19c15d252e17889b34', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa7eb56b760d31cc1a9aa5499e6f6ad7b', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfbee03b84d00ccc68ef343e3f9eba6be', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb59707ae64d6d584128c4d1ee812af15', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x199409b5f9e74f8621c3dd21db08a76d', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfe1e25706a959511f1c7d3b182075b37', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x85396b8478c0b637f0fbb8087b1b6710', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0f7df8a4e272292c60867cfd8f1df3eb', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc84c1d75ddd282a1ef1fa9867d7c3232', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x00d7fff1b34d056004030da751b04250', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9042a496d45bf9ac1e8aa6c79de5fb5f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfef584d41020e05680985ce3a8037645', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd8a2c53abfc6fd35a8d1805038d35a3d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8ae860f88d94dc435c0969d199b76d5f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfd252ac3d91f75925fad9c3440330f55', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x158ef29f4233b039269825b8e915da30', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x259ed6d01bb96bf7a4a095d07a417ddd', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x35116fb0288ea4d8c1b2da551480dc1e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x19f25f47189d28148e5886316e5464c4', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5e6741a8ba6bc44a50fca796b1318bea', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd959c6225184dc773df4fc5e7426e606', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x59d44020db7dd6d66d00bec10cc5c701', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0805af46cbb630b40f30c556d433b4ae', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x96d00479df0275a03fe842fad6d8d0a6', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6e7771cfb54ce1b22735cfd76253ed11', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x967ce0f3ecd05501c029624bae1d3bb1', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x81109700d695d34d82e393d22dc64963', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7d4db549960a34ce3033370ef1a07a96', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x12b963f8952f48951f1b6409ae4c4956', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xeab762ed579c35345f10c169cf15538a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x597e9ef2e0c1aa0a3cbab9ab1449f328', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe08a48e9e26cce39410345f6800c9c8a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1711c73a85b31dded948f1e7a2dd88b6', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfe922ffb4f82035b8771727b671fa7dc', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdfb595b5a77200d549948c42c70d7a07', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9a1c5c3585d1ed1370b0cf101ed16d5c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe09070e23672c2b9e125d412409fdbf5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x502fe5d689b73a93ac4367b2ff2cf129', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6f16260c31c99af0272667d470733e18', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x88e8e8c5e239a4708149565a101728d8', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2f31732ea8188d1df64ccb46f0068e28', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8629bda43442b42597537540ed768087', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9693fa01aaae8e5a64177ea8027a2ac8', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd4280b955b4f25c05b49de89a451295e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5e5bcc0ff2e1443129248e11df185087', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x182b21410c00aa2e0b2b0a8d5cd55c1f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x326a8f046148f41c53b9c5d9af328971', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf4c7868372452bab543fa84c4a3aa4c2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb66c92bb559ab262ce642e67c824ec8a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd9a985defa2b93f6c43e5d1d60cbb7a2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3a6350a75aa79aa2fcbf9002e62ef10d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe514443d43310d3e10da8d9f6ffc385f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa64b9f4bcbf3626836da686ad9644bb7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x50ec941987ab334180179e5142ad220a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xce0fda15c618a3fa53fdf556b1868321', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc064e39396558b0d100e5510593eb248', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4785f6d947945c6710a7399172a76dc7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd0035c8ec22c01ac015c8c6a248b8273', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x67ce29641e05a921b8300e8bb153eb0d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfda235e53d75f368d4293bac32fe8d18', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9dc5c3411f81680ee6c4e39c38d1b1c5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x188a090e74d1b83958b37f01f8ca2b05', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4e6d9f8b69ba6f2565c05852faa15bd0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd28023560f4208ba2d6757b99be1654c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x76393f8b38f9065ec689617a506f377f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5a524f911c113e9ea28902c29171e0a0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcf37b8635345804bd2096f474fce223b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb5b5af47d61e94cdb3e9861d692d6385', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7e68f4114dfec3909377e25f1f055da4', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa8a025f882b79cf14fc9e93428b69afe', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x314aab67d943fd6e9c0dfd45d31d70ee', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7d405e32a7dbdf3d92f1a682c08e84e5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xeb0f8eb114942d68a5b80ddfd43b791a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x329f6b60d4e7a143f0aaf7893b64c0ac', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd7b57d5e88a961592a35a91bad5db3ac', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6cc076a46feedee7f63ccc672a850812', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3ffc062f5dbc4d1d7bdbf85309def9f3', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbca9c943e5e559feea64bc45b1e054b0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd3aa3919cf8727cbb984a995026567b1', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe9ae07f109bfa94bb4429dc01b697307', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb34f1180a844c78348cbb1d70761100a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x51c059a2c52347c453f3f0a59ef2e8ff', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf2f494ef6b8f70d9dbf0db366fd949af', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x25a91318818f06a2e4aa4575eed57a6e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd9fee121c1fb686a95ec954e1e01153b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9fc9f8b7f633e7fa6cf9af644663f380', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcdb4e5203375fb8f7f6e4822a81a3632', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa07d9985cb0162d08d46593be250c25a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7f7f475faa95f5b14c20d63eb840b033', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbb0e84ed5af0c518495df9b35b90a323', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4fba59aa22748ff0831748533115ffab', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x732caf26bd3c46f127a0438eea95d944', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc6162a8c2b51075455daec7c384296d0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6989166d93e5aa5269b207e237d74435', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa4ac527232c6a7450c56efaaa71ce366', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x57b394691be4c0f6aa6c1d31509ca494', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3f4cf018dc7045a27147762ca1cd9494', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x941fe659f39e812ac7987f01475f8119', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x20550abfaeb47aeb1d707c92a2b5c8ad', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.2-tus', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/secu[...];
Date: 2023-07-04 18:40:04 Duration: 3s874ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x45336ea585ddfb1ca68691646a7be17e', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x21d8660966f359b70fe02e122ac31918', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdeb8a06ed432f481a6e8954f31c05892', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x75bdfabc08bb39107d069fc7cf756514', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd3ee5e1bcd03998a27671a9e2cc41157', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x23eab81a1e5398e0e5608475dae8cce4', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x929ed4868fe23cc6d5c37fff85a6f217', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x60eb0378379ee4950f19e478ea595c8b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x71d4e4cf48cc25ee5ced0db6c53e659e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9a0a9aae397cc2bdf4c09a585ae9e120', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4dc263d3a8900faa6f6667d5d1eaddad', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x04c9181f846ae2984f25e48438be9ab8', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x96ff36cb6741b371a3da8e1135450353', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xee2aa0f61e58a7791511ab20589c9b14', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x71bc3eebc1b9554946cfdfff6a61829e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x881dabed2768e6dba0abc047ba7603f9', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x01566318ec580be7a442cc868fa08696', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x42faa48a2390eb4f80e633b72f11c841', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x396de83974bfc0c16ac06359390afca6', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe6f4be522f41359f48fdb2032e093b2d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1252d8935eb0562b1db9466ee8ad2a7d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd8061535e96c1f8c551c6db07cbd1f21', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xce65df5e03ebece408adc0bda59d72af', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5482621cf27ecc2b7fd189a346e5941e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x508142797c88c4382b8f300b75b39b98', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x835cddbc081ebb9bcb432d93e75f9efa', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xee8172b013dd47c1e6a01805b7925b57', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8550ef784faa83c89cff41bad9ebaf44', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x50d909a03168f2d2bee8d856e1832eed', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x785260436e17962927ab1b835c06f217', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x76210b99c49d725eada10bf3085e9e43', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa70bad2c2c4a1841a1ca1f852aa4441c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x180a984b9c6491acbe614c92057647a6', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe1838bc47dc472b470c4f0f72e2fe775', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3da326bf25f625ca76530919ebabc422', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6a75144976b8da2e79420dd4c52d8e6a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0c8e526994d3e42e7825148444ca685e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x66d2ab83d78b590d4922bbc11d9f510d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x77f0a1bf49c9faf15cb7a5558cda084a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb73e995bbd71e5a677fc65297fcf36e4', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x67b796d33ae91936ab38b02346ab4df7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf6119d158ac4612f8c9819abd0959dc2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0eb7b6ce9e77f1e73201cffaf3e7194e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x90e235186f01e47c5944dcb2b55d446a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x562110e51f67584c486ba6a49b5bc4fd', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb8d73ad33ec9db4dd2ae129897d18084', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3893dd8aac9190d3602dda49048d65ef', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x18243332a3d6fcc2f3d5a309dcef0d60', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfd9edbbfa5dbb289180ebda3ae2ba8d7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x75635711c3c478004407c1eb50cdf781', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x48bc00e959f3ca0df8f24b0d52de835d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6fce6d471c7822ce32520c19719e654b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa49b53505a6a931f246c5bda018d62bd', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe23e1f175d0beb26081a3f65e5fa23bc', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x43f64b9b2ca3ce43c8b834f6a38e2922', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3e57dea6a1300ffd7c05f84bf55537da', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe69983c280cc62fde95f2a6e93da1da7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x62e5178c8dfdf19a4e5310c27415daeb', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcea50efbcbe531a70a685c1a8946c2f9', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7922142b1b9a1e1b857b3a4cd76a1295', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9cb0cb427528b9b801860e1bb4f5ceaf', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb13d3d1549e795c264bb4b2d0ca6ba9a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf5cb6a85ce059893c31e95357cfc2c94', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x18cc3a9533ce475b37f6c9c7bab87340', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa9ea36d39272333112f84c6e08a248b9', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x205ce3e234a9edbd01160ba9e183e8b1', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x90c1d5cf091a2640df2deb12390b8480', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x399ff351526605f3569e1ec6bbbceffc', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4c619136c908cbd6d32e5527d28b8899', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5c2843e584e4898ca2c9878b7df91554', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6f0dac3432cf9225f1ca18995a2301e2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5bc01d94f68dc28214bf81e6975f58a8', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x04d4d3e0ff018b401adc8d621eeb9438', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x05dc83169f82148531271851262b8f33', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcd8d7ac651c826a0571213e4961bfaae', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe965cd9a7645805106631f93a8b37297', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x93bd313015d876ab249de91d1e26fa74', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xac4fde9825ecace66ddc086d8e98e28b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe01d17ba2b837d0c404449f8f2c3c3f5', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa5b362d3ca82a7867075b5b9920f1a6b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe0422fbb472ac6a51b483d1c8640dbcc', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdaa961e726b8c0ffacca6f34283bd674', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe9eadd1cac58cdcfc5de990a4a722620', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x489072d703b271538a1c7e852f963ffd', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3c45da9de15407c26b81220bbcc14e9e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x416ff9fc31268ae0f0dab47b61822ab8', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc7e04894ee5f6421d476155304231187', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2bb0ca59a11fe2d4f9c9a7fefebe1c37', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7e67fd518b0caecf71bccc744a8b5c4e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6955fdc3eba5f2a996de7c478d0de57c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3cb760e49b7750448cd6f364061743e3', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf8f15997ba078a8c9b38576c671da3cb', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x33eff1f3363c927af63332bc7cee0973', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x33019e0bdf9b632334989c229d77ffe3', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x710533c0a1f332cc795b3d509a6a6ae9', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe9ee1614db6f0f0094b15abf1e30a2da', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe587f097c34642a1234d50d241899b76', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xba07aa0af1737836ebdf5fb034c7492f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdba597e934ad2538e0e36ca55e956681', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x21c6ae44f077cf88f6d3a41a4b450c4d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/secu[...];
Date: 2023-07-04 18:40:13 Duration: 2s974ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x76512afaf81cdd73d170961f8bc4d9b8', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbb98faf8446a2b5facc1cd7549d627fc', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe8f331967cf7c1478534b48daeeb0bde', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x15909e77674c2512655ba553d31e03ee', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x623d54fe85a0cdc6d5a29f7be2ea73f9', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcb302feffba48e5dcc4fa599ed2bab4b', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3ac9de04059e17c7b3cf1e0e54b5d608', 'RHBA-2019:1992: cloud-init bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'The cloud-init packages provide a set of init scripts for cloud instances. Cloud instances need special scripts to run during initialization to retrieve and install SSH keys, and to let the user run various scripts. Users of cloud-init are advised to upgrade to these updated packages.', '2019-07-30 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:1992 https://access.redhat.com/security/cve/CVE-2019-0816', 'Moderate', 'Medium', 'cloud-init', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:18.5-1.el8.4', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x280b6faaa43f719d1fc8c0b0d9f3c1ab', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd16984a0b02be54ae9807f5bf5d62331', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5a22d756aacc70f4187df17f2fedb690', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x36bb52a28d79f159e287934dba12b28f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x50b8ab6c72c6477d407ca3dd3429a3b2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x46fa42443555aa551a7b1c343ffe7551', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc07d8340b1049704dd63ddad0b5f7e85', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4c1205e3f5e449f45a2eaea0d7cd272d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8d5fc7d7f5dd9e42dbd479d000d5eb38', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xafe5b5741da1f07dad6b17664c49a54c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x584cfcb1447726e1086a3c6c2f6f9c62', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8e597f869f70414c0975aae8524de602', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe71337d9e5938fb49e0342c031457ee0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2a9b811f3287d88177308e1af09f1616', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-devel', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x146ff4e5f6f7eda15bfebf1623a203df', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc7a0d8320bf5b2f9487c760d453ef1e0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb853c0e29db5f61f5259c5c7255e8b6a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7196f849bf1056f9e076e0984a3e4511', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2c493ece0fd556e196bebe93e9083e26', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x17c3f4ad7fe578a4c2c6efb00185966e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd7d7dfe94d77abd6afb4297f688cf29d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf6c1f937187fcb5e637eb5f3769a1da1', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe827c5a221d130c9630568fe82300608', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd232476da1e391d9218806ae863b1d09', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7bc04e605de60b447e74fd2f8596afc7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x39545b9d644537940a7d4c77c3b69122', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x50c1ece00069fe41a0868f95e0c22a9a', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbec3a7581de5886929d46bcc67d1f69c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-irb', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1c133fa3596da545e5994febcf2d655d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x01dd47970dc5080d22a10317005c444e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2fe97a2b9b3192a247d44536d15f877b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3eb419db350e9d0cdc2d678e43fb6ad9', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x285b33829c94239d8c1e3fea26b5f943', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x2d1738d2dbfe4ed3b1af3f0ecf63fe53', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5b0a1f915460887dbbc0459091da9312', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'ruby-libs', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:2.5.5-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8f3039abae742d6c4252e92eefefa2f0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9027af5f1b6eba54da09ecf6e6729f26', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb5e2a960205fdcb380cc2b7a073ac30c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3010684d8ef684efc7c3a27bb358905f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc2d99e37faf907be62a965a295d16ace', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xed541021e5ff5adb875faab006cb2527', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6828be7ccc9f719be9aba80c909873ad', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6b3fa7dcab6290d10f093b70248e005e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7dfa5a9b2eee0632f5487d127d08ca78', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xeb3cac72d1160cda837f5553731f7b29', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6588df67a272dd6d40b46853f6f50a7b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x03b72f005df351dea957d872def16111', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3e000a3e9d839aab164d7ba4f301ec65', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x695c4c91e39afd6833eee305c19f08a2', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-abrt-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:0.3.0-4.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x04bbb491b2a6f24a6d57e76afa22ddb7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7619438277bc77664afa39f217d68687', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcc7a83cd2abb4330f3e492198c1ddb78', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6a6a21018defab8a8d42e49eca338436', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd94f183db099261de2e14d3bf1850291', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x799fe097dc7e7a81193c0fc8c73a4f35', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x70061db3928b35e59e61a66f5db7401e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bigdecimal', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.3.4-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc7b2fb731697273be5f403f9d78a55d4', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf0981019a01f7627b788c4c696c6e103', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x383dbe86cad274994242874aac08c36d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb8acece35ad552222a6cfc3e44fe0c11', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5c6ccc2cbc7a19c65a79b118fc7ecf17', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x79b3a2c1e776345b97bb9d101709e202', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe0e6b21ef53c28bf223d11ffae6484b7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson', '', 'ruby:2.5', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe33fc27d7e3841d8fdf00a40550dcacb', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6be843ae41c5f4dc4084151530c3031e', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x187a640c09ec5b63488a445f5b84a45b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe503fb3120ac8fbdeec3eb277ccabac4', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x73306c476cad62c6b11d66c048780073', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x32b5d15e1b53c8a06456bed7200372db', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x84ec2dc6e3413db2173f44e25cb6094c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bson-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:4.3.0-2.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0648d072a5624f422a8ab07c54fdb06d', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x777ca7f5352b144078ea1d485c92f7e9', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xaa6b0f0bb0d481f5b46252a42e8a9615', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xde73e053f523fc3cbe439d4f363c6967', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa318c2b635d6c82bb8dc20d0353ce7bd', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7a18ac69505970c5a8dc385ad2845e0b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x05365273c0d4e22ae215e084ef80d7e0', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x38585b964f1604ff664c95f65e10f72b', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x82eff1ff57c9559917e3f93eebfb1a74', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x133c00b22287b9a1c38be28af3686f75', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x53090bfe951e0a528c7e2bf9a98de5b7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xebf4d321dbe46e5b2e502175db700865', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe9e087869b9464d041f5d84cfe00f7db', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x531696276296192556d2b4ac2f25d43f', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-bundler-doc', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.16.1-3.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xaa0fe0a1001130bb33c293b5d6e11003', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb72f30642a44e077f0689e32e239bb67', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf0658976046334eea2a0beb413a1c23c', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb74bd8141f4447b5c3713b441728e4e9', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc4216e4a7a1901d57c5e465336d930a7', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x50b89a6e4f82f894d53284cfa6145018', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8b2b4b238b893d8dd30687f3f0264d97', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-did_you_mean', '', 'ruby:2.5', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.2.0-105.module+el8.1.0+3656+f80bfa1d', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xee7aa825fbffafff78fec601422f9e11', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/security/cve/CVE-2019-8321 https://access.redhat.com/security/cve/CVE-2019-8322 https://access.redhat.com/security/cve/CVE-2019-8323 https://access.redhat.com/security/cve/CVE-2019-8325', 'Moderate', 'Medium', 'rubygem-io-console', '', 'ruby:2.5', 'aarch64|i686|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.4.6-105.module+el8.1.0+3656+f80bfa1d', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb659a2b223a6478089516b8b9e12b153', 'RHBA-2019:3384: ruby:2.5 bug fix and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:3384 https://access.redhat.com/security/cve/CVE-2019-8320 https://access.redhat.com/secu[...];
Date: 2023-07-04 18:38:53 Duration: 1s340ms Bind query: yes
14 190ms 4s340ms 1s703ms 5 8s518ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)), (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, cpe:[...];Times Reported Time consuming queries #14
Day Hour Count Duration Avg duration Jul 04 14 5 8s518ms 1s703ms -
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x18ea0b22e439a7960c5d984f3c6eebc8', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-idoverride-memberof-plugin', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:0.0.4-6.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1d085c58111d73df4dfeba5fdafe2676', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x79ab5f5869410cdcd594132bc8039f28', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0b4fe067979eb6a7529b8aa594a02960', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6dda8f785ada64612b58e8f1ea750198', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfdc101e415760dde1674570afd1fa439', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6c9b0d62fe8ef2bb528c3c236722869b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3f11813a91154c6539ca721edc0ddb28', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x09bad404efed0959a374add29a30878b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe8c12d03db048c8bdc15e912be0a84d7', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc71631dff9c1df72c930cbae66d2d614', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1b3430c853dc1ed74f46347ddc1ae1e2', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfdac06ca1ce853859334a93fd806fd56', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x4d955b61eb813d9b70393b95a45ef066', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3638bf9be5d2279ee782f46019a6ce7a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8867fab15e5e38f6112c9bb515d69aec', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7229d2cc12a3584dfd46e76bbc773591', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x38da49b4b487f226ad9a3c552048f4fb', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc3ae4712bf43de3a989f973ff2494e33', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9dbef8bcbde966356600365feebd5625', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbed59b8217732cc61f2d26caccd8dd27', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x09b5caea52c05a9567d719f2f6b98675', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf5d9509b344d9dbc194bcbf6be466e3f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x238f5242e31c950bac6e5cddf3d46769', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfd6139a6d08a10de89a5385cc238c57c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd8b07ff48b0c9f99ab58eb5cc7c0125a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0bda576c554719fc8e1c626f021c2ff7', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0b37ca003ab705e259dfda6b2cb0353b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4e301af639a46ab0f916b2b0cf4ae0ee', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5d17a3241e8963fa82001846acf8d1b8', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x17a0ba2f85a02cac5d4c41234e6eac51', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1f55dec385084fc3a509163ba21f4bec', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x17638347fb6da108c6d9d1c68a96476c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc117429f2f34820c0253fdde0c102742', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xff3306bda14c861cb4c06e34a8986a0d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x43f3b1bbb0001119b5667752c732b6d7', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaf304eafacb4e8f8ef4c59874ada491e', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf9962cd827b6819cb0a2a1c38d9bee1a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbd44c0aa054e1877f027ffef646f6823', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x8cc4a95db1f0013960ba32c50038a282', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x87f28184b869db62a168d5fbe489c4dc', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1ba85dafb99a82b1407d8422e42ff34e', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbc7936e8d5755aeea4f7341fc5b75020', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x387318ad29c9efceafb73c256eb07e19', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf736049f52010902df8bc6f825f0251c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdbe63e0c4535e6520b3ccb5f77d7322c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe073fb23a313ac97c8845c1f1fba6e9a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x671d3cb48a8029523eee6b9f691f3dd0', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0873c6cf8b1bc51e5da13dff599601c6', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x86e9900cb08539f977d6f5c118c3b791', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa533b9eb100bb4d4af1ea5cf8aa8e58c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdd8a1352a988a430b59dc686093620b4', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9fb59e0b96444a18aa2f5c8c7cc975c1', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbd302d7f2f88fbc03a20f6eea45b01f0', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5fa5021029a6739cc8eec4c04dbb197f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2831896585f0c076dde6aeca9b2e0237', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x49dc8cc35460e13025d630667a00731c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe64a2dba0c61180654c3f7abbe1391e9', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb83b8befbad3908464d85c401fc5b340', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfa5c200f5eb44e7f4ff2c2221de4dd45', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd025e988b9f8cc5bffc20e92ca4ab22a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x002b626866acbe11d85913efff604b0c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd5907087cdd8a6ab7a7206db0c53d7c7', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2f3f5e890aaab12f471434d86d811f4b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf0ef8451b8edfbe9beca28b7ad874ac0', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xae1076da754ed68337586342ca0c944b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3d23edec6e322e80487ee105cc473ed9', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb274d2509ab3f9347f90ce0cc1a85347', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa1dd3c65f5e9808bb232397f984e6124', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbfa19444bb440f82e2bf7f43c520fddb', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe3a86e6da9efb7c4f4b6682b2f9fdd1c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5fa7146e1cd95ec179bd333eede52f0b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdbdf105f6800b29a70ec41e5b4dcfa4e', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xaf9f1d78abe5d51d5f11aa4042a71b26', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x627a6622abebc72370d8af57144f1755', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd8c418622bdbea24b28344458c8848f5', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3ed9fab54afe942110e3cad2398d91c3', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe6ec280c6f45e2e8a74a86246e2f2b0c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x910cea21f21e3709f0c8113897426fcc', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x59843228123df95ffb09f524240d594f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x281f45e973586d06a738a7da0d52197d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb6d185f32957ac698052b6a2f99786c2', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4aae2170da706b5a6e55d5c3168fa241', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd443056ba1c80252af04db54d14d55bb', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x270aea9ff93d637f4465f0c57224192f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbebd54e5365ada6c633031e209767180', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xec39d153f9f64afbd0d1823602ce74e1', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf41eb0e12a92532ab8b4efb3dddc34bb', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x10d897ab575d5959d0730a7c8044d8dd', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf306fabe801fb592af046af92e98bb6a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6892c0429d2e25b76ee8a853df7f4510', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1a598f2bab2e3f41a21251bac8dfc247', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1fa290a936b91311bd5630422d07dc55', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa5c8a195b771ea25eac150454fa5a695', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xae4ada28a7379a8f8593dad3e77eed6a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6175fb7aacedd4a3ce067ae078baece5', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3d32b59fd473dde59176f6ff2f2e9479', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8acdb88eaa19351d9eb5b721408e3512', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa4733664007cf049a8f83adf6b702e1a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0ff6dd19c2355779d9f2517cdbcb7bad', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1643f9fd57f68c0bccff345a063bd4f1', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xeb0c6e3c3644a90d16cac3f788cfcb53', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf2a0ea68aff6f29674f82b27d6f0fc40', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x200ce56c914b96c27968c409821ec1d8', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8a09b1cd6be205bb427cc942da504c43', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x41504d445f788fef2b1b889426ff2467', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe1d58bb5da6ff96ba914e38e0cb30e4f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb32f518258fea9223144f923ec2c5251', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0223ab084b48f01a5b343eb278643d0b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x185a7fe1147d3eb684989823cff6ee33', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x79f6483d6e4028be3fdf56b73af006dc', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd7945f501411e09b8e5dee405396101d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x61129a990290262a1db8104a9ddcbb1e', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb620d9fa4f2ba45c83e518fe2cb70019', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5fc29a3800af7b82f764bec8301351d9', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xff0eea8f1021d2083a8ef0b4a0e6183d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb2540b713282f489fcd1dd37aab024d6', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3af2a2404b83d45512b99d76ad14c81c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf3e89076fafecff535f043028fbf8e59', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x49efec806a8e6591121ccee533ef8f9d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6::baseos', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6d0df7316a27dce4e46669717859cd03', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe90983fba029f91e9a96a8337349ea00', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::appstream', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x856e98f63eaff86a2c0cce5d2f254d56', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xec2eb866a39c00124fdbf074f1cba34c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x49767e5765e4d1d54d1597049ef8de7f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbeef023a319ecf69f5f52752bcc5e386', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.6', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0d6f540cdbc2d336b6b77ea317e3e676', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.6-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:[...];
Date: 2023-07-04 18:40:18 Duration: 4s340ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\xac9ba1efdd7074fc7a025efe1277079d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-idoverride-memberof-plugin', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.0.4-6.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd060f6ff47636bdabddfcb449264323c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x79816f7cf69efd00036a6a2fd0e31e31', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5c91c0f98983c9c7918e5c7a0ac6f26a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc2b8aebb29172228127a470e81895afa', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7ccc03a52f16ed929e69333cf600f006', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x727925b272a270d899ba0f0900702608', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd8d30a1db9bf773b22da52a8e7366600', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb0047e82ff2f84ba68eaf49adc908857', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xaf00a25677a18460959bba984fcd918d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x91035770aab19f8b849ef470b6784ee3', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x908406c56f93a6452daf2fa9a071f91c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9720c245cf8a327206bd42e1b2a620f8', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xfdb3c6e8eb0afba60a0da5be9ad4a054', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbb933df999ca65291db5c7c88a6fa9a8', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xad3163f82d31a94c916bf57020a8a5ed', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcba61ae31ac45d1df2469a16c1850cf9', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd37faefffc12845d39359d3936c8e610', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe45e686e91b66f53b86240899735e32b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf02168bfb432145a83d8d871a2bb7a94', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8695aeebeef04396109ba287d7c13582', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x17a43a408b475cad334aaf91b058d231', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0b655fb35027ab099e671fd2d9679de4', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcbcfbb4216960d36d79312f0227b4b0d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1ee114a239e6e2f02bc30e16d5211ca5', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7ea3997ae0bc1c8b38fe6d081d30550a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9f92b80005a2ae151e103e052bb821f4', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x29daa82709b1c20557e96e4841cf5661', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5faef92e2eaf184fa93f663853b17c76', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xaf076cb533ea75cc96067ba4d6e7d411', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9b5f5319a322dc8ce195afbf4ad886b7', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1d538cd0bad54923d237a0298582dcac', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x386ec91fb69579e0cb7d71f240287284', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9a934272024eed71556cbc6312b7260d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x05876260b12f5f318df03ccefe53884f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6f3eff1045c599ebc493f1afef1c2e4f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf957e0d0426d5ccbd4a630e13e3ced23', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x56e01e95bd4d822c48fae3de6bf1efff', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9ce1d814e59a094b4e3b139e4c2e0d8a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xabc76e71794a336ba304b597c63f971d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x05601913f80febf6dad6c20e7db8c7e6', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x89cbb234222180f527de0e1185c0ecd3', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x597645c3c56798b8f0d766e8c15f4afb', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0c2eeaec051b372ec7d0ed9b60654ae7', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1d0cdc45b515481963c6625cf2758312', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa4edafc05fa7779ed33823e49ffe934d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf6291a1c0ce6d65e3e7d45ad627915fc', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1a2209b944e546fae324a6bc255cdf2f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x893067afa6389928cc80505c650530dc', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfd16a5043914e51a329073eeb312cc17', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf4295b78ef3dcd87dab519afc586f310', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x112e8f0e54e7b37d77b825ffef651a98', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc26e6ce2456dac051d263cc356656dd9', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1a62e9ce62e89c0a0f2e4d4f44e3fc22', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4e2729eb42033ef73ef87a4d9df8a07e', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x77292d767d8ce5ae7e5eba634ebcc605', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9c96710f553d74f2fb90c83f169d51d3', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xde5a5d642e88b2080432d1868e00855b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2743d8c01646d1df22b5348c3cb330a8', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf34572ae2883388ebd76a30a68253ef3', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x942095507a1239bcea654131278e658b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x46871d300ecb532dc3517c0ea2c15433', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfbee6bab70716681f4de71ea1f52e253', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb3110f7ec3753f02a16975f7782c7f23', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0bf1474a80af17d980a15450cc503388', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcbf1358fbcc64ef7ca8525af321aa08f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf69d75c554bbb164627abd6f55ded584', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8f295e1b106157a19f31091857c4c903', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe819e76b2665bde68799d5c173e50d65', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x419a605436f44ab0dae17c36cf0f9a2f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcb7e1876f449dba88a360e760606f872', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x453cce4138e1aa3da834de4420328277', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe53d050f997db7e8256ea80144eb2f6b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3925f19488e2133f3d44805a0ab4ebf8', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x37c6ad88343f969d8581141ce2374913', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x06837139af6b5348afd327b724bff620', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc6396ac42b5107f2c7b5b5b47abe068e', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1547955feda73bc549d9cc3c880245b2', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x66e112845456f5c95e10772f88e2268d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1fea1d114f5be1e334a1b2a388f0510a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x56af9dbda8b353e1e7f81e89f7d14af9', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x160ed1b6c0e938ec84042af812e57053', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1299e0d0e38ade651bce3d7e4e6b5130', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x65b81f43d444493e072ed40788f5f13d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4dfb1f65f4764f4060351b927d016363', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x43eddde787ad564dd0e03afdfd0178c0', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x077f8be5fff4750aa66b14535fc3d0d7', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x60180cdae8999e17defb8983e53f6131', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd01837ed54c48fb7784fbd2f6f1ee28f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc745e0a9302fab845331075f12a6d5c1', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x77f26dc0b7aaa90cc44692ab06ad5df0', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc166540575108e5fe87809cdb5ffe20c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x10431165cfb54364228abb61f3157c7d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6341ed3bb7e8284a0353e7c26746d1bd', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x472d48df56122ee83c70f70f75aa8d74', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4932e7614e53f534cd5e49c194b05e7b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd8ddcffe27448fd63241d27b2612aa59', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xac65117c9bc43853ecc1681718277ebc', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7e10f7f4285ea02d550f2320fe37953c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd4d3dd5df4c715a7d26303bd7c157988', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf18d9c8d9a999f47d26daff8d54f7e1c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x37e2af1b4054e30f727b6af68df11132', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x27a21549f3afc2f98a4c309a959ea6d0', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6ff801c163bcbc45dbd4f1ffd0e861e9', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xe0694822b3909704eb54b192e48c2de6', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x91b7bc14ef8ee7ec9e0f375ae45f17a7', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8be1997005989d4b583c6fcbc13996ae', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x11c56a7ce55bd332e60ce6215c7c63d9', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc018affabe406d71785d048c0dab595c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1aec410d486d37c1938690e7e315c426', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9f220e1197fc0de276a7f9186cca7df2', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x619e3cf2b1cc7d7fa5f753556b109796', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4e8c49ac41edde3126955103588ac4fa', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x73843f59058365cbe526f60b196caba2', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x518a6cbe029d45d21f5407392b89ef6f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5485bf7c31d49b45e5675afe87beb6a1', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbe9e55a71e12a4ac7c1f93daad11cd34', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x25a045892bbdfecaa9b300e78c099e61', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xf3272c8bd42d95b5b9915d0f7ba1b197', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x1dd248680cf124223cbd2b9d6d2298f3', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2::baseos', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcf69d5e803052bd379cd09c75077202b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x60de993f940297622de3618a0be8eb4e', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::appstream', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7f8b99f7c3ed640530bcdcebe8c49567', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x984641252358aba0bd386691f4990974', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x48a0a470195fedc8f797ec6edd9c1bd3', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::realtime', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x9423190a66cae724033b11d4d8c83fa2', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.2', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x31d0c306646d1dd63fe0e6a25a2cb1a8', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:[...];
Date: 2023-07-04 18:40:06 Duration: 1s826ms Bind query: yes
-
INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ('md5', '\x8b16cb3e76ec4ef038e4e3c8e0f03e28', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-idoverride-memberof-plugin', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:0.0.4-6.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x226221828a4d9f819ac33af20c71dd06', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x005bc96bbbc9b34ee2b9e54f636382e5', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6c5846e7310a1215d5d25afa2888750c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc1c8d2367550bb82024eaf49b8735179', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xeab10d8f6aa39fa00e5017fe2e622902', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x147ceb1f6e4d7118b4f906e85d65e63e', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb2eb42da22a9c37b050ccc224e681d65', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-python-compat', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x26e82cf78177b0c1b03d4e4a65e54c7c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc43514be7aba9835be132bd2ac621ddd', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe3b96d64016714b8c51523f3db546db4', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x3f1e5295561a52444d87595335f8d198', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x75a7f4500a2e5ba98ea728eb7167338b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x59a2b9daa56a9c8bcd95efd3828a54f4', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd9f614f34c20a0849fd15cf7b540362c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe4272343d0777849cc6138f1c29aa4bf', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1706c6dcfed45efc4aec0b5751b2ae43', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3969d9d665dfc3d8f02d3915b081f7a1', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x44a024a1ecc4acdaefc681fbe540f081', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xeaa9776777151eefaab6fef248188409', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0fd8683feaaaff315e0c2bd19d480536', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xee0c21653b00b49daa67df97094f1a71', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-common', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x42c57c6b3065aa9800779e11f2fab9ab', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbda7d9c19cc65aa51105d9e93a67845a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2f52ab15505f40ce5e98118180ec7479', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5516a2f7e59b57071afa77853d53c5f4', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4c527105cb6f9e53bafc2a86467f20a8', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xed7a2243e0101c9c800c72004aaa904d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x01d74fcb493d7b70a96ee8a1f422f67c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-dns', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xcf2177f9581aa87a3c9b9324ab90710c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6970425e6fe8bf951c08086aa53f779f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x5d198446fb4ec36f8d914d4c43dbdee2', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x74ecef013abcd870e368a34c756cadb6', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xbcde83e5c4ee60f924b55b7aa5f6b3e0', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x7714d0cb9242cebbce7ce3427d8979cd', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xabd8f7074805f14a24ed9fe511f5c66d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'ipa-server-trust-ad', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x18492abd609a95bdf63156b66ad5564f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x6ab63bfd50b0fcbc3a9d066cc38f8066', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xa66722124c12a187aaa16cd6cbd9ee8b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x10ad34946e668a724c49102fe471e94d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x022bc902ab8445e0b42952f6d65c076f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xc907820cab5345e8c64b2e396e316389', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x69db0c47d44876381465fe888ff9dbdb', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'opendnssec', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.4.14-1.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xcbab1b0d00b003f73b66dbee6018481b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8e08235f24aaee689a2419d00e49254a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xa1b0026314f122acb0dbfe57680cfd36', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xee0057664c6f6b91162c643942c6f854', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd277b930a52e68db4bfdce6186f53657', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf8794d9a183e2228f2763ec8dd19b77b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3c25ba47d71a2e1c3c69adbecf51c1be', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-custodia', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:0.6.0-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x561d12a95a8f63724d404c6366237802', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7ac5b1c034b0efce2e17096139c3d332', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x6b566c7c9de30ab63103d2aee1c77666', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1f51af5e304e192c7a4c92411b46a12f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8f0ddcd7fdf05aae1d6ffa29643b233c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3d776644b6f09613a9a3abe8a34107da', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9305aa71fb6976453d47895e426490b6', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaclient', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0c5ebf1f5d0f480bf6d0e672187be194', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x9a3b967d8dd3d9508a289119eb260f4e', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc3cbbfa2ad5b7cf6a2f2ea8cb315e77d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xd2b02db90489c326885b8e20d7e21218', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfb9ee7fdff901a4c07d1de67a9c229b3', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xde2e4f78413ccdf741589d7c3624e78d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3774ad1187ba6350af47b6a644ac50c8', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipalib', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb0b1f6c8bbda85dfe9f4d96bb32dddca', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x27b0cc48526409ed65d246504d2230f2', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x2b96a029ef920afaf0b5709de9121ca5', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x993463cc51e2cdb6010aadf9cc5b399e', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0b4db5c5d9b28f1e30bbda8d9534a8c0', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x202bed7521c5553a87a9f235f855abf1', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8c7a570d50fb962aac15436420ff668a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-ipaserver', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:4.8.0-13.module+el8.1.0+4923+c6efe041', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x75743d00e5fefbdb6879236e2f1bd41d', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3d0549857276218fc8448b8be7929209', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5c5f12297f23dd94e54bc61a76944e94', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x54c0da63da8d507105219add29be7374', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x69b49fede5439da1c8bef0a2f4af84fd', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1dc7838393aa92f3a1fd73a537457f54', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x43d9e464852c5820b2d14f37ed9c02d7', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-jwcrypto', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:0.5.0-1.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x322567b01861593bc966aba90c5190c1', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xf0e2b616bffbf26a34024d9c1b530865', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3003ea55e2aa2cb3bb45cd02531a88b0', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x88a3fb7a2f709471874c7b4ff3182312', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x39be60f2f0f4993c1976fc76351c3fdd', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xb7dc02dbba2bbf33b05aa5fd093d76bc', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x0d88703791f3fbe5c964fbaf1c6dccff', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-kdcproxy', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:0.4-3.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x3c9c2e70852e9d1144886213d89fc181', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc6da78b64a49157704367be60a2e6298', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1bfab3bfe6cab0a9e7d18a058d9f2fb3', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xce654b63eace7263b29ee337cf3a175a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x69b03327db648a141712b5cbd7adc5eb', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x7dcf76c5c2113fb5638f5250a2620ecd', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x58dcbe00710194461266587693c82801', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-pyusb', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.0.0-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x13034d1feb3f5e0eb5ec1fc695468cb8', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x21e3858c411d5a4b3c48663499b3eeb5', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfc90d642cee948c5023085f27ce215de', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdfe8b2aeededf39ad57c9d25ae7dbb62', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbad8ba971d251c85be08aed30813bedd', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4cb67d4729b04c1abd9f6d1564e34b98', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x633fa89feadf969daaa7a4d277ece44c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xc241c22b07dde86622b51ccf34229a5e', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x96f05d512e2c68379c73d1c32454d1be', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x963480c4063879a761ccabe5cbe02d1c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x59b3f2003191c8aeac879f10dad648dc', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xebf0221a429d78a3aea06beaf2a4ef01', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfb650e1295111b91974dcdf78572208a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xbff81aea59d1300c9590655c4177883f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-qrcode-core', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:5.1-12.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xfe4a8dd9bcf7f2c32173f4cb6b6d194a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x1e5399a4f6e1c1b27fdda3a55e341f39', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x4231cae028915d18aeb1652a05ce00c9', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xdfa2d18ed69035339bf6039fa1070920', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x69461857def6d9681936371bcbdc35cd', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x8c4caf54c33568e55a42cd0bfee3b5b5', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\x5463fed71b09ec78950a71f0ceaeaefe', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'python3-yubico', '', 'idm:DL1', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.3.2-9.module+el8.1.0+4098+f286395e', 'invalid', NULL, VersionRange('{}', '{}')), ('md5', '\xca1df9e9af8c5315087c9e9cb7e97b36', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x84358af6037b51e16e7f07ddd1b0e66c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x57cdefcfae9d462d560944cc2167db24', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x382a77fcc08c02e7891a6fbb19155a5b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x81a17fbd0d588fb2279024a829f9ca9b', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xe59658159a03023ac6a46ea3cee06361', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xd5c6754fdac36aeedd2f661b70669728', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'slapi-nis', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:0.56.3-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x783a894a4d4e3aab093a3e9b7b7a8a1f', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x279cc32bc4af2569164959cc4334564c', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::appstream', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xdfc5826e221889c6f4317314501be9e5', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xec50ef0054422b94b1daf1d89c20fe22', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xadde3a0e467df200c2a203ad704ec601', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\xb10840ff6f96cd889ef2b2a20910b380', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:2.4.0-2.module+el8.1.0+4098+f286395e', 'pattern match', NULL, VersionRange('{}', '{}')), ('md5', '\x0f108c447673a851f6a7ad36d9c7588a', 'RHBA-2019:4268: idm:DL1 bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Bug Fix(es): * IPA upgrade fails for latest ipa package when adtrust is installed (BZ#1773516)', '2019-12-17 00:00:00+00', 'https://access.redhat.com/errata/RHBA-2019:4268 https://access.redhat.com/security/cve/CVE-2019-10195 https://access.redhat.com/security/cve/CVE-2019-14867', 'Important', 'High', 'softhsm', '', 'idm:DL1', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:[...];
Date: 2023-07-04 18:38:55 Duration: 1s96ms Bind query: yes
15 0ms 1s958ms 99ms 2,088 3m27s commit;Times Reported Time consuming queries #15
Day Hour Count Duration Avg duration Jul 04 14 2,088 3m27s 99ms -
commit;
Date: 2023-07-04 18:39:33 Duration: 1s958ms
-
commit;
Date: 2023-07-04 18:40:46 Duration: 1s831ms
-
commit;
Date: 2023-07-04 18:40:46 Duration: 1s831ms
16 0ms 1s665ms 83ms 354 29s560ms insert into update_operation (updater, fingerprint, kind) values (?, ?, ?) returning id, ref;Times Reported Time consuming queries #16
Day Hour Count Duration Avg duration Jul 04 14 354 29s560ms 83ms -
INSERT INTO update_operation (updater, fingerprint, kind) VALUES ('RHEL6-rhsso-including-unpatched', '{"Etag":"\"349623598899226c6eb4ebb7289d35bd\"","Date":"Tue, 04 Jul 2023 12:51:24 GMT"}', 'vulnerability') RETURNING id, ref;
Date: 2023-07-04 18:39:33 Duration: 1s665ms Bind query: yes
-
INSERT INTO update_operation (updater, fingerprint, kind) VALUES ('RHEL7-openstack-14', '{"Etag":"\"0ff35622be2e5c2ca764c85e29bb2be1\"","Date":"Sat, 01 Jul 2023 07:29:47 GMT"}', 'vulnerability') RETURNING id, ref;
Date: 2023-07-04 18:39:33 Duration: 1s254ms Bind query: yes
-
INSERT INTO update_operation (updater, fingerprint, kind) VALUES ('osv/npm', '"21b1b656743a59c5e8d6c1c6f028abee"', 'vulnerability') RETURNING id, ref;
Date: 2023-07-04 18:41:43 Duration: 865ms Bind query: yes
17 0ms 1s885ms 81ms 1,653 2m15s insert into updater_status (updater_name, last_attempt, last_success, last_run_succeeded, last_attempt_fingerprint) values (?, ?, ?, ?, ?) on conflict (updater_name) do update set last_attempt = ?, last_success = ?, last_run_succeeded = ?, last_attempt_fingerprint = ? returning updater_name;Times Reported Time consuming queries #17
Day Hour Count Duration Avg duration Jul 04 14 1,653 2m15s 81ms -
INSERT INTO updater_status (updater_name, last_attempt, last_success, last_run_succeeded, last_attempt_fingerprint) VALUES ('RHEL6-rhel-6-extras', '2023-07-04 18:39:31.481111+00', $2, 'true', '{"Etag":"\"d6027a87257c4753a606d67725005cdd\"","Date":"Fri, 30 Jun 2023 21:35:51 GMT"}') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_success = $2, last_run_succeeded = 'true', last_attempt_fingerprint = $3 RETURNING updater_name;
Date: 2023-07-04 18:39:33 Duration: 1s885ms Bind query: yes
-
INSERT INTO updater_status (updater_name, last_attempt, last_success, last_run_succeeded, last_attempt_fingerprint) VALUES ('RHEL7-openshift-3.10', '2023-07-04 18:39:31.477477+00', $2, 'true', '{"Etag":"\"b060a1bfb8d505f2204f9673a6186ef1\"","Date":"Sat, 01 Jul 2023 07:28:36 GMT"}') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_success = $2, last_run_succeeded = 'true', last_attempt_fingerprint = $3 RETURNING updater_name;
Date: 2023-07-04 18:39:33 Duration: 1s778ms Bind query: yes
-
INSERT INTO updater_status (updater_name, last_attempt, last_success, last_run_succeeded, last_attempt_fingerprint) VALUES ('RHEL7-ansible-2.5', '2023-07-04 18:39:31.899678+00', $2, 'true', '{"Etag":"\"51a323b1fcd3e5e3e61ca77fb12411dd\"","Date":"Sat, 01 Jul 2023 07:34:09 GMT"}') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_success = $2, last_run_succeeded = 'true', last_attempt_fingerprint = $3 RETURNING updater_name;
Date: 2023-07-04 18:39:34 Duration: 1s601ms Bind query: yes
18 0ms 356ms 49ms 28 1s395ms insert into updater_status (updater_name, last_attempt, last_run_succeeded, last_attempt_fingerprint, last_error) values (?, ?, ?, ?, ?) on conflict (updater_name) do update set last_attempt = ?, last_run_succeeded = ?, last_attempt_fingerprint = ?, last_error = ? returning updater_name;Times Reported Time consuming queries #18
Day Hour Count Duration Avg duration Jul 04 14 28 1s395ms 49ms -
INSERT INTO updater_status (updater_name, last_attempt, last_run_succeeded, last_attempt_fingerprint, last_error) VALUES ('RHEL7-openshift-3.1', '2023-07-04 18:41:17.759863+00', 'false', '', 'failed to begin transaction: failed to connect to `host=postgres-clair user=clair database=clair`: server error (FATAL: sorry, too many clients already (SQLSTATE 53300))') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_run_succeeded = 'false', last_attempt_fingerprint = $3, last_error = $4 RETURNING updater_name;
Date: 2023-07-04 18:41:18 Duration: 356ms Bind query: yes
-
INSERT INTO updater_status (updater_name, last_attempt, last_run_succeeded, last_attempt_fingerprint, last_error) VALUES ('RHEL6-rhel-6.5-tus', '2023-07-04 18:41:19.546381+00', 'false', '', 'failed to begin transaction: failed to connect to `host=postgres-clair user=clair database=clair`: server error (FATAL: sorry, too many clients already (SQLSTATE 53300))') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_run_succeeded = 'false', last_attempt_fingerprint = $3, last_error = $4 RETURNING updater_name;
Date: 2023-07-04 18:41:19 Duration: 268ms Bind query: yes
-
INSERT INTO updater_status (updater_name, last_attempt, last_run_succeeded, last_attempt_fingerprint, last_error) VALUES ('RHEL9-rhel-9.0-eus', '2023-07-04 18:41:20.268711+00', 'false', '', 'failed to begin transaction: failed to connect to `host=postgres-clair user=clair database=clair`: server error (FATAL: sorry, too many clients already (SQLSTATE 53300))') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_run_succeeded = 'false', last_attempt_fingerprint = $3, last_error = $4 RETURNING updater_name;
Date: 2023-07-04 18:41:20 Duration: 188ms Bind query: yes
19 0ms 268ms 13ms 23 300ms insert into uo_vuln (uo, vuln) values (?, ( select id from vuln where hash_kind = ? and hash = ?)) on conflict do nothing; ? - 07 - 04 ? : ? : ?.? utc[?] debug: checkpoint sync: number = ? file = base / ? / ? _fsm time = ?.? ms;Times Reported Time consuming queries #19
Day Hour Count Duration Avg duration Jul 04 14 23 300ms 13ms -
INSERT INTO uo_vuln (uo, vuln) VALUES ('268', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\x4d8b89873db8b780afd3e28b9088d507')) ON CONFLICT DO NOTHING; 2023 - 07 - 04 18:41:49.916 UTC[15] DEBUG: checkpoint sync: number = 39 file = base / 16384 / 2840_fsm time = 0.019 ms;
Date: 2023-07-04 18:41:49 Duration: 268ms Bind query: yes
-
INSERT INTO uo_vuln (uo, vuln) VALUES ('465', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xca8122caa65185af1932d1f270c25420')) ON CONFLICT DO NOTHING; 2023 - 07 - 04 18:44:29.095 UTC[15] DEBUG: checkpoint sync: number = 11 file = base / 16384 / 16925_fsm time = 0.008 ms;
Date: 2023-07-04 18:44:29 Duration: 20ms Bind query: yes
-
INSERT INTO uo_vuln (uo, vuln) VALUES ('206', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xd40a184a1ee7a14fce7520e3821ce97a')) ON CONFLICT DO NOTHING; 2023 - 07 - 04 18:43:56.092 UTC[15] DEBUG: checkpoint sync: number = 9 file = base / 16384 / 16925_fsm time = 0.002 ms;
Date: 2023-07-04 18:43:55 Duration: 9ms Bind query: yes
20 0ms 267ms 5ms 93 522ms insert into uo_vuln (uo, vuln) values (?, ( select id from vuln where hash_kind = ? and hash = ?)) on conflict do nothing; ? - 07 - 04 ? : ? : ?.? utc[?] debug: checkpoint sync: number = ? file = base / ? / ? time = ?.? ms;Times Reported Time consuming queries #20
Day Hour Count Duration Avg duration Jul 04 14 93 522ms 5ms -
INSERT INTO uo_vuln (uo, vuln) VALUES ('476', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xf2da568ac20e9b8cb3a56c483927d55a')) ON CONFLICT DO NOTHING; 2023 - 07 - 04 18:41:49.915 UTC[15] DEBUG: checkpoint sync: number = 38 file = base / 16384 / 16919 time = 0.007 ms;
Date: 2023-07-04 18:41:49 Duration: 267ms Bind query: yes
-
INSERT INTO uo_vuln (uo, vuln) VALUES ('349', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xc8947e062a3a2500bb34c3391f7edb3d')) ON CONFLICT DO NOTHING; 2023 - 07 - 04 18:49:15.522 UTC[15] DEBUG: checkpoint sync: number = 4 file = base / 16384 / 16925 time = 0.028 ms;
Date: 2023-07-04 18:49:15 Duration: 59ms Bind query: yes
-
INSERT INTO uo_vuln (uo, vuln) VALUES ('268', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xf22c40d47c7f4c27db1125374751694d')) ON CONFLICT DO NOTHING; 2023 - 07 - 04 18:46:05.056 UTC[15] DEBUG: checkpoint sync: number = 15 file = base / 16384 / 16953 time = 28.637 ms;
Date: 2023-07-04 18:46:05 Duration: 34ms Bind query: yes
Time consuming prepare
Rank Total duration Times executed Min duration Max duration Avg duration Query 1 4s402ms 472 0ms 69ms 9ms ;Times Reported Time consuming prepare #1
Day Hour Count Duration Avg duration Jul 04 14 472 4s402ms 9ms -
;
Date: 2023-07-04 18:41:24 Duration: 69ms Database: postgres
-
;
Date: 2023-07-04 18:39:05 Duration: 59ms Database: postgres
-
;
Date: 2023-07-04 18:38:59 Duration: 36ms Database: postgres
2 125ms 2,042 0ms 0ms 0ms SELECT lock FROM pg_advisory_unlock($1) lock WHERE lock = true;Times Reported Time consuming prepare #2
Day Hour Count Duration Avg duration 13 2,042 125ms 0ms -
SELECT lock FROM pg_advisory_unlock($1) lock WHERE lock = true;
Date: 2023-07-04 18:41:14 Duration: 0ms Database: postgres
-
SELECT lock FROM pg_advisory_unlock($1) lock WHERE lock = true;
Date: 2023-07-04 18:41:18 Duration: 0ms Database: postgres
-
SELECT lock FROM pg_advisory_unlock($1) lock WHERE lock = true;
Date: 2023-07-04 18:37:59 Duration: 0ms Database: postgres
3 98ms 2,223 0ms 0ms 0ms SELECT lock FROM pg_try_advisory_lock($1) lock WHERE lock = true;Times Reported Time consuming prepare #3
Day Hour Count Duration Avg duration 13 2,223 98ms 0ms -
SELECT lock FROM pg_try_advisory_lock($1) lock WHERE lock = true;
Date: 2023-07-04 18:37:58 Duration: 0ms Database: postgres
-
SELECT lock FROM pg_try_advisory_lock($1) lock WHERE lock = true;
Date: 2023-07-04 18:38:58 Duration: 0ms Database: postgres
-
SELECT lock FROM pg_try_advisory_lock($1) lock WHERE lock = true;
Date: 2023-07-04 18:35:12 Duration: 0ms Database: postgres
4 53ms 3 0ms 53ms 17ms SELECT version FROM libindex_migrations WHERE version = 1;Times Reported Time consuming prepare #4
Day Hour Count Duration Avg duration 13 3 53ms 17ms -
SELECT version FROM libindex_migrations WHERE version = 1;
Date: 2023-07-04 18:41:02 Duration: 53ms Database: postgres
-
SELECT version FROM libindex_migrations WHERE version = 1;
Date: 2023-07-04 18:37:46 Duration: 0ms Database: postgres
-
SELECT version FROM libindex_migrations WHERE version = 1;
Date: 2023-07-04 18:38:46 Duration: 0ms Database: postgres
5 47ms 79 0ms 1ms 0ms SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'vulnerability' ORDER BY id DESC;Times Reported Time consuming prepare #5
Day Hour Count Duration Avg duration 13 79 47ms 0ms -
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'vulnerability' ORDER BY id DESC;
Date: 2023-07-04 18:38:16 Duration: 1ms Database: postgres
-
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'vulnerability' ORDER BY id DESC;
Date: 2023-07-04 18:37:58 Duration: 1ms Database: postgres
-
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'vulnerability' ORDER BY id DESC;
Date: 2023-07-04 18:37:58 Duration: 1ms Database: postgres
6 22ms 78 0ms 8ms 0ms INSERT INTO update_operation (updater, fingerprint, kind) VALUES ($1, $2, 'vulnerability') RETURNING id, ref;Times Reported Time consuming prepare #6
Day Hour Count Duration Avg duration 13 78 22ms 0ms -
INSERT INTO update_operation (updater, fingerprint, kind) VALUES ($1, $2, 'vulnerability') RETURNING id, ref;
Date: 2023-07-04 18:36:16 Duration: 8ms Database: postgres
-
INSERT INTO update_operation (updater, fingerprint, kind) VALUES ($1, $2, 'vulnerability') RETURNING id, ref;
Date: 2023-07-04 18:35:16 Duration: 0ms Database: postgres
-
INSERT INTO update_operation (updater, fingerprint, kind) VALUES ($1, $2, 'vulnerability') RETURNING id, ref;
Date: 2023-07-04 18:37:59 Duration: 0ms Database: postgres
7 17ms 83 0ms 0ms 0ms INSERT INTO updater_status (;Times Reported Time consuming prepare #7
Day Hour Count Duration Avg duration 13 83 17ms 0ms -
INSERT INTO updater_status (;
Date: 2023-07-04 18:35:15 Duration: 0ms Database: postgres
-
INSERT INTO updater_status (;
Date: 2023-07-04 18:35:27 Duration: 0ms Database: postgres
-
INSERT INTO updater_status (;
Date: 2023-07-04 18:36:41 Duration: 0ms Database: postgres
8 0ms 3 0ms 0ms 0ms SELECT version FROM notifier_migrations WHERE version = 1;Times Reported Time consuming prepare #8
Day Hour Count Duration Avg duration 13 3 0ms 0ms -
SELECT version FROM notifier_migrations WHERE version = 1;
Date: 2023-07-04 18:37:47 Duration: 0ms Database: postgres
-
SELECT version FROM notifier_migrations WHERE version = 1;
Date: 2023-07-04 18:41:03 Duration: 0ms Database: postgres
-
SELECT version FROM notifier_migrations WHERE version = 1;
Date: 2023-07-04 18:38:47 Duration: 0ms Database: postgres
9 0ms 3 0ms 0ms 0ms SELECT version FROM libvuln_migrations WHERE version = 1;Times Reported Time consuming prepare #9
Day Hour Count Duration Avg duration 13 3 0ms 0ms -
SELECT version FROM libvuln_migrations WHERE version = 1;
Date: 2023-07-04 18:41:02 Duration: 0ms Database: postgres
-
SELECT version FROM libvuln_migrations WHERE version = 1;
Date: 2023-07-04 18:37:47 Duration: 0ms Database: postgres
-
SELECT version FROM libvuln_migrations WHERE version = 1;
Date: 2023-07-04 18:38:47 Duration: 0ms Database: postgres
10 0ms 4 0ms 0ms 0ms SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'enrichment' ORDER BY id DESC;Times Reported Time consuming prepare #10
Day Hour Count Duration Avg duration 13 4 0ms 0ms -
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'enrichment' ORDER BY id DESC;
Date: 2023-07-04 18:41:23 Duration: 0ms Database: postgres
-
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'enrichment' ORDER BY id DESC;
Date: 2023-07-04 18:41:10 Duration: 0ms Database: postgres
-
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'enrichment' ORDER BY id DESC;
Date: 2023-07-04 18:35:15 Duration: 0ms Database: postgres
11 0ms 3 0ms 0ms 0ms SELECT version FROM libvuln_migrations WHERE version = 2;Times Reported Time consuming prepare #11
Day Hour Count Duration Avg duration 13 3 0ms 0ms -
SELECT version FROM libvuln_migrations WHERE version = 2;
Date: 2023-07-04 18:41:02 Duration: 0ms Database: postgres
-
SELECT version FROM libvuln_migrations WHERE version = 2;
Date: 2023-07-04 18:38:47 Duration: 0ms Database: postgres
-
SELECT version FROM libvuln_migrations WHERE version = 2;
Date: 2023-07-04 18:37:47 Duration: 0ms Database: postgres
12 0ms 3 0ms 0ms 0ms SELECT version FROM libindex_migrations WHERE version = 2;Times Reported Time consuming prepare #12
Day Hour Count Duration Avg duration 13 3 0ms 0ms -
SELECT version FROM libindex_migrations WHERE version = 2;
Date: 2023-07-04 18:41:02 Duration: 0ms Database: postgres
-
SELECT version FROM libindex_migrations WHERE version = 2;
Date: 2023-07-04 18:37:46 Duration: 0ms Database: postgres
-
SELECT version FROM libindex_migrations WHERE version = 2;
Date: 2023-07-04 18:38:46 Duration: 0ms Database: postgres
13 0ms 3 0ms 0ms 0ms SELECT version FROM libvuln_migrations WHERE version = 8;Times Reported Time consuming prepare #13
Day Hour Count Duration Avg duration 13 3 0ms 0ms -
SELECT version FROM libvuln_migrations WHERE version = 8;
Date: 2023-07-04 18:41:03 Duration: 0ms Database: postgres
-
SELECT version FROM libvuln_migrations WHERE version = 8;
Date: 2023-07-04 18:37:47 Duration: 0ms Database: postgres
-
SELECT version FROM libvuln_migrations WHERE version = 8;
Date: 2023-07-04 18:38:47 Duration: 0ms Database: postgres
14 0ms 3 0ms 0ms 0ms SELECT version FROM notifier_migrations WHERE version = 2;Times Reported Time consuming prepare #14
Day Hour Count Duration Avg duration 13 3 0ms 0ms -
SELECT version FROM notifier_migrations WHERE version = 2;
Date: 2023-07-04 18:37:47 Duration: 0ms Database: postgres
-
SELECT version FROM notifier_migrations WHERE version = 2;
Date: 2023-07-04 18:41:03 Duration: 0ms Database: postgres
-
SELECT version FROM notifier_migrations WHERE version = 2;
Date: 2023-07-04 18:38:47 Duration: 0ms Database: postgres
15 0ms 3 0ms 0ms 0ms SELECT version FROM libvuln_migrations WHERE version = 9;Times Reported Time consuming prepare #15
Day Hour Count Duration Avg duration 13 3 0ms 0ms -
SELECT version FROM libvuln_migrations WHERE version = 9;
Date: 2023-07-04 18:37:47 Duration: 0ms Database: postgres
-
SELECT version FROM libvuln_migrations WHERE version = 9;
Date: 2023-07-04 18:41:03 Duration: 0ms Database: postgres
-
SELECT version FROM libvuln_migrations WHERE version = 9;
Date: 2023-07-04 18:38:47 Duration: 0ms Database: postgres
16 0ms 3 0ms 0ms 0ms SELECT version FROM libindex_migrations WHERE version = 3;Times Reported Time consuming prepare #16
Day Hour Count Duration Avg duration 13 3 0ms 0ms -
SELECT version FROM libindex_migrations WHERE version = 3;
Date: 2023-07-04 18:37:46 Duration: 0ms Database: postgres
-
SELECT version FROM libindex_migrations WHERE version = 3;
Date: 2023-07-04 18:41:02 Duration: 0ms Database: postgres
-
SELECT version FROM libindex_migrations WHERE version = 3;
Date: 2023-07-04 18:38:46 Duration: 0ms Database: postgres
17 0ms 3 0ms 0ms 0ms SELECT version FROM libvuln_migrations WHERE version = 3;Times Reported Time consuming prepare #17
Day Hour Count Duration Avg duration 13 3 0ms 0ms -
SELECT version FROM libvuln_migrations WHERE version = 3;
Date: 2023-07-04 18:41:02 Duration: 0ms Database: postgres
-
SELECT version FROM libvuln_migrations WHERE version = 3;
Date: 2023-07-04 18:38:47 Duration: 0ms Database: postgres
-
SELECT version FROM libvuln_migrations WHERE version = 3;
Date: 2023-07-04 18:37:47 Duration: 0ms Database: postgres
18 0ms 3 0ms 0ms 0ms SELECT version FROM libindex_migrations WHERE version = 4;Times Reported Time consuming prepare #18
Day Hour Count Duration Avg duration 13 3 0ms 0ms -
SELECT version FROM libindex_migrations WHERE version = 4;
Date: 2023-07-04 18:37:46 Duration: 0ms Database: postgres
-
SELECT version FROM libindex_migrations WHERE version = 4;
Date: 2023-07-04 18:41:02 Duration: 0ms Database: postgres
-
SELECT version FROM libindex_migrations WHERE version = 4;
Date: 2023-07-04 18:38:46 Duration: 0ms Database: postgres
19 0ms 3 0ms 0ms 0ms SELECT version FROM libvuln_migrations WHERE version = 10;Times Reported Time consuming prepare #19
Day Hour Count Duration Avg duration 13 3 0ms 0ms -
SELECT version FROM libvuln_migrations WHERE version = 10;
Date: 2023-07-04 18:37:47 Duration: 0ms Database: postgres
-
SELECT version FROM libvuln_migrations WHERE version = 10;
Date: 2023-07-04 18:41:03 Duration: 0ms Database: postgres
-
SELECT version FROM libvuln_migrations WHERE version = 10;
Date: 2023-07-04 18:38:47 Duration: 0ms Database: postgres
20 0ms 3 0ms 0ms 0ms SELECT version FROM libindex_migrations WHERE version = 5;Times Reported Time consuming prepare #20
Day Hour Count Duration Avg duration 13 3 0ms 0ms -
SELECT version FROM libindex_migrations WHERE version = 5;
Date: 2023-07-04 18:41:02 Duration: 0ms Database: postgres
-
SELECT version FROM libindex_migrations WHERE version = 5;
Date: 2023-07-04 18:37:46 Duration: 0ms Database: postgres
-
SELECT version FROM libindex_migrations WHERE version = 5;
Date: 2023-07-04 18:38:46 Duration: 0ms Database: postgres
Time consuming bind
Rank Total duration Times executed Min duration Max duration Avg duration Query 1 1m14s 5,658,125 0ms 76ms 0ms ;Times Reported Time consuming bind #1
Day Hour Count Duration Avg duration Jul 04 14 5,658,125 1m14s 0ms -
;
Date: 2023-07-04 18:39:06 Duration: 76ms Database: postgres parameters: $1 = 'md5', $2 = '\x1766bf7bc5755e220e1fff89476de0cd', $3 = 'CVE-2019-14904', $4 = 'alpine-main-v3.12-updater', $5 = '', $6 = '0001-01-01 00:00:00+00', $7 = 'https://www.cve.org/CVERecord?id=CVE-2019-14904', $8 = '', $9 = 'Unknown', $10 = 'ansible', $11 = '', $12 = '', $13 = '', $14 = 'source', $15 = 'alpine', $16 = 'Alpine Linux', $17 = '', $18 = '', $19 = '3.12', $20 = '', $21 = '', $22 = 'Alpine Linux v3.12', $23 = '', $24 = '', $25 = '', $26 = '2.9.3-r0', $27 = 'invalid', $28 = NULL, $29 = '{}', $30 = '{}', $31 = 'md5', $32 = '\x48151c8a7ee1c851de7ca754577f0bff', $33 = 'CVE-2019-14905', $34 = 'alpine-main-v3.12-updater', $35 = '', $36 = '0001-01-01 00:00:00+00', $37 = 'https://www.cve.org/CVERecord?id=CVE-2019-14905', $38 = '', $39 = 'Unknown', $40 = 'ansible', $41 = '', $42 = '', $43 = '', $44 = 'source', $45 = 'alpine', $46 = 'Alpine Linux', $47 = '', $48 = '', $49 = '3.12', $50 = '', $51 = '', $52 = 'Alpine Linux v3.12', $53 = '', $54 = '', $55 = '', $56 = '2.9.3-r0', $57 = 'invalid', $58 = NULL, $59 = '{}', $60 = '{}', $61 = 'md5', $62 = '\xf64d370d688b5da600d1e15e38156816', $63 = 'CVE-2020-1737', $64 = 'alpine-main-v3.12-updater', $65 = '', $66 = '0001-01-01 00:00:00+00', $67 = 'https://www.cve.org/CVERecord?id=CVE-2020-1737', $68 = '', $69 = 'Unknown', $70 = 'ansible', $71 = '', $72 = '', $73 = '', $74 = 'source', $75 = 'alpine', $76 = 'Alpine Linux', $77 = '', $78 = '', $79 = '3.12', $80 = '', $81 = '', $82 = 'Alpine Linux v3.12', $83 = '', $84 = '', $85 = '', $86 = '2.9.6-r0', $87 = 'invalid', $88 = NULL, $89 = '{}', $90 = '{}', $91 = 'md5', $92 = '\xb86c2a2d102e0201c2a66620a1d4c5a8', $93 = 'CVE-2018-10875', $94 = 'alpine-main-v3.12-updater', $95 = '', $96 = '0001-01-01 00:00:00+00', $97 = 'https://www.cve.org/CVERecord?id=CVE-2018-10875', $98 = '', $99 = 'Unknown', $100 = 'ansible', $101 = '', $102 = '', $103 = '', $104 = 'source', $105 = 'alpine', $106 = 'Alpine Linux', $107 = '', $108 = '', $109 = '3.12', $110 = '', $111 = '', $112 = 'Alpine Linux v3.12', $113 = '', $114 = '', $115 = '', $116 = '2.6.3-r0', $117 = 'invalid', $118 = NULL, $119 = '{}', $120 = '{}', $121 = 'md5', $122 = '\xccd446adeafcff0071a15d69cc101705', $123 = 'CVE-2019-10206', $124 = 'alpine-main-v3.12-updater', $125 = '', $126 = '0001-01-01 00:00:00+00', $127 = 'https://www.cve.org/CVERecord?id=CVE-2019-10206', $128 = '', $129 = 'Unknown', $130 = 'ansible', $131 = '', $132 = '', $133 = '', $134 = 'source', $135 = 'alpine', $136 = 'Alpine Linux', $137 = '', $138 = '', $139 = '3.12', $140 = '', $141 = '', $142 = 'Alpine Linux v3.12', $143 = '', $144 = '', $145 = '', $146 = '2.8.4-r0', $147 = 'invalid', $148 = NULL, $149 = '{}', $150 = '{}', $151 = 'md5', $152 = '\xe4922845614be1c0eaefb2dcc29e9146', $153 = 'CVE-2019-10217', $154 = 'alpine-main-v3.12-updater', $155 = '', $156 = '0001-01-01 00:00:00+00', $157 = 'https://www.cve.org/CVERecord?id=CVE-2019-10217', $158 = '', $159 = 'Unknown', $160 = 'ansible', $161 = '', $162 = '', $163 = '', $164 = 'source', $165 = 'alpine', $166 = 'Alpine Linux', $167 = '', $168 = '', $169 = '3.12', $170 = '', $171 = '', $172 = 'Alpine Linux v3.12', $173 = '', $174 = '', $175 = '', $176 = '2.8.4-r0', $177 = 'invalid', $178 = NULL, $179 = '{}', $180 = '{}', $181 = 'md5', $182 = '\x559a7c32be3b2a98d3ce87bc14b04c60', $183 = 'CVE-2019-14856', $184 = 'alpine-main-v3.12-updater', $185 = '', $186 = '0001-01-01 00:00:00+00', $187 = 'https://www.cve.org/CVERecord?id=CVE-2019-14856', $188 = '', $189 = 'Unknown', $190 = 'ansible', $191 = '', $192 = '', $193 = '', $194 = 'source', $195 = 'alpine', $196 = 'Alpine Linux', $197 = '', $198 = '', $199 = '3.12', $200 = '', $201 = '', $202 = 'Alpine Linux v3.12', $203 = '', $204 = '', $205 = '', $206 = '2.8.6-r0', $207 = 'invalid', $208 = NULL, $209 = '{}', $210 = '{}', $211 = 'md5', $212 = '\x8f03211fcfb86bd890cb08331eab1d15', $213 = 'CVE-2019-14858', $214 = 'alpine-main-v3.12-updater', $215 = '', $216 = '0001-01-01 00:00:00+00', $217 = 'https://www.cve.org/CVERecord?id=CVE-2019-14858', $218 = '', $219 = 'Unknown', $220 = 'ansible', $221 = '', $222 = '', $223 = '', $224 = 'source', $225 = 'alpine', $226 = 'Alpine Linux', $227 = '', $228 = '', $229 = '3.12', $230 = '', $231 = '', $232 = 'Alpine Linux v3.12', $233 = '', $234 = '', $235 = '', $236 = '2.8.6-r0', $237 = 'invalid', $238 = NULL, $239 = '{}', $240 = '{}', $241 = 'md5', $242 = '\x76fdd2af8f8ba6ee8a42d9cfc5327d30', $243 = 'CVE-2019-14846', $244 = 'alpine-main-v3.12-updater', $245 = '', $246 = '0001-01-01 00:00:00+00', $247 = 'https://www.cve.org/CVERecord?id=CVE-2019-14846', $248 = '', $249 = 'Unknown', $250 = 'ansible', $251 = '', $252 = '', $253 = '', $254 = 'source', $255 = 'alpine', $256 = 'Alpine Linux', $257 = '', $258 = '', $259 = '3.12', $260 = '', $261 = '', $262 = 'Alpine Linux v3.12', $263 = '', $264 = '', $265 = '', $266 = '2.9.13-r0', $267 = 'invalid', $268 = NULL, $269 = '{}', $270 = '{}', $271 = 'md5', $272 = '\x4453623f57fc3e419a8b1cf4821ddcb8', $273 = 'CVE-2020-14330', $274 = 'alpine-main-v3.12-updater', $275 = '', $276 = '0001-01-01 00:00:00+00', $277 = 'https://www.cve.org/CVERecord?id=CVE-2020-14330', $278 = '', $279 = 'Unknown', $280 = 'ansible', $281 = '', $282 = '', $283 = '', $284 = 'source', $285 = 'alpine', $286 = 'Alpine Linux', $287 = '', $288 = '', $289 = '3.12', $290 = '', $291 = '', $292 = 'Alpine Linux v3.12', $293 = '', $294 = '', $295 = '', $296 = '2.9.13-r0', $297 = 'invalid', $298 = NULL, $299 = '{}', $300 = '{}', $301 = 'md5', $302 = '\x6450f5c5cdfedb6069b550560ea297f0', $303 = 'CVE-2020-14332', $304 = 'alpine-main-v3.12-updater', $305 = '', $306 = '0001-01-01 00:00:00+00', $307 = 'https://www.cve.org/CVERecord?id=CVE-2020-14332', $308 = '', $309 = 'Unknown', $310 = 'ansible', $311 = '', $312 = '', $313 = '', $314 = 'source', $315 = 'alpine', $316 = 'Alpine Linux', $317 = '', $318 = '', $319 = '3.12', $320 = '', $321 = '', $322 = 'Alpine Linux v3.12', $323 = '', $324 = '', $325 = '', $326 = '2.9.13-r0', $327 = 'invalid', $328 = NULL, $329 = '{}', $330 = '{}', $331 = 'md5', $332 = '\xd12c8bacf254b7d720078fd042a55395', $333 = 'CVE-2020-14365', $334 = 'alpine-main-v3.12-updater', $335 = '', $336 = '0001-01-01 00:00:00+00', $337 = 'https://www.cve.org/CVERecord?id=CVE-2020-14365', $338 = '', $339 = 'Unknown', $340 = 'ansible', $341 = '', $342 = '', $343 = '', $344 = 'source', $345 = 'alpine', $346 = 'Alpine Linux', $347 = '', $348 = '', $349 = '3.12', $350 = '', $351 = '', $352 = 'Alpine Linux v3.12', $353 = '', $354 = '', $355 = '', $356 = '2.9.13-r0', $357 = 'invalid', $358 = NULL, $359 = '{}', $360 = '{}', $361 = 'md5', $362 = '\x139724bc71da06c05a23461bf1a5a9eb', $363 = 'CVE-2018-16876', $364 = 'alpine-main-v3.12-updater', $365 = '', $366 = '0001-01-01 00:00:00+00', $367 = 'https://www.cve.org/CVERecord?id=CVE-2018-16876', $368 = '', $369 = 'Unknown', $370 = 'ansible', $371 = '', $372 = '', $373 = '', $374 = 'source', $375 = 'alpine', $376 = 'Alpine Linux', $377 = '', $378 = '', $379 = '3.12', $380 = '', $381 = '', $382 = 'Alpine Linux v3.12', $383 = '', $384 = '', $385 = '', $386 = '2.7.9-r0', $387 = 'invalid', $388 = NULL, $389 = '{}', $390 = '{}', $391 = 'md5', $392 = '\x48b697bb1088be5d95009715f7020ca6', $393 = 'CVE-2019-10156', $394 = 'alpine-main-v3.12-updater', $395 = '', $396 = '0001-01-01 00:00:00+00', $397 = 'https://www.cve.org/CVERecord?id=CVE-2019-10156', $398 = '', $399 = 'Unknown', $400 = 'ansible', $401 = '', $402 = '', $403 = '', $404 = 'source', $405 = 'alpine', $406 = 'Alpine Linux', $407 = '', $408 = '', $409 = '3.12', $410 = '', $411 = '', $412 = 'Alpine Linux v3.12', $413 = '', $414 = '', $415 = '', $416 = '2.8.2-r0', $417 = 'invalid', $418 = NULL, $419 = '{}', $420 = '{}', $421 = 'md5', $422 = '\x254ffe9fd2856c3356f324273939591b', $423 = 'CVE-2021-20191', $424 = 'alpine-main-v3.12-updater', $425 = '', $426 = '0001-01-01 00:00:00+00', $427 = 'https://www.cve.org/CVERecord?id=CVE-2021-20191', $428 = '', $429 = 'Unknown', $430 = 'ansible', $431 = '', $432 = '', $433 = '', $434 = 'source', $435 = 'alpine', $436 = 'Alpine Linux', $437 = '', $438 = '', $439 = '3.12', $440 = '', $441 = '', $442 = 'Alpine Linux v3.12', $443 = '', $444 = '', $445 = '', $446 = '2.9.18-r0', $447 = 'invalid', $448 = NULL, $449 = '{}', $450 = '{}', $451 = 'md5', $452 = '\x0898f10182b639b4c083a9d7b2b51e13', $453 = 'CVE-2019-3828', $454 = 'alpine-main-v3.12-updater', $455 = '', $456 = '0001-01-01 00:00:00+00', $457 = 'https://www.cve.org/CVERecord?id=CVE-2019-3828', $458 = '', $459 = 'Unknown', $460 = 'ansible', $461 = '', $462 = '', $463 = '', $464 = 'source', $465 = 'alpine', $466 = 'Alpine Linux', $467 = '', $468 = '', $469 = '3.12', $470 = '', $471 = '', $472 = 'Alpine Linux v3.12', $473 = '', $474 = '', $475 = '', $476 = '2.9.7-r0', $477 = 'invalid', $478 = NULL, $479 = '{}', $480 = '{}', $481 = 'md5', $482 = '\xedf6bfda8fbab0e674de9be42af240be', $483 = 'CVE-2020-1733', $484 = 'alpine-main-v3.12-updater', $485 = '', $486 = '0001-01-01 00:00:00+00', $487 = 'https://www.cve.org/CVERecord?id=CVE-2020-1733', $488 = '', $489 = 'Unknown', $490 = 'ansible', $491 = '', $492 = '', $493 = '', $494 = 'source', $495 = 'alpine', $496 = 'Alpine Linux', $497 = '', $498 = '', $499 = '3.12', $500 = '', $501 = '', $502 = 'Alpine Linux v3.12', $503 = '', $504 = '', $505 = '', $506 = '2.9.7-r0', $507 = 'invalid', $508 = NULL, $509 = '{}', $510 = '{}', $511 = 'md5', $512 = '\x8308b566d2e15c25723fedfd25579edd', $513 = 'CVE-2020-1739', $514 = 'alpine-main-v3.12-updater', $515 = '', $516 = '0001-01-01 00:00:00+00', $517 = 'https://www.cve.org/CVERecord?id=CVE-2020-1739', $518 = '', $519 = 'Unknown', $520 = 'ansible', $521 = '', $522 = '', $523 = '', $524 = 'source', $525 = 'alpine', $526 = 'Alpine Linux', $527 = '', $528 = '', $529 = '3.12', $530 = '', $531 = '', $532 = 'Alpine Linux v3.12', $533 = '', $534 = '', $535 = '', $536 = '2.9.7-r0', $537 = 'invalid', $538 = NULL, $539 = '{}', $540 = '{}', $541 = 'md5', $542 = '\x0a14386789f411bffb64b938a8df3323', $543 = 'CVE-2020-1740', $544 = 'alpine-main-v3.12-updater', $545 = '', $546 = '0001-01-01 00:00:00+00', $547 = 'https://www.cve.org/CVERecord?id=CVE-2020-1740', $548 = '', $549 = 'Unknown', $550 = 'ansible', $551 = '', $552 = '', $553 = '', $554 = 'source', $555 = 'alpine', $556 = 'Alpine Linux', $557 = '', $558 = '', $559 = '3.12', $560 = '', $561 = '', $562 = 'Alpine Linux v3.12', $563 = '', $564 = '', $565 = '', $566 = '2.9.7-r0', $567 = 'invalid', $568 = NULL, $569 = '{}', $570 = '{}', $571 = 'md5', $572 = '\xa4bfac6a7ef6d75b2218ba594c9e94d2', $573 = 'CVE-2020-1746', $574 = 'alpine-main-v3.12-updater', $575 = '', $576 = '0001-01-01 00:00:00+00', $577 = 'https://www.cve.org/CVERecord?id=CVE-2020-1746', $578 = '', $579 = 'Unknown', $580 = 'ansible', $581 = '', $582 = '', $583 = '', $584 = 'source', $585 = 'alpine', $586 = 'Alpine Linux', $587 = '', $588 = '', $589 = '3.12', $590 = '', $591 = '', $592 = 'Alpine Linux v3.12', $593 = '', $594 = '', $595 = '', $596 = '2.9.7-r0', $597 = 'invalid', $598 = NULL, $599 = '{}', $600 = '{}', $601 = 'md5', $602 = '\xa06277d1552e85889ab6ce0af6aed86d', $603 = 'CVE-2020-10691', $604 = 'alpine-main-v3.12-updater', $605 = '', $606 = '0001-01-01 00:00:00+00', $607 = 'https://www.cve.org/CVERecord?id=CVE-2020-10691', $608 = '', $609 = 'Unknown', $610 = 'ansible', $611 = '', $612 = '', $613 = '', $614 = 'source', $615 = 'alpine', $616 = 'Alpine Linux', $617 = '', $618 = '', $619 = '3.12', $620 = '', $621 = '', $622 = 'Alpine Linux v3.12', $623 = '', $624 = '', $625 = '', $626 = '2.9.7-r0', $627 = 'invalid', $628 = NULL, $629 = '{}', $630 = '{}', $631 = 'md5', $632 = '\x6a565fbcfc7d6d4f04444e19880395f8', $633 = 'CVE-2018-17189', $634 = 'alpine-main-v3.12-updater', $635 = '', $636 = '0001-01-01 00:00:00+00', $637 = 'https://www.cve.org/CVERecord?id=CVE-2018-17189', $638 = '', $639 = 'Unknown', $640 = 'apache2', $641 = '', $642 = '', $643 = '', $644 = 'source', $645 = 'alpine', $646 = 'Alpine Linux', $647 = '', $648 = '', $649 = '3.12', $650 = '', $651 = '', $652 = 'Alpine Linux v3.12', $653 = '', $654 = '', $655 = '', $656 = '2.4.38-r0', $657 = 'invalid', $658 = NULL, $659 = '{}', $660 = '{}', $661 = 'md5', $662 = '\xf9054b1a1242de62e4f48bb84fac1f96', $663 = 'CVE-2018-17199', $664 = 'alpine-main-v3.12-updater', $665 = '', $666 = '0001-01-01 00:00:00+00', $667 = 'https://www.cve.org/CVERecord?id=CVE-2018-17199', $668 = '', $669 = 'Unknown', $670 = 'apache2', $671 = '', $672 = '', $673 = '', $674 = 'source', $675 = 'alpine', $676 = 'Alpine Linux', $677 = '', $678 = '', $679 = '3.12', $680 = '', $681 = '', $682 = 'Alpine Linux v3.12', $683 = '', $684 = '', $685 = '', $686 = '2.4.38-r0', $687 = 'invalid', $688 = NULL, $689 = '{}', $690 = '{}', $691 = 'md5', $692 = '\x1da643e4c535dd90aafcfc3fd9809cca', $693 = 'CVE-2019-0190', $694 = 'alpine-main-v3.12-updater', $695 = '', $696 = '0001-01-01 00:00:00+00', $697 = 'https://www.cve.org/CVERecord?id=CVE-2019-0190', $698 = '', $699 = 'Unknown', $700 = 'apache2', $701 = '', $702 = '', $703 = '', $704 = 'source', $705 = 'alpine', $706 = 'Alpine Linux', $707 = '', $708 = '', $709 = '3.12', $710 = '', $711 = '', $712 = 'Alpine Linux v3.12', $713 = '', $714 = '', $715 = '', $716 = '2.4.38-r0', $717 = 'invalid', $718 = NULL, $719 = '{}', $720 = '{}', $721 = 'md5', $722 = '\xb09b940b3f43dca5012139c58e9bfeb1', $723 = 'CVE-2021-42013', $724 = 'alpine-main-v3.12-updater', $725 = '', $726 = '0001-01-01 00:00:00+00', $727 = 'https://www.cve.org/CVERecord?id=CVE-2021-42013', $728 = '', $729 = 'Unknown', $730 = 'apache2', $731 = '', $732 = '', $733 = '', $734 = 'source', $735 = 'alpine', $736 = 'Alpine Linux', $737 = '', $738 = '', $739 = '3.12', $740 = '', $741 = '', $742 = 'Alpine Linux v3.12', $743 = '', $744 = '', $745 = '', $746 = '2.4.51-r0', $747 = 'invalid', $748 = NULL, $749 = '{}', $750 = '{}', $751 = 'md5', $752 = '\x9fa7c48c8496211dcf71a9d1fd524195', $753 = 'CVE-2017-3167', $754 = 'alpine-main-v3.12-updater', $755 = '', $756 = '0001-01-01 00:00:00+00', $757 = 'https://www.cve.org/CVERecord?id=CVE-2017-3167', $758 = '', $759 = 'Unknown', $760 = 'apache2', $761 = '', $762 = '', $763 = '', $764 = 'source', $765 = 'alpine', $766 = 'Alpine Linux', $767 = '', $768 = '', $769 = '3.12', $770 = '', $771 = '', $772 = 'Alpine Linux v3.12', $773 = '', $774 = '', $775 = '', $776 = '2.4.26-r0', $777 = 'invalid', $778 = NULL, $779 = '{}', $780 = '{}', $781 = 'md5', $782 = '\x8f8105370ddad8b01effcf7625114ff5', $783 = 'CVE-2017-3169', $784 = 'alpine-main-v3.12-updater', $785 = '', $786 = '0001-01-01 00:00:00+00', $787 = 'https://www.cve.org/CVERecord?id=CVE-2017-3169', $788 = '', $789 = 'Unknown', $790 = 'apache2', $791 = '', $792 = '', $793 = '', $794 = 'source', $795 = 'alpine', $796 = 'Alpine Linux', $797 = '', $798 = '', $799 = '3.12', $800 = '', $801 = '', $802 = 'Alpine Linux v3.12', $803 = '', $804 = '', $805 = '', $806 = '2.4.26-r0', $807 = 'invalid', $808 = NULL, $809 = '{}', $810 = '{}', $811 = 'md5', $812 = '\xac14acc42baa953538792cdd6a4fd019', $813 = 'CVE-2017-7659', $814 = 'alpine-main-v3.12-updater', $815 = '', $816 = '0001-01-01 00:00:00+00', $817 = 'https://www.cve.org/CVERecord?id=CVE-2017-7659', $818 = '', $819 = 'Unknown', $820 = 'apache2', $821 = '', $822 = '', $823 = '', $824 = 'source', $825 = 'alpine', $826 = 'Alpine Linux', $827 = '', $828 = '', $829 = '3.12', $830 = '', $831 = '', $832 = 'Alpine Linux v3.12', $833 = '', $834 = '', $835 = '', $836 = '2.4.26-r0', $837 = 'invalid', $838 = NULL, $839 = '{}', $840 = '{}', $841 = 'md5', $842 = '\x3ce4c2816a8101e846fec2e5b01a92e6', $843 = 'CVE-2017-7668', $844 = 'alpine-main-v3.12-updater', $845 = '', $846 = '0001-01-01 00:00:00+00', $847 = 'https://www.cve.org/CVERecord?id=CVE-2017-7668', $848 = '', $849 = 'Unknown', $850 = 'apache2', $851 = '', $852 = '', $853 = '', $854 = 'source', $855 = 'alpine', $856 = 'Alpine Linux', $857 = '', $858 = '', $859 = '3.12', $860 = '', $861 = '', $862 = 'Alpine Linux v3.12', $863 = '', $864 = '', $865 = '', $866 = '2.4.26-r0', $867 = 'invalid', $868 = NULL, $869 = '{}', $870 = '{}', $871 = 'md5', $872 = '\x0dd903d11dfbb7b2d1e61bfab9ebf894', $873 = 'CVE-2017-7679', $874 = 'alpine-main-v3.12-updater', $875 = '', $876 = '0001-01-01 00:00:00+00', $877 = 'https://www.cve.org/CVERecord?id=CVE-2017-7679', $878 = '', $879 = 'Unknown', $880 = 'apache2', $881 = '', $882 = '', $883 = '', $884 = 'source', $885 = 'alpine', $886 = 'Alpine Linux', $887 = '', $888 = '', $889 = '3.12', $890 = '', $891 = '', $892 = 'Alpine Linux v3.12', $893 = '', $894 = '', $895 = '', $896 = '2.4.26-r0', $897 = 'invalid', $898 = NULL, $899 = '{}', $900 = '{}', $901 = 'md5', $902 = '\x594fa28a5f0f6ec1e7b6bae93006a9a6', $903 = 'CVE-2019-0196', $904 = 'alpine-main-v3.12-updater', $905 = '', $906 = '0001-01-01 00:00:00+00', $907 = 'https://www.cve.org/CVERecord?id=CVE-2019-0196', $908 = '', $909 = 'Unknown', $910 = 'apache2', $911 = '', $912 = '', $913 = '', $914 = 'source', $915 = 'alpine', $916 = 'Alpine Linux', $917 = '', $918 = '', $919 = '3.12', $920 = '', $921 = '', $922 = 'Alpine Linux v3.12', $923 = '', $924 = '', $925 = '', $926 = '2.4.39-r0', $927 = 'invalid', $928 = NULL, $929 = '{}', $930 = '{}', $931 = 'md5', $932 = '\xa5abc2b27e848748789cf63cc5b478ed', $933 = 'CVE-2019-0197', $934 = 'alpine-main-v3.12-updater', $935 = '', $936 = '0001-01-01 00:00:00+00', $937 = 'https://www.cve.org/CVERecord?id=CVE-2019-0197', $938 = '', $939 = 'Unknown', $940 = 'apache2', $941 = '', $942 = '', $943 = '', $944 = 'source', $945 = 'alpine', $946 = 'Alpine Linux', $947 = '', $948 = '', $949 = '3.12', $950 = '', $951 = '', $952 = 'Alpine Linux v3.12', $953 = '', $954 = '', $955 = '', $956 = '2.4.39-r0', $957 = 'invalid', $958 = NULL, $959 = '{}', $960 = '{}', $961 = 'md5', $962 = '\x04263ea7be8e9c624c9e3793d6cab8f5', $963 = 'CVE-2019-0211', $964 = 'alpine-main-v3.12-updater', $965 = '', $966 = '0001-01-01 00:00:00+00', $967 = 'https://www.cve.org/CVERecord?id=CVE-2019-0211', $968 = '', $969 = 'Unknown', $970 = 'apache2', $971 = '', $972 = '', $973 = '', $974 = 'source', $975 = 'alpine', $976 = 'Alpine Linux', $977 = '', $978 = '', $979 = '3.12', $980 = '', $981 = '', $982 = 'Alpine Linux v3.12', $983 = '', $984 = '', $985 = '', $986 = '2.4.39-r0', $987 = 'invalid', $988 = NULL, $989 = '{}', $990 = '{}', $991 = 'md5', $992 = '\xb133476de4767023a3ee4714d6e38a1e', $993 = 'CVE-2019-0215', $994 = 'alpine-main-v3.12-updater', $995 = '', $996 = '0001-01-01 00:00:00+00', $997 = 'https://www.cve.org/CVERecord?id=CVE-2019-0215', $998 = '', $999 = 'Unknown', $1000 = 'apache2', $1001 = '', $1002 = '', $1003 = '', $1004 = 'source', $1005 = 'alpine', $1006 = 'Alpine Linux', $1007 = '', $1008 = '', $1009 = '3.12', $1010 = '', $1011 = '', $1012 = 'Alpine Linux v3.12', $1013 = '', $1014 = '', $1015 = '', $1016 = '2.4.39-r0', $1017 = 'invalid', $1018 = NULL, $1019 = '{}', $1020 = '{}', $1021 = 'md5', $1022 = '\x78c4228a6c333b0db54bf42bd4783425', $1023 = 'CVE-2019-0217', $1024 = 'alpine-main-v3.12-updater', $1025 = '', $1026 = '0001-01-01 00:00:00+00', $1027 = 'https://www.cve.org/CVERecord?id=CVE-2019-0217', $1028 = '', $1029 = 'Unknown', $1030 = 'apache2', $1031 = '', $1032 = '', $1033 = '', $1034 = 'source', $1035 = 'alpine', $1036 = 'Alpine Linux', $1037 = '', $1038 = '', $1039 = '3.12', $1040 = '', $1041 = '', $1042 = 'Alpine Linux v3.12', $1043 = '', $1044 = '', $1045 = '', $1046 = '2.4.39-r0', $1047 = 'invalid', $1048 = NULL, $1049 = '{}', $1050 = '{}', $1051 = 'md5', $1052 = '\x14938ffd6b340831fb679dc4e50cd81e', $1053 = 'CVE-2019-0220', $1054 = 'alpine-main-v3.12-updater', $1055 = '', $1056 = '0001-01-01 00:00:00+00', $1057 = 'https://www.cve.org/CVERecord?id=CVE-2019-0220', $1058 = '', $1059 = 'Unknown', $1060 = 'apache2', $1061 = '', $1062 = '', $1063 = '', $1064 = 'source', $1065 = 'alpine', $1066 = 'Alpine Linux', $1067 = '', $1068 = '', $1069 = '3.12', $1070 = '', $1071 = '', $1072 = 'Alpine Linux v3.12', $1073 = '', $1074 = '', $1075 = '', $1076 = '2.4.39-r0', $1077 = 'invalid', $1078 = NULL, $1079 = '{}', $1080 = '{}', $1081 = 'md5', $1082 = '\x852618d50b3462a742448246e15bd81a', $1083 = 'CVE-2021-40438', $1084 = 'alpine-main-v3.12-updater', $1085 = '', $1086 = '0001-01-01 00:00:00+00', $1087 = 'https://www.cve.org/CVERecord?id=CVE-2021-40438', $1088 = '', $1089 = 'Unknown', $1090 = 'apache2', $1091 = '', $1092 = '', $1093 = '', $1094 = 'source', $1095 = 'alpine', $1096 = 'Alpine Linux', $1097 = '', $1098 = '', $1099 = '3.12', $1100 = '', $1101 = '', $1102 = 'Alpine Linux v3.12', $1103 = '', $1104 = '', $1105 = '', $1106 = '2.4.49-r0', $1107 = 'invalid', $1108 = NULL, $1109 = '{}', $1110 = '{}', $1111 = 'md5', $1112 = '\x97b472fe496fd3044e0e413c0643b805', $1113 = 'CVE-2021-39275', $1114 = 'alpine-main-v3.12-updater', $1115 = '', $1116 = '0001-01-01 00:00:00+00', $1117 = 'https://www.cve.org/CVERecord?id=CVE-2021-39275', $1118 = '', $1119 = 'Unknown', $1120 = 'apache2', $1121 = '', $1122 = '', $1123 = '', $1124 = 'source', $1125 = 'alpine', $1126 = 'Alpine Linux', $1127 = '', $1128 = '', $1129 = '3.12', $1130 = '', $1131 = '', $1132 = 'Alpine Linux v3.12', $1133 = '', $1134 = '', $1135 = '', $1136 = '2.4.49-r0', $1137 = 'invalid', $1138 = NULL, $1139 = '{}', $1140 = '{}', $1141 = 'md5', $1142 = '\x823cad7e190859192eebf65abf6e9f37', $1143 = 'CVE-2021-36160', $1144 = 'alpine-main-v3.12-updater', $1145 = '', $1146 = '0001-01-01 00:00:00+00', $1147 = 'https://www.cve.org/CVERecord?id=CVE-2021-36160', $1148 = '', $1149 = 'Unknown', $1150 = 'apache2', $1151 = '', $1152 = '', $1153 = '', $1154 = 'source', $1155 = 'alpine', $1156 = 'Alpine Linux', $1157 = '', $1158 = '', $1159 = '3.12', $1160 = '', $1161 = '', $1162 = 'Alpine Linux v3.12', $1163 = '', $1164 = '', $1165 = '', $1166 = '2.4.49-r0', $1167 = 'invalid', $1168 = NULL, $1169 = '{}', $1170 = '{}', $1171 = 'md5', $1172 = '\xde3ae95e5ee91fea92f1abd95eba664f', $1173 = 'CVE-2021-34798', $1174 = 'alpine-main-v3.12-updater', $1175 = '', $1176 = '0001-01-01 00:00:00+00', $1177 = 'https://www.cve.org/CVERecord?id=CVE-2021-34798', $1178 = '', $1179 = 'Unknown', $1180 = 'apache2', $1181 = '', $1182 = '', $1183 = '', $1184 = 'source', $1185 = 'alpine', $1186 = 'Alpine Linux', $1187 = '', $1188 = '', $1189 = '3.12', $1190 = '', $1191 = '', $1192 = 'Alpine Linux v3.12', $1193 = '', $1194 = '', $1195 = '', $1196 = '2.4.49-r0', $1197 = 'invalid', $1198 = NULL, $1199 = '{}', $1200 = '{}', $1201 = 'md5', $1202 = '\x12ca299122a9174d921f822aa5d67664', $1203 = 'CVE-2021-33193', $1204 = 'alpine-main-v3.12-updater', $1205 = '', $1206 = '0001-01-01 00:00:00+00', $1207 = 'https://www.cve.org/CVERecord?id=CVE-2021-33193', $1208 = '', $1209 = 'Unknown', $1210 = 'apache2', $1211 = '', $1212 = '', $1213 = '', $1214 = 'source', $1215 = 'alpine', $1216 = 'Alpine Linux', $1217 = '', $1218 = '', $1219 = '3.12', $1220 = '', $1221 = '', $1222 = 'Alpine Linux v3.12', $1223 = '', $1224 = '', $1225 = '', $1226 = '2.4.49-r0', $1227 = 'invalid', $1228 = NULL, $1229 = '{}', $1230 = '{}', $1231 = 'md5', $1232 = '\xb794c0a9524c788b33afdd98de7d394b', $1233 = 'CVE-2020-9490', $1234 = 'alpine-main-v3.12-updater', $1235 = '', $1236 = '0001-01-01 00:00:00+00', $1237 = 'https://www.cve.org/CVERecord?id=CVE-2020-9490', $1238 = '', $1239 = 'Unknown', $1240 = 'apache2', $1241 = '', $1242 = '', $1243 = '', $1244 = 'source', $1245 = 'alpine', $1246 = 'Alpine Linux', $1247 = '', $1248 = '', $1249 = '3.12', $1250 = '', $1251 = '', $1252 = 'Alpine Linux v3.12', $1253 = '', $1254 = '', $1255 = '', $1256 = '2.4.46-r0', $1257 = 'invalid', $1258 = NULL, $1259 = '{}', $1260 = '{}', $1261 = 'md5', $1262 = '\xfce20676c018a8af05d947578433e749', $1263 = 'CVE-2020-11984', $1264 = 'alpine-main-v3.12-updater', $1265 = '', $1266 = '0001-01-01 00:00:00+00', $1267 = 'https://www.cve.org/CVERecord?id=CVE-2020-11984', $1268 = '', $1269 = 'Unknown', $1270 = 'apache2', $1271 = '', $1272 = '', $1273 = '', $1274 = 'source', $1275 = 'alpine', $1276 = 'Alpine Linux', $1277 = '', $1278 = '', $1279 = '3.12', $1280 = '', $1281 = '', $1282 = 'Alpine Linux v3.12', $1283 = '', $1284 = '', $1285 = '', $1286 = '2.4.46-r0', $1287 = 'invalid', $1288 = NULL, $1289 = '{}', $1290 = '{}', $1291 = 'md5', $1292 = '\x94f6e5b2c3e3a435e3b4478a8c4b7fa4', $1293 = 'CVE-2020-11993', $1294 = 'alpine-main-v3.12-updater', $1295 = '', $1296 = '0001-01-01 00:00:00+00', $1297 = 'https://www.cve.org/CVERecord?id=CVE-2020-11993', $1298 = '', $1299 = 'Unknown', $1300 = 'apache2', $1301 = '', $1302 = '', $1303 = '', $1304 = 'source', $1305 = 'alpine', $1306 = 'Alpine Linux', $1307 = '', $1308 = '', $1309 = '3.12', $1310 = '', $1311 = '', $1312 = 'Alpine Linux v3.12', $1313 = '', $1314 = '', $1315 = '', $1316 = '2.4.46-r0', $1317 = 'invalid', $1318 = NULL, $1319 = '{}', $1320 = '{}', $1321 = 'md5', $1322 = '\xc7a98ca6119c04aa1ebddb2c23397b18', $1323 = 'CVE-2019-17657', $1324 = 'alpine-main-v3.12-updater', $1325 = '', $1326 = '0001-01-01 00:00:00+00', $1327 = 'https://www.cve.org/CVERecord?id=CVE-2019-17657', $1328 = '', $1329 = 'Unknown', $1330 = 'apache2', $1331 = '', $1332 = '', $1333 = '', $1334 = 'source', $1335 = 'alpine', $1336 = 'Alpine Linux', $1337 = '', $1338 = '', $1339 = '3.12', $1340 = '', $1341 = '', $1342 = 'Alpine Linux v3.12', $1343 = '', $1344 = '', $1345 = '', $1346 = '2.4.48-r0', $1347 = 'invalid', $1348 = NULL, $1349 = '{}', $1350 = '{}', $1351 = 'md5', $1352 = '\xe7448ad2090f159f91e6b2519a5ff96f', $1353 = 'CVE-2020-13938', $1354 = 'alpine-main-v3.12-updater', $1355 = '', $1356 = '0001-01-01 00:00:00+00', $1357 = 'https://www.cve.org/CVERecord?id=CVE-2020-13938', $1358 = '', $1359 = 'Unknown', $1360 = 'apache2', $1361 = '', $1362 = '', $1363 = '', $1364 = 'source', $1365 = 'alpine', $1366 = 'Alpine Linux', $1367 = '', $1368 = '', $1369 = '3.12', $1370 = '', $1371 = '', $1372 = 'Alpine Linux v3.12', $1373 = '', $1374 = '', $1375 = '', $1376 = '2.4.48-r0', $1377 = 'invalid', $1378 = NULL, $1379 = '{}', $1380 = '{}', $1381 = 'md5', $1382 = '\x82ca226f2a4d2942b0c54d91ae60180f', $1383 = 'CVE-2020-13950', $1384 = 'alpine-main-v3.12-updater', $1385 = '', $1386 = '0001-01-01 00:00:00+00', $1387 = 'https://www.cve.org/CVERecord?id=CVE-2020-13950', $1388 = '', $1389 = 'Unknown', $1390 = 'apache2', $1391 = '', $1392 = '', $1393 = '', $1394 = 'source', $1395 = 'alpine', $1396 = 'Alpine Linux', $1397 = '', $1398 = '', $1399 = '3.12', $1400 = '', $1401 = '', $1402 = 'Alpine Linux v3.12', $1403 = '', $1404 = '', $1405 = '', $1406 = '2.4.48-r0', $1407 = 'invalid', $1408 = NULL, $1409 = '{}', $1410 = '{}', $1411 = 'md5', $1412 = '\x16b9e801982db4704d3fded5af594f05', $1413 = 'CVE-2020-35452', $1414 = 'alpine-main-v3.12-updater', $1415 = '', $1416 = '0001-01-01 00:00:00+00', $1417 = 'https://www.cve.org/CVERecord?id=CVE-2020-35452', $1418 = '', $1419 = 'Unknown', $1420 = 'apache2', $1421 = '', $1422 = '', $1423 = '', $1424 = 'source', $1425 = 'alpine', $1426 = 'Alpine Linux', $1427 = '', $1428 = '', $1429 = '3.12', $1430 = '', $1431 = '', $1432 = 'Alpine Linux v3.12', $1433 = '', $1434 = '', $1435 = '', $1436 = '2.4.48-r0', $1437 = 'invalid', $1438 = NULL, $1439 = '{}', $1440 = '{}', $1441 = 'md5', $1442 = '\x8b348d7714142f50384985a967080848', $1443 = 'CVE-2021-26690', $1444 = 'alpine-main-v3.12-updater', $1445 = '', $1446 = '0001-01-01 00:00:00+00', $1447 = 'https://www.cve.org/CVERecord?id=CVE-2021-26690', $1448 = '', $1449 = 'Unknown', $1450 = 'apache2', $1451 = '', $1452 = '', $1453 = '', $1454 = 'source', $1455 = 'alpine', $1456 = 'Alpine Linux', $1457 = '', $1458 = '', $1459 = '3.12', $1460 = '', $1461 = '', $1462 = 'Alpine Linux v3.12', $1463 = '', $1464 = '', $1465 = '', $1466 = '2.4.48-r0', $1467 = 'invalid', $1468 = NULL, $1469 = '{}', $1470 = '{}', $1471 = 'md5', $1472 = '\xf95237919cc7ff4daa4aea487018c92b', $1473 = 'CVE-2021-26691', $1474 = 'alpine-main-v3.12-updater', $1475 = '', $1476 = '0001-01-01 00:00:00+00', $1477 = 'https://www.cve.org/CVERecord?id=CVE-2021-26691', $1478 = '', $1479 = 'Unknown', $1480 = 'apache2', $1481 = '', $1482 = '', $1483 = '', $1484 = 'source', $1485 = 'alpine', $1486 = 'Alpine Linux', $1487 = '', $1488 = '', $1489 = '3.12', $1490 = '', $1491 = '', $1492 = 'Alpine Linux v3.12', $1493 = '', $1494 = '', $1495 = '', $1496 = '2.4.48-r0', $1497 = 'invalid', $1498 = NULL, $1499 = '{}', $1500 = '{}', $1501 = 'md5', $1502 = '\x6ed162b86b52df2d5d8ac58dbcd3cd45', $1503 = 'CVE-2021-30641', $1504 = 'alpine-main-v3.12-updater', $1505 = '', $1506 = '0001-01-01 00:00:00+00', $1507 = 'https://www.cve.org/CVERecord?id=CVE-2021-30641', $1508 = '', $1509 = 'Unknown', $1510 = 'apache2', $1511 = '', $1512 = '', $1513 = '', $1514 = 'source', $1515 = 'alpine', $1516 = 'Alpine Linux', $1517 = '', $1518 = '', $1519 = '3.12', $1520 = '', $1521 = '', $1522 = 'Alpine Linux v3.12', $1523 = '', $1524 = '', $1525 = '', $1526 = '2.4.48-r0', $1527 = 'invalid', $1528 = NULL, $1529 = '{}', $1530 = '{}', $1531 = 'md5', $1532 = '\x43a0411a523b20b3135351676fa05fa7', $1533 = 'CVE-2021-31618', $1534 = 'alpine-main-v3.12-updater', $1535 = '', $1536 = '0001-01-01 00:00:00+00', $1537 = 'https://www.cve.org/CVERecord?id=CVE-2021-31618', $1538 = '', $1539 = 'Unknown', $1540 = 'apache2', $1541 = '', $1542 = '', $1543 = '', $1544 = 'source', $1545 = 'alpine', $1546 = 'Alpine Linux', $1547 = '', $1548 = '', $1549 = '3.12', $1550 = '', $1551 = '', $1552 = 'Alpine Linux v3.12', $1553 = '', $1554 = '', $1555 = '', $1556 = '2.4.48-r0', $1557 = 'invalid', $1558 = NULL, $1559 = '{}', $1560 = '{}', $1561 = 'md5', $1562 = '\x6bf585770785232f4bde0b982fc347fc', $1563 = 'CVE-2021-44224', $1564 = 'alpine-main-v3.12-updater', $1565 = '', $1566 = '0001-01-01 00:00:00+00', $1567 = 'https://www.cve.org/CVERecord?id=CVE-2021-44224', $1568 = '', $1569 = 'Unknown', $1570 = 'apache2', $1571 = '', $1572 = '', $1573 = '', $1574 = 'source', $1575 = 'alpine', $1576 = 'Alpine Linux', $1577 = '', $1578 = '', $1579 = '3.12', $1580 = '', $1581 = '', $1582 = 'Alpine Linux v3.12', $1583 = '', $1584 = '', $1585 = '', $1586 = '2.4.52-r0', $1587 = 'invalid', $1588 = NULL, $1589 = '{}', $1590 = '{}', $1591 = 'md5', $1592 = '\x360656ac0921bf45a7119337482d4f54', $1593 = 'CVE-2021-44790', $1594 = 'alpine-main-v3.12-updater', $1595 = '', $1596 = '0001-01-01 00:00:00+00', $1597 = 'https://www.cve.org/CVERecord?id=CVE-2021-44790', $1598 = '', $1599 = 'Unknown', $1600 = 'apache2', $1601 = '', $1602 = '', $1603 = '', $1604 = 'source', $1605 = 'alpine', $1606 = 'Alpine Linux', $1607 = '', $1608 = '', $1609 = '3.12', $1610 = '', $1611 = '', $1612 = 'Alpine Linux v3.12', $1613 = '', $1614 = '', $1615 = '', $1616 = '2.4.52-r0', $1617 = 'invalid', $1618 = NULL, $1619 = '{}', $1620 = '{}', $1621 = 'md5', $1622 = '\x166c9e4440c2e8609eae4ad852a64a15', $1623 = 'CVE-2017-15710', $1624 = 'alpine-main-v3.12-updater', $1625 = '', $1626 = '0001-01-01 00:00:00+00', $1627 = 'https://www.cve.org/CVERecord?id=CVE-2017-15710', $1628 = '', $1629 = 'Unknown', $1630 = 'apache2', $1631 = '', $1632 = '', $1633 = '', $1634 = 'source', $1635 = 'alpine', $1636 = 'Alpine Linux', $1637 = '', $1638 = '', $1639 = '3.12', $1640 = '', $1641 = '', $1642 = 'Alpine Linux v3.12', $1643 = '', $1644 = '', $1645 = '', $1646 = '2.4.33-r0', $1647 = 'invalid', $1648 = NULL, $1649 = '{}', $1650 = '{}', $1651 = 'md5', $1652 = '\xd322861635faee2dcad6e0a2a82560a3', $1653 = 'CVE-2017-15715', $1654 = 'alpine-main-v3.12-updater', $1655 = '', $1656 = '0001-01-01 00:00:00+00', $1657 = 'https://www.cve.org/CVERecord?id=CVE-2017-15715', $1658 = '', $1659 = 'Unknown', $1660 = 'apache2', $1661 = '', $1662 = '', $1663 = '', $1664 = 'source', $1665 = 'alpine', $1666 = 'Alpine Linux', $1667 = '', $1668 = '', $1669 = '3.12', $1670 = '', $1671 = '', $1672 = 'Alpine Linux v3.12', $1673 = '', $1674 = '', $1675 = '', $1676 = '2.4.33-r0', $1677 = 'invalid', $1678 = NULL, $1679 = '{}', $1680 = '{}', $1681 = 'md5', $1682 = '\xa5ee71ac8c99888bdd86a46481d837ae', $1683 = 'CVE-2018-1283', $1684 = 'alpine-main-v3.12-updater', $1685 = '', $1686 = '0001-01-01 00:00:00+00', $1687 = 'https://www.cve.org/CVERecord?id=CVE-2018-1283', $1688 = '', $1689 = 'Unknown', $1690 = 'apache2', $1691 = '', $1692 = '', $1693 = '', $1694 = 'source', $1695 = 'alpine', $1696 = 'Alpine Linux', $1697 = '', $1698 = '', $1699 = '3.12', $1700 = '', $1701 = '', $1702 = 'Alpine Linux v3.12', $1703 = '', $1704 = '', $1705 = '', $1706 = '2.4.33-r0', $1707 = 'invalid', $1708 = NULL, $1709 = '{}', $1710 = '{}', $1711 = 'md5', $1712 = '\x018a9eaeed130f2292080f39b4cfc958', $1713 = 'CVE-2018-1301', $1714 = 'alpine-main-v3.12-updater', $1715 = '', $1716 = '0001-01-01 00:00:00+00', $1717 = 'https://www.cve.org/CVERecord?id=CVE-2018-1301', $1718 = '', $1719 = 'Unknown', $1720 = 'apache2', $1721 = '', $1722 = '', $1723 = '', $1724 = 'source', $1725 = 'alpine', $1726 = 'Alpine Linux', $1727 = '', $1728 = '', $1729 = '3.12', $1730 = '', $1731 = '', $1732 = 'Alpine Linux v3.12', $1733 = '', $1734 = '', $1735 = '', $1736 = '2.4.33-r0', $1737 = 'invalid', $1738 = NULL, $1739 = '{}', $1740 = '{}', $1741 = 'md5', $1742 = '\x5437071db9f286c61383b415d6d1d4da', $1743 = 'CVE-2018-1302', $1744 = 'alpine-main-v3.12-updater', $1745 = '', $1746 = '0001-01-01 00:00:00+00', $1747 = 'https://www.cve.org/CVERecord?id=CVE-2018-1302', $1748 = '', $1749 = 'Unknown', $1750 = 'apache2', $1751 = '', $1752 = '', $1753 = '', $1754 = 'source', $1755 = 'alpine', $1756 = 'Alpine Linux', $1757 = '', $1758 = '', $1759 = '3.12', $1760 = '', $1761 = '', $1762 = 'Alpine Linux v3.12', $1763 = '', $1764 = '', $1765 = '', $1766 = '2.4.33-r0', $1767 = 'invalid', $1768 = NULL, $1769 = '{}', $1770 = '{}', $1771 = 'md5', $1772 = '\x4e94d377f2a7a98c76b4b163796f119c', $1773 = 'CVE-2018-1303', $1774 = 'alpine-main-v3.12-updater', $1775 = '', $1776 = '0001-01-01 00:00:00+00', $1777 = 'https://www.cve.org/CVERecord?id=CVE-2018-1303', $1778 = '', $1779 = 'Unknown', $1780 = 'apache2', $1781 = '', $1782 = '', $1783 = '', $1784 = 'source', $1785 = 'alpine', $1786 = 'Alpine Linux', $1787 = '', $1788 = '', $1789 = '3.12', $1790 = '', $1791 = '', $1792 = 'Alpine Linux v3.12', $1793 = '', $1794 = '', $1795 = '', $1796 = '2.4.33-r0', $1797 = 'invalid', $1798 = NULL, $1799 = '{}', $1800 = '{}', $1801 = 'md5', $1802 = '\x2d51b61d6c8fda0a0714b2ded44e8a6a', $1803 = 'CVE-2018-1312', $1804 = 'alpine-main-v3.12-updater', $1805 = '', $1806 = '0001-01-01 00:00:00+00', $1807 = 'https://www.cve.org/CVERecord?id=CVE-2018-1312', $1808 = '', $1809 = 'Unknown', $1810 = 'apache2', $1811 = '', $1812 = '', $1813 = '', $1814 = 'source', $1815 = 'alpine', $1816 = 'Alpine Linux', $1817 = '', $1818 = '', $1819 = '3.12', $1820 = '', $1821 = '', $1822 = 'Alpine Linux v3.12', $1823 = '', $1824 = '', $1825 = '', $1826 = '2.4.33-r0', $1827 = 'invalid', $1828 = NULL, $1829 = '{}', $1830 = '{}', $1831 = 'md5', $1832 = '\x5d017a1396bbb9457797d6cde46e83b6', $1833 = 'CVE-2018-1333', $1834 = 'alpine-main-v3.12-updater', $1835 = '', $1836 = '0001-01-01 00:00:00+00', $1837 = 'https://www.cve.org/CVERecord?id=CVE-2018-1333', $1838 = '', $1839 = 'Unknown', $1840 = 'apache2', $1841 = '', $1842 = '', $1843 = '', $1844 = 'source', $1845 = 'alpine', $1846 = 'Alpine Linux', $1847 = '', $1848 = '', $1849 = '3.12', $1850 = '', $1851 = '', $1852 = 'Alpine Linux v3.12', $1853 = '', $1854 = '', $1855 = '', $1856 = '2.4.34-r0', $1857 = 'invalid', $1858 = NULL, $1859 = '{}', $1860 = '{}', $1861 = 'md5', $1862 = '\xc25d6072ee02bb4ac19bcbfc2a0ed894', $1863 = 'CVE-2018-8011', $1864 = 'alpine-main-v3.12-updater', $1865 = '', $1866 = '0001-01-01 00:00:00+00', $1867 = 'https://www.cve.org/CVERecord?id=CVE-2018-8011', $1868 = '', $1869 = 'Unknown', $1870 = 'apache2', $1871 = '', $1872 = '', $1873 = '', $1874 = 'source', $1875 = 'alpine', $1876 = 'Alpine Linux', $1877 = '', $1878 = '', $1879 = '3.12', $1880 = '', $1881 = '', $1882 = 'Alpine Linux v3.12', $1883 = '', $1884 = '', $1885 = '', $1886 = '2.4.34-r0', $1887 = 'invalid', $1888 = NULL, $1889 = '{}', $1890 = '{}', $1891 = 'md5', $1892 = '\x453699ffa715e4eb5559a97e4b785b33', $1893 = 'CVE-2018-11763', $1894 = 'alpine-main-v3.12-updater', $1895 = '', $1896 = '0001-01-01 00:00:00+00', $1897 = 'https://www.cve.org/CVERecord?id=CVE-2018-11763', $1898 = '', $1899 = 'Unknown', $1900 = 'apache2', $1901 = '', $1902 = '', $1903 = '', $1904 = 'source', $1905 = 'alpine', $1906 = 'Alpine Linux', $1907 = '', $1908 = '', $1909 = '3.12', $1910 = '', $1911 = '', $1912 = 'Alpine Linux v3.12', $1913 = '', $1914 = '', $1915 = '', $1916 = '2.4.35-r0', $1917 = 'invalid', $1918 = NULL, $1919 = '{}', $1920 = '{}', $1921 = 'md5', $1922 = '\xdbfe3698531ab519d48cef64db14607f', $1923 = 'CVE-2019-9517', $1924 = 'alpine-main-v3.12-updater', $1925 = '', $1926 = '0001-01-01 00:00:00+00', $1927 = 'https://www.cve.org/CVERecord?id=CVE-2019-9517', $1928 = '', $1929 = 'Unknown', $1930 = 'apache2', $1931 = '', $1932 = '', $1933 = '', $1934 = 'source', $1935 = 'alpine', $1936 = 'Alpine Linux', $1937 = '', $1938 = '', $1939 = '3.12', $1940 = '', $1941 = '', $1942 = 'Alpine Linux v3.12', $1943 = '', $1944 = '', $1945 = '', $1946 = '2.4.41-r0', $1947 = 'invalid', $1948 = NULL, $1949 = '{}', $1950 = '{}', $1951 = 'md5', $1952 = '\x7e9e1a69d572087a6dcb46ef5e7753e8', $1953 = 'CVE-2019-10081', $1954 = 'alpine-main-v3.12-updater', $1955 = '', $1956 = '0001-01-01 00:00:00+00', $1957 = 'https://www.cve.org/CVERecord?id=CVE-2019-10081', $1958 = '', $1959 = 'Unknown', $1960 = 'apache2', $1961 = '', $1962 = '', $1963 = '', $1964 = 'source', $1965 = 'alpine', $1966 = 'Alpine Linux', $1967 = '', $1968 = '', $1969 = '3.12', $1970 = '', $1971 = '', $1972 = 'Alpine Linux v3.12', $1973 = '', $1974 = '', $1975 = '', $1976 = '2.4.41-r0', $1977 = 'invalid', $1978 = NULL, $1979 = '{}', $1980 = '{}', $1981 = 'md5', $1982 = '\xbed27353af05f51ab55c50e11e0872cb', $1983 = 'CVE-2019-10082', $1984 = 'alpine-main-v3.12-updater', $1985 = '', $1986 = '0001-01-01 00:00:00+00', $1987 = 'https://www.cve.org/CVERecord?id=CVE-2019-10082', $1988 = '', $1989 = 'Unknown', $1990 = 'apache2', $1991 = '', $1992 = '', $1993 = '', $1994 = 'source', $1995 = 'alpine', $1996 = 'Alpine Linux', $1997 = '', $1998 = '', $1999 = '3.12', $2000 = '', $2001 = '', $2002 = 'Alpine Linux v3.12', $2003 = '', $2004 = '', $2005 = '', $2006 = '2.4.41-r0', $2007 = 'invalid', $2008 = NULL, $2009 = '{}', $2010 = '{}', $2011 = 'md5', $2012 = '\xe08c9d77e283d0d5cf099d7f19504f15', $2013 = 'CVE-2019-10092', $2014 = 'alpine-main-v3.12-updater', $2015 = '', $2016 = '0001-01-01 00:00:00+00', $2017 = 'https://www.cve.org/CVERecord?id=CVE-2019-10092', $2018 = '', $2019 = 'Unknown', $2020 = 'apache2', $2021 = '', $2022 = '', $2023 = '', $2024 = 'source', $2025 = 'alpine', $2026 = 'Alpine Linux', $2027 = '', $2028 = '', $2029 = '3.12', $2030 = '', $2031 = '', $2032 = 'Alpine Linux v3.12', $2033 = '', $2034 = '', $2035 = '', $2036 = '2.4.41-r0', $2037 = 'invalid', $2038 = NULL, $2039 = '{}', $2040 = '{}', $2041 = 'md5', $2042 = '\x7883ea8f3c3151b6ca6955c855ef5097', $2043 = 'CVE-2019-10097', $2044 = 'alpine-main-v3.12-updater', $2045 = '', $2046 = '0001-01-01 00:00:00+00', $2047 = 'https://www.cve.org/CVERecord?id=CVE-2019-10097', $2048 = '', $2049 = 'Unknown', $2050 = 'apache2', $2051 = '', $2052 = '', $2053 = '', $2054 = 'source', $2055 = 'alpine', $2056 = 'Alpine Linux', $2057 = '', $2058 = '', $2059 = '3.12', $2060 = '', $2061 = '', $2062 = 'Alpine Linux v3.12', $2063 = '', $2064 = '', $2065 = '', $2066 = '2.4.41-r0', $2067 = 'invalid', $2068 = NULL, $2069 = '{}', $2070 = '{}', $2071 = 'md5', $2072 = '\x848a49cb84431199e86097827755ab13', $2073 = 'CVE-2019-10098', $2074 = 'alpine-main-v3.12-updater', $2075 = '', $2076 = '0001-01-01 00:00:00+00', $2077 = 'https://www.cve.org/CVERecord?id=CVE-2019-10098', $2078 = '', $2079 = 'Unknown', $2080 = 'apache2', $2081 = '', $2082 = '', $2083 = '', $2084 = 'source', $2085 = 'alpine', $2086 = 'Alpine Linux', $2087 = '', $2088 = '', $2089 = '3.12', $2090 = '', $2091 = '', $2092 = 'Alpine Linux v3.12', $2093 = '', $2094 = '', $2095 = '', $2096 = '2.4.41-r0', $2097 = 'invalid', $2098 = NULL, $2099 = '{}', $2100 = '{}', $2101 = 'md5', $2102 = '\xb8af4c673b0560b8b4f45553cccf1d72', $2103 = 'CVE-2017-9798', $2104 = 'alpine-main-v3.12-updater', $2105 = '', $2106 = '0001-01-01 00:00:00+00', $2107 = 'https://www.cve.org/CVERecord?id=CVE-2017-9798', $2108 = '', $2109 = 'Unknown', $2110 = 'apache2', $2111 = '', $2112 = '', $2113 = '', $2114 = 'source', $2115 = 'alpine', $2116 = 'Alpine Linux', $2117 = '', $2118 = '', $2119 = '3.12', $2120 = '', $2121 = '', $2122 = 'Alpine Linux v3.12', $2123 = '', $2124 = '', $2125 = '', $2126 = '2.4.27-r1', $2127 = 'invalid', $2128 = NULL, $2129 = '{}', $2130 = '{}', $2131 = 'md5', $2132 = '\x3f7dd679a5f2f81a3e2bfe35a22d189b', $2133 = 'CVE-2020-1927', $2134 = 'alpine-main-v3.12-updater', $2135 = '', $2136 = '0001-01-01 00:00:00+00', $2137 = 'https://www.cve.org/CVERecord?id=CVE-2020-1927', $2138 = '', $2139 = 'Unknown', $2140 = 'apache2', $2141 = '', $2142 = '', $2143 = '', $2144 = 'source', $2145 = 'alpine', $2146 = 'Alpine Linux', $2147 = '', $2148 = '', $2149 = '3.12', $2150 = '', $2151 = '', $2152 = 'Alpine Linux v3.12', $2153 = '', $2154 = '', $2155 = '', $2156 = '2.4.43-r0', $2157 = 'invalid', $2158 = NULL, $2159 = '{}', $2160 = '{}', $2161 = 'md5', $2162 = '\x863813a6a6f96d6a87b846d12b510324', $2163 = 'CVE-2020-1934', $2164 = 'alpine-main-v3.12-updater', $2165 = '', $2166 = '0001-01-01 00:00:00+00', $2167 = 'https://www.cve.org/CVERecord?id=CVE-2020-1934', $2168 = '', $2169 = 'Unknown', $2170 = 'apache2', $2171 = '', $2172 = '', $2173 = '', $2174 = 'source', $2175 = 'alpine', $2176 = 'Alpine Linux', $2177 = '', $2178 = '', $2179 = '3.12', $2180 = '', $2181 = '', $2182 = 'Alpine Linux v3.12', $2183 = '', $2184 = '', $2185 = '', $2186 = '2.4.43-r0', $2187 = 'invalid', $2188 = NULL, $2189 = '{}', $2190 = '{}', $2191 = 'md5', $2192 = '\xb54b37029083c5daaa9a4682d135eb45', $2193 = 'CVE-2021-41524', $2194 = 'alpine-main-v3.12-updater', $2195 = '', $2196 = '0001-01-01 00:00:00+00', $2197 = 'https://www.cve.org/CVERecord?id=CVE-2021-41524', $2198 = '', $2199 = 'Unknown', $2200 = 'apache2', $2201 = '', $2202 = '', $2203 = '', $2204 = 'source', $2205 = 'alpine', $2206 = 'Alpine Linux', $2207 = '', $2208 = '', $2209 = '3.12', $2210 = '', $2211 = '', $2212 = 'Alpine Linux v3.12', $2213 = '', $2214 = '', $2215 = '', $2216 = '2.4.50-r0', $2217 = 'invalid', $2218 = NULL, $2219 = '{}', $2220 = '{}', $2221 = 'md5', $2222 = '\x3502c819a1de5f24cda40e480599a0e7', $2223 = 'CVE-2021-41773', $2224 = 'alpine-main-v3.12-updater', $2225 = '', $2226 = '0001-01-01 00:00:00+00', $2227 = 'https://www.cve.org/CVERecord?id=CVE-2021-41773', $2228 = '', $2229 = 'Unknown', $2230 = 'apache2', $2231 = '', $2232 = '', $2233 = '', $2234 = 'source', $2235 = 'alpine', $2236 = 'Alpine Linux', $2237 = '', $2238 = '', $2239 = '3.12', $2240 = '', $2241 = '', $2242 = 'Alpine Linux v3.12', $2243 = '', $2244 = '', $2245 = '', $2246 = '2.4.50-r0', $2247 = 'invalid', $2248 = NULL, $2249 = '{}', $2250 = '{}', $2251 = 'md5', $2252 = '\x21142537f3c824e7454657b671c7aee6', $2253 = 'CVE-2022-22719', $2254 = 'alpine-main-v3.12-updater', $2255 = '', $2256 = '0001-01-01 00:00:00+00', $2257 = 'https://www.cve.org/CVERecord?id=CVE-2022-22719', $2258 = '', $2259 = 'Unknown', $2260 = 'apache2', $2261 = '', $2262 = '', $2263 = '', $2264 = 'source', $2265 = 'alpine', $2266 = 'Alpine Linux', $2267 = '', $2268 = '', $2269 = '3.12', $2270 = '', $2271 = '', $2272 = 'Alpine Linux v3.12', $2273 = '', $2274 = '', $2275 = '', $2276 = '2.4.53-r0', $2277 = 'invalid', $2278 = NULL, $2279 = '{}', $2280 = '{}', $2281 = 'md5', $2282 = '\x4a6fa77d6abc7c49cc141cfbe0b19dc6', $2283 = 'CVE-2022-22720', $2284 = 'alpine-main-v3.12-updater', $2285 = '', $2286 = '0001-01-01 00:00:00+00', $2287 = 'https://www.cve.org/CVERecord?id=CVE-2022-22720', $2288 = '', $2289 = 'Unknown', $2290 = 'apache2', $2291 = '', $2292 = '', $2293 = '', $2294 = 'source', $2295 = 'alpine', $2296 = 'Alpine Linux', $2297 = '', $2298 = '', $2299 = '3.12', $2300 = '', $2301 = '', $2302 = 'Alpine Linux v3.12', $2303 = '', $2304 = '', $2305 = '', $2306 = '2.4.53-r0', $2307 = 'invalid', $2308 = NULL, $2309 = '{}', $2310 = '{}', $2311 = 'md5', $2312 = '\x5cf2a67941f7061db18a26136541daca', $2313 = 'CVE-2022-22721', $2314 = 'alpine-main-v3.12-updater', $2315 = '', $2316 = '0001-01-01 00:00:00+00', $2317 = 'https://www.cve.org/CVERecord?id=CVE-2022-22721', $2318 = '', $2319 = 'Unknown', $2320 = 'apache2', $2321 = '', $2322 = '', $2323 = '', $2324 = 'source', $2325 = 'alpine', $2326 = 'Alpine Linux', $2327 = '', $2328 = '', $2329 = '3.12', $2330 = '', $2331 = '', $2332 = 'Alpine Linux v3.12', $2333 = '', $2334 = '', $2335 = '', $2336 = '2.4.53-r0', $2337 = 'invalid', $2338 = NULL, $2339 = '{}', $2340 = '{}', $2341 = 'md5', $2342 = '\xafb69c4d7979291b03dc36282ea62bcd', $2343 = 'CVE-2022-23943', $2344 = 'alpine-main-v3.12-updater', $2345 = '', $2346 = '0001-01-01 00:00:00+00', $2347 = 'https://www.cve.org/CVERecord?id=CVE-2022-23943', $2348 = '', $2349 = 'Unknown', $2350 = 'apache2', $2351 = '', $2352 = '', $2353 = '', $2354 = 'source', $2355 = 'alpine', $2356 = 'Alpine Linux', $2357 = '', $2358 = '', $2359 = '3.12', $2360 = '', $2361 = '', $2362 = 'Alpine Linux v3.12', $2363 = '', $2364 = '', $2365 = '', $2366 = '2.4.53-r0', $2367 = 'invalid', $2368 = NULL, $2369 = '{}', $2370 = '{}', $2371 = 'md5', $2372 = '\x3dbe64cd9769d6cbbbdcd78bf8b70cd9', $2373 = 'CVE-2021-30139', $2374 = 'alpine-main-v3.12-updater', $2375 = '', $2376 = '0001-01-01 00:00:00+00', $2377 = 'https://www.cve.org/CVERecord?id=CVE-2021-30139', $2378 = '', $2379 = 'Unknown', $2380 = 'apk-tools', $2381 = '', $2382 = '', $2383 = '', $2384 = 'source', $2385 = 'alpine', $2386 = 'Alpine Linux', $2387 = '', $2388 = '', $2389 = '3.12', $2390 = '', $2391 = '', $2392 = 'Alpine Linux v3.12', $2393 = '', $2394 = '', $2395 = '', $2396 = '2.10.6-r0', $2397 = 'invalid', $2398 = NULL, $2399 = '{}', $2400 = '{}', $2401 = 'md5', $2402 = '\xcc990797141751686213b485f1a43ded', $2403 = 'CVE-2021-36159', $2404 = 'alpine-main-v3.12-updater', $2405 = '', $2406 = '0001-01-01 00:00:00+00', $2407 = 'https://www.cve.org/CVERecord?id=CVE-2021-36159', $2408 = '', $2409 = 'Unknown', $2410 = 'apk-tools', $2411 = '', $2412 = '', $2413 = '', $2414 = 'source', $2415 = 'alpine', $2416 = 'Alpine Linux', $2417 = '', $2418 = '', $2419 = '3.12', $2420 = '', $2421 = '', $2422 = 'Alpine Linux v3.12', $2423 = '', $2424 = '', $2425 = '', $2426 = '2.10.7-r0', $2427 = 'invalid', $2428 = NULL, $2429 = '{}', $2430 = '{}', $2431 = 'md5', $2432 = '\x1620add37e3b4d676399f1ed70d197fc', $2433 = 'CVE-2017-9669', $2434 = 'alpine-main-v3.12-updater', $2435 = '', $2436 = '0001-01-01 00:00:00+00', $2437 = 'https://www.cve.org/CVERecord?id=CVE-2017-9669', $2438 = '', $2439 = 'Unknown', $2440 = 'apk-tools', $2441 = '', $2442 = '', $2443 = '', $2444 = 'source', $2445 = 'alpine', $2446 = 'Alpine Linux', $2447 = '', $2448 = '', $2449 = '3.12', $2450 = '', $2451 = '', $2452 = 'Alpine Linux v3.12', $2453 = '', $2454 = '', $2455 = '', $2456 = '2.7.2-r0', $2457 = 'invalid', $2458 = NULL, $2459 = '{}', $2460 = '{}', $2461 = 'md5', $2462 = '\xeef98f1ba13b5c938263fef9104c9011', $2463 = 'CVE-2017-9671', $2464 = 'alpine-main-v3.12-updater', $2465 = '', $2466 = '0001-01-01 00:00:00+00', $2467 = 'https://www.cve.org/CVERecord?id=CVE-2017-9671', $2468 = '', $2469 = 'Unknown', $2470 = 'apk-tools', $2471 = '', $2472 = '', $2473 = '', $2474 = 'source', $2475 = 'alpine', $2476 = 'Alpine Linux', $2477 = '', $2478 = '', $2479 = '3.12', $2480 = '', $2481 = '', $2482 = 'Alpine Linux v3.12', $2483 = '', $2484 = '', $2485 = '', $2486 = '2.7.2-r0', $2487 = 'invalid', $2488 = NULL, $2489 = '{}', $2490 = '{}', $2491 = 'md5', $2492 = '\x91c7f5556280b2b0e17525956cec6c83', $2493 = 'CVE-2019-17544', $2494 = 'alpine-main-v3.12-updater', $2495 = '', $2496 = '0001-01-01 00:00:00+00', $2497 = 'https://www.cve.org/CVERecord?id=CVE-2019-17544', $2498 = '', $2499 = 'Unknown', $2500 = 'aspell', $2501 = '', $2502 = '', $2503 = '', $2504 = 'source', $2505 = 'alpine', $2506 = 'Alpine Linux', $2507 = '', $2508 = '', $2509 = '3.12', $2510 = '', $2511 = '', $2512 = 'Alpine Linux v3.12', $2513 = '', $2514 = '', $2515 = '', $2516 = '0.60.8-r0', $2517 = 'invalid', $2518 = NULL, $2519 = '{}', $2520 = '{}', $2521 = 'md5', $2522 = '\x7704b9de439014046c6b904ea6cd5fb8', $2523 = 'CVE-2019-25051', $2524 = 'alpine-main-v3.12-updater', $2525 = '', $2526 = '0001-01-01 00:00:00+00', $2527 = 'https://www.cve.org/CVERecord?id=CVE-2019-25051', $2528 = '', $2529 = 'Unknown', $2530 = 'aspell', $2531 = '', $2532 = '', $2533 = '', $2534 = 'source', $2535 = 'alpine', $2536 = 'Alpine Linux', $2537 = '', $2538 = '', $2539 = '3.12', $2540 = '', $2541 = '', $2542 = 'Alpine Linux v3.12', $2543 = '', $2544 = '', $2545 = '', $2546 = '0.60.8-r1', $2547 = 'invalid', $2548 = NULL, $2549 = '{}', $2550 = '{}', $2551 = 'md5', $2552 = '\x9e3e546adbb5ca67abca7fdf56dc6f4b', $2553 = 'CVE-2020-35652', $2554 = 'alpine-main-v3.12-updater', $2555 = '', $2556 = '0001-01-01 00:00:00+00', $2557 = 'https://www.cve.org/CVERecord?id=CVE-2020-35652', $2558 = '', $2559 = 'Unknown', $2560 = 'asterisk', $2561 = '', $2562 = '', $2563 = '', $2564 = 'source', $2565 = 'alpine', $2566 = 'Alpine Linux', $2567 = '', $2568 = '', $2569 = '3.12', $2570 = '', $2571 = '', $2572 = 'Alpine Linux v3.12', $2573 = '', $2574 = '', $2575 = '', $2576 = '16.15.1-r0', $2577 = 'invalid', $2578 = NULL, $2579 = '{}', $2580 = '{}', $2581 = 'md5', $2582 = '\x308c46af6fedf5d0e2f25dd5b6f9896b', $2583 = 'CVE-2020-35776', $2584 = 'alpine-main-v3.12-updater', $2585 = '', $2586 = '0001-01-01 00:00:00+00', $2587 = 'https://www.cve.org/CVERecord?id=CVE-2020-35776', $2588 = '', $2589 = 'Unknown', $2590 = 'asterisk', $2591 = '', $2592 = '', $2593 = '', $2594 = 'source', $2595 = 'alpine', $2596 = 'Alpine Linux', $2597 = '', $2598 = '', $2599 = '3.12', $2600 = '', $2601 = '', $2602 = 'Alpine Linux v3.12', $2603 = '', $2604 = '', $2605 = '', $2606 = '16.16.1-r0', $2607 = 'invalid', $2608 = NULL, $2609 = '{}', $2610 = '{}', $2611 = 'md5', $2612 = '\x71e827ec819944ec018da139a5a0e390', $2613 = 'CVE-2021-26712', $2614 = 'alpine-main-v3.12-updater', $2615 = '', $2616 = '0001-01-01 00:00:00+00', $2617 = 'https://www.cve.org/CVERecord?id=CVE-2021-26712', $2618 = '', $2619 = 'Unknown', $2620 = 'asterisk', $2621 = '', $2622 = '', $2623 = '', $2624 = 'source', $2625 = 'alpine', $2626 = 'Alpine Linux', $2627 = '', $2628 = '', $2629 = '3.12', $2630 = '', $2631 = '', $2632 = 'Alpine Linux v3.12', $2633 = '', $2634 = '', $2635 = '', $2636 = '16.16.1-r0', $2637 = 'invalid', $2638 = NULL, $2639 = '{}', $2640 = '{}', $2641 = 'md5', $2642 = '\x8a5244c42eb91f0d5706b0c9f29d89f8', $2643 = 'CVE-2021-26713', $2644 = 'alpine-main-v3.12-updater', $2645 = '', $2646 = '0001-01-01 00:00:00+00', $2647 = 'https://www.cve.org/CVERecord?id=CVE-2021-26713', $2648 = '', $2649 = 'Unknown', $2650 = 'asterisk', $2651 = '', $2652 = '', $2653 = '', $2654 = 'source', $2655 = 'alpine', $2656 = 'Alpine Linux', $2657 = '', $2658 = '', $2659 = '3.12', $2660 = '', $2661 = '', $2662 = 'Alpine Linux v3.12', $2663 = '', $2664 = '', $2665 = '', $2666 = '16.16.1-r0', $2667 = 'invalid', $2668 = NULL, $2669 = '{}', $2670 = '{}', $2671 = 'md5', $2672 = '\x6f09c6c192a0d4c865d742b1d59f850b', $2673 = 'CVE-2021-26717', $2674 = 'alpine-main-v3.12-updater', $2675 = '', $2676 = '0001-01-01 00:00:00+00', $2677 = 'https://www.cve.org/CVERecord?id=CVE-2021-26717', $2678 = '', $2679 = 'Unknown', $2680 = 'asterisk', $2681 = '', $2682 = '', $2683 = '', $2684 = 'source', $2685 = 'alpine', $2686 = 'Alpine Linux', $2687 = '', $2688 = '', $2689 = '3.12', $2690 = '', $2691 = '', $2692 = 'Alpine Linux v3.12', $2693 = '', $2694 = '', $2695 = '', $2696 = '16.16.1-r0', $2697 = 'invalid', $2698 = NULL, $2699 = '{}', $2700 = '{}', $2701 = 'md5', $2702 = '\x099f1902b85b68d4baad836a7908344d', $2703 = 'CVE-2021-26906', $2704 = 'alpine-main-v3.12-updater', $2705 = '', $2706 = '0001-01-01 00:00:00+00', $2707 = 'https://www.cve.org/CVERecord?id=CVE-2021-26906', $2708 = '', $2709 = 'Unknown', $2710 = 'asterisk', $2711 = '', $2712 = '', $2713 = '', $2714 = 'source', $2715 = 'alpine', $2716 = 'Alpine Linux', $2717 = '', $2718 = '', $2719 = '3.12', $2720 = '', $2721 = '', $2722 = 'Alpine Linux v3.12', $2723 = '', $2724 = '', $2725 = '', $2726 = '16.16.1-r0', $2727 = 'invalid', $2728 = NULL, $2729 = '{}', $2730 = '{}', $2731 = 'md5', $2732 = '\x4892f44a33905a1357e2fdf18142a9e7', $2733 = 'CVE-2021-32558', $2734 = 'alpine-main-v3.12-updater', $2735 = '', $2736 = '0001-01-01 00:00:00+00', $2737 = 'https://www.cve.org/CVERecord?id=CVE-2021-32558', $2738 = '', $2739 = 'Unknown', $2740 = 'asterisk', $2741 = '', $2742 = '', $2743 = '', $2744 = 'source', $2745 = 'alpine', $2746 = 'Alpine Linux', $2747 = '', $2748 = '', $2749 = '3.12', $2750 = '', $2751 = '', $2752 = 'Alpine Linux v3.12', $2753 = '', $2754 = '', $2755 = '', $2756 = '16.16.1-r1', $2757 = 'invalid', $2758 = NULL, $2759 = '{}', $2760 = '{}', $2761 = 'md5', $2762 = '\xd49364f717e840217edea9107d154c12', $2763 = 'CVE-2019-15297', $2764 = 'alpine-main-v3.12-updater', $2765 = '', $2766 = '0001-01-01 00:00:00+00', $2767 = 'https://www.cve.org/CVERecord?id=CVE-2019-15297', $2768 = '', $2769 = 'Unknown', $2770 = 'asterisk', $2771 = '', $2772 = '', $2773 = '', $2774 = 'source', $2775 = 'alpine', $2776 = 'Alpine Linux', $2777 = '', $2778 = '', $2779 = '3.12', $2780 = '', $2781 = '', $2782 = 'Alpine Linux v3.12', $2783 = '', $2784 = '', $2785 = '', $2786 = '16.5.1-r0', $2787 = 'invalid', $2788 = NULL, $2789 = '{}', $2790 = '{}', $2791 = 'md5', $2792 = '\x56ee37c161533cc6e0b611ebb4cc37b7', $2793 = 'CVE-2019-15639', $2794 = 'alpine-main-v3.12-updater', $2795 = '', $2796 = '0001-01-01 00:00:00+00', $2797 = 'https://www.cve.org/CVERecord?id=CVE-2019-15639', $2798 = '', $2799 = 'Unknown', $2800 = 'asterisk', $2801 = '', $2802 = '', $2803 = '', $2804 = 'source', $2805 = 'alpine', $2806 = 'Alpine Linux', $2807 = '', $2808 = '', $2809 = '3.12', $2810 = '', $2811 = '', $2812 = 'Alpine Linux v3.12', $2813 = '', $2814 = '', $2815 = '', $2816 = '16.5.1-r0', $2817 = 'invalid', $2818 = NULL, $2819 = '{}', $2820 = '{}', $2821 = 'md5', $2822 = '\xacf0ef3a0e37aeb409f0203eeb748068', $2823 = 'CVE-2019-18610', $2824 = 'alpine-main-v3.12-updater', $2825 = '', $2826 = '0001-01-01 00:00:00+00', $2827 = 'https://www.cve.org/CVERecord?id=CVE-2019-18610', $2828 = '', $2829 = 'Unknown', $2830 = 'asterisk', $2831 = '', $2832 = '', $2833 = '', $2834 = 'source', $2835 = 'alpine', $2836 = 'Alpine Linux', $2837 = '', $2838 = '', $2839 = '3.12', $2840 = '', $2841 = '', $2842 = 'Alpine Linux v3.12', $2843 = '', $2844 = '', $2845 = '', $2846 = '16.6.2-r0', $2847 = 'invalid', $2848 = NULL, $2849 = '{}', $2850 = '{}', $2851 = 'md5', $2852 = '\x6fd51b20b42c794e3070f0c1d848ab34', $2853 = 'CVE-2019-18790', $2854 = 'alpine-main-v3.12-updater', $2855 = '', $2856 = '0001-01-01 00:00:00+00', $2857 = 'https://www.cve.org/CVERecord?id=CVE-2019-18790', $2858 = '', $2859 = 'Unknown', $2860 = 'asterisk', $2861 = '', $2862 = '', $2863 = '', $2864 = 'source', $2865 = 'alpine', $2866 = 'Alpine Linux', $2867 = '', $2868 = '', $2869 = '3.12', $2870 = '', $2871 = '', $2872 = 'Alpine Linux v3.12', $2873 = '', $2874 = '', $2875 = '', $2876 = '16.6.2-r0', $2877 = 'invalid', $2878 = NULL, $2879 = '{}', $2880 = '{}', $2881 = 'md5', $2882 = '\x7e3a4106cc5e01932d94efc0d03a8702', $2883 = 'CVE-2018-19278', $2884 = 'alpine-main-v3.12-updater', $2885 = '', $2886 = '0001-01-01 00:00:00+00', $2887 = 'https://www.cve.org/CVERecord?id=CVE-2018-19278', $2888 = '', $2889 = 'Unknown', $2890 = 'asterisk', $2891 = '', $2892 = '', $2893 = '', $2894 = 'source', $2895 = 'alpine', $2896 = 'Alpine Linux', $2897 = '', $2898 = '', $2899 = '3.12', $2900 = '', $2901 = '', $2902 = 'Alpine Linux v3.12', $2903 = '', $2904 = '', $2905 = '', $2906 = '15.7.1-r0', $2907 = 'invalid', $2908 = NULL, $2909 = '{}', $2910 = '{}', $2911 = 'md5', $2912 = '\x041002a73eda8eff450424f9cf047c29', $2913 = 'CVE-2019-7251', $2914 = 'alpine-main-v3.12-updater', $2915 = '', $2916 = '0001-01-01 00:00:00+00', $2917 = 'https://www.cve.org/CVERecord?id=CVE-2019-7251', $2918 = '', $2919 = 'Unknown', $2920 = 'asterisk', $2921 = '', $2922 = '', $2923 = '', $2924 = 'source', $2925 = 'alpine', $2926 = 'Alpine Linux', $2927 = '', $2928 = '', $2929 = '3.12', $2930 = '', $2931 = '', $2932 = 'Alpine Linux v3.12', $2933 = '', $2934 = '', $2935 = '', $2936 = '16.3.0-r0', $2937 = 'invalid', $2938 = NULL, $2939 = '{}', $2940 = '{}', $2941 = 'md5', $2942 = '\xe3143997af0eb5ca83032ba0118e50ec', $2943 = 'CVE-2019-12827', $2944 = 'alpine-main-v3.12-updater', $2945 = '', $2946 = '0001-01-01 00:00:00+00', $2947 = 'https://www.cve.org/CVERecord?id=CVE-2019-12827', $2948 = '', $2949 = 'Unknown', $2950 = 'asterisk', $2951 = '', $2952 = '', $2953 = '', $2954 = 'source', $2955 = 'alpine', $2956 = 'Alpine Linux', $2957 = '', $2958 = '', $2959 = '3.12', $2960 = '', $2961 = '', $2962 = 'Alpine Linux v3.12', $2963 = '', $2964 = '', $2965 = '', $2966 = '16.4.1-r0', $2967 = 'invalid', $2968 = NULL, $2969 = '{}', $2970 = '{}', $2971 = 'md5', $2972 = '\x54bdf81bee023f4f4eb1957b710b5217', $2973 = 'CVE-2020-28327', $2974 = 'alpine-main-v3.12-updater', $2975 = '', $2976 = '0001-01-01 00:00:00+00', $2977 = 'https://www.cve.org/CVERecord?id=CVE-2020-28327', $2978 = '', $2979 = 'Unknown', $2980 = 'asterisk', $2981 = '', $2982 = '', $2983 = '', $2984 = 'source', $2985 = 'alpine', $2986 = 'Alpine Linux', $2987 = '', $2988 = '', $2989 = '3.12', $2990 = '', $2991 = '', $2992 = 'Alpine Linux v3.12', $2993 = '', $2994 = '', $2995 = '', $2996 = '16.14.1-r0', $2997 = 'invalid', $2998 = NULL, $2999 = '{}', $3000 = '{}', $3001 = 'md5', $3002 = '\x8d86abd400bc66e54b95b9870a569a33', $3003 = 'CVE-2021-26720', $3004 = 'alpine-main-v3.12-updater', $3005 = '', $3006 = '0001-01-01 00:00:00+00', $3007 = 'https://www.cve.org/CVERecord?id=CVE-2021-26720', $3008 = '', $3009 = 'Unknown', $3010 = 'avahi', $3011 = '', $3012 = '', $3013 = '', $3014 = 'source', $3015 = 'alpine', $3016 = 'Alpine Linux', $3017 = '', $3018 = '', $3019 = '3.12', $3020 = '', $3021 = '', $3022 = 'Alpine Linux v3.12', $3023 = '', $3024 = '', $3025 = '', $3026 = '0', $3027 = 'invalid', $3028 = NULL, $3029 = '{}', $3030 = '{}', $3031 = 'md5', $3032 = '\xa89fd856c3d414bbfdb3df9d9c7192d6', $3033 = 'CVE-2017-6519', $3034 = 'alpine-main-v3.12-updater', $3035 = '', $3036 = '0001-01-01 00:00:00+00', $3037 = 'https://www.cve.org/CVERecord?id=CVE-2017-6519', $3038 = '', $3039 = 'Unknown', $3040 = 'avahi', $3041 = '', $3042 = '', $3043 = '', $3044 = 'source', $3045 = 'alpine', $3046 = 'Alpine Linux', $3047 = '', $3048 = '', $3049 = '3.12', $3050 = '', $3051 = '', $3052 = 'Alpine Linux v3.12', $3053 = '', $3054 = '', $3055 = '', $3056 = '0.7-r2', $3057 = 'invalid', $3058 = NULL, $3059 = '{}', $3060 = '{}', $3061 = 'md5', $3062 = '\xccd663822b6ae7e6f02386424545c511', $3063 = 'CVE-2018-1000845', $3064 = 'alpine-main-v3.12-updater', $3065 = '', $3066 = '0001-01-01 00:00:00+00', $3067 = 'https://www.cve.org/CVERecord?id=CVE-2018-1000845', $3068 = '', $3069 = 'Unknown', $3070 = 'avahi', $3071 = '', $3072 = '', $3073 = '', $3074 = 'source', $3075 = 'alpine', $3076 = 'Alpine Linux', $3077 = '', $3078 = '', $3079 = '3.12', $3080 = '', $3081 = '', $3082 = 'Alpine Linux v3.12', $3083 = '', $3084 = '', $3085 = '', $3086 = '0.7-r2', $3087 = 'invalid', $3088 = NULL, $3089 = '{}', $3090 = '{}', $3091 = 'md5', $3092 = '\xc7ec2707a6aea9e0f91b0793b9bcceff', $3093 = 'CVE-2021-3468', $3094 = 'alpine-main-v3.12-updater', $3095 = '', $3096 = '0001-01-01 00:00:00+00', $3097 = 'https://www.cve.org/CVERecord?id=CVE-2021-3468', $3098 = '', $3099 = 'Unknown', $3100 = 'avahi', $3101 = '', $3102 = '', $3103 = '', $3104 = 'source', $3105 = 'alpine', $3106 = 'Alpine Linux', $3107 = '', $3108 = '', $3109 = '3.12', $3110 = '', $3111 = '', $3112 = 'Alpine Linux v3.12', $3113 = '', $3114 = '', $3115 = '', $3116 = '0.8-r1', $3117 = 'invalid', $3118 = NULL, $3119 = '{}', $3120 = '{}', $3121 = 'md5', $3122 = '\xb4ad1ad90f88dae815b218ad246adf40', $3123 = 'CVE-2021-36217', $3124 = 'alpine-main-v3.12-updater', $3125 = '', $3126 = '0001-01-01 00:00:00+00', $3127 = 'https://www.cve.org/CVERecord?id=CVE-2021-36217', $3128 = '', $3129 = 'Unknown', $3130 = 'avahi', $3131 = '', $3132 = '', $3133 = '', $3134 = 'source', $3135 = 'alpine', $3136 = 'Alpine Linux', $3137 = '', $3138 = '', $3139 = '3.12', $3140 = '', $3141 = '', $3142 = 'Alpine Linux v3.12', $3143 = '', $3144 = '', $3145 = '', $3146 = '0.8-r2', $3147 = 'invalid', $3148 = NULL, $3149 = '{}', $3150 = '{}', $3151 = 'md5', $3152 = '\x35b95170fcc5e4c8a3c6778462bb80b9', $3153 = 'CVE-2017-1000501', $3154 = 'alpine-main-v3.12-updater', $3155 = '', $3156 = '0001-01-01 00:00:00+00', $3157 = 'https://www.cve.org/CVERecord?id=CVE-2017-1000501', $3158 = '', $3159 = 'Unknown', $3160 = 'awstats', $3161 = '', $3162 = '', $3163 = '', $3164 = 'source', $3165 = 'alpine', $3166 = 'Alpine Linux', $3167 = '', $3168 = '', $3169 = '3.12', $3170 = '', $3171 = '', $3172 = 'Alpine Linux v3.12', $3173 = '', $3174 = '', $3175 = '', $3176 = '7.6-r2', $3177 = 'invalid', $3178 = NULL, $3179 = '{}', $3180 = '{}', $3181 = 'md5', $3182 = '\xf93120286be393bfbf6cb0d8f42adb32', $3183 = 'CVE-2020-35176', $3184 = 'alpine-main-v3.12-updater', $3185 = '', $3186 = '0001-01-01 00:00:00+00', $3187 = 'https://www.cve.org/CVERecord?id=CVE-2020-35176', $3188 = '', $3189 = 'Unknown', $3190 = 'awstats', $3191 = '', $3192 = '', $3193 = '', $3194 = 'source', $3195 = 'alpine', $3196 = 'Alpine Linux', $3197 = '', $3198 = '', $3199 = '3.12', $3200 = '', $3201 = '', $3202 = 'Alpine Linux v3.12', $3203 = '', $3204 = '', $3205 = '', $3206 = '7.8-r1', $3207 = 'invalid', $3208 = NULL, $3209 = '{}', $3210 = '{}', $3211 = 'md5', $3212 = '\x5eeccb579a760e05d04b0156072ed399', $3213 = 'CVE-2020-13614', $3214 = 'alpine-main-v3.12-updater', $3215 = '', $3216 = '0001-01-01 00:00:00+00', $3217 = 'https://www.cve.org/CVERecord?id=CVE-2020-13614', $3218 = '', $3219 = 'Unknown', $3220 = 'axel', $3221 = '', $3222 = '', $3223 = '', $3224 = 'source', $3225 = 'alpine', $3226 = 'Alpine Linux', $3227 = '', $3228 = '', $3229 = '3.12', $3230 = '', $3231 = '', $3232 = 'Alpine Linux v3.12', $3233 = '', $3234 = '', $3235 = '', $3236 = '2.17.8-r0', $3237 = 'invalid', $3238 = NULL, $3239 = '{}', $3240 = '{}', $3241 = 'md5', $3242 = '\x53688dbfe59d2999e23ed7b2ee02d0b9', $3243 = 'CVE-2016-0634', $3244 = 'alpine-main-v3.12-updater', $3245 = '', $3246 = '0001-01-01 00:00:00+00', $3247 = 'https://www.cve.org/CVERecord?id=CVE-2016-0634', $3248 = '', $3249 = 'Unknown', $3250 = 'bash', $3251 = '', $3252 = '', $3253 = '', $3254 = 'source', $3255 = 'alpine', $3256 = 'Alpine Linux', $3257 = '', $3258 = '', $3259 = '3.12', $3260 = '', $3261 = '', $3262 = 'Alpine Linux v3.12', $3263 = '', $3264 = '', $3265 = '', $3266 = '4.4.12-r1', $3267 = 'invalid', $3268 = NULL, $3269 = '{}', $3270 = '{}', $3271 = 'md5', $3272 = '\x3505a076cefcc4406f91e1f01336c2c9', $3273 = 'CVE-2018-5740', $3274 = 'alpine-main-v3.12-updater', $3275 = '', $3276 = '0001-01-01 00:00:00+00', $3277 = 'https://www.cve.org/CVERecord?id=CVE-2018-5740', $3278 = '', $3279 = 'Unknown', $3280 = 'bind', $3281 = '', $3282 = '', $3283 = '', $3284 = 'source', $3285 = 'alpine', $3286 = 'Alpine Linux', $3287 = '', $3288 = '', $3289 = '3.12', $3290 = '', $3291 = '', $3292 = 'Alpine Linux v3.12', $3293 = '', $3294 = '', $3295 = '', $3296 = '9.12.2_p1-r0', $3297 = 'invalid', $3298 = NULL, $3299 = '{}', $3300 = '{}', $3301 = 'md5', $3302 = '\x226430a689667f2c17f279eb04328a8d', $3303 = 'CVE-2018-5738', $3304 = 'alpine-main-v3.12-updater', $3305 = '', $3306 = '0001-01-01 00:00:00+00', $3307 = 'https://www.cve.org/CVERecord?id=CVE-2018-5738', $3308 = '', $3309 = 'Unknown', $3310 = 'bind', $3311 = '', $3312 = '', $3313 = '', $3314 = 'source', $3315 = 'alpine', $3316 = 'Alpine Linux', $3317 = '', $3318 = '', $3319 = '3.12', $3320 = '', $3321 = '', $3322 = 'Alpine Linux v3.12', $3323 = '', $3324 = '', $3325 = '', $3326 = '9.12.2_p1-r0', $3327 = 'invalid', $3328 = NULL, $3329 = '{}', $3330 = '{}', $3331 = 'md5', $3332 = '\x73ad08b49eb61710f24cdc300dee4793', $3333 = 'CVE-2020-8625', $3334 = 'alpine-main-v3.12-updater', $3335 = '', $3336 = '0001-01-01 00:00:00+00', $3337 = 'https://www.cve.org/CVERecord?id=CVE-2020-8625', $3338 = '', $3339 = 'Unknown', $3340 = 'bind', $3341 = '', $3342 = '', $3343 = '', $3344 = 'source', $3345 = 'alpine', $3346 = 'Alpine Linux', $3347 = '', $3348 = '', $3349 = '3.12', $3350 = '', $3351 = '', $3352 = 'Alpine Linux v3.12', $3353 = '', $3354 = '', $3355 = '', $3356 = '9.16.11-r2', $3357 = 'invalid', $3358 = NULL, $3359 = '{}', $3360 = '{}', $3361 = 'md5', $3362 = '\x53cae4b25db8d6d04275ef8f9d8583d2', $3363 = 'CVE-2021-25218', $3364 = 'alpine-main-v3.12-updater', $3365 = '', $3366 = '0001-01-01 00:00:00+00', $3367 = 'https://www.cve.org/CVERecord?id=CVE-2021-25218', $3368 = '', $3369 = 'Unknown', $3370 = 'bind', $3371 = '', $3372 = '', $3373 = '', $3374 = 'source', $3375 = 'alpine', $3376 = 'Alpine Linux', $3377 = '', $3378 = '', $3379 = '3.12', $3380 = '', $3381 = '', $3382 = 'Alpine Linux v3.12', $3383 = '', $3384 = '', $3385 = '', $3386 = '9.16.20-r0', $3387 = 'invalid', $3388 = NULL, $3389 = '{}', $3390 = '{}', $3391 = 'md5', $3392 = '\x1b6c0c186384d19fd486ad54d28ef691', $3393 = 'CVE-2020-8620', $3394 = 'alpine-main-v3.12-updater', $3395 = '', $3396 = '0001-01-01 00:00:00+00', $3397 = 'https://www.cve.org/CVERecord?id=CVE-2020-8620', $3398 = '', $3399 = 'Unknown', $3400 = 'bind', $3401 = '', $3402 = '', $3403 = '', $3404 = 'source', $3405 = 'alpine', $3406 = 'Alpine Linux', $3407 = '', $3408 = '', $3409 = '3.12', $3410 = '', $3411 = '', $3412 = 'Alpine Linux v3.12', $3413 = '', $3414 = '', $3415 = '', $3416 = '9.16.6-r0', $3417 = 'invalid', $3418 = NULL, $3419 = '{}', $3420 = '{}', $3421 = 'md5', $3422 = '\xc8a5289522acfd08063d0075de7f5bb7', $3423 = 'CVE-2020-8621', $3424 = 'alpine-main-v3.12-updater', $3425 = '', $3426 = '0001-01-01 00:00:00+00', $3427 = 'https://www.cve.org/CVERecord?id=CVE-2020-8621', $3428 = '', $3429 = 'Unknown', $3430 = 'bind', $3431 = '', $3432 = '', $3433 = '', $3434 = 'source', $3435 = 'alpine', $3436 = 'Alpine Linux', $3437 = '', $3438 = '', $3439 = '3.12', $3440 = '', $3441 = '', $3442 = 'Alpine Linux v3.12', $3443 = '', $3444 = '', $3445 = '', $3446 = '9.16.6-r0', $3447 = 'invalid', $3448 = NULL, $3449 = '{}', $3450 = '{}', $3451 = 'md5', $3452 = '\x7bbb585eabb032be6f094362bca0086d', $3453 = 'CVE-2020-8622', $3454 = 'alpine-main-v3.12-updater', $3455 = '', $3456 = '0001-01-01 00:00:00+00', $3457 = 'https://www.cve.org/CVERecord?id=CVE-2020-8622', $3458 = '', $3459 = 'Unknown', $3460 = 'bind', $3461 = '', $3462 = '', $3463 = '', $3464 = 'source', $3465 = 'alpine', $3466 = 'Alpine Linux', $3467 = '', $3468 = '', $3469 = '3.12', $3470 = '', $3471 = '', $3472 = 'Alpine Linux v3.12', $3473 = '', $3474 = '', $3475 = '', $3476 = '9.16.6-r0', $3477 = 'invalid', $3478 = NULL, $3479 = '{}', $3480 = '{}', $3481 = 'md5', $3482 = '\x682b4b02082d72438fa36b7bf00765d3', $3483 = 'CVE-2020-8623', $3484 = 'alpine-main-v3.12-updater', $3485 = '', $3486 = '0001-01-01 00:00:00+00', $3487 = 'https://www.cve.org/CVERecord?id=CVE-2020-8623', $3488 = '', $3489 = 'Unknown', $3490 = 'bind', $3491 = '', $3492 = '', $3493 = '', $3494 = 'source', $3495 = 'alpine', $3496 = 'Alpine Linux', $3497 = '', $3498 = '', $3499 = '3.12', $3500 = '', $3501 = '', $3502 = 'Alpine Linux v3.12', $3503 = '', $3504 = '', $3505 = '', $3506 = '9.16.6-r0', $3507 = 'invalid', $3508 = NULL, $3509 = '{}', $3510 = '{}', $3511 = 'md5', $3512 = '\xb46d12b3bda4d7e7cadfb36b8399f30d', $3513 = 'CVE-2020-8624', $3514 = 'alpine-main-v3.12-updater', $3515 = '', $3516 = '0001-01-01 00:00:00+00', $3517 = 'https://www.cve.org/CVERecord?id=CVE-2020-8624', $3518 = '', $3519 = 'Unknown', $3520 = 'bind', $3521 = '', $3522 = '', $3523 = '', $3524 = 'source', $3525 = 'alpine', $3526 = 'Alpine Linux', $3527 = '', $3528 = '', $3529 = '3.12', $3530 = '', $3531 = '', $3532 = 'Alpine Linux v3.12', $3533 = '', $3534 = '', $3535 = '', $3536 = '9.16.6-r0', $3537 = 'invalid', $3538 = NULL, $3539 = '{}', $3540 = '{}', $3541 = 'md5', $3542 = '\xa979c46bb5afd041c7075884a09171e1', $3543 = 'CVE-2019-6465', $3544 = 'alpine-main-v3.12-updater', $3545 = '', $3546 = '0001-01-01 00:00:00+00', $3547 = 'https://www.cve.org/CVERecord?id=CVE-2019-6465', $3548 = '', $3549 = 'Unknown', $3550 = 'bind', $3551 = '', $3552 = '', $3553 = '', $3554 = 'source', $3555 = 'alpine', $3556 = 'Alpine Linux', $3557 = '', $3558 = '', $3559 = '3.12', $3560 = '', $3561 = '', $3562 = 'Alpine Linux v3.12', $3563 = '', $3564 = '', $3565 = '', $3566 = '9.12.3_p4-r0', $3567 = 'invalid', $3568 = NULL, $3569 = '{}', $3570 = '{}', $3571 = 'md5', $3572 = '\xcce439ebe6475965fc8b75a9e0d38aa3', $3573 = 'CVE-2018-5745', $3574 = 'alpine-main-v3.12-updater', $3575 = '', $3576 = '0001-01-01 00:00:00+00', $3577 = 'https://www.cve.org/CVERecord?id=CVE-2018-5745', $3578 = '', $3579 = 'Unknown', $3580 = 'bind', $3581 = '', $3582 = '', $3583 = '', $3584 = 'source', $3585 = 'alpine', $3586 = 'Alpine Linux', $3587 = '', $3588 = '', $3589 = '3.12', $3590 = '', $3591 = '', $3592 = 'Alpine Linux v3.12', $3593 = '', $3594 = '', $3595 = '', $3596 = '9.12.3_p4-r0', $3597 = 'invalid', $3598 = NULL, $3599 = '{}', $3600 = '{}', $3601 = 'md5', $3602 = '\x36e40c93b737742f524a4ceb4e787a32', $3603 = 'CVE-2018-5744', $3604 = 'alpine-main-v3.12-updater', $3605 = '', $3606 = '0001-01-01 00:00:00+00', $3607 = 'https://www.cve.org/CVERecord?id=CVE-2018-5744', $3608 = '', $3609 = 'Unknown', $3610 = 'bind', $3611 = '', $3612 = '', $3613 = '', $3614 = 'source', $3615 = 'alpine', $3616 = 'Alpine Linux', $3617 = '', $3618 = '', $3619 = '3.12', $3620 = '', $3621 = '', $3622 = 'Alpine Linux v3.12', $3623 = '', $3624 = '', $3625 = '', $3626 = '9.12.3_p4-r0', $3627 = 'invalid', $3628 = NULL, $3629 = '{}', $3630 = '{}', $3631 = 'md5', $3632 = '\xb39f94530f67461794eebec75067bef8', $3633 = 'CVE-2019-6475', $3634 = 'alpine-main-v3.12-updater', $3635 = '', $3636 = '0001-01-01 00:00:00+00', $3637 = 'https://www.cve.org/CVERecord?id=CVE-2019-6475', $3638 = '', $3639 = 'Unknown', $3640 = 'bind', $3641 = '', $3642 = '', $3643 = '', $3644 = 'source', $3645 = 'alpine', $3646 = 'Alpine Linux', $3647 = '', $3648 = '', $3649 = '3.12', $3650 = '', $3651 = '', $3652 = 'Alpine Linux v3.12', $3653 = '', $3654 = '', $3655 = '', $3656 = '9.14.7-r0', $3657 = 'invalid', $3658 = NULL, $3659 = '{}', $3660 = '{}', $3661 = 'md5', $3662 = '\x173bcdfba32cfc80af90aaf905bbf3e2', $3663 = 'CVE-2019-6476', $3664 = 'alpine-main-v3.12-updater', $3665 = '', $3666 = '0001-01-01 00:00:00+00', $3667 = 'https://www.cve.org/CVERecord?id=CVE-2019-6476', $3668 = '', $3669 = 'Unknown', $3670 = 'bind', $3671 = '', $3672 = '', $3673 = '', $3674 = 'source', $3675 = 'alpine', $3676 = 'Alpine Linux', $3677 = '', $3678 = '', $3679 = '3.12', $3680 = '', $3681 = '', $3682 = 'Alpine Linux v3.12', $3683 = '', $3684 = '', $3685 = '', $3686 = '9.14.7-r0', $3687 = 'invalid', $3688 = NULL, $3689 = '{}', $3690 = '{}', $3691 = 'md5', $3692 = '\x3871ce57a593b6d08d4ec458d55c6ce8', $3693 = 'CVE-2021-25214', $3694 = 'alpine-main-v3.12-updater', $3695 = '', $3696 = '0001-01-01 00:00:00+00', $3697 = 'https://www.cve.org/CVERecord?id=CVE-2021-25214', $3698 = '', $3699 = 'Unknown', $3700 = 'bind', $3701 = '', $3702 = '', $3703 = '', $3704 = 'source', $3705 = 'alpine', $3706 = 'Alpine Linux', $3707 = '', $3708 = '', $3709 = '3.12', $3710 = '', $3711 = '', $3712 = 'Alpine Linux v3.12', $3713 = '', $3714 = '', $3715 = '', $3716 = '9.16.15-r0', $3717 = 'invalid', $3718 = NULL, $3719 = '{}', $3720 = '{}', $3721 = 'md5', $3722 = '\x79534cafd3ecde51eae41ba8840d1648', $3723 = 'CVE-2021-25215', $3724 = 'alpine-main-v3.12-updater', $3725 = '', $3726 = '0001-01-01 00:00:00+00', $3727 = 'https://www.cve.org/CVERecord?id=CVE-2021-25215', $3728 = '', $3729 = 'Unknown', $3730 = 'bind', $3731 = '', $3732 = '', $3733 = '', $3734 = 'source', $3735 = 'alpine', $3736 = 'Alpine Linux', $3737 = '', $3738 = '', $3739 = '3.12', $3740 = '', $3741 = '', $3742 = 'Alpine Linux v3.12', $3743 = '', $3744 = '', $3745 = '', $3746 = '9.16.15-r0', $3747 = 'invalid', $3748 = NULL, $3749 = '{}', $3750 = '{}', $3751 = 'md5', $3752 = '\x13563ef4362a5f8541b35448f6eca545', $3753 = 'CVE-2021-25216', $3754 = 'alpine-main-v3.12-updater', $3755 = '', $3756 = '0001-01-01 00:00:00+00', $3757 = 'https://www.cve.org/CVERecord?id=CVE-2021-25216', $3758 = '', $3759 = 'Unknown', $3760 = 'bind', $3761 = '', $3762 = '', $3763 = '', $3764 = 'source', $3765 = 'alpine', $3766 = 'Alpine Linux', $3767 = '', $3768 = '', $3769 = '3.12', $3770 = '', $3771 = '', $3772 = 'Alpine Linux v3.12', $3773 = '', $3774 = '', $3775 = '', $3776 = '9.16.15-r0', $3777 = 'invalid', $3778 = NULL, $3779 = '{}', $3780 = '{}', $3781 = 'md5', $3782 = '\xc9ab87d105ea1701f1fbfd387fc3c310', $3783 = 'CVE-2017-3145', $3784 = 'alpine-main-v3.12-updater', $3785 = '', $3786 = '0001-01-01 00:00:00+00', $3787 = 'https://www.cve.org/CVERecord?id=CVE-2017-3145', $3788 = '', $3789 = 'Unknown', $3790 = 'bind', $3791 = '', $3792 = '', $3793 = '', $3794 = 'source', $3795 = 'alpine', $3796 = 'Alpine Linux', $3797 = '', $3798 = '', $3799 = '3.12', $3800 = '', $3801 = '', $3802 = 'Alpine Linux v3.12', $3803 = '', $3804 = '', $3805 = '', $3806 = '9.11.2_p1-r0', $3807 = 'invalid', $3808 = NULL, $3809 = '{}', $3810 = '{}', $3811 = 'md5', $3812 = '\x0aae94ea47718d01d328bb40ead76a95', $3813 = 'CVE-2018-5737', $3814 = 'alpine-main-v3.12-updater', $3815 = '', $3816 = '0001-01-01 00:00:00+00', $3817 = 'https://www.cve.org/CVERecord?id=CVE-2018-5737', $3818 = '', $3819 = 'Unknown', $3820 = 'bind', $3821 = '', $3822 = '', $3823 = '', $3824 = 'source', $3825 = 'alpine', $3826 = 'Alpine Linux', $3827 = '', $3828 = '', $3829 = '3.12', $3830 = '', $3831 = '', $3832 = 'Alpine Linux v3.12', $3833 = '', $3834 = '', $3835 = '', $3836 = '9.12.1_p2-r0', $3837 = 'invalid', $3838 = NULL, $3839 = '{}', $3840 = '{}', $3841 = 'md5', $3842 = '\x07dcc80f04f761dbfc98949217084d3f', $3843 = 'CVE-2018-5736', $3844 = 'alpine-main-v3.12-updater', $3845 = '', $3846 = '0001-01-01 00:00:00+00', $3847 = 'https://www.cve.org/CVERecord?id=CVE-2018-5736', $3848 = '', $3849 = 'Unknown', $3850 = 'bind', $3851 = '', $3852 = '', $3853 = '', $3854 = 'source', $3855 = 'alpine', $3856 = 'Alpine Linux', $3857 = '', $3858 = '', $3859 = '3.12', $3860 = '', $3861 = '', $3862 = 'Alpine Linux v3.12', $3863 = '', $3864 = '', $3865 = '', $3866 = '9.12.1_p2-r0', $3867 = 'invalid', $3868 = NULL, $3869 = '{}', $3870 = '{}', $3871 = 'md5', $3872 = '\x5a85f3b99666142cfddfeec86dc1397c', $3873 = 'CVE-2020-8616', $3874 = 'alpine-main-v3.12-updater', $3875 = '', $3876 = '0001-01-01 00:00:00+00', $3877 = 'https://www.cve.org/CVERecord?id=CVE-2020-8616', $3878 = '', $3879 = 'Unknown', $3880 = 'bind', $3881 = '', $3882 = '', $3883 = '', $3884 = 'source', $3885 = 'alpine', $3886 = 'Alpine Linux', $3887 = '', $3888 = '', $3889 = '3.12', $3890 = '', $3891 = '', $3892 = 'Alpine Linux v3.12', $3893 = '', $3894 = '', $3895 = '', $3896 = '9.14.12-r0', $3897 = 'invalid', $3898 = NULL, $3899 = '{}', $3900 = '{}', $3901 = 'md5', $3902 = '\x855cc26ec5f294a5adf698c054615116', $3903 = 'CVE-2020-8617', $3904 = 'alpine-main-v3.12-updater', $3905 = '', $3906 = '0001-01-01 00:00:00+00', $3907 = 'https://www.cve.org/CVERecord?id=CVE-2020-8617', $3908 = '', $3909 = 'Unknown', $3910 = 'bind', $3911 = '', $3912 = '', $3913 = '', $3914 = 'source', $3915 = 'alpine', $3916 = 'Alpine Linux', $3917 = '', $3918 = '', $3919 = '3.12', $3920 = '', $3921 = '', $3922 = 'Alpine Linux v3.12', $3923 = '', $3924 = '', $3925 = '', $3926 = '9.14.12-r0', $3927 = 'invalid', $3928 = NULL, $3929 = '{}', $3930 = '{}', $3931 = 'md5', $3932 = '\x21cc6180b17546450994a866d2b3e887', $3933 = 'CVE-2019-6471', $3934 = 'alpine-main-v3.12-updater', $3935 = '', $3936 = '0001-01-01 00:00:00+00', $3937 = 'https://www.cve.org/CVERecord?id=CVE-2019-6471', $3938 = '', $3939 = 'Unknown', $3940 = 'bind', $3941 = '', $3942 = '', $3943 = '', $3944 = 'source', $3945 = 'alpine', $3946 = 'Alpine Linux', $3947 = '', $3948 = '', $3949 = '3.12', $3950 = '', $3951 = '', $3952 = 'Alpine Linux v3.12', $3953 = '', $3954 = '', $3955 = '', $3956 = '9.14.4-r0', $3957 = 'invalid', $3958 = NULL, $3959 = '{}', $3960 = '{}', $3961 = 'md5', $3962 = '\x2fe5b8543c90b20df51e52940372bdbb', $3963 = 'CVE-2019-6477', $3964 = 'alpine-main-v3.12-updater', $3965 = '', $3966 = '0001-01-01 00:00:00+00', $3967 = 'https://www.cve.org/CVERecord?id=CVE-2019-6477', $3968 = '', $3969 = 'Unknown', $3970 = 'bind', $3971 = '', $3972 = '', $3973 = '', $3974 = 'source', $3975 = 'alpine', $3976 = 'Alpine Linux', $3977 = '', $3978 = '', $3979 = '3.12', $3980 = '', $3981 = '', $3982 = 'Alpine Linux v3.12', $3983 = '', $3984 = '', $3985 = '', $3986 = '9.14.8-r0', $3987 = 'invalid', $3988 = NULL, $3989 = '{}', $3990 = '{}', $3991 = 'md5', $3992 = '\xde8fd24bb2c67cc638a2714547e260ce', $3993 = 'CVE-2019-6470', $3994 = 'alpine-main-v3.12-updater', $3995 = '', $3996 = '0001-01-01 00:00:00+00', $3997 = 'https://www.cve.org/CVERecord?id=CVE-2019-6470', $3998 = '', $3999 = 'Unknown', $4000 = 'bind', $4001 = '', $4002 = '', $4003 = '', $4004 = 'source', $4005 = 'alpine', $4006 = 'Alpine Linux', $4007 = '', $4008 = '', $4009 = '3.12', $4010 = '', $4011 = '', $4012 = 'Alpine Linux v3.12', $4013 = '', $4014 = '', $4015 = '', $4016 = '0', $4017 = 'invalid', $4018 = NULL, $4019 = '{}', $4020 = '{}', $4021 = 'md5', $4022 = '\xe0378ee1109a9dd6871593cb0c8db9b0', $4023 = 'CVE-2016-9131', $4024 = 'alpine-main-v3.12-updater', $4025 = '', $4026 = '0001-01-01 00:00:00+00', $4027 = 'https://www.cve.org/CVERecord?id=CVE-2016-9131', $4028 = '', $4029 = 'Unknown', $4030 = 'bind', $4031 = '', $4032 = '', $4033 = '', $4034 = 'source', $4035 = 'alpine', $4036 = 'Alpine Linux', $4037 = '', $4038 = '', $4039 = '3.12', $4040 = '', $4041 = '', $4042 = 'Alpine Linux v3.12', $4043 = '', $4044 = '', $4045 = '', $4046 = '9.10.4_p5-r0', $4047 = 'invalid', $4048 = NULL, $4049 = '{}', $4050 = '{}', $4051 = 'md5', $4052 = '\x84adafce6fa493aed9d9bfbac1c18bb6', $4053 = 'CVE-2016-9147', $4054 = 'alpine-main-v3.12-updater', $4055 = '', $4056 = '0001-01-01 00:00:00+00', $4057 = 'https://www.cve.org/CVERecord?id=CVE-2016-9147', $4058 = '', $4059 = 'Unknown', $4060 = 'bind', $4061 = '', $4062 = '', $4063 = '', $4064 = 'source', $4065 = 'alpine', $4066 = 'Alpine Linux', $4067 = '', $4068 = '', $4069 = '3.12', $4070 = '', $4071 = '', $4072 = 'Alpine Linux v3.12', $4073 = '', $4074 = '', $4075 = '', $4076 = '9.10.4_p5-r0', $4077 = 'invalid', $4078 = NULL, $4079 = '{}', $4080 = '{}', $4081 = 'md5', $4082 = '\x9360082ee9c64b1a8b4f2a8c6872728e', $4083 = 'CVE-2016-9444', $4084 = 'alpine-main-v3.12-updater', $4085 = '', $4086 = '0001-01-01 00:00:00+00', $4087 = 'https://www.cve.org/CVERecord?id=CVE-2016-9444', $4088 = '', $4089 = 'Unknown', $4090 = 'bind', $4091 = '', $4092 = '', $4093 = '', $4094 = 'source', $4095 = 'alpine', $4096 = 'Alpine Linux', $4097 = '', $4098 = '', $4099 = '3.12', $4100 = '', $4101 = '', $4102 = 'Alpine Linux v3.12', $4103 = '', $4104 = '', $4105 = '', $4106 = '9.10.4_p5-r0', $4107 = 'invalid', $4108 = NULL, $4109 = '{}', $4110 = '{}', $4111 = 'md5', $4112 = '\x0c67878576d207095ea1fbf5ead57695', $4113 = 'CVE-2017-3136', $4114 = 'alpine-main-v3.12-updater', $4115 = '', $4116 = '0001-01-01 00:00:00+00', $4117 = 'https://www.cve.org/CVERecord?id=CVE-2017-3136', $4118 = '', $4119 = 'Unknown', $4120 = 'bind', $4121 = '', $4122 = '', $4123 = '', $4124 = 'source', $4125 = 'alpine', $4126 = 'Alpine Linux', $4127 = '', $4128 = '', $4129 = '3.12', $4130 = '', $4131 = '', $4132 = 'Alpine Linux v3.12', $4133 = '', $4134 = '', $4135 = '', $4136 = '9.11.0_p5-r0', $4137 = 'invalid', $4138 = NULL, $4139 = '{}', $4140 = '{}', $4141 = 'md5', $4142 = '\x356ddbc8e62ca016605641d1503dca38', $4143 = 'CVE-2017-3137', $4144 = 'alpine-main-v3.12-updater', $4145 = '', $4146 = '0001-01-01 00:00:00+00', $4147 = 'https://www.cve.org/CVERecord?id=CVE-2017-3137', $4148 = '', $4149 = 'Unknown', $4150 = 'bind', $4151 = '', $4152 = '', $4153 = '', $4154 = 'source', $4155 = 'alpine', $4156 = 'Alpine Linux', $4157 = '', $4158 = '', $4159 = '3.12', $4160 = '', $4161 = '', $4162 = 'Alpine Linux v3.12', $4163 = '', $4164 = '', $4165 = '', $4166 = '9.11.0_p5-r0', $4167 = 'invalid', $4168 = NULL, $4169 = '{}', $4170 = '{}', $4171 = 'md5', $4172 = '\x9c90fc6506bcefab751dfc384ba32dd2', $4173 = 'CVE-2017-3138', $4174 = 'alpine-main-v3.12-updater', $4175 = '', $4176 = '0001-01-01 00:00:00+00', $4177 = 'https://www.cve.org/CVERecord?id=CVE-2017-3138', $4178 = '', $4179 = 'Unknown', $4180 = 'bind', $4181 = '', $4182 = '', $4183 = '', $4184 = 'source', $4185 = 'alpine', $4186 = 'Alpine Linux', $4187 = '', $4188 = '', $4189 = '3.12', $4190 = '', $4191 = '', $4192 = 'Alpine Linux v3.12', $4193 = '', $4194 = '', $4195 = '', $4196 = '9.11.0_p5-r0', $4197 = 'invalid', $4198 = NULL, $4199 = '{}', $4200 = '{}', $4201 = 'md5', $4202 = '\xbc981cc498a988b25d527d39e1f4e166', $4203 = 'CVE-2022-0396', $4204 = 'alpine-main-v3.12-updater', $4205 = '', $4206 = '0001-01-01 00:00:00+00', $4207 = 'https://www.cve.org/CVERecord?id=CVE-2022-0396', $4208 = '', $4209 = 'Unknown', $4210 = 'bind', $4211 = '', $4212 = '', $4213 = '', $4214 = 'source', $4215 = 'alpine', $4216 = 'Alpine Linux', $4217 = '', $4218 = '', $4219 = '3.12', $4220 = '', $4221 = '', $4222 = 'Alpine Linux v3.12', $4223 = '', $4224 = '', $4225 = '', $4226 = '9.16.27-r0', $4227 = 'invalid', $4228 = NULL, $4229 = '{}', $4230 = '{}', $4231 = 'md5', $4232 = '\x482b1810a051758d802c788ce8c9698b', $4233 = 'CVE-2021-25219', $4234 = 'alpine-main-v3.12-updater', $4235 = '', $4236 = '0001-01-01 00:00:00+00', $4237 = 'https://www.cve.org/CVERecord?id=CVE-2021-25219', $4238 = '', $4239 = 'Unknown', $4240 = 'bind', $4241 = '', $4242 = '', $4243 = '', $4244 = 'source', $4245 = 'alpine', $4246 = 'Alpine Linux', $4247 = '', $4248 = '', $4249 = '3.12', $4250 = '', $4251 = '', $4252 = 'Alpine Linux v3.12', $4253 = '', $4254 = '', $4255 = '', $4256 = '9.16.27-r0', $4257 = 'invalid', $4258 = NULL, $4259 = '{}', $4260 = '{}', $4261 = 'md5', $4262 = '\x82750d85a0ae40030a660c8e3df6ad9c', $4263 = 'CVE-2021-25220', $4264 = 'alpine-main-v3.12-updater', $4265 = '', $4266 = '0001-01-01 00:00:00+00', $4267 = 'https://www.cve.org/CVERecord?id=CVE-2021-25220', $4268 = '', $4269 = 'Unknown', $4270 = 'bind', $4271 = '', $4272 = '', $4273 = '', $4274 = 'source', $4275 = 'alpine', $4276 = 'Alpine Linux', $4277 = '', $4278 = '', $4279 = '3.12', $4280 = '', $4281 = '', $4282 = 'Alpine Linux v3.12', $4283 = '', $4284 = '', $4285 = '', $4286 = '9.16.27-r0', $4287 = 'invalid', $4288 = NULL, $4289 = '{}', $4290 = '{}', $4291 = 'md5', $4292 = '\x83fcca03b3c3dbfface8789b80c74526', $4293 = 'CVE-2020-8618', $4294 = 'alpine-main-v3.12-updater', $4295 = '', $4296 = '0001-01-01 00:00:00+00', $4297 = 'https://www.cve.org/CVERecord?id=CVE-2020-8618', $4298 = '', $4299 = 'Unknown', $4300 = 'bind', $4301 = '', $4302 = '', $4303 = '', $4304 = 'source', $4305 = 'alpine', $4306 = 'Alpine Linux', $4307 = '', $4308 = '', $4309 = '3.12', $4310 = '', $4311 = '', $4312 = 'Alpine Linux v3.12', $4313 = '', $4314 = '', $4315 = '', $4316 = '9.16.4-r0', $4317 = 'invalid', $4318 = NULL, $4319 = '{}', $4320 = '{}', $4321 = 'md5', $4322 = '\x667a03300387a3926801eb100269fc5f', $4323 = 'CVE-2020-8619', $4324 = 'alpine-main-v3.12-updater', $4325 = '', $4326 = '0001-01-01 00:00:00+00', $4327 = 'https://www.cve.org/CVERecord?id=CVE-2020-8619', $4328 = '', $4329 = 'Unknown', $4330 = 'bind', $4331 = '', $4332 = '', $4333 = '', $4334 = 'source', $4335 = 'alpine', $4336 = 'Alpine Linux', $4337 = '', $4338 = '', $4339 = '3.12', $4340 = '', $4341 = '', $4342 = 'Alpine Linux v3.12', $4343 = '', $4344 = '', $4345 = '', $4346 = '9.16.4-r0', $4347 = 'invalid', $4348 = NULL, $4349 = '{}', $4350 = '{}', $4351 = 'md5', $4352 = '\x9b8fc4b08ffaa236289629c153184f5e', $4353 = 'CVE-2019-6467', $4354 = 'alpine-main-v3.12-updater', $4355 = '', $4356 = '0001-01-01 00:00:00+00', $4357 = 'https://www.cve.org/CVERecord?id=CVE-2019-6467', $4358 = '', $4359 = 'Unknown', $4360 = 'bind', $4361 = '', $4362 = '', $4363 = '', $4364 = 'source', $4365 = 'alpine', $4366 = 'Alpine Linux', $4367 = '', $4368 = '', $4369 = '3.12', $4370 = '', $4371 = '', $4372 = 'Alpine Linux v3.12', $4373 = '', $4374 = '', $4375 = '', $4376 = '9.14.1-r0', $4377 = 'invalid', $4378 = NULL, $4379 = '{}', $4380 = '{}', $4381 = 'md5', $4382 = '\x684b9e1a02b3fbcf8e21929a4c68a0c9', $4383 = 'CVE-2018-5743', $4384 = 'alpine-main-v3.12-updater', $4385 = '', $4386 = '0001-01-01 00:00:00+00', $4387 = 'https://www.cve.org/CVERecord?id=CVE-2018-5743', $4388 = '', $4389 = 'Unknown', $4390 = 'bind', $4391 = '', $4392 = '', $4393 = '', $4394 = 'source', $4395 = 'alpine', $4396 = 'Alpine Linux', $4397 = '', $4398 = '', $4399 = '3.12', $4400 = '', $4401 = '', $4402 = 'Alpine Linux v3.12', $4403 = '', $4404 = '', $4405 = '', $4406 = '9.14.1-r0', $4407 = 'invalid', $4408 = NULL, $4409 = '{}', $4410 = '{}', $4411 = 'md5', $4412 = '\xb259f68424e70a19e8a4ab3724e4d32e', $4413 = 'CVE-2017-7614', $4414 = 'alpine-main-v3.12-updater', $4415 = '', $4416 = '0001-01-01 00:00:00+00', $4417 = 'https://www.cve.org/CVERecord?id=CVE-2017-7614', $4418 = '', $4419 = 'Unknown', $4420 = 'binutils', $4421 = '', $4422 = '', $4423 = '', $4424 = 'source', $4425 = 'alpine', $4426 = 'Alpine Linux', $4427 = '', $4428 = '', $4429 = '3.12', $4430 = '', $4431 = '', $4432 = 'Alpine Linux v3.12', $4433 = '', $4434 = '', $4435 = '', $4436 = '2.28-r1', $4437 = 'invalid', $4438 = NULL, $4439 = '{}', $4440 = '{}', $4441 = 'md5', $4442 = '\xfcae3e8fbbb6198abd23f577ffd2dc09', $4443 = 'CVE-2018-19931', $4444 = 'alpine-main-v3.12-updater', $4445 = '', $4446 = '0001-01-01 00:00:00+00', $4447 = 'https://www.cve.org/CVERecord?id=CVE-2018-19931', $4448 = '', $4449 = 'Unknown', $4450 = 'binutils', $4451 = '', $4452 = '', $4453 = '', $4454 = 'source', $4455 = 'alpine', $4456 = 'Alpine Linux', $4457 = '', $4458 = '', $4459 = '3.12', $4460 = '', $4461 = '', $4462 = 'Alpine Linux v3.12', $4463 = '', $4464 = '', $4465 = '', $4466 = '2.32-r0', $4467 = 'invalid', $4468 = NULL, $4469 = '{}', $4470 = '{}', $4471 = 'md5', $4472 = '\x7113f881e378c3fd95cc3fcb43548767', $4473 = 'CVE-2018-19932', $4474 = 'alpine-main-v3.12-updater', $4475 = '', $4476 = '0001-01-01 00:00:00+00', $4477 = 'https://www.cve.org/CVERecord?id=CVE-2018-19932', $4478 = '', $4479 = 'Unknown', $4480 = 'binutils', $4481 = '', $4482 = '', $4483 = '', $4484 = 'source', $4485 = 'alpine', $4486 = 'Alpine Linux', $4487 = '', $4488 = '', $4489 = '3.12', $4490 = '', $4491 = '', $4492 = 'Alpine Linux v3.12', $4493 = '', $4494 = '', $4495 = '', $4496 = '2.32-r0', $4497 = 'invalid', $4498 = NULL, $4499 = '{}', $4500 = '{}', $4501 = 'md5', $4502 = '\x247cb475ea5c15f614b994a14bf42290', $4503 = 'CVE-2018-20002', $4504 = 'alpine-main-v3.12-updater', $4505 = '', $4506 = '0001-01-01 00:00:00+00', $4507 = 'https://www.cve.org/CVERecord?id=CVE-2018-20002', $4508 = '', $4509 = 'Unknown', $4510 = 'binutils', $4511 = '', $4512 = '', $4513 = '', $4514 = 'source', $4515 = 'alpine', $4516 = 'Alpine Linux', $4517 = '', $4518 = '', $4519 = '3.12', $4520 = '', $4521 = '', $4522 = 'Alpine Linux v3.12', $4523 = '', $4524 = '', $4525 = '', $4526 = '2.32-r0', $4527 = 'invalid', $4528 = NULL, $4529 = '{}', $4530 = '{}', $4531 = 'md5', $4532 = '\x214e011e591320821ae42fa2ca032f9a', $4533 = 'CVE-2018-20712', $4534 = 'alpine-main-v3.12-updater', $4535 = '', $4536 = '0001-01-01 00:00:00+00', $4537 = 'https://www.cve.org/CVERecord?id=CVE-2018-20712', $4538 = '', $4539 = 'Unknown', $4540 = 'binutils', $4541 = '', $4542 = '', $4543 = '', $4544 = 'source', $4545 = 'alpine', $4546 = 'Alpine Linux', $4547 = '', $4548 = '', $4549 = '3.12', $4550 = '', $4551 = '', $4552 = 'Alpine Linux v3.12', $4553 = '', $4554 = '', $4555 = '', $4556 = '2.32-r0', $4557 = 'invalid', $4558 = NULL, $4559 = '{}', $4560 = '{}', $4561 = 'md5', $4562 = '\x88d2aed73eef98fce4ec90594c3314a9', $4563 = 'CVE-2021-3487', $4564 = 'alpine-main-v3.12-updater', $4565 = '', $4566 = '0001-01-01 00:00:00+00', $4567 = 'https://www.cve.org/CVERecord?id=CVE-2021-3487', $4568 = '', $4569 = 'Unknown', $4570 = 'binutils', $4571 = '', $4572 = '', $4573 = '', $4574 = 'source', $4575 = 'alpine', $4576 = 'Alpine Linux', $4577 = '', $4578 = '', $4579 = '3.12', $4580 = '', $4581 = '', $4582 = 'Alpine Linux v3.12', $4583 = '', $4584 = '', $4585 = '', $4586 = '2.34-r2', $4587 = 'invalid', $4588 = NULL, $4589 = '{}', $4590 = '{}', $4591 = 'md5', $4592 = '\xaf1a0d08b6471a142045531f067da0b4', $4593 = 'CVE-2020-0556', $4594 = 'alpine-main-v3.12-updater', $4595 = '', $4596 = '0001-01-01 00:00:00+00', $4597 = 'https://www.cve.org/CVERecord?id=CVE-2020-0556', $4598 = '', $4599 = 'Unknown', $4600 = 'bluez', $4601 = '', $4602 = '', $4603 = '', $4604 = 'source', $4605 = 'alpine', $4606 = 'Alpine Linux', $4607 = '', $4608 = '', $4609 = '3.12', $4610 = '', $4611 = '', $4612 = 'Alpine Linux v3.12', $4613 = '', $4614 = '', $4615 = '', $4616 = '5.54-r0', $4617 = 'invalid', $4618 = NULL, $4619 = '{}', $4620 = '{}', $4621 = 'md5', $4622 = '\xf92e5a6fca8442dde84bf45710304f7d', $4623 = 'CVE-2020-27153', $4624 = 'alpine-main-v3.12-updater', $4625 = '', $4626 = '0001-01-01 00:00:00+00', $4627 = 'https://www.cve.org/CVERecord?id=CVE-2020-27153', $4628 = '', $4629 = 'Unknown', $4630 = 'bluez', $4631 = '', $4632 = '', $4633 = '', $4634 = 'source', $4635 = 'alpine', $4636 = 'Alpine Linux', $4637 = '', $4638 = '', $4639 = '3.12', $4640 = '', $4641 = '', $4642 = 'Alpine Linux v3.12', $4643 = '', $4644 = '', $4645 = '', $4646 = '5.54-r6', $4647 = 'invalid', $4648 = NULL, $4649 = '{}', $4650 = '{}', $4651 = 'md5', $4652 = '\xc3de6d600ec8e0ec67b0c721392a312d', $4653 = 'CVE-2018-20187', $4654 = 'alpine-main-v3.12-updater', $4655 = '', $4656 = '0001-01-01 00:00:00+00', $4657 = 'https://www.cve.org/CVERecord?id=CVE-2018-20187', $4658 = '', $4659 = 'Unknown', $4660 = 'botan', $4661 = '', $4662 = '', $4663 = '', $4664 = 'source', $4665 = 'alpine', $4666 = 'Alpine Linux', $4667 = '', $4668 = '', $4669 = '3.12', $4670 = '', $4671 = '', $4672 = 'Alpine Linux v3.12', $4673 = '', $4674 = '', $4675 = '', $4676 = '2.9.0-r0', $4677 = 'invalid', $4678 = NULL, $4679 = '{}', $4680 = '{}', $4681 = 'md5', $4682 = '\x1e002bfd16519b9441c2ce820fada419', $4683 = 'CVE-2021-24115', $4684 = 'alpine-main-v3.12-updater', $4685 = '', $4686 = '0001-01-01 00:00:00+00', $4687 = 'https://www.cve.org/CVERecord?id=CVE-2021-24115', $4688 = '', $4689 = 'Unknown', $4690 = 'botan', $4691 = '', $4692 = '', $4693 = '', $4694 = 'source', $4695 = 'alpine', $4696 = 'Alpine Linux', $4697 = '', $4698 = '', $4699 = '3.12', $4700 = '', $4701 = '', $4702 = 'Alpine Linux v3.12', $4703 = '', $4704 = '', $4705 = '', $4706 = '2.11.0-r6', $4707 = 'invalid', $4708 = NULL, $4709 = '{}', $4710 = '{}', $4711 = 'md5', $4712 = '\x747ff07e927acb541ce11e088f732bf7', $4713 = 'CVE-2018-9127', $4714 = 'alpine-main-v3.12-updater', $4715 = '', $4716 = '0001-01-01 00:00:00+00', $4717 = 'https://www.cve.org/CVERecord?id=CVE-2018-9127', $4718 = '', $4719 = 'Unknown', $4720 = 'botan', $4721 = '', $4722 = '', $4723 = '', $4724 = 'source', $4725 = 'alpine', $4726 = 'Alpine Linux', $4727 = '', $4728 = '', $4729 = '3.12', $4730 = '', $4731 = '', $4732 = 'Alpine Linux v3.12', $4733 = '', $4734 = '', $4735 = '', $4736 = '2.5.0-r0', $4737 = 'invalid', $4738 = NULL, $4739 = '{}', $4740 = '{}', $4741 = 'md5', $4742 = '\x88a8ade58d0710677857ced898a9f881', $4743 = 'CVE-2018-9860', $4744 = 'alpine-main-v3.12-updater', $4745 = '', $4746 = '0001-01-01 00:00:00+00', $4747 = 'https://www.cve.org/CVERecord?id=CVE-2018-9860', $4748 = '', $4749 = 'Unknown', $4750 = 'botan', $4751 = '', $4752 = '', $4753 = '', $4754 = 'source', $4755 = 'alpine', $4756 = 'Alpine Linux', $4757 = '', $4758 = '', $4759 = '3.12', $4760 = '', $4761 = '', $4762 = 'Alpine Linux v3.12', $4763 = '', $4764 = '', $4765 = '', $4766 = '2.6.0-r0', $4767 = 'invalid', $4768 = NULL, $4769 = '{}', $4770 = '{}', $4771 = 'md5', $4772 = '\x7d406ca2a0dcb795953453c82b9b3473', $4773 = 'CVE-2018-12435', $4774 = 'alpine-main-v3.12-updater', $4775 = '', $4776 = '0001-01-01 00:00:00+00', $4777 = 'https://www.cve.org/CVERecord?id=CVE-2018-12435', $4778 = '', $4779 = 'Unknown', $4780 = 'botan', $4781 = '', $4782 = '', $4783 = '', $4784 = 'source', $4785 = 'alpine', $4786 = 'Alpine Linux', $4787 = '', $4788 = '', $4789 = '3.12', $4790 = '', $4791 = '', $4792 = 'Alpine Linux v3.12', $4793 = '', $4794 = '', $4795 = '', $4796 = '2.7.0-r0', $4797 = 'invalid', $4798 = NULL, $4799 = '{}', $4800 = '{}', $4801 = 'md5', $4802 = '\x45dea71a36ed32206010b1668429d83d', $4803 = 'CVE-2020-8927', $4804 = 'alpine-main-v3.12-updater', $4805 = '', $4806 = '0001-01-01 00:00:00+00', $4807 = 'https://www.cve.org/CVERecord?id=CVE-2020-8927', $4808 = '', $4809 = 'Unknown', $4810 = 'brotli', $4811 = '', $4812 = '', $4813 = '', $4814 = 'source', $4815 = 'alpine', $4816 = 'Alpine Linux', $4817 = '', $4818 = '', $4819 = '3.12', $4820 = '', $4821 = '', $4822 = 'Alpine Linux v3.12', $4823 = '', $4824 = '', $4825 = '', $4826 = '1.0.9-r0', $4827 = 'invalid', $4828 = NULL, $4829 = '{}', $4830 = '{}', $4831 = 'md5', $4832 = '\x894f2349726ceafac6f3c22f2f563ef7', $4833 = 'CVE-2020-5291', $4834 = 'alpine-main-v3.12-updater', $4835 = '', $4836 = '0001-01-01 00:00:00+00', $4837 = 'https://www.cve.org/CVERecord?id=CVE-2020-5291', $4838 = '', $4839 = 'Unknown', $4840 = 'bubblewrap', $4841 = '', $4842 = '', $4843 = '', $4844 = 'source', $4845 = 'alpine', $4846 = 'Alpine Linux', $4847 = '', $4848 = '', $4849 = '3.12', $4850 = '', $4851 = '', $4852 = 'Alpine Linux v3.12', $4853 = '', $4854 = '', $4855 = '', $4856 = '0.4.1-r0', $4857 = 'invalid', $4858 = NULL, $4859 = '{}', $4860 = '{}', $4861 = 'md5', $4862 = '\x3eda0bc39f957f5cf26db5f3483a16cd', $4863 = 'CVE-2018-20679', $4864 = 'alpine-main-v3.12-updater', $4865 = '', $4866 = '0001-01-01 00:00:00+00', $4867 = 'https://www.cve.org/CVERecord?id=CVE-2018-20679', $4868 = '', $4869 = 'Unknown', $4870 = 'busybox', $4871 = '', $4872 = '', $4873 = '', $4874 = 'source', $4875 = 'alpine', $4876 = 'Alpine Linux', $4877 = '', $4878 = '', $4879 = '3.12', $4880 = '', $4881 = '', $4882 = 'Alpine Linux v3.12', $4883 = '', $4884 = '', $4885 = '', $4886 = '1.29.3-r10', $4887 = 'invalid', $4888 = NULL, $4889 = '{}', $4890 = '{}', $4891 = 'md5', $4892 = '\xfb71a0eb98bbc87191f5bb58f7abe99b', $4893 = 'CVE-2019-5747', $4894 = 'alpine-main-v3.12-updater', $4895 = '', $4896 = '0001-01-01 00:00:00+00', $4897 = 'https://www.cve.org/CVERecord?id=CVE-2019-5747', $4898 = '', $4899 = 'Unknown', $4900 = 'busybox', $4901 = '', $4902 = '', $4903 = '', $4904 = 'source', $4905 = 'alpine', $4906 = 'Alpine Linux', $4907 = '', $4908 = '', $4909 = '3.12', $4910 = '', $4911 = '', $4912 = 'Alpine Linux v3.12', $4913 = '', $4914 = '', $4915 = '', $4916 = '1.30.1-r2', $4917 = 'invalid', $4918 = NULL, $4919 = '{}', $4920 = '{}', $4921 = 'md5', $4922 = '\x85039ce524ef30a64bcf5ed456851af2', $4923 = 'CVE-2021-28831', $4924 = 'alpine-main-v3.12-updater', $4925 = '', $4926 = '0001-01-01 00:00:00+00', $4927 = 'https://www.cve.org/CVERecord?id=CVE-2021-28831', $4928 = '', $4929 = 'Unknown', $4930 = 'busybox', $4931 = '', $4932 = '', $4933 = '', $4934 = 'source', $4935 = 'alpine', $4936 = 'Alpine Linux', $4937 = '', $4938 = '', $4939 = '3.12', $4940 = '', $4941 = '', $4942 = 'Alpine Linux v3.12', $4943 = '', $4944 = '', $4945 = '', $4946 = '1.31.1-r20', $4947 = 'invalid', $4948 = NULL, $4949 = '{}', $4950 = '{}', $4951 = 'md5', $4952 = '\xbfef8cc0d46fc6d645a752af018c630a', $4953 = 'CVE-2021-42374', $4954 = 'alpine-main-v3.12-updater', $4955 = '', $4956 = '0001-01-01 00:00:00+00', $4957 = 'https://www.cve.org/CVERecord?id=CVE-2021-42374', $4958 = '', $4959 = 'Unknown', $4960 = 'busybox', $4961 = '', $4962 = '', $4963 = '', $4964 = 'source', $4965 = 'alpine', $4966 = 'Alpine Linux', $4967 = '', $4968 = '', $4969 = '3.12', $4970 = '', $4971 = '', $4972 = 'Alpine Linux v3.12', $4973 = '', $4974 = '', $4975 = '', $4976 = '1.31.1-r21', $4977 = 'invalid', $4978 = NULL, $4979 = '{}', $4980 = '{}', $4981 = 'md5', $4982 = '\x87e3b740c8567c709b35d96b430fe28a', $4983 = 'CVE-2021-42378', $4984 = 'alpine-main-v3.12-updater', $4985 = '', $4986 = '0001-01-01 00:00:00+00', $4987 = 'https://www.cve.org/CVERecord?id=CVE-2021-42378', $4988 = '', $4989 = 'Unknown', $4990 = 'busybox', $4991 = '', $4992 = '', $4993 = '', $4994 = 'source', $4995 = 'alpine', $4996 = 'Alpine Linux', $4997 = '', $4998 = '', $4999 = '3.12', $5000 = '', $5001 = '', $5002 = 'Alpine Linux v3.12', $5003 = '', $5004 = '', $5005 = '', $5006 = '1.31.1-r21', $5007 = 'invalid', $5008 = NULL, $5009 = '{}', $5010 = '{}', $5011 = 'md5', $5012 = '\xadc0ca6004aa7eb3dfcccee73fa20ba2', $5013 = 'CVE-2021-42379', $5014 = 'alpine-main-v3.12-updater', $5015 = '', $5016 = '0001-01-01 00:00:00+00', $5017 = 'https://www.cve.org/CVERecord?id=CVE-2021-42379', $5018 = '', $5019 = 'Unknown', $5020 = 'busybox', $5021 = '', $5022 = '', $5023 = '', $5024 = 'source', $5025 = 'alpine', $5026 = 'Alpine Linux', $5027 = '', $5028 = '', $5029 = '3.12', $5030 = '', $5031 = '', $5032 = 'Alpine Linux v3.12', $5033 = '', $5034 = '', $5035 = '', $5036 = '1.31.1-r21', $5037 = 'invalid', $5038 = NULL, $5039 = '{}', $5040 = '{}', $5041 = 'md5', $5042 = '\xf9d7726c2eed37e2fe40f12ecbf287de', $5043 = 'CVE-2021-42380', $5044 = 'alpine-main-v3.12-updater', $5045 = '', $5046 = '0001-01-01 00:00:00+00', $5047 = 'https://www.cve.org/CVERecord?id=CVE-2021-42380', $5048 = '', $5049 = 'Unknown', $5050 = 'busybox', $5051 = '', $5052 = '', $5053 = '', $5054 = 'source', $5055 = 'alpine', $5056 = 'Alpine Linux', $5057 = '', $5058 = '', $5059 = '3.12', $5060 = '', $5061 = '', $5062 = 'Alpine Linux v3.12', $5063 = '', $5064 = '', $5065 = '', $5066 = '1.31.1-r21', $5067 = 'invalid', $5068 = NULL, $5069 = '{}', $5070 = '{}', $5071 = 'md5', $5072 = '\xc7bd8ddd20e52019fba70ca3a2d24cf9', $5073 = 'CVE-2021-42381', $5074 = 'alpine-main-v3.12-updater', $5075 = '', $5076 = '0001-01-01 00:00:00+00', $5077 = 'https://www.cve.org/CVERecord?id=CVE-2021-42381', $5078 = '', $5079 = 'Unknown', $5080 = 'busybox', $5081 = '', $5082 = '', $5083 = '', $5084 = 'source', $5085 = 'alpine', $5086 = 'Alpine Linux', $5087 = '', $5088 = '', $5089 = '3.12', $5090 = '', $5091 = '', $5092 = 'Alpine Linux v3.12', $5093 = '', $5094 = '', $5095 = '', $5096 = '1.31.1-r21', $5097 = 'invalid', $5098 = NULL, $5099 = '{}', $5100 = '{}', $5101 = 'md5', $5102 = '\xa104c8e8c5ea4d73ae07894b600573b7', $5103 = 'CVE-2021-42382', $5104 = 'alpine-main-v3.12-updater', $5105 = '', $5106 = '0001-01-01 00:00:00+00', $5107 = 'https://www.cve.org/CVERecord?id=CVE-2021-42382', $5108 = '', $5109 = 'Unknown', $5110 = 'busybox', $5111 = '', $5112 = '', $5113 = '', $5114 = 'source', $5115 = 'alpine', $5116 = 'Alpine Linux', $5117 = '', $5118 = '', $5119 = '3.12', $5120 = '', $5121 = '', $5122 = 'Alpine Linux v3.12', $5123 = '', $5124 = '', $5125 = '', $5126 = '1.31.1-r21', $5127 = 'invalid', $5128 = NULL, $5129 = '{}', $5130 = '{}', $5131 = 'md5', $5132 = '\x2a7eaaca4ad82f7f3d0b4aac862d4b70', $5133 = 'CVE-2021-42383', $5134 = 'alpine-main-v3.12-updater', $5135 = '', $5136 = '0001-01-01 00:00:00+00', $5137 = 'https://www.cve.org/CVERecord?id=CVE-2021-42383', $5138 = '', $5139 = 'Unknown', $5140 = 'busybox', $5141 = '', $5142 = '', $5143 = '', $5144 = 'source', $5145 = 'alpine', $5146 = 'Alpine Linux', $5147 = '', $5148 = '', $5149 = '3.12', $5150 = '', $5151 = '', $5152 = 'Alpine Linux v3.12', $5153 = '', $5154 = '', $5155 = '', $5156 = '1.31.1-r21', $5157 = 'invalid', $5158 = NULL, $5159 = '{}', $5160 = '{}', $5161 = 'md5', $5162 = '\x0551b1c5ee136c8f32ed9a44568459c1', $5163 = 'CVE-2021-42384', $5164 = 'alpine-main-v3.12-updater', $5165 = '', $5166 = '0001-01-01 00:00:00+00', $5167 = 'https://www.cve.org/CVERecord?id=CVE-2021-42384', $5168 = '', $5169 = 'Unknown', $5170 = 'busybox', $5171 = '', $5172 = '', $5173 = '', $5174 = 'source', $5175 = 'alpine', $5176 = 'Alpine Linux', $5177 = '', $5178 = '', $5179 = '3.12', $5180 = '', $5181 = '', $5182 = 'Alpine Linux v3.12', $5183 = '', $5184 = '', $5185 = '', $5186 = '1.31.1-r21', $5187 = 'invalid', $5188 = NULL, $5189 = '{}', $5190 = '{}', $5191 = 'md5', $5192 = '\xc242852e8bf52aced6ed715145ccdd24', $5193 = 'CVE-2021-42385', $5194 = 'alpine-main-v3.12-updater', $5195 = '', $5196 = '0001-01-01 00:00:00+00', $5197 = 'https://www.cve.org/CVERecord?id=CVE-2021-42385', $5198 = '', $5199 = 'Unknown', $5200 = 'busybox', $5201 = '', $5202 = '', $5203 = '', $5204 = 'source', $5205 = 'alpine', $5206 = 'Alpine Linux', $5207 = '', $5208 = '', $5209 = '3.12', $5210 = '', $5211 = '', $5212 = 'Alpine Linux v3.12', $5213 = '', $5214 = '', $5215 = '', $5216 = '1.31.1-r21', $5217 = 'invalid', $5218 = NULL, $5219 = '{}', $5220 = '{}', $5221 = 'md5', $5222 = '\x9c20e11f51e1673eecedcdec9c84aa12', $5223 = 'CVE-2021-42386', $5224 = 'alpine-main-v3.12-updater', $5225 = '', $5226 = '0001-01-01 00:00:00+00', $5227 = 'https://www.cve.org/CVERecord?id=CVE-2021-42386', $5228 = '', $5229 = 'Unknown', $5230 = 'busybox', $5231 = '', $5232 = '', $5233 = '', $5234 = 'source', $5235 = 'alpine', $5236 = 'Alpine Linux', $5237 = '', $5238 = '', $5239 = '3.12', $5240 = '', $5241 = '', $5242 = 'Alpine Linux v3.12', $5243 = '', $5244 = '', $5245 = '', $5246 = '1.31.1-r21', $5247 = 'invalid', $5248 = NULL, $5249 = '{}', $5250 = '{}', $5251 = 'md5', $5252 = '\x5c50a84e9e670a5bcce43f15caeff09b', $5253 = 'ALPINE-13661', $5254 = 'alpine-main-v3.12-updater', $5255 = '', $5256 = '0001-01-01 00:00:00+00', $5257 = 'https://www.cve.org/CVERecord?id=ALPINE-13661', $5258 = '', $5259 = 'Unknown', $5260 = 'busybox', $5261 = '', $5262 = '', $5263 = '', $5264 = 'source', $5265 = 'alpine', $5266 = 'Alpine Linux', $5267 = '', $5268 = '', $5269 = '3.12', $5270 = '', $5271 = '', $5272 = 'Alpine Linux v3.12', $5273 = '', $5274 = '', $5275 = '', $5276 = '1.31.1-r22', $5277 = 'invalid', $5278 = NULL, $5279 = '{}', $5280 = '{}', $5281 = 'md5', $5282 = '\x26355e7b5f2c0178fa95cb6ea246d248', $5283 = 'CVE-2022-28391', $5284 = 'alpine-main-v3.12-updater', $5285 = '', $5286 = '0001-01-01 00:00:00+00', $5287 = 'https://www.cve.org/CVERecord?id=CVE-2022-28391', $5288 = '', $5289 = 'Unknown', $5290 = 'busybox', $5291 = '', $5292 = '', $5293 = '', $5294 = 'source', $5295 = 'alpine', $5296 = 'Alpine Linux', $5297 = '', $5298 = '', $5299 = '3.12', $5300 = '', $5301 = '', $5302 = 'Alpine Linux v3.12', $5303 = '', $5304 = '', $5305 = '', $5306 = '1.31.1-r22', $5307 = 'invalid', $5308 = NULL, $5309 = '{}', $5310 = '{}', $5311 = 'md5', $5312 = '\x9810e696b88f427f591335cfba3c9e84', $5313 = 'CVE-2021-42373', $5314 = 'alpine-main-v3.12-updater', $5315 = '', $5316 = '0001-01-01 00:00:00+00', $5317 = 'https://www.cve.org/CVERecord?id=CVE-2021-42373', $5318 = '', $5319 = 'Unknown', $5320 = 'busybox', $5321 = '', $5322 = '', $5323 = '', $5324 = 'source', $5325 = 'alpine', $5326 = 'Alpine Linux', $5327 = '', $5328 = '', $5329 = '3.12', $5330 = '', $5331 = '', $5332 = 'Alpine Linux v3.12', $5333 = '', $5334 = '', $5335 = '', $5336 = '0', $5337 = 'invalid', $5338 = NULL, $5339 = '{}', $5340 = '{}', $5341 = 'md5', $5342 = '\xf3a2a99cfa3c54d34d4131e4a17b963e', $5343 = 'CVE-2021-42375', $5344 = 'alpine-main-v3.12-updater', $5345 = '', $5346 = '0001-01-01 00:00:00+00', $5347 = 'https://www.cve.org/CVERecord?id=CVE-2021-42375', $5348 = '', $5349 = 'Unknown', $5350 = 'busybox', $5351 = '', $5352 = '', $5353 = '', $5354 = 'source', $5355 = 'alpine', $5356 = 'Alpine Linux', $5357 = '', $5358 = '', $5359 = '3.12', $5360 = '', $5361 = '', $5362 = 'Alpine Linux v3.12', $5363 = '', $5364 = '', $5365 = '', $5366 = '0', $5367 = 'invalid', $5368 = NULL, $5369 = '{}', $5370 = '{}', $5371 = 'md5', $5372 = '\x448783356562de4b54c8112721fd776b', $5373 = 'CVE-2021-42376', $5374 = 'alpine-main-v3.12-updater', $5375 = '', $5376 = '0001-01-01 00:00:00+00', $5377 = 'https://www.cve.org/CVERecord?id=CVE-2021-42376', $5378 = '', $5379 = 'Unknown', $5380 = 'busybox', $5381 = '', $5382 = '', $5383 = '', $5384 = 'source', $5385 = 'alpine', $5386 = 'Alpine Linux', $5387 = '', $5388 = '', $5389 = '3.12', $5390 = '', $5391 = '', $5392 = 'Alpine Linux v3.12', $5393 = '', $5394 = '', $5395 = '', $5396 = '0', $5397 = 'invalid', $5398 = NULL, $5399 = '{}', $5400 = '{}', $5401 = 'md5', $5402 = '\x0904271817d4be8eeff630d09dfb2929', $5403 = 'CVE-2021-42377', $5404 = 'alpine-main-v3.12-updater', $5405 = '', $5406 = '0001-01-01 00:00:00+00', $5407 = 'https://www.cve.org/CVERecord?id=CVE-2021-42377', $5408 = '', $5409 = 'Unknown', $5410 = 'busybox', $5411 = '', $5412 = '', $5413 = '', $5414 = 'source', $5415 = 'alpine', $5416 = 'Alpine Linux', $5417 = '', $5418 = '', $5419 = '3.12', $5420 = '', $5421 = '', $5422 = 'Alpine Linux v3.12', $5423 = '', $5424 = '', $5425 = '', $5426 = '0', $5427 = 'invalid', $5428 = NULL, $5429 = '{}', $5430 = '{}', $5431 = 'md5', $5432 = '\x2cd57c68e8b2bab19d72bff6fc735283', $5433 = 'CVE-2017-16544', $5434 = 'alpine-main-v3.12-updater', $5435 = '', $5436 = '0001-01-01 00:00:00+00', $5437 = 'https://www.cve.org/CVERecord?id=CVE-2017-16544', $5438 = '', $5439 = 'Unknown', $5440 = 'busybox', $5441 = '', $5442 = '', $5443 = '', $5444 = 'source', $5445 = 'alpine', $5446 = 'Alpine Linux', $5447 = '', $5448 = '', $5449 = '3.12', $5450 = '', $5451 = '', $5452 = 'Alpine Linux v3.12', $5453 = '', $5454 = '', $5455 = '', $5456 = '1.27.2-r4', $5457 = 'invalid', $5458 = NULL, $5459 = '{}', $5460 = '{}', $5461 = 'md5', $5462 = '\x191cf2626b71033932ca3da12b278efc', $5463 = 'CVE-2017-15873', $5464 = 'alpine-main-v3.12-updater', $5465 = '', $5466 = '0001-01-01 00:00:00+00', $5467 = 'https://www.cve.org/CVERecord?id=CVE-2017-15873', $5468 = '', $5469 = 'Unknown', $5470 = 'busybox', $5471 = '', $5472 = '', $5473 = '', $5474 = 'source', $5475 = 'alpine', $5476 = 'Alpine Linux', $5477 = '', $5478 = '', $5479 = '3.12', $5480 = '', $5481 = '', $5482 = 'Alpine Linux v3.12', $5483 = '', $5484 = '', $5485 = '', $5486 = '1.27.2-r4', $5487 = 'invalid', $5488 = NULL, $5489 = '{}', $5490 = '{}', $5491 = 'md5', $5492 = '\xd3f5ea72c167d5272a2181a403aa4763', $5493 = 'CVE-2017-15874', $5494 = 'alpine-main-v3.12-updater', $5495 = '', $5496 = '0001-01-01 00:00:00+00', $5497 = 'https://www.cve.org/CVERecord?id=CVE-2017-15874', $5498 = '', $5499 = 'Unknown', $5500 = 'busybox', $5501 = '', $5502 = '', $5503 = '', $5504 = 'source', $5505 = 'alpine', $5506 = 'Alpine Linux', $5507 = '', $5508 = '', $5509 = '3.12', $5510 = '', $5511 = '', $5512 = 'Alpine Linux v3.12', $5513 = '', $5514 = '', $5515 = '', $5516 = '1.27.2-r4', $5517 = 'invalid', $5518 = NULL, $5519 = '{}', $5520 = '{}', $5521 = 'md5', $5522 = '\x05996b9fdd6d8ecc4021c460df282580', $5523 = 'CVE-2018-1000500', $5524 = 'alpine-main-v3.12-updater', $5525 = '', $5526 = '0001-01-01 00:00:00+00', $5527 = 'https://www.cve.org/CVERecord?id=CVE-2018-1000500', $5528 = '', $5529 = 'Unknown', $5530 = 'busybox', $5531 = '', $5532 = '', $5533 = '', $5534 = 'source', $5535 = 'alpine', $5536 = 'Alpine Linux', $5537 = '', $5538 = '', $5539 = '3.12', $5540 = '', $5541 = '', $5542 = 'Alpine Linux v3.12', $5543 = '', $5544 = '', $5545 = '', $5546 = '1.28.3-r2', $5547 = 'invalid', $5548 = NULL, $5549 = '{}', $5550 = '{}', $5551 = 'md5', $5552 = '\x7d2f05ede8d7d56a494c9d89d30fdff1', $5553 = 'CVE-2016-3189', $5554 = 'alpine-main-v3.12-updater', $5555 = '', $5556 = '0001-01-01 00:00:00+00', $5557 = 'https://www.cve.org/CVERecord?id=CVE-2016-3189', $5558 = '', $5559 = 'Unknown', $5560 = 'bzip2', $5561 = '', $5562 = '', $5563 = '', $5564 = 'source', $5565 = 'alpine', $5566 = 'Alpine Linux', $5567 = '', $5568 = '', $5569 = '3.12', $5570 = '', $5571 = '', $5572 = 'Alpine Linux v3.12', $5573 = '', $5574 = '', $5575 = '', $5576 = '1.0.6-r5', $5577 = 'invalid', $5578 = NULL, $5579 = '{}', $5580 = '{}', $5581 = 'md5', $5582 = '\xa0c95e8228d203478417a3a0514c1484', $5583 = 'CVE-2019-12900', $5584 = 'alpine-main-v3.12-updater', $5585 = '', $5586 = '0001-01-01 00:00:00+00', $5587 = 'https://www.cve.org/CVERecord?id=CVE-2019-12900', $5588 = '', $5589 = 'Unknown', $5590 = 'bzip2', $5591 = '', $5592 = '', $5593 = '', $5594 = 'source', $5595 = 'alpine', $5596 = 'Alpine Linux', $5597 = '', $5598 = '', $5599 = '3.12', $5600 = '', $5601 = '', $5602 = 'Alpine Linux v3.12', $5603 = '', $5604 = '', $5605 = '', $5606 = '1.0.6-r7', $5607 = 'invalid', $5608 = NULL, $5609 = '{}', $5610 = '{}', $5611 = 'md5', $5612 = '\xff5d3d3b0863332390f7c7633ff9409d', $5613 = 'CVE-2021-3672', $5614 = 'alpine-main-v3.12-updater', $5615 = '', $5616 = '0001-01-01 00:00:00+00', $5617 = 'https://www.cve.org/CVERecord?id=CVE-2021-3672', $5618 = '', $5619 = 'Unknown', $5620 = 'c-ares', $5621 = '', $5622 = '', $5623 = '', $5624 = 'source', $5625 = 'alpine', $5626 = 'Alpine Linux', $5627 = '', $5628 = '', $5629 = '3.12', $5630 = '', $5631 = '', $5632 = 'Alpine Linux v3.12', $5633 = '', $5634 = '', $5635 = '', $5636 = '1.17.2-r0', $5637 = 'invalid', $5638 = NULL, $5639 = '{}', $5640 = '{}', $5641 = 'md5', $5642 = '\xfe6c01e8c081180f2628d43a6c8e9b22', $5643 = 'CVE-2020-35492', $5644 = 'alpine-main-v3.12-updater', $5645 = '', $5646 = '0001-01-01 00:00:00+00', $5647 = 'https://www.cve.org/CVERecord?id=CVE-2020-35492', $5648 = '', $5649 = 'Unknown', $5650 = 'cairo', $5651 = '', $5652 = '', $5653 = '', $5654 = 'source', $5655 = 'alpine', $5656 = 'Alpine Linux', $5657 = '', $5658 = '', $5659 = '3.12', $5660 = '', $5661 = '', $5662 = 'Alpine Linux v3.12', $5663 = '', $5664 = '', $5665 = '', $5666 = '1.16.0-r3', $5667 = 'invalid', $5668 = NULL, $5669 = '{}', $5670 = '{}', $5671 = 'md5', $5672 = '\xc956b9867b2bdd79d2145cbbbc155593', $5673 = 'CVE-2019-6462', $5674 = 'alpine-main-v3.12-updater', $5675 = '', $5676 = '0001-01-01 00:00:00+00', $5677 = 'https://www.cve.org/CVERecord?id=CVE-2019-6462', $5678 = '', $5679 = 'Unknown', $5680 = 'cairo', $5681 = '', $5682 = '', $5683 = '', $5684 = 'source', $5685 = 'alpine', $5686 = 'Alpine Linux', $5687 = '', $5688 = '', $5689 = '3.12', $5690 = '', $5691 = '', $5692 = 'Alpine Linux v3.12', $5693 = '', $5694 = '', $5695 = '', $5696 = '1.16.0-r5', $5697 = 'invalid', $5698 = NULL, $5699 = '{}', $5700 = '{}', $5701 = 'md5', $5702 = '\xdc869e2c29410b3b8b1a3017e0204473', $5703 = 'CVE-2018-19876', $5704 = 'alpine-main-v3.12-updater', $5705 = '', $5706 = '0001-01-01 00:00:00+00', $5707 = 'https://www.cve.org/CVERecord?id=CVE-2018-19876', $5708 = '', $5709 = 'Unknown', $5710 = 'cairo', $5711 = '', $5712 = '', $5713 = '', $5714 = 'source', $5715 = 'alpine', $5716 = 'Alpine Linux', $5717 = '', $5718 = '', $5719 = '3.12', $5720 = '', $5721 = '', $5722 = 'Alpine Linux v3.12', $5723 = '', $5724 = '', $5725 = '', $5726 = '1.16.0-r1', $5727 = 'invalid', $5728 = NULL, $5729 = '{}', $5730 = '{}', $5731 = 'md5', $5732 = '\x62b54198a5536c6414014515e6a755f2', $5733 = 'CVE-2020-14367', $5734 = 'alpine-main-v3.12-updater', $5735 = '', $5736 = '0001-01-01 00:00:00+00', $5737 = 'https://www.cve.org/CVERecord?id=CVE-2020-14367', $5738 = '', $5739 = 'Unknown', $5740 = 'chrony', $5741 = '', $5742 = '', $5743 = '', $5744 = 'source', $5745 = 'alpine', $5746 = 'Alpine Linux', $5747 = '', $5748 = '', $5749 = '3.12', $5750 = '', $5751 = '', $5752 = 'Alpine Linux v3.12', $5753 = '', $5754 = '', $5755 = '', $5756 = '3.5.1-r0', $5757 = 'invalid', $5758 = NULL, $5759 = '{}', $5760 = '{}', $5761 = 'md5', $5762 = '\xc87fdf9157d358eedc5cd6f340894069', $5763 = 'CVE-2020-14342', $5764 = 'alpine-main-v3.12-updater', $5765 = '', $5766 = '0001-01-01 00:00:00+00', $5767 = 'https://www.cve.org/CVERecord?id=CVE-2020-14342', $5768 = '', $5769 = 'Unknown', $5770 = 'cifs-utils', $5771 = '', $5772 = '', $5773 = '', $5774 = 'source', $5775 = 'alpine', $5776 = 'Alpine Linux', $5777 = '', $5778 = '', $5779 = '3.12', $5780 = '', $5781 = '', $5782 = 'Alpine Linux v3.12', $5783 = '', $5784 = '', $5785 = '', $5786 = '0', $5787 = 'invalid', $5788 = NULL, $5789 = '{}', $5790 = '{}', $5791 = 'md5', $5792 = '\xd2a26abc4bb7c9bef026ad53ee8e6788', $5793 = 'CVE-2021-20208', $5794 = 'alpine-main-v3.12-updater', $5795 = '', $5796 = '0001-01-01 00:00:00+00', $5797 = 'https://www.cve.org/CVERecord?id=CVE-2021-20208', $5798 = '', $5799 = 'Unknown', $5800 = 'cifs-utils', $5801 = '', $5802 = '', $5803 = '', $5804 = 'source', $5805 = 'alpine', $5806 = 'Alpine Linux', $5807 = '', $5808 = '', $5809 = '3.12', $5810 = '', $5811 = '', $5812 = 'Alpine Linux v3.12', $5813 = '', $5814 = '', $5815 = '', $5816 = '6.13-r0', $5817 = 'invalid', $5818 = NULL, $5819 = '{}', $5820 = '{}', $5821 = 'md5', $5822 = '\x138ef566f13fd913fae0df2c401fc896', $5823 = 'CVE-2018-15378', $5824 = 'alpine-main-v3.12-updater', $5825 = '', $5826 = '0001-01-01 00:00:00+00', $5827 = 'https://www.cve.org/CVERecord?id=CVE-2018-15378', $5828 = '', $5829 = 'Unknown', $5830 = 'clamav', $5831 = '', $5832 = '', $5833 = '', $5834 = 'source', $5835 = 'alpine', $5836 = 'Alpine Linux', $5837 = '', $5838 = '', $5839 = '3.12', $5840 = '', $5841 = '', $5842 = 'Alpine Linux v3.12', $5843 = '', $5844 = '', $5845 = '', $5846 = '0.100.2-r0', $5847 = 'invalid', $5848 = NULL, $5849 = '{}', $5850 = '{}', $5851 = 'md5', $5852 = '\x8592ca089dab50b06d1068ae210f22d7', $5853 = 'CVE-2018-14680', $5854 = 'alpine-main-v3.12-updater', $5855 = '', $5856 = '0001-01-01 00:00:00+00', $5857 = 'https://www.cve.org/CVERecord?id=CVE-2018-14680', $5858 = '', $5859 = 'Unknown', $5860 = 'clamav', $5861 = '', $5862 = '', $5863 = '', $5864 = 'source', $5865 = 'alpine', $5866 = 'Alpine Linux', $5867 = '', $5868 = '', $5869 = '3.12', $5870 = '', $5871 = '', $5872 = 'Alpine Linux v3.12', $5873 = '', $5874 = '', $5875 = '', $5876 = '0.100.2-r0', $5877 = 'invalid', $5878 = NULL, $5879 = '{}', $5880 = '{}', $5881 = 'md5', $5882 = '\x988f4a77375e098b880709d28a8eab2e', $5883 = 'CVE-2018-14681', $5884 = 'alpine-main-v3.12-updater', $5885 = '', $5886 = '0001-01-01 00:00:00+00', $5887 = 'https://www.cve.org/CVERecord?id=CVE-2018-14681', $5888 = '', $5889 = 'Unknown', $5890 = 'clamav', $5891 = '', $5892 = '', $5893 = '', $5894 = 'source', $5895 = 'alpine', $5896 = 'Alpine Linux', $5897 = '', $5898 = '', $5899 = '3.12', $5900 = '', $5901 = '', $5902 = 'Alpine Linux v3.12', $5903 = '', $5904 = '', $5905 = '', $5906 = '0.100.2-r0', $5907 = 'invalid', $5908 = NULL, $5909 = '{}', $5910 = '{}', $5911 = 'md5', $5912 = '\x2a0f2c5cf33fccb323ab8f2f7f7a680b', $5913 = 'CVE-2018-14682', $5914 = 'alpine-main-v3.12-updater', $5915 = '', $5916 = '0001-01-01 00:00:00+00', $5917 = 'https://www.cve.org/CVERecord?id=CVE-2018-14682', $5918 = '', $5919 = 'Unknown', $5920 = 'clamav', $5921 = '', $5922 = '', $5923 = '', $5924 = 'source', $5925 = 'alpine', $5926 = 'Alpine Linux', $5927 = '', $5928 = '', $5929 = '3.12', $5930 = '', $5931 = '', $5932 = 'Alpine Linux v3.12', $5933 = '', $5934 = '', $5935 = '', $5936 = '0.100.2-r0', $5937 = 'invalid', $5938 = NULL, $5939 = '{}', $5940 = '{}', $5941 = 'md5', $5942 = '\xa3e4d20db10c4214c2bd77ad1ee7cd23', $5943 = 'CVE-2019-1787', $5944 = 'alpine-main-v3.12-updater', $5945 = '', $5946 = '0001-01-01 00:00:00+00', $5947 = 'https://www.cve.org/CVERecord?id=CVE-2019-1787', $5948 = '', $5949 = 'Unknown', $5950 = 'clamav', $5951 = '', $5952 = '', $5953 = '', $5954 = 'source', $5955 = 'alpine', $5956 = 'Alpine Linux', $5957 = '', $5958 = '', $5959 = '3.12', $5960 = '', $5961 = '', $5962 = 'Alpine Linux v3.12', $5963 = '', $5964 = '', $5965 = '', $5966 = '0.100.3-r0', $5967 = 'invalid', $5968 = NULL, $5969 = '{}', $5970 = '{}', $5971 = 'md5', $5972 = '\xab71600418ee78af3285028b8b82745f', $5973 = 'CVE-2019-1788', $5974 = 'alpine-main-v3.12-updater', $5975 = '', $5976 = '0001-01-01 00:00:00+00', $5977 = 'https://www.cve.org/CVERecord?id=CVE-2019-1788', $5978 = '', $5979 = 'Unknown', $5980 = 'clamav', $5981 = '', $5982 = '', $5983 = '', $5984 = 'source', $5985 = 'alpine', $5986 = 'Alpine Linux', $5987 = '', $5988 = '', $5989 = '3.12', $5990 = '', $5991 = '', $5992 = 'Alpine Linux v3.12', $5993 = '', $5994 = '', $5995 = '', $5996 = '0.100.3-r0', $5997 = 'invalid', $5998 = NULL, $5999 = '{}', $6000 = '{}', $6001 = 'md5', $6002 = '\xbb4727a96784418d1a22ee7f9345d408', $6003 = 'CVE-2019-1789', $6004 = 'alpine-main-v3.12-updater', $6005 = '', $6006 = '0001-01-01 00:00:00+00', $6007 = 'https://www.cve.org/CVERecord?id=CVE-2019-1789', $6008 = '', $6009 = 'Unknown', $6010 = 'clamav', $6011 = '', $6012 = '', $6013 = '', $6014 = 'source', $6015 = 'alpine', $6016 = 'Alpine Linux', $6017 = '', $6018 = '', $6019 = '3.12', $6020 = '', $6021 = '', $6022 = 'Alpine Linux v3.12', $6023 = '', $6024 = '', $6025 = '', $6026 = '0.100.3-r0', $6027 = 'invalid', $6028 = NULL, $6029 = '{}', $6030 = '{}', $6031 = 'md5', $6032 = '\x76cf249cdd6f6c8b3a1b0bb897fe91f0', $6033 = 'CVE-2017-12374', $6034 = 'alpine-main-v3.12-updater', $6035 = '', $6036 = '0001-01-01 00:00:00+00', $6037 = 'https://www.cve.org/CVERecord?id=CVE-2017-12374', $6038 = '', $6039 = 'Unknown', $6040 = 'clamav', $6041 = '', $6042 = '', $6043 = '', $6044 = 'source', $6045 = 'alpine', $6046 = 'Alpine Linux', $6047 = '', $6048 = '', $6049 = '3.12', $6050 = '', $6051 = '', $6052 = 'Alpine Linux v3.12', $6053 = '', $6054 = '', $6055 = '', $6056 = '0.99.3-r0', $6057 = 'invalid', $6058 = NULL, $6059 = '{}', $6060 = '{}', $6061 = 'md5', $6062 = '\xa3cb98a9fca123ed99ec2435d4058300', $6063 = 'CVE-2017-12375', $6064 = 'alpine-main-v3.12-updater', $6065 = '', $6066 = '0001-01-01 00:00:00+00', $6067 = 'https://www.cve.org/CVERecord?id=CVE-2017-12375', $6068 = '', $6069 = 'Unknown', $6070 = 'clamav', $6071 = '', $6072 = '', $6073 = '', $6074 = 'source', $6075 = 'alpine', $6076 = 'Alpine Linux', $6077 = '', $6078 = '', $6079 = '3.12', $6080 = '', $6081 = '', $6082 = 'Alpine Linux v3.12', $6083 = '', $6084 = '', $6085 = '', $6086 = '0.99.3-r0', $6087 = 'invalid', $6088 = NULL, $6089 = '{}', $6090 = '{}', $6091 = 'md5', $6092 = '\x69285319d60e85174586533934d03e0c', $6093 = 'CVE-2017-12376', $6094 = 'alpine-main-v3.12-updater', $6095 = '', $6096 = '0001-01-01 00:00:00+00', $6097 = 'https://www.cve.org/CVERecord?id=CVE-2017-12376', $6098 = '', $6099 = 'Unknown', $6100 = 'clamav', $6101 = '', $6102 = '', $6103 = '', $6104 = 'source', $6105 = 'alpine', $6106 = 'Alpine Linux', $6107 = '', $6108 = '', $6109 = '3.12', $6110 = '', $6111 = '', $6112 = 'Alpine Linux v3.12', $6113 = '', $6114 = '', $6115 = '', $6116 = '0.99.3-r0', $6117 = 'invalid', $6118 = NULL, $6119 = '{}', $6120 = '{}', $6121 = 'md5', $6122 = '\x64f09e94f38f7e4e08142a0c54f07aae', $6123 = 'CVE-2017-12377', $6124 = 'alpine-main-v3.12-updater', $6125 = '', $6126 = '0001-01-01 00:00:00+00', $6127 = 'https://www.cve.org/CVERecord?id=CVE-2017-12377', $6128 = '', $6129 = 'Unknown', $6130 = 'clamav', $6131 = '', $6132 = '', $6133 = '', $6134 = 'source', $6135 = 'alpine', $6136 = 'Alpine Linux', $6137 = '', $6138 = '', $6139 = '3.12', $6140 = '', $6141 = '', $6142 = 'Alpine Linux v3.12', $6143 = '', $6144 = '', $6145 = '', $6146 = '0.99.3-r0', $6147 = 'invalid', $6148 = NULL, $6149 = '{}', $6150 = '{}', $6151 = 'md5', $6152 = '\x7f4823565f716b8e5f809a4ddda59dd6', $6153 = 'CVE-2017-12378', $6154 = 'alpine-main-v3.12-updater', $6155 = '', $6156 = '0001-01-01 00:00:00+00', $6157 = 'https://www.cve.org/CVERecord?id=CVE-2017-12378', $6158 = '', $6159 = 'Unknown', $6160 = 'clamav', $6161 = '', $6162 = '', $6163 = '', $6164 = 'source', $6165 = 'alpine', $6166 = 'Alpine Linux', $6167 = '', $6168 = '', $6169 = '3.12', $6170 = '', $6171 = '', $6172 = 'Alpine Linux v3.12', $6173 = '', $6174 = '', $6175 = '', $6176 = '0.99.3-r0', $6177 = 'invalid', $6178 = NULL, $6179 = '{}', $6180 = '{}', $6181 = 'md5', $6182 = '\xbdace1e478c510718c24932c636e0c8f', $6183 = 'CVE-2017-12379', $6184 = 'alpine-main-v3.12-updater', $6185 = '', $6186 = '0001-01-01 00:00:00+00', $6187 = 'https://www.cve.org/CVERecord?id=CVE-2017-12379', $6188 = '', $6189 = 'Unknown', $6190 = 'clamav', $6191 = '', $6192 = '', $6193 = '', $6194 = 'source', $6195 = 'alpine', $6196 = 'Alpine Linux', $6197 = '', $6198 = '', $6199 = '3.12', $6200 = '', $6201 = '', $6202 = 'Alpine Linux v3.12', $6203 = '', $6204 = '', $6205 = '', $6206 = '0.99.3-r0', $6207 = 'invalid', $6208 = NULL, $6209 = '{}', $6210 = '{}', $6211 = 'md5', $6212 = '\xd50585873a833f3a54f5a8925395dbe0', $6213 = 'CVE-2017-12380', $6214 = 'alpine-main-v3.12-updater', $6215 = '', $6216 = '0001-01-01 00:00:00+00', $6217 = 'https://www.cve.org/CVERecord?id=CVE-2017-12380', $6218 = '', $6219 = 'Unknown', $6220 = 'clamav', $6221 = '', $6222 = '', $6223 = '', $6224 = 'source', $6225 = 'alpine', $6226 = 'Alpine Linux', $6227 = '', $6228 = '', $6229 = '3.12', $6230 = '', $6231 = '', $6232 = 'Alpine Linux v3.12', $6233 = '', $6234 = '', $6235 = '', $6236 = '0.99.3-r0', $6237 = 'invalid', $6238 = NULL, $6239 = '{}', $6240 = '{}', $6241 = 'md5', $6242 = '\x163a542f38f7bd035109f287d95d9084', $6243 = 'CVE-2022-20698', $6244 = 'alpine-main-v3.12-updater', $6245 = '', $6246 = '0001-01-01 00:00:00+00', $6247 = 'https://www.cve.org/CVERecord?id=CVE-2022-20698', $6248 = '', $6249 = 'Unknown', $6250 = 'clamav', $6251 = '', $6252 = '', $6253 = '', $6254 = 'source', $6255 = 'alpine', $6256 = 'Alpine Linux', $6257 = '', $6258 = '', $6259 = '3.12', $6260 = '', $6261 = '', $6262 = 'Alpine Linux v3.12', $6263 = '', $6264 = '', $6265 = '', $6266 = '0.103.6-r0', $6267 = 'invalid', $6268 = NULL, $6269 = '{}', $6270 = '{}', $6271 = 'md5', $6272 = '\x208e48573ab08bd019728f99cf126f33', $6273 = 'CVE-2022-20770', $6274 = 'alpine-main-v3.12-updater', $6275 = '', $6276 = '0001-01-01 00:00:00+00', $6277 = 'https://www.cve.org/CVERecord?id=CVE-2022-20770', $6278 = '', $6279 = 'Unknown', $6280 = 'clamav', $6281 = '', $6282 = '', $6283 = '', $6284 = 'source', $6285 = 'alpine', $6286 = 'Alpine Linux', $6287 = '', $6288 = '', $6289 = '3.12', $6290 = '', $6291 = '', $6292 = 'Alpine Linux v3.12', $6293 = '', $6294 = '', $6295 = '', $6296 = '0.103.6-r0', $6297 = 'invalid', $6298 = NULL, $6299 = '{}', $6300 = '{}', $6301 = 'md5', $6302 = '\xaba7be5f7988d3e98a4235cba345062f', $6303 = 'CVE-2022-20771', $6304 = 'alpine-main-v3.12-updater', $6305 = '', $6306 = '0001-01-01 00:00:00+00', $6307 = 'https://www.cve.org/CVERecord?id=CVE-2022-20771', $6308 = '', $6309 = 'Unknown', $6310 = 'clamav', $6311 = '', $6312 = '', $6313 = '', $6314 = 'source', $6315 = 'alpine', $6316 = 'Alpine Linux', $6317 = '', $6318 = '', $6319 = '3.12', $6320 = '', $6321 = '', $6322 = 'Alpine Linux v3.12', $6323 = '', $6324 = '', $6325 = '', $6326 = '0.103.6-r0', $6327 = 'invalid', $6328 = NULL, $6329 = '{}', $6330 = '{}', $6331 = 'md5', $6332 = '\x59eb60b9ec76ce2acc4dd6d75433e49a', $6333 = 'CVE-2022-20785', $6334 = 'alpine-main-v3.12-updater', $6335 = '', $6336 = '0001-01-01 00:00:00+00', $6337 = 'https://www.cve.org/CVERecord?id=CVE-2022-20785', $6338 = '', $6339 = 'Unknown', $6340 = 'clamav', $6341 = '', $6342 = '', $6343 = '', $6344 = 'source', $6345 = 'alpine', $6346 = 'Alpine Linux', $6347 = '', $6348 = '', $6349 = '3.12', $6350 = '', $6351 = '', $6352 = 'Alpine Linux v3.12', $6353 = '', $6354 = '', $6355 = '', $6356 = '0.103.6-r0', $6357 = 'invalid', $6358 = NULL, $6359 = '{}', $6360 = '{}', $6361 = 'md5', $6362 = '\xfd3799868ff69ec8b20d15902cd6b5ba', $6363 = 'CVE-2022-20792', $6364 = 'alpine-main-v3.12-updater', $6365 = '', $6366 = '0001-01-01 00:00:00+00', $6367 = 'https://www.cve.org/CVERecord?id=CVE-2022-20792', $6368 = '', $6369 = 'Unknown', $6370 = 'clamav', $6371 = '', $6372 = '', $6373 = '', $6374 = 'source', $6375 = 'alpine', $6376 = 'Alpine Linux', $6377 = '', $6378 = '', $6379 = '3.12', $6380 = '', $6381 = '', $6382 = 'Alpine Linux v3.12', $6383 = '', $6384 = '', $6385 = '', $6386 = '0.103.6-r0', $6387 = 'invalid', $6388 = NULL, $6389 = '{}', $6390 = '{}', $6391 = 'md5', $6392 = '\x0a25b4f02dd77277627721e8432407ca', $6393 = 'CVE-2022-20796', $6394 = 'alpine-main-v3.12-updater', $6395 = '', $6396 = '0001-01-01 00:00:00+00', $6397 = 'https://www.cve.org/CVERecord?id=CVE-2022-20796', $6398 = '', $6399 = 'Unknown', $6400 = 'clamav', $6401 = '', $6402 = '', $6403 = '', $6404 = 'source', $6405 = 'alpine', $6406 = 'Alpine Linux', $6407 = '', $6408 = '', $6409 = '3.12', $6410 = '', $6411 = '', $6412 = 'Alpine Linux v3.12', $6413 = '', $6414 = '', $6415 = '', $6416 = '0.103.6-r0', $6417 = 'invalid', $6418 = NULL, $6419 = '{}', $6420 = '{}', $6421 = 'md5', $6422 = '\xfbaf7a3962503d8d23963a631b6c1543', $6423 = 'CVE-2017-16932', $6424 = 'alpine-main-v3.12-updater', $6425 = '', $6426 = '0001-01-01 00:00:00+00', $6427 = 'https://www.cve.org/CVERecord?id=CVE-2017-16932', $6428 = '', $6429 = 'Unknown', $6430 = 'clamav', $6431 = '', $6432 = '', $6433 = '', $6434 = 'source', $6435 = 'alpine', $6436 = 'Alpine Linux', $6437 = '', $6438 = '', $6439 = '3.12', $6440 = '', $6441 = '', $6442 = 'Alpine Linux v3.12', $6443 = '', $6444 = '', $6445 = '', $6446 = '0.100.1-r0', $6447 = 'invalid', $6448 = NULL, $6449 = '{}', $6450 = '{}', $6451 = 'md5', $6452 = '\xda20882e15ef0b04d7558f88518f5cb8', $6453 = 'CVE-2018-0360', $6454 = 'alpine-main-v3.12-updater', $6455 = '', $6456 = '0001-01-01 00:00:00+00', $6457 = 'https://www.cve.org/CVERecord?id=CVE-2018-0360', $6458 = '', $6459 = 'Unknown', $6460 = 'clamav', $6461 = '', $6462 = '', $6463 = '', $6464 = 'source', $6465 = 'alpine', $6466 = 'Alpine Linux', $6467 = '', $6468 = '', $6469 = '3.12', $6470 = '', $6471 = '', $6472 = 'Alpine Linux v3.12', $6473 = '', $6474 = '', $6475 = '', $6476 = '0.100.1-r0', $6477 = 'invalid', $6478 = NULL, $6479 = '{}', $6480 = '{}', $6481 = 'md5', $6482 = '\x2824ac584d91ca5e2b9787b959cf9a34', $6483 = 'CVE-2018-0361', $6484 = 'alpine-main-v3.12-updater', $6485 = '', $6486 = '0001-01-01 00:00:00+00', $6487 = 'https://www.cve.org/CVERecord?id=CVE-2018-0361', $6488 = '', $6489 = 'Unknown', $6490 = 'clamav', $6491 = '', $6492 = '', $6493 = '', $6494 = 'source', $6495 = 'alpine', $6496 = 'Alpine Linux', $6497 = '', $6498 = '', $6499 = '3.12', $6500 = '', $6501 = '', $6502 = 'Alpine Linux v3.12', $6503 = '', $6504 = '', $6505 = '', $6506 = '0.100.1-r0', $6507 = 'invalid', $6508 = NULL, $6509 = '{}', $6510 = '{}', $6511 = 'md5', $6512 = '\x8a1c39a60933eb6ce999b8fde51e992a', $6513 = 'CVE-2019-12625', $6514 = 'alpine-main-v3.12-updater', $6515 = '', $6516 = '0001-01-01 00:00:00+00', $6517 = 'https://www.cve.org/CVERecord?id=CVE-2019-12625', $6518 = '', $6519 = 'Unknown', $6520 = 'clamav', $6521 = '', $6522 = '', $6523 = '', $6524 = 'source', $6525 = 'alpine', $6526 = 'Alpine Linux', $6527 = '', $6528 = '', $6529 = '3.12', $6530 = '', $6531 = '', $6532 = 'Alpine Linux v3.12', $6533 = '', $6534 = '', $6535 = '', $6536 = '0.101.4-r0', $6537 = 'invalid', $6538 = NULL, $6539 = '{}', $6540 = '{}', $6541 = 'md5', $6542 = '\x5c7b60766eec7a88953b77b8596773e0', $6543 = 'CVE-2019-15961', $6544 = 'alpine-main-v3.12-updater', $6545 = '', $6546 = '0001-01-01 00:00:00+00', $6547 = 'https://www.cve.org/CVERecord?id=CVE-2019-15961', $6548 = '', $6549 = 'Unknown', $6550 = 'clamav', $6551 = '', $6552 = '', $6553 = '', $6554 = 'source', $6555 = 'alpine', $6556 = 'Alpine Linux', $6557 = '', $6558 = '', $6559 = '3.12', $6560 = '', $6561 = '', $6562 = 'Alpine Linux v3.12', $6563 = '', $6564 = '', $6565 = '', $6566 = '0.102.0-r0', $6567 = 'invalid', $6568 = NULL, $6569 = '{}', $6570 = '{}', $6571 = 'md5', $6572 = '\x90fa13e217914e8835f9ffc6e64c8ce0', $6573 = 'CVE-2020-3123', $6574 = 'alpine-main-v3.12-updater', $6575 = '', $6576 = '0001-01-01 00:00:00+00', $6577 = 'https://www.cve.org/CVERecord?id=CVE-2020-3123', $6578 = '', $6579 = 'Unknown', $6580 = 'clamav', $6581 = '', $6582 = '', $6583 = '', $6584 = 'source', $6585 = 'alpine', $6586 = 'Alpine Linux', $6587 = '', $6588 = '', $6589 = '3.12', $6590 = '', $6591 = '', $6592 = 'Alpine Linux v3.12', $6593 = '', $6594 = '', $6595 = '', $6596 = '0.102.1-r0', $6597 = 'invalid', $6598 = NULL, $6599 = '{}', $6600 = '{}', $6601 = 'md5', $6602 = '\x4ea9295336b1e3de6d3cafc3ce715dc8', $6603 = 'CVE-2020-3327', $6604 = 'alpine-main-v3.12-updater', $6605 = '', $6606 = '0001-01-01 00:00:00+00', $6607 = 'https://www.cve.org/CVERecord?id=CVE-2020-3327', $6608 = '', $6609 = 'Unknown', $6610 = 'clamav', $6611 = '', $6612 = '', $6613 = '', $6614 = 'source', $6615 = 'alpine', $6616 = 'Alpine Linux', $6617 = '', $6618 = '', $6619 = '3.12', $6620 = '', $6621 = '', $6622 = 'Alpine Linux v3.12', $6623 = '', $6624 = '', $6625 = '', $6626 = '0.102.3-r0', $6627 = 'invalid', $6628 = NULL, $6629 = '{}', $6630 = '{}', $6631 = 'md5', $6632 = '\x07745fd6b438b7d5b677de9d0d917b84', $6633 = 'CVE-2020-3341', $6634 = 'alpine-main-v3.12-updater', $6635 = '', $6636 = '0001-01-01 00:00:00+00', $6637 = 'https://www.cve.org/CVERecord?id=CVE-2020-3341', $6638 = '', $6639 = 'Unknown', $6640 = 'clamav', $6641 = '', $6642 = '', $6643 = '', $6644 = 'source', $6645 = 'alpine', $6646 = 'Alpine Linux', $6647 = '', $6648 = '', $6649 = '3.12', $6650 = '', $6651 = '', $6652 = 'Alpine Linux v3.12', $6653 = '', $6654 = '', $6655 = '', $6656 = '0.102.3-r0', $6657 = 'invalid', $6658 = NULL, $6659 = '{}', $6660 = '{}', $6661 = 'md5', $6662 = '\x051432cb7d8a45388cce3f877303464e', $6663 = 'CVE-2020-3350', $6664 = 'alpine-main-v3.12-updater', $6665 = '', $6666 = '0001-01-01 00:00:00+00', $6667 = 'https://www.cve.org/CVERecord?id=CVE-2020-3350', $6668 = '', $6669 = 'Unknown', $6670 = 'clamav', $6671 = '', $6672 = '', $6673 = '', $6674 = 'source', $6675 = 'alpine', $6676 = 'Alpine Linux', $6677 = '', $6678 = '', $6679 = '3.12', $6680 = '', $6681 = '', $6682 = 'Alpine Linux v3.12', $6683 = '', $6684 = '', $6685 = '', $6686 = '0.102.4-r0', $6687 = 'invalid', $6688 = NULL, $6689 = '{}', $6690 = '{}', $6691 = 'md5', $6692 = '\x6a2be2c753dac791d419357effa08dbf', $6693 = 'CVE-2020-3481', $6694 = 'alpine-main-v3.12-updater', $6695 = '', $6696 = '0001-01-01 00:00:00+00', $6697 = 'https://www.cve.org/CVERecord?id=CVE-2020-3481', $6698 = '', $6699 = 'Unknown', $6700 = 'clamav', $6701 = '', $6702 = '', $6703 = '', $6704 = 'source', $6705 = 'alpine', $6706 = 'Alpine Linux', $6707 = '', $6708 = '', $6709 = '3.12', $6710 = '', $6711 = '', $6712 = 'Alpine Linux v3.12', $6713 = '', $6714 = '', $6715 = '', $6716 = '0.102.4-r0', $6717 = 'invalid', $6718 = NULL, $6719 = '{}', $6720 = '{}', $6721 = 'md5', $6722 = '\x1c503423951b3e7a04e40d9b6213c5f2', $6723 = 'CVE-2021-1405', $6724 = 'alpine-main-v3.12-updater', $6725 = '', $6726 = '0001-01-01 00:00:00+00', $6727 = 'https://www.cve.org/CVERecord?id=CVE-2021-1405', $6728 = '', $6729 = 'Unknown', $6730 = 'clamav', $6731 = '', $6732 = '', $6733 = '', $6734 = 'source', $6735 = 'alpine', $6736 = 'Alpine Linux', $6737 = '', $6738 = '', $6739 = '3.12', $6740 = '', $6741 = '', $6742 = 'Alpine Linux v3.12', $6743 = '', $6744 = '', $6745 = '', $6746 = '0.103.2-r0', $6747 = 'invalid', $6748 = NULL, $6749 = '{}', $6750 = '{}', $6751 = 'md5', $6752 = '\x91f4878a09aca267c01917ca52dc57d4', $6753 = 'CVE-2021-1404', $6754 = 'alpine-main-v3.12-updater', $6755 = '', $6756 = '0001-01-01 00:00:00+00', $6757 = 'https://www.cve.org/CVERecord?id=CVE-2021-1404', $6758 = '', $6759 = 'Unknown', $6760 = 'clamav', $6761 = '', $6762 = '', $6763 = '', $6764 = 'source', $6765 = 'alpine', $6766 = 'Alpine Linux', $6767 = '', $6768 = '', $6769 = '3.12', $6770 = '', $6771 = '', $6772 = 'Alpine Linux v3.12', $6773 = '', $6774 = '', $6775 = '', $6776 = '0.103.2-r0', $6777 = 'invalid', $6778 = NULL, $6779 = '{}', $6780 = '{}', $6781 = 'md5', $6782 = '\x70e3fd2a737214302fc4f7ecce6bae06', $6783 = 'CVE-2021-1252', $6784 = 'alpine-main-v3.12-updater', $6785 = '', $6786 = '0001-01-01 00:00:00+00', $6787 = 'https://www.cve.org/CVERecord?id=CVE-2021-1252', $6788 = '', $6789 = 'Unknown', $6790 = 'clamav', $6791 = '', $6792 = '', $6793 = '', $6794 = 'source', $6795 = 'alpine', $6796 = 'Alpine Linux', $6797 = '', $6798 = '', $6799 = '3.12', $6800 = '', $6801 = '', $6802 = 'Alpine Linux v3.12', $6803 = '', $6804 = '', $6805 = '', $6806 = '0.103.2-r0', $6807 = 'invalid', $6808 = NULL, $6809 = '{}', $6810 = '{}', $6811 = 'md5', $6812 = '\xc16446baa8132fff2b1b246f51164554', $6813 = 'CVE-2012-6706', $6814 = 'alpine-main-v3.12-updater', $6815 = '', $6816 = '0001-01-01 00:00:00+00', $6817 = 'https://www.cve.org/CVERecord?id=CVE-2012-6706', $6818 = '', $6819 = 'Unknown', $6820 = 'clamav', $6821 = '', $6822 = '', $6823 = '', $6824 = 'source', $6825 = 'alpine', $6826 = 'Alpine Linux', $6827 = '', $6828 = '', $6829 = '3.12', $6830 = '', $6831 = '', $6832 = 'Alpine Linux v3.12', $6833 = '', $6834 = '', $6835 = '', $6836 = '0.99.4-r0', $6837 = 'invalid', $6838 = NULL, $6839 = '{}', $6840 = '{}', $6841 = 'md5', $6842 = '\x1638c1e356bf5230ccf75a4fb3cf60d4', $6843 = 'CVE-2017-6419', $6844 = 'alpine-main-v3.12-updater', $6845 = '', $6846 = '0001-01-01 00:00:00+00', $6847 = 'https://www.cve.org/CVERecord?id=CVE-2017-6419', $6848 = '', $6849 = 'Unknown', $6850 = 'clamav', $6851 = '', $6852 = '', $6853 = '', $6854 = 'source', $6855 = 'alpine', $6856 = 'Alpine Linux', $6857 = '', $6858 = '', $6859 = '3.12', $6860 = '', $6861 = '', $6862 = 'Alpine Linux v3.12', $6863 = '', $6864 = '', $6865 = '', $6866 = '0.99.4-r0', $6867 = 'invalid', $6868 = NULL, $6869 = '{}', $6870 = '{}', $6871 = 'md5', $6872 = '\x49a49e17be01699f8b3dbff6fdca6867', $6873 = 'CVE-2017-11423', $6874 = 'alpine-main-v3.12-updater', $6875 = '', $6876 = '0001-01-01 00:00:00+00', $6877 = 'https://www.cve.org/CVERecord?id=CVE-2017-11423', $6878 = '', $6879 = 'Unknown', $6880 = 'clamav', $6881 = '', $6882 = '', $6883 = '', $6884 = 'source', $6885 = 'alpine', $6886 = 'Alpine Linux', $6887 = '', $6888 = '', $6889 = '3.12', $6890 = '', $6891 = '', $6892 = 'Alpine Linux v3.12', $6893 = '', $6894 = '', $6895 = '', $6896 = '0.99.4-r0', $6897 = 'invalid', $6898 = NULL, $6899 = '{}', $6900 = '{}', $6901 = 'md5', $6902 = '\x00c61f830dc04ec3d7a0c5dd8477aa2a', $6903 = 'CVE-2018-0202', $6904 = 'alpine-main-v3.12-updater', $6905 = '', $6906 = '0001-01-01 00:00:00+00', $6907 = 'https://www.cve.org/CVERecord?id=CVE-2018-0202', $6908 = '', $6909 = 'Unknown', $6910 = 'clamav', $6911 = '', $6912 = '', $6913 = '', $6914 = 'source', $6915 = 'alpine', $6916 = 'Alpine Linux', $6917 = '', $6918 = '', $6919 = '3.12', $6920 = '', $6921 = '', $6922 = 'Alpine Linux v3.12', $6923 = '', $6924 = '', $6925 = '', $6926 = '0.99.4-r0', $6927 = 'invalid', $6928 = NULL, $6929 = '{}', $6930 = '{}', $6931 = 'md5', $6932 = '\x0198557532ac70fb822a0f731edad9c3', $6933 = 'CVE-2018-1000085', $6934 = 'alpine-main-v3.12-updater', $6935 = '', $6936 = '0001-01-01 00:00:00+00', $6937 = 'https://www.cve.org/CVERecord?id=CVE-2018-1000085', $6938 = '', $6939 = 'Unknown', $6940 = 'clamav', $6941 = '', $6942 = '', $6943 = '', $6944 = 'source', $6945 = 'alpine', $6946 = 'Alpine Linux', $6947 = '', $6948 = '', $6949 = '3.12', $6950 = '', $6951 = '', $6952 = 'Alpine Linux v3.12', $6953 = '', $6954 = '', $6955 = '', $6956 = '0.99.4-r0', $6957 = 'invalid', $6958 = NULL, $6959 = '{}', $6960 = '{}', $6961 = 'md5', $6962 = '\x0ef31b17c99c1387f6d01b19eae41f7b', $6963 = 'CVE-2018-14447', $6964 = 'alpine-main-v3.12-updater', $6965 = '', $6966 = '0001-01-01 00:00:00+00', $6967 = 'https://www.cve.org/CVERecord?id=CVE-2018-14447', $6968 = '', $6969 = 'Unknown', $6970 = 'confuse', $6971 = '', $6972 = '', $6973 = '', $6974 = 'source', $6975 = 'alpine', $6976 = 'Alpine Linux', $6977 = '', $6978 = '', $6979 = '3.12', $6980 = '', $6981 = '', $6982 = 'Alpine Linux v3.12', $6983 = '', $6984 = '', $6985 = '', $6986 = '3.2.2-r0', $6987 = 'invalid', $6988 = NULL, $6989 = '{}', $6990 = '{}', $6991 = 'md5', $6992 = '\x3c660b92e0b46f27bad69bd44fe6bdce', $6993 = 'CVE-2017-18018', $6994 = 'alpine-main-v3.12-updater', $6995 = '', $6996 = '0001-01-01 00:00:00+00', $6997 = 'https://www.cve.org/CVERecord?id=CVE-2017-18018', $6998 = '', $6999 = 'Unknown', $7000 = 'coreutils', $7001 = '', $7002 = '', $7003 = '', $7004 = 'source', $7005 = 'alpine', $7006 = 'Alpine Linux', $7007 = '', $7008 = '', $7009 = '3.12', $7010 = '', $7011 = '', $7012 = 'Alpine Linux v3.12', $7013 = '', $7014 = '', $7015 = '', $7016 = '8.30-r0', $7017 = 'invalid', $7018 = NULL, $7019 = '{}', $7020 = '{}', $7021 = 'md5', $7022 = '\xfad6ab60ab812668875fc1e40a1fb0db', $7023 = 'CVE-2016-6318', $7024 = 'alpine-main-v3.12-updater', $7025 = '', $7026 = '0001-01-01 00:00:00+00', $7027 = 'https://www.cve.org/CVERecord?id=CVE-2016-6318', $7028 = '', $7029 = 'Unknown', $7030 = 'cracklib', $7031 = '', $7032 = '', $7033 = '', $7034 = 'source', $7035 = 'alpine', $7036 = 'Alpine Linux', $7037 = '', $7038 = '', $7039 = '3.12', $7040 = '', $7041 = '', $7042 = 'Alpine Linux v3.12', $7043 = '', $7044 = '', $7045 = '', $7046 = '2.9.7-r0', $7047 = 'invalid', $7048 = NULL, $7049 = '{}', $7050 = '{}', $7051 = 'md5', $7052 = '\x9369348ed4b9f586fac7e0ddb860a828', $7053 = 'CVE-2020-14382', $7054 = 'alpine-main-v3.12-updater', $7055 = '', $7056 = '0001-01-01 00:00:00+00', $7057 = 'https://www.cve.org/CVERecord?id=CVE-2020-14382', $7058 = '', $7059 = 'Unknown', $7060 = 'cryptsetup', $7061 = '', $7062 = '', $7063 = '', $7064 = 'source', $7065 = 'alpine', $7066 = 'Alpine Linux', $7067 = '', $7068 = '', $7069 = '3.12', $7070 = '', $7071 = '', $7072 = 'Alpine Linux v3.12', $7073 = '', $7074 = '', $7075 = '', $7076 = '2.3.2-r1', $7077 = 'invalid', $7078 = NULL, $7079 = '{}', $7080 = '{}', $7081 = 'md5', $7082 = '\x9922b81b20fafb8a3d2b6dad3286fe0f', $7083 = 'CVE-2021-4122', $7084 = 'alpine-main-v3.12-updater', $7085 = '', $7086 = '0001-01-01 00:00:00+00', $7087 = 'https://www.cve.org/CVERecord?id=CVE-2021-4122', $7088 = '', $7089 = 'Unknown', $7090 = 'cryptsetup', $7091 = '', $7092 = '', $7093 = '', $7094 = 'source', $7095 = 'alpine', $7096 = 'Alpine Linux', $7097 = '', $7098 = '', $7099 = '3.12', $7100 = '', $7101 = '', $7102 = 'Alpine Linux v3.12', $7103 = '', $7104 = '', $7105 = '', $7106 = '2.3.7-r0', $7107 = 'invalid', $7108 = NULL, $7109 = '{}', $7110 = '{}', $7111 = 'md5', $7112 = '\xc58f1039ad070d036caaa83c8f9b2370', $7113 = 'CVE-2014-7204', $7114 = 'alpine-main-v3.12-updater', $7115 = '', $7116 = '0001-01-01 00:00:00+00', $7117 = 'https://www.cve.org/CVERecord?id=CVE-2014-7204', $7118 = '', $7119 = 'Unknown', $7120 = 'ctags', $7121 = '', $7122 = '', $7123 = '', $7124 = 'source', $7125 = 'alpine', $7126 = 'Alpine Linux', $7127 = '', $7128 = '', $7129 = '3.12', $7130 = '', $7131 = '', $7132 = 'Alpine Linux v3.12', $7133 = '', $7134 = '', $7135 = '', $7136 = '5.8-r5', $7137 = 'invalid', $7138 = NULL, $7139 = '{}', $7140 = '{}', $7141 = 'md5', $7142 = '\x8257dd8bf32afd31648233fe054467c8', $7143 = 'CVE-2019-8696', $7144 = 'alpine-main-v3.12-updater', $7145 = '', $7146 = '0001-01-01 00:00:00+00', $7147 = 'https://www.cve.org/CVERecord?id=CVE-2019-8696', $7148 = '', $7149 = 'Unknown', $7150 = 'cups', $7151 = '', $7152 = '', $7153 = '', $7154 = 'source', $7155 = 'alpine', $7156 = 'Alpine Linux', $7157 = '', $7158 = '', $7159 = '3.12', $7160 = '', $7161 = '', $7162 = 'Alpine Linux v3.12', $7163 = '', $7164 = '', $7165 = '', $7166 = '2.2.12-r0', $7167 = 'invalid', $7168 = NULL, $7169 = '{}', $7170 = '{}', $7171 = 'md5', $7172 = '\xe52ab02f6331827098a90ba5c1a402b2', $7173 = 'CVE-2019-8675', $7174 = 'alpine-main-v3.12-updater', $7175 = '', $7176 = '0001-01-01 00:00:00+00', $7177 = 'https://www.cve.org/CVERecord?id=CVE-2019-8675', $7178 = '', $7179 = 'Unknown', $7180 = 'cups', $7181 = '', $7182 = '', $7183 = '', $7184 = 'source', $7185 = 'alpine', $7186 = 'Alpine Linux', $7187 = '', $7188 = '', $7189 = '3.12', $7190 = '', $7191 = '', $7192 = 'Alpine Linux v3.12', $7193 = '', $7194 = '', $7195 = '', $7196 = '2.2.12-r0', $7197 = 'invalid', $7198 = NULL, $7199 = '{}', $7200 = '{}', $7201 = 'md5', $7202 = '\xaa179a18dfd4b18d58ab483b392b79b7', $7203 = 'CVE-2020-3898', $7204 = 'alpine-main-v3.12-updater', $7205 = '', $7206 = '0001-01-01 00:00:00+00', $7207 = 'https://www.cve.org/CVERecord?id=CVE-2020-3898', $7208 = '', $7209 = 'Unknown', $7210 = 'cups', $7211 = '', $7212 = '', $7213 = '', $7214 = 'source', $7215 = 'alpine', $7216 = 'Alpine Linux', $7217 = '', $7218 = '', $7219 = '3.12', $7220 = '', $7221 = '', $7222 = 'Alpine Linux v3.12', $7223 = '', $7224 = '', $7225 = '', $7226 = '2.3.3-r0', $7227 = 'invalid', $7228 = NULL, $7229 = '{}', $7230 = '{}', $7231 = 'md5', $7232 = '\x528ee1081a62902bc78876e2715bcf9a', $7233 = 'CVE-2019-8842', $7234 = 'alpine-main-v3.12-updater', $7235 = '', $7236 = '0001-01-01 00:00:00+00', $7237 = 'https://www.cve.org/CVERecord?id=CVE-2019-8842', $7238 = '', $7239 = 'Unknown', $7240 = 'cups', $7241 = '', $7242 = '', $7243 = '', $7244 = 'source', $7245 = 'alpine', $7246 = 'Alpine Linux', $7247 = '', $7248 = '', $7249 = '3.12', $7250 = '', $7251 = '', $7252 = 'Alpine Linux v3.12', $7253 = '', $7254 = '', $7255 = '', $7256 = '2.3.3-r0', $7257 = 'invalid', $7258 = NULL, $7259 = '{}', $7260 = '{}', $7261 = 'md5', $7262 = '\x90f28149fb2fe883276a70167677ed48', $7263 = 'CVE-2018-4700', $7264 = 'alpine-main-v3.12-updater', $7265 = '', $7266 = '0001-01-01 00:00:00+00', $7267 = 'https://www.cve.org/CVERecord?id=CVE-2018-4700', $7268 = '', $7269 = 'Unknown', $7270 = 'cups', $7271 = '', $7272 = '', $7273 = '', $7274 = 'source', $7275 = 'alpine', $7276 = 'Alpine Linux', $7277 = '', $7278 = '', $7279 = '3.12', $7280 = '', $7281 = '', $7282 = 'Alpine Linux v3.12', $7283 = '', $7284 = '', $7285 = '', $7286 = '2.2.10-r0', $7287 = 'invalid', $7288 = NULL, $7289 = '{}', $7290 = '{}', $7291 = 'md5', $7292 = '\x3f57054c122e760c46dea11736c07b61', $7293 = 'CVE-2017-7407', $7294 = 'alpine-main-v3.12-updater', $7295 = '', $7296 = '0001-01-01 00:00:00+00', $7297 = 'https://www.cve.org/CVERecord?id=CVE-2017-7407', $7298 = '', $7299 = 'Unknown', $7300 = 'curl', $7301 = '', $7302 = '', $7303 = '', $7304 = 'source', $7305 = 'alpine', $7306 = 'Alpine Linux', $7307 = '', $7308 = '', $7309 = '3.12', $7310 = '', $7311 = '', $7312 = 'Alpine Linux v3.12', $7313 = '', $7314 = '', $7315 = '', $7316 = '7.53.1-r2', $7317 = 'invalid', $7318 = NULL, $7319 = '{}', $7320 = '{}', $7321 = 'md5', $7322 = '\x3759b430e954f50baed5e7e67d274ad2', $7323 = 'CVE-2018-1000300', $7324 = 'alpine-main-v3.12-updater', $7325 = '', $7326 = '0001-01-01 00:00:00+00', $7327 = 'https://www.cve.org/CVERecord?id=CVE-2018-1000300', $7328 = '', $7329 = 'Unknown', $7330 = 'curl', $7331 = '', $7332 = '', $7333 = '', $7334 = 'source', $7335 = 'alpine', $7336 = 'Alpine Linux', $7337 = '', $7338 = '', $7339 = '3.12', $7340 = '', $7341 = '', $7342 = 'Alpine Linux v3.12', $7343 = '', $7344 = '', $7345 = '', $7346 = '7.60.0-r0', $7347 = 'invalid', $7348 = NULL, $7349 = '{}', $7350 = '{}', $7351 = 'md5', $7352 = '\xc48395cfe09bcbd11689a49e51f5a114', $7353 = 'CVE-2018-1000301', $7354 = 'alpine-main-v3.12-updater', $7355 = '', $7356 = '0001-01-01 00:00:00+00', $7357 = 'https://www.cve.org/CVERecord?id=CVE-2018-1000301', $7358 = '', $7359 = 'Unknown', $7360 = 'curl', $7361 = '', $7362 = '', $7363 = '', $7364 = 'source', $7365 = 'alpine', $7366 = 'Alpine Linux', $7367 = '', $7368 = '', $7369 = '3.12', $7370 = '', $7371 = '', $7372 = 'Alpine Linux v3.12', $7373 = '', $7374 = '', $7375 = '', $7376 = '7.60.0-r0', $7377 = 'invalid', $7378 = NULL, $7379 = '{}', $7380 = '{}', $7381 = 'md5', $7382 = '\x94f75ea740622c493efdd0dab083e2f0', $7383 = 'CVE-2018-0500', $7384 = 'alpine-main-v3.12-updater', $7385 = '', $7386 = '0001-01-01 00:00:00+00', $7387 = 'https://www.cve.org/CVERecord?id=CVE-2018-0500', $7388 = '', $7389 = 'Unknown', $7390 = 'curl', $7391 = '', $7392 = '', $7393 = '', $7394 = 'source', $7395 = 'alpine', $7396 = 'Alpine Linux', $7397 = '', $7398 = '', $7399 = '3.12', $7400 = '', $7401 = '', $7402 = 'Alpine Linux v3.12', $7403 = '', $7404 = '', $7405 = '', $7406 = '7.61.0-r0', $7407 = 'invalid', $7408 = NULL, $7409 = '{}', $7410 = '{}', $7411 = 'md5', $7412 = '\x4fbb2ab29a3302044d12037853ea2ab7', $7413 = 'CVE-2018-16890', $7414 = 'alpine-main-v3.12-updater', $7415 = '', $7416 = '0001-01-01 00:00:00+00', $7417 = 'https://www.cve.org/CVERecord?id=CVE-2018-16890', $7418 = '', $7419 = 'Unknown', $7420 = 'curl', $7421 = '', $7422 = '', $7423 = '', $7424 = 'source', $7425 = 'alpine', $7426 = 'Alpine Linux', $7427 = '', $7428 = '', $7429 = '3.12', $7430 = '', $7431 = '', $7432 = 'Alpine Linux v3.12', $7433 = '', $7434 = '', $7435 = '', $7436 = '7.64.0-r0', $7437 = 'invalid', $7438 = NULL, $7439 = '{}', $7440 = '{}', $7441 = 'md5', $7442 = '\x07e803f012f7e39962b035619cbaf4c4', $7443 = 'CVE-2019-3822', $7444 = 'alpine-main-v3.12-updater', $7445 = '', $7446 = '0001-01-01 00:00:00+00', $7447 = 'https://www.cve.org/CVERecord?id=CVE-2019-3822', $7448 = '', $7449 = 'Unknown', $7450 = 'curl', $7451 = '', $7452 = '', $7453 = '', $7454 = 'source', $7455 = 'alpine', $7456 = 'Alpine Linux', $7457 = '', $7458 = '', $7459 = '3.12', $7460 = '', $7461 = '', $7462 = 'Alpine Linux v3.12', $7463 = '', $7464 = '', $7465 = '', $7466 = '7.64.0-r0', $7467 = 'invalid', $7468 = NULL, $7469 = '{}', $7470 = '{}', $7471 = 'md5', $7472 = '\xdf1f6c83f92afe0f7c07fc828712abb5', $7473 = 'CVE-2019-3823', $7474 = 'alpine-main-v3.12-updater', $7475 = '', $7476 = '0001-01-01 00:00:00+00', $7477 = 'https://www.cve.org/CVERecord?id=CVE-2019-3823', $7478 = '', $7479 = 'Unknown', $7480 = 'curl', $7481 = '', $7482 = '', $7483 = '', $7484 = 'source', $7485 = 'alpine', $7486 = 'Alpine Linux', $7487 = '', $7488 = '', $7489 = '3.12', $7490 = '', $7491 = '', $7492 = 'Alpine Linux v3.12', $7493 = '', $7494 = '', $7495 = '', $7496 = '7.64.0-r0', $7497 = 'invalid', $7498 = NULL, $7499 = '{}', $7500 = '{}', $7501 = 'md5', $7502 = '\xce1e80b159b0337750626ab8ba58388c', $7503 = 'CVE-2020-8284', $7504 = 'alpine-main-v3.12-updater', $7505 = '', $7506 = '0001-01-01 00:00:00+00', $7507 = 'https://www.cve.org/CVERecord?id=CVE-2020-8284', $7508 = '', $7509 = 'Unknown', $7510 = 'curl', $7511 = '', $7512 = '', $7513 = '', $7514 = 'source', $7515 = 'alpine', $7516 = 'Alpine Linux', $7517 = '', $7518 = '', $7519 = '3.12', $7520 = '', $7521 = '', $7522 = 'Alpine Linux v3.12', $7523 = '', $7524 = '', $7525 = '', $7526 = '7.74.0-r0', $7527 = 'invalid', $7528 = NULL, $7529 = '{}', $7530 = '{}', $7531 = 'md5', $7532 = '\xdfea62a0ba2fc32311f5fe0526056941', $7533 = 'CVE-2021-22898', $7534 = 'alpine-main-v3.12-updater', $7535 = '', $7536 = '0001-01-01 00:00:00+00', $7537 = 'https://www.cve.org/CVERecord?id=CVE-2021-22898', $7538 = '', $7539 = 'Unknown', $7540 = 'curl', $7541 = '', $7542 = '', $7543 = '', $7544 = 'source', $7545 = 'alpine', $7546 = 'Alpine Linux', $7547 = '', $7548 = '', $7549 = '3.12', $7550 = '', $7551 = '', $7552 = 'Alpine Linux v3.12', $7553 = '', $7554 = '', $7555 = '', $7556 = '7.77.0-r0', $7557 = 'invalid', $7558 = NULL, $7559 = '{}', $7560 = '{}', $7561 = 'md5', $7562 = '\x5ec9b1a54cdaa4aed05c95846931074e', $7563 = 'CVE-2021-22901', $7564 = 'alpine-main-v3.12-updater', $7565 = '', $7566 = '0001-01-01 00:00:00+00', $7567 = 'https://www.cve.org/CVERecord?id=CVE-2021-22901', $7568 = '', $7569 = 'Unknown', $7570 = 'curl', $7571 = '', $7572 = '', $7573 = '', $7574 = 'source', $7575 = 'alpine', $7576 = 'Alpine Linux', $7577 = '', $7578 = '', $7579 = '3.12', $7580 = '', $7581 = '', $7582 = 'Alpine Linux v3.12', $7583 = '', $7584 = '', $7585 = '', $7586 = '7.77.0-r0', $7587 = 'invalid', $7588 = NULL, $7589 = '{}', $7590 = '{}', $7591 = 'md5', $7592 = '\x8afc1c42ba6f2adf4849211e0927bd83', $7593 = 'CVE-2016-5419', $7594 = 'alpine-main-v3.12-updater', $7595 = '', $7596 = '0001-01-01 00:00:00+00', $7597 = 'https://www.cve.org/CVERecord?id=CVE-2016-5419', $7598 = '', $7599 = 'Unknown', $7600 = 'curl', $7601 = '', $7602 = '', $7603 = '', $7604 = 'source', $7605 = 'alpine', $7606 = 'Alpine Linux', $7607 = '', $7608 = '', $7609 = '3.12', $7610 = '', $7611 = '', $7612 = 'Alpine Linux v3.12', $7613 = '', $7614 = '', $7615 = '', $7616 = '7.50.1-r0', $7617 = 'invalid', $7618 = NULL, $7619 = '{}', $7620 = '{}', $7621 = 'md5', $7622 = '\xe14b7049ac8fb4c8641466a2cdd2af1e', $7623 = 'CVE-2016-5420', $7624 = 'alpine-main-v3.12-updater', $7625 = '', $7626 = '0001-01-01 00:00:00+00', $7627 = 'https://www.cve.org/CVERecord?id=CVE-2016-5420', $7628 = '', $7629 = 'Unknown', $7630 = 'curl', $7631 = '', $7632 = '', $7633 = '', $7634 = 'source', $7635 = 'alpine', $7636 = 'Alpine Linux', $7637 = '', $7638 = '', $7639 = '3.12', $7640 = '', $7641 = '', $7642 = 'Alpine Linux v3.12', $7643 = '', $7644 = '', $7645 = '', $7646 = '7.50.1-r0', $7647 = 'invalid', $7648 = NULL, $7649 = '{}', $7650 = '{}', $7651 = 'md5', $7652 = '\x6daad69b7ca6fb11de4296c719ab2df2', $7653 = 'CVE-2016-5421', $7654 = 'alpine-main-v3.12-updater', $7655 = '', $7656 = '0001-01-01 00:00:00+00', $7657 = 'https://www.cve.org/CVERecord?id=CVE-2016-5421', $7658 = '', $7659 = 'Unknown', $7660 = 'curl', $7661 = '', $7662 = '', $7663 = '', $7664 = 'source', $7665 = 'alpine', $7666 = 'Alpine Linux', $7667 = '', $7668 = '', $7669 = '3.12', $7670 = '', $7671 = '', $7672 = 'Alpine Linux v3.12', $7673 = '', $7674 = '', $7675 = '', $7676 = '7.50.1-r0', $7677 = 'invalid', $7678 = NULL, $7679 = '{}', $7680 = '{}', $7681 = 'md5', $7682 = '\x2520e532d541a2ee08c83fb346ed49fd', $7683 = 'CVE-2017-1000257', $7684 = 'alpine-main-v3.12-updater', $7685 = '', $7686 = '0001-01-01 00:00:00+00', $7687 = 'https://www.cve.org/CVERecord?id=CVE-2017-1000257', $7688 = '', $7689 = 'Unknown', $7690 = 'curl', $7691 = '', $7692 = '', $7693 = '', $7694 = 'source', $7695 = 'alpine', $7696 = 'Alpine Linux', $7697 = '', $7698 = '', $7699 = '3.12', $7700 = '', $7701 = '', $7702 = 'Alpine Linux v3.12', $7703 = '', $7704 = '', $7705 = '', $7706 = '7.56.1-r0', $7707 = 'invalid', $7708 = NULL, $7709 = '{}', $7710 = '{}', $7711 = 'md5', $7712 = '\x610b9bbd0cf36c9828011e4ffcf8c029', $7713 = 'CVE-2017-8816', $7714 = 'alpine-main-v3.12-updater', $7715 = '', $7716 = '0001-01-01 00:00:00+00', $7717 = 'https://www.cve.org/CVERecord?id=CVE-2017-8816', $7718 = '', $7719 = 'Unknown', $7720 = 'curl', $7721 = '', $7722 = '', $7723 = '', $7724 = 'source', $7725 = 'alpine', $7726 = 'Alpine Linux', $7727 = '', $7728 = '', $7729 = '3.12', $7730 = '', $7731 = '', $7732 = 'Alpine Linux v3.12', $7733 = '', $7734 = '', $7735 = '', $7736 = '7.57.0-r0', $7737 = 'invalid', $7738 = NULL, $7739 = '{}', $7740 = '{}', $7741 = 'md5', $7742 = '\x0333dac1304fdbdfb5894a85f5325fe0', $7743 = 'CVE-2017-8817', $7744 = 'alpine-main-v3.12-updater', $7745 = '', $7746 = '0001-01-01 00:00:00+00', $7747 = 'https://www.cve.org/CVERecord?id=CVE-2017-8817', $7748 = '', $7749 = 'Unknown', $7750 = 'curl', $7751 = '', $7752 = '', $7753 = '', $7754 = 'source', $7755 = 'alpine', $7756 = 'Alpine Linux', $7757 = '', $7758 = '', $7759 = '3.12', $7760 = '', $7761 = '', $7762 = 'Alpine Linux v3.12', $7763 = '', $7764 = '', $7765 = '', $7766 = '7.57.0-r0', $7767 = 'invalid', $7768 = NULL, $7769 = '{}', $7770 = '{}', $7771 = 'md5', $7772 = '\x009173ec038c4594b92140c407c83a2d', $7773 = 'CVE-2017-8818', $7774 = 'alpine-main-v3.12-updater', $7775 = '', $7776 = '0001-01-01 00:00:00+00', $7777 = 'https://www.cve.org/CVERecord?id=CVE-2017-8818', $7778 = '', $7779 = 'Unknown', $7780 = 'curl', $7781 = '', $7782 = '', $7783 = '', $7784 = 'source', $7785 = 'alpine', $7786 = 'Alpine Linux', $7787 = '', $7788 = '', $7789 = '3.12', $7790 = '', $7791 = '', $7792 = 'Alpine Linux v3.12', $7793 = '', $7794 = '', $7795 = '', $7796 = '7.57.0-r0', $7797 = 'invalid', $7798 = NULL, $7799 = '{}', $7800 = '{}', $7801 = 'md5', $7802 = '\x1fdf0fe57cf066c45655de6acfa89ca6', $7803 = 'CVE-2021-22945', $7804 = 'alpine-main-v3.12-updater', $7805 = '', $7806 = '0001-01-01 00:00:00+00', $7807 = 'https://www.cve.org/CVERecord?id=CVE-2021-22945', $7808 = '', $7809 = 'Unknown', $7810 = 'curl', $7811 = '', $7812 = '', $7813 = '', $7814 = 'source', $7815 = 'alpine', $7816 = 'Alpine Linux', $7817 = '', $7818 = '', $7819 = '3.12', $7820 = '', $7821 = '', $7822 = 'Alpine Linux v3.12', $7823 = '', $7824 = '', $7825 = '', $7826 = '7.79.0-r0', $7827 = 'invalid', $7828 = NULL, $7829 = '{}', $7830 = '{}', $7831 = 'md5', $7832 = '\x28048601d768cefceffffdfdf2f30641', $7833 = 'CVE-2021-22946', $7834 = 'alpine-main-v3.12-updater', $7835 = '', $7836 = '0001-01-01 00:00:00+00', $7837 = 'https://www.cve.org/CVERecord?id=CVE-2021-22946', $7838 = '', $7839 = 'Unknown', $7840 = 'curl', $7841 = '', $7842 = '', $7843 = '', $7844 = 'source', $7845 = 'alpine', $7846 = 'Alpine Linux', $7847 = '', $7848 = '', $7849 = '3.12', $7850 = '', $7851 = '', $7852 = 'Alpine Linux v3.12', $7853 = '', $7854 = '', $7855 = '', $7856 = '7.79.0-r0', $7857 = 'invalid', $7858 = NULL, $7859 = '{}', $7860 = '{}', $7861 = 'md5', $7862 = '\x4ef8e020ca2029df22c72e983ac15cf9', $7863 = 'CVE-2021-22947', $7864 = 'alpine-main-v3.12-updater', $7865 = '', $7866 = '0001-01-01 00:00:00+00', $7867 = 'https://www.cve.org/CVERecord?id=CVE-2021-22947', $7868 = '', $7869 = 'Unknown', $7870 = 'curl', $7871 = '', $7872 = '', $7873 = '', $7874 = 'source', $7875 = 'alpine', $7876 = 'Alpine Linux', $7877 = '', $7878 = '', $7879 = '3.12', $7880 = '', $7881 = '', $7882 = 'Alpine Linux v3.12', $7883 = '', $7884 = '', $7885 = '', $7886 = '7.79.0-r0', $7887 = 'invalid', $7888 = NULL, $7889 = '{}', $7890 = '{}', $7891 = 'md5', $7892 = '\xb586756c64af5e27f61d324a4cec4c6c', $7893 = 'CVE-2016-7141', $7894 = 'alpine-main-v3.12-updater', $7895 = '', $7896 = '0001-01-01 00:00:00+00', $7897 = 'https://www.cve.org/CVERecord?id=CVE-2016-7141', $7898 = '', $7899 = 'Unknown', $7900 = 'curl', $7901 = '', $7902 = '', $7903 = '', $7904 = 'source', $7905 = 'alpine', $7906 = 'Alpine Linux', $7907 = '', $7908 = '', $7909 = '3.12', $7910 = '', $7911 = '', $7912 = 'Alpine Linux v3.12', $7913 = '', $7914 = '', $7915 = '', $7916 = '7.50.2-r0', $7917 = 'invalid', $7918 = NULL, $7919 = '{}', $7920 = '{}', $7921 = 'md5', $7922 = '\xaed7ea03078c1b0b98c439bd75394111', $7923 = 'CVE-2017-2629', $7924 = 'alpine-main-v3.12-updater', $7925 = '', $7926 = '0001-01-01 00:00:00+00', $7927 = 'https://www.cve.org/CVERecord?id=CVE-2017-2629', $7928 = '', $7929 = 'Unknown', $7930 = 'curl', $7931 = '', $7932 = '', $7933 = '', $7934 = 'source', $7935 = 'alpine', $7936 = 'Alpine Linux', $7937 = '', $7938 = '', $7939 = '3.12', $7940 = '', $7941 = '', $7942 = 'Alpine Linux v3.12', $7943 = '', $7944 = '', $7945 = '', $7946 = '7.53.0-r0', $7947 = 'invalid', $7948 = NULL, $7949 = '{}', $7950 = '{}', $7951 = 'md5', $7952 = '\x8ca58a60f5069898e72729f5a82b8563', $7953 = 'CVE-2018-14618', $7954 = 'alpine-main-v3.12-updater', $7955 = '', $7956 = '0001-01-01 00:00:00+00', $7957 = 'https://www.cve.org/CVERecord?id=CVE-2018-14618', $7958 = '', $7959 = 'Unknown', $7960 = 'curl', $7961 = '', $7962 = '', $7963 = '', $7964 = 'source', $7965 = 'alpine', $7966 = 'Alpine Linux', $7967 = '', $7968 = '', $7969 = '3.12', $7970 = '', $7971 = '', $7972 = 'Alpine Linux v3.12', $7973 = '', $7974 = '', $7975 = '', $7976 = '7.61.1-r0', $7977 = 'invalid', $7978 = NULL, $7979 = '{}', $7980 = '{}', $7981 = 'md5', $7982 = '\x5deaa462689fc7bdb7cd610346a33304', $7983 = 'CVE-2020-8231', $7984 = 'alpine-main-v3.12-updater', $7985 = '', $7986 = '0001-01-01 00:00:00+00', $7987 = 'https://www.cve.org/CVERecord?id=CVE-2020-8231', $7988 = '', $7989 = 'Unknown', $7990 = 'curl', $7991 = '', $7992 = '', $7993 = '', $7994 = 'source', $7995 = 'alpine', $7996 = 'Alpine Linux', $7997 = '', $7998 = '', $7999 = '3.12', $8000 = '', $8001 = '', $8002 = 'Alpine Linux v3.12', $8003 = '', $8004 = '', $8005 = '', $8006 = '7.69.1-r2', $8007 = 'invalid', $8008 = NULL, $8009 = '{}', $8010 = '{}', $8011 = 'md5', $8012 = '\x9a49a50b11de7a56a80c3d226c30ffc6', $8013 = 'CVE-2021-22897', $8014 = 'alpine-main-v3.12-updater', $8015 = '', $8016 = '0001-01-01 00:00:00+00', $8017 = 'https://www.cve.org/CVERecord?id=CVE-2021-22897', $8018 = '', $8019 = 'Unknown', $8020 = 'curl', $8021 = '', $8022 = '', $8023 = '', $8024 = 'source', $8025 = 'alpine', $8026 = 'Alpine Linux', $8027 = '', $8028 = '', $8029 = '3.12', $8030 = '', $8031 = '', $8032 = 'Alpine Linux v3.12', $8033 = '', $8034 = '', $8035 = '', $8036 = '0', $8037 = 'invalid', $8038 = NULL, $8039 = '{}', $8040 = '{}', $8041 = 'md5', $8042 = '\xafeb13977bc987443806c16d02ec2983', $8043 = 'CVE-2016-7167', $8044 = 'alpine-main-v3.12-updater', $8045 = '', $8046 = '0001-01-01 00:00:00+00', $8047 = 'https://www.cve.org/CVERecord?id=CVE-2016-7167', $8048 = '', $8049 = 'Unknown', $8050 = 'curl', $8051 = '', $8052 = '', $8053 = '', $8054 = 'source', $8055 = 'alpine', $8056 = 'Alpine Linux', $8057 = '', $8058 = '', $8059 = '3.12', $8060 = '', $8061 = '', $8062 = 'Alpine Linux v3.12', $8063 = '', $8064 = '', $8065 = '', $8066 = '7.50.3-r0', $8067 = 'invalid', $8068 = NULL, $8069 = '{}', $8070 = '{}', $8071 = 'md5', $8072 = '\x652b1511d73e33e424f4f8e7eaffeb13', $8073 = 'CVE-2016-8615', $8074 = 'alpine-main-v3.12-updater', $8075 = '', $8076 = '0001-01-01 00:00:00+00', $8077 = 'https://www.cve.org/CVERecord?id=CVE-2016-8615', $8078 = '', $8079 = 'Unknown', $8080 = 'curl', $8081 = '', $8082 = '', $8083 = '', $8084 = 'source', $8085 = 'alpine', $8086 = 'Alpine Linux', $8087 = '', $8088 = '', $8089 = '3.12', $8090 = '', $8091 = '', $8092 = 'Alpine Linux v3.12', $8093 = '', $8094 = '', $8095 = '', $8096 = '7.51.0-r0', $8097 = 'invalid', $8098 = NULL, $8099 = '{}', $8100 = '{}', $8101 = 'md5', $8102 = '\x67229e9b3121799a9dcbe6b57b74e8ef', $8103 = 'CVE-2016-8616', $8104 = 'alpine-main-v3.12-updater', $8105 = '', $8106 = '0001-01-01 00:00:00+00', $8107 = 'https://www.cve.org/CVERecord?id=CVE-2016-8616', $8108 = '', $8109 = 'Unknown', $8110 = 'curl', $8111 = '', $8112 = '', $8113 = '', $8114 = 'source', $8115 = 'alpine', $8116 = 'Alpine Linux', $8117 = '', $8118 = '', $8119 = '3.12', $8120 = '', $8121 = '', $8122 = 'Alpine Linux v3.12', $8123 = '', $8124 = '', $8125 = '', $8126 = '7.51.0-r0', $8127 = 'invalid', $8128 = NULL, $8129 = '{}', $8130 = '{}', $8131 = 'md5', $8132 = '\xcd01fb5219394b23e7da19afee11bae3', $8133 = 'CVE-2016-8617', $8134 = 'alpine-main-v3.12-updater', $8135 = '', $8136 = '0001-01-01 00:00:00+00', $8137 = 'https://www.cve.org/CVERecord?id=CVE-2016-8617', $8138 = '', $8139 = 'Unknown', $8140 = 'curl', $8141 = '', $8142 = '', $8143 = '', $8144 = 'source', $8145 = 'alpine', $8146 = 'Alpine Linux', $8147 = '', $8148 = '', $8149 = '3.12', $8150 = '', $8151 = '', $8152 = 'Alpine Linux v3.12', $8153 = '', $8154 = '', $8155 = '', $8156 = '7.51.0-r0', $8157 = 'invalid', $8158 = NULL, $8159 = '{}', $8160 = '{}', $8161 = 'md5', $8162 = '\xc017716da7cf79cd034644b19004314f', $8163 = 'CVE-2016-8618', $8164 = 'alpine-main-v3.12-updater', $8165 = '', $8166 = '0001-01-01 00:00:00+00', $8167 = 'https://www.cve.org/CVERecord?id=CVE-2016-8618', $8168 = '', $8169 = 'Unknown', $8170 = 'curl', $8171 = '', $8172 = '', $8173 = '', $8174 = 'source', $8175 = 'alpine', $8176 = 'Alpine Linux', $8177 = '', $8178 = '', $8179 = '3.12', $8180 = '', $8181 = '', $8182 = 'Alpine Linux v3.12', $8183 = '', $8184 = '', $8185 = '', $8186 = '7.51.0-r0', $8187 = 'invalid', $8188 = NULL, $8189 = '{}', $8190 = '{}', $8191 = 'md5', $8192 = '\xbfbf330cbb4603507e37a0373aee97a3', $8193 = 'CVE-2016-8619', $8194 = 'alpine-main-v3.12-updater', $8195 = '', $8196 = '0001-01-01 00:00:00+00', $8197 = 'https://www.cve.org/CVERecord?id=CVE-2016-8619', $8198 = '', $8199 = 'Unknown', $8200 = 'curl', $8201 = '', $8202 = '', $8203 = '', $8204 = 'source', $8205 = 'alpine', $8206 = 'Alpine Linux', $8207 = '', $8208 = '', $8209 = '3.12', $8210 = '', $8211 = '', $8212 = 'Alpine Linux v3.12', $8213 = '', $8214 = '', $8215 = '', $8216 = '7.51.0-r0', $8217 = 'invalid', $8218 = NULL, $8219 = '{}', $8220 = '{}', $8221 = 'md5', $8222 = '\x1ffa5a97a16219179b823d190e9c5e0e', $8223 = 'CVE-2016-8620', $8224 = 'alpine-main-v3.12-updater', $8225 = '', $8226 = '0001-01-01 00:00:00+00', $8227 = 'https://www.cve.org/CVERecord?id=CVE-2016-8620', $8228 = '', $8229 = 'Unknown', $8230 = 'curl', $8231 = '', $8232 = '', $8233 = '', $8234 = 'source', $8235 = 'alpine', $8236 = 'Alpine Linux', $8237 = '', $8238 = '', $8239 = '3.12', $8240 = '', $8241 = '', $8242 = 'Alpine Linux v3.12', $8243 = '', $8244 = '', $8245 = '', $8246 = '7.51.0-r0', $8247 = 'invalid', $8248 = NULL, $8249 = '{}', $8250 = '{}', $8251 = 'md5', $8252 = '\x7919a5fb09571b21871409198a2ab688', $8253 = 'CVE-2016-8621', $8254 = 'alpine-main-v3.12-updater', $8255 = '', $8256 = '0001-01-01 00:00:00+00', $8257 = 'https://www.cve.org/CVERecord?id=CVE-2016-8621', $8258 = '', $8259 = 'Unknown', $8260 = 'curl', $8261 = '', $8262 = '', $8263 = '', $8264 = 'source', $8265 = 'alpine', $8266 = 'Alpine Linux', $8267 = '', $8268 = '', $8269 = '3.12', $8270 = '', $8271 = '', $8272 = 'Alpine Linux v3.12', $8273 = '', $8274 = '', $8275 = '', $8276 = '7.51.0-r0', $8277 = 'invalid', $8278 = NULL, $8279 = '{}', $8280 = '{}', $8281 = 'md5', $8282 = '\x6075eb2a2eebf3bce4cf03b0e26f1a29', $8283 = 'CVE-2016-8622', $8284 = 'alpine-main-v3.12-updater', $8285 = '', $8286 = '0001-01-01 00:00:00+00', $8287 = 'https://www.cve.org/CVERecord?id=CVE-2016-8622', $8288 = '', $8289 = 'Unknown', $8290 = 'curl', $8291 = '', $8292 = '', $8293 = '', $8294 = 'source', $8295 = 'alpine', $8296 = 'Alpine Linux', $8297 = '', $8298 = '', $8299 = '3.12', $8300 = '', $8301 = '', $8302 = 'Alpine Linux v3.12', $8303 = '', $8304 = '', $8305 = '', $8306 = '7.51.0-r0', $8307 = 'invalid', $8308 = NULL, $8309 = '{}', $8310 = '{}', $8311 = 'md5', $8312 = '\xde6bb9eccdd7093465a32e8cccb7c8ed', $8313 = 'CVE-2016-8623', $8314 = 'alpine-main-v3.12-updater', $8315 = '', $8316 = '0001-01-01 00:00:00+00', $8317 = 'https://www.cve.org/CVERecord?id=CVE-2016-8623', $8318 = '', $8319 = 'Unknown', $8320 = 'curl', $8321 = '', $8322 = '', $8323 = '', $8324 = 'source', $8325 = 'alpine', $8326 = 'Alpine Linux', $8327 = '', $8328 = '', $8329 = '3.12', $8330 = '', $8331 = '', $8332 = 'Alpine Linux v3.12', $8333 = '', $8334 = '', $8335 = '', $8336 = '7.51.0-r0', $8337 = 'invalid', $8338 = NULL, $8339 = '{}', $8340 = '{}', $8341 = 'md5', $8342 = '\x452ffe8e6c08c5637228b798cb519330', $8343 = 'CVE-2016-8624', $8344 = 'alpine-main-v3.12-updater', $8345 = '', $8346 = '0001-01-01 00:00:00+00', $8347 = 'https://www.cve.org/CVERecord?id=CVE-2016-8624', $8348 = '', $8349 = 'Unknown', $8350 = 'curl', $8351 = '', $8352 = '', $8353 = '', $8354 = 'source', $8355 = 'alpine', $8356 = 'Alpine Linux', $8357 = '', $8358 = '', $8359 = '3.12', $8360 = '', $8361 = '', $8362 = 'Alpine Linux v3.12', $8363 = '', $8364 = '', $8365 = '', $8366 = '7.51.0-r0', $8367 = 'invalid', $8368 = NULL, $8369 = '{}', $8370 = '{}', $8371 = 'md5', $8372 = '\x3dfb412b16e12945f77936acc9fc2b7a', $8373 = 'CVE-2016-8625', $8374 = 'alpine-main-v3.12-updater', $8375 = '', $8376 = '0001-01-01 00:00:00+00', $8377 = 'https://www.cve.org/CVERecord?id=CVE-2016-8625', $8378 = '', $8379 = 'Unknown', $8380 = 'curl', $8381 = '', $8382 = '', $8383 = '', $8384 = 'source', $8385 = 'alpine', $8386 = 'Alpine Linux', $8387 = '', $8388 = '', $8389 = '3.12', $8390 = '', $8391 = '', $8392 = 'Alpine Linux v3.12', $8393 = '', $8394 = '', $8395 = '', $8396 = '7.51.0-r0', $8397 = 'invalid', $8398 = NULL, $8399 = '{}', $8400 = '{}', $8401 = 'md5', $8402 = '\x0fcd855dd531e22a15c2354ce8d5641d', $8403 = 'CVE-2016-9594', $8404 = 'alpine-main-v3.12-updater', $8405 = '', $8406 = '0001-01-01 00:00:00+00', $8407 = 'https://www.cve.org/CVERecord?id=CVE-2016-9594', $8408 = '', $8409 = 'Unknown', $8410 = 'curl', $8411 = '', $8412 = '', $8413 = '', $8414 = 'source', $8415 = 'alpine', $8416 = 'Alpine Linux', $8417 = '', $8418 = '', $8419 = '3.12', $8420 = '', $8421 = '', $8422 = 'Alpine Linux v3.12', $8423 = '', $8424 = '', $8425 = '', $8426 = '7.52.1-r0', $8427 = 'invalid', $8428 = NULL, $8429 = '{}', $8430 = '{}', $8431 = 'md5', $8432 = '\x730110898b12e0dc65caa2dadcc4b12e', $8433 = 'CVE-2019-5435', $8434 = 'alpine-main-v3.12-updater', $8435 = '', $8436 = '0001-01-01 00:00:00+00', $8437 = 'https://www.cve.org/CVERecord?id=CVE-2019-5435', $8438 = '', $8439 = 'Unknown', $8440 = 'curl', $8441 = '', $8442 = '', $8443 = '', $8444 = 'source', $8445 = 'alpine', $8446 = 'Alpine Linux', $8447 = '', $8448 = '', $8449 = '3.12', $8450 = '', $8451 = '', $8452 = 'Alpine Linux v3.12', $8453 = '', $8454 = '', $8455 = '', $8456 = '7.65.0-r0', $8457 = 'invalid', $8458 = NULL, $8459 = '{}', $8460 = '{}', $8461 = 'md5', $8462 = '\x6103ab5a432bf5823293f81c211e1401', $8463 = 'CVE-2019-5436', $8464 = 'alpine-main-v3.12-updater', $8465 = '', $8466 = '0001-01-01 00:00:00+00', $8467 = 'https://www.cve.org/CVERecord?id=CVE-2019-5436', $8468 = '', $8469 = 'Unknown', $8470 = 'curl', $8471 = '', $8472 = '', $8473 = '', $8474 = 'source', $8475 = 'alpine', $8476 = 'Alpine Linux', $8477 = '', $8478 = '', $8479 = '3.12', $8480 = '', $8481 = '', $8482 = 'Alpine Linux v3.12', $8483 = '', $8484 = '', $8485 = '', $8486 = '7.65.0-r0', $8487 = 'invalid', $8488 = NULL, $8489 = '{}', $8490 = '{}', $8491 = 'md5', $8492 = '\x49f9a6f102c2fe273acf09943acf775b', $8493 = 'CVE-2020-8285', $8494 = 'alpine-main-v3.12-updater', $8495 = '', $8496 = '0001-01-01 00:00:00+00', $8497 = 'https://www.cve.org/CVERecord?id=CVE-2020-8285', $8498 = '', $8499 = 'Unknown', $8500 = 'curl', $8501 = '', $8502 = '', $8503 = '', $8504 = 'source', $8505 = 'alpine', $8506 = 'Alpine Linux', $8507 = '', $8508 = '', $8509 = '3.12', $8510 = '', $8511 = '', $8512 = 'Alpine Linux v3.12', $8513 = '', $8514 = '', $8515 = '', $8516 = '7.69.1-r3', $8517 = 'invalid', $8518 = NULL, $8519 = '{}', $8520 = '{}', $8521 = 'md5', $8522 = '\xd408bb615258981cbcab11d8f10cb9f9', $8523 = 'CVE-2020-8286', $8524 = 'alpine-main-v3.12-updater', $8525 = '', $8526 = '0001-01-01 00:00:00+00', $8527 = 'https://www.cve.org/CVERecord?id=CVE-2020-8286', $8528 = '', $8529 = 'Unknown', $8530 = 'curl', $8531 = '', $8532 = '', $8533 = '', $8534 = 'source', $8535 = 'alpine', $8536 = 'Alpine Linux', $8537 = '', $8538 = '', $8539 = '3.12', $8540 = '', $8541 = '', $8542 = 'Alpine Linux v3.12', $8543 = '', $8544 = '', $8545 = '', $8546 = '7.69.1-r3', $8547 = 'invalid', $8548 = NULL, $8549 = '{}', $8550 = '{}', $8551 = 'md5', $8552 = '\xa3d30026f086606f39d832a0a2cce361', $8553 = 'CVE-2020-8169', $8554 = 'alpine-main-v3.12-updater', $8555 = '', $8556 = '0001-01-01 00:00:00+00', $8557 = 'https://www.cve.org/CVERecord?id=CVE-2020-8169', $8558 = '', $8559 = 'Unknown', $8560 = 'curl', $8561 = '', $8562 = '', $8563 = '', $8564 = 'source', $8565 = 'alpine', $8566 = 'Alpine Linux', $8567 = '', $8568 = '', $8569 = '3.12', $8570 = '', $8571 = '', $8572 = 'Alpine Linux v3.12', $8573 = '', $8574 = '', $8575 = '', $8576 = '7.69.1-r1', $8577 = 'invalid', $8578 = NULL, $8579 = '{}', $8580 = '{}', $8581 = 'md5', $8582 = '\x9594d98a6aec943c970f40157739bd62', $8583 = 'CVE-2020-8177', $8584 = 'alpine-main-v3.12-updater', $8585 = '', $8586 = '0001-01-01 00:00:00+00', $8587 = 'https://www.cve.org/CVERecord?id=CVE-2020-8177', $8588 = '', $8589 = 'Unknown', $8590 = 'curl', $8591 = '', $8592 = '', $8593 = '', $8594 = 'source', $8595 = 'alpine', $8596 = 'Alpine Linux', $8597 = '', $8598 = '', $8599 = '3.12', $8600 = '', $8601 = '', $8602 = 'Alpine Linux v3.12', $8603 = '', $8604 = '', $8605 = '', $8606 = '7.69.1-r1', $8607 = 'invalid', $8608 = NULL, $8609 = '{}', $8610 = '{}', $8611 = 'md5', $8612 = '\x9bd0f86d0827fc2bc5d3c6ca11dcf6e6', $8613 = 'CVE-2021-22922', $8614 = 'alpine-main-v3.12-updater', $8615 = '', $8616 = '0001-01-01 00:00:00+00', $8617 = 'https://www.cve.org/CVERecord?id=CVE-2021-22922', $8618 = '', $8619 = 'Unknown', $8620 = 'curl', $8621 = '', $8622 = '', $8623 = '', $8624 = 'source', $8625 = 'alpine', $8626 = 'Alpine Linux', $8627 = '', $8628 = '', $8629 = '3.12', $8630 = '', $8631 = '', $8632 = 'Alpine Linux v3.12', $8633 = '', $8634 = '', $8635 = '', $8636 = '7.78.0-r0', $8637 = 'invalid', $8638 = NULL, $8639 = '{}', $8640 = '{}', $8641 = 'md5', $8642 = '\x42167b67c05ba6b39ccff64eaa048af6', $8643 = 'CVE-2021-22923', $8644 = 'alpine-main-v3.12-updater', $8645 = '', $8646 = '0001-01-01 00:00:00+00', $8647 = 'https://www.cve.org/CVERecord?id=CVE-2021-22923', $8648 = '', $8649 = 'Unknown', $8650 = 'curl', $8651 = '', $8652 = '', $8653 = '', $8654 = 'source', $8655 = 'alpine', $8656 = 'Alpine Linux', $8657 = '', $8658 = '', $8659 = '3.12', $8660 = '', $8661 = '', $8662 = 'Alpine Linux v3.12', $8663 = '', $8664 = '', $8665 = '', $8666 = '7.78.0-r0', $8667 = 'invalid', $8668 = NULL, $8669 = '{}', $8670 = '{}', $8671 = 'md5', $8672 = '\xe5f74a64b691677e0541ba22af4673ce', $8673 = 'CVE-2021-22924', $8674 = 'alpine-main-v3.12-updater', $8675 = '', $8676 = '0001-01-01 00:00:00+00', $8677 = 'https://www.cve.org/CVERecord?id=CVE-2021-22924', $8678 = '', $8679 = 'Unknown', $8680 = 'curl', $8681 = '', $8682 = '', $8683 = '', $8684 = 'source', $8685 = 'alpine', $8686 = 'Alpine Linux', $8687 = '', $8688 = '', $8689 = '3.12', $8690 = '', $8691 = '', $8692 = 'Alpine Linux v3.12', $8693 = '', $8694 = '', $8695 = '', $8696 = '7.78.0-r0', $8697 = 'invalid', $8698 = NULL, $8699 = '{}', $8700 = '{}', $8701 = 'md5', $8702 = '\x5fd8524b83c66736d7db8ba78318c661', $8703 = 'CVE-2021-22925', $8704 = 'alpine-main-v3.12-updater', $8705 = '', $8706 = '0001-01-01 00:00:00+00', $8707 = 'https://www.cve.org/CVERecord?id=CVE-2021-22925', $8708 = '', $8709 = 'Unknown', $8710 = 'curl', $8711 = '', $8712 = '', $8713 = '', $8714 = 'source', $8715 = 'alpine', $8716 = 'Alpine Linux', $8717 = '', $8718 = '', $8719 = '3.12', $8720 = '', $8721 = '', $8722 = 'Alpine Linux v3.12', $8723 = '', $8724 = '', $8725 = '', $8726 = '7.78.0-r0', $8727 = 'invalid', $8728 = NULL, $8729 = '{}', $8730 = '{}', $8731 = 'md5', $8732 = '\x209b1084986b4ccf9542f595d15f296b', $8733 = 'CVE-2017-7468', $8734 = 'alpine-main-v3.12-updater', $8735 = '', $8736 = '0001-01-01 00:00:00+00', $8737 = 'https://www.cve.org/CVERecord?id=CVE-2017-7468', $8738 = '', $8739 = 'Unknown', $8740 = 'curl', $8741 = '', $8742 = '', $8743 = '', $8744 = 'source', $8745 = 'alpine', $8746 = 'Alpine Linux', $8747 = '', $8748 = '', $8749 = '3.12', $8750 = '', $8751 = '', $8752 = 'Alpine Linux v3.12', $8753 = '', $8754 = '', $8755 = '', $8756 = '7.54.0-r0', $8757 = 'invalid', $8758 = NULL, $8759 = '{}', $8760 = '{}', $8761 = 'md5', $8762 = '\xc202be73c3c9e34865919bc9b8666c22', $8763 = 'CVE-2018-1000120', $8764 = 'alpine-main-v3.12-updater', $8765 = '', $8766 = '0001-01-01 00:00:00+00', $8767 = 'https://www.cve.org/CVERecord?id=CVE-2018-1000120', $8768 = '', $8769 = 'Unknown', $8770 = 'curl', $8771 = '', $8772 = '', $8773 = '', $8774 = 'source', $8775 = 'alpine', $8776 = 'Alpine Linux', $8777 = '', $8778 = '', $8779 = '3.12', $8780 = '', $8781 = '', $8782 = 'Alpine Linux v3.12', $8783 = '', $8784 = '', $8785 = '', $8786 = '7.59.0-r0', $8787 = 'invalid', $8788 = NULL, $8789 = '{}', $8790 = '{}', $8791 = 'md5', $8792 = '\xcaf36768464e10944c3f793ac60af643', $8793 = 'CVE-2018-1000121', $8794 = 'alpine-main-v3.12-updater', $8795 = '', $8796 = '0001-01-01 00:00:00+00', $8797 = 'https://www.cve.org/CVERecord?id=CVE-2018-1000121', $8798 = '', $8799 = 'Unknown', $8800 = 'curl', $8801 = '', $8802 = '', $8803 = '', $8804 = 'source', $8805 = 'alpine', $8806 = 'Alpine Linux', $8807 = '', $8808 = '', $8809 = '3.12', $8810 = '', $8811 = '', $8812 = 'Alpine Linux v3.12', $8813 = '', $8814 = '', $8815 = '', $8816 = '7.59.0-r0', $8817 = 'invalid', $8818 = NULL, $8819 = '{}', $8820 = '{}', $8821 = 'md5', $8822 = '\x34ec3a96d08ce611f942c7ab75c23291', $8823 = 'CVE-2018-1000122', $8824 = 'alpine-main-v3.12-updater', $8825 = '', $8826 = '0001-01-01 00:00:00+00', $8827 = 'https://www.cve.org/CVERecord?id=CVE-2018-1000122', $8828 = '', $8829 = 'Unknown', $8830 = 'curl', $8831 = '', $8832 = '', $8833 = '', $8834 = 'source', $8835 = 'alpine', $8836 = 'Alpine Linux', $8837 = '', $8838 = '', $8839 = '3.12', $8840 = '', $8841 = '', $8842 = 'Alpine Linux v3.12', $8843 = '', $8844 = '', $8845 = '', $8846 = '7.59.0-r0', $8847 = 'invalid', $8848 = NULL, $8849 = '{}', $8850 = '{}', $8851 = 'md5', $8852 = '\x31b20753c4e53ddce9e9072bcfe734cb', $8853 = 'CVE-2019-5481', $8854 = 'alpine-main-v3.12-updater', $8855 = '', $8856 = '0001-01-01 00:00:00+00', $8857 = 'https://www.cve.org/CVERecord?id=CVE-2019-5481', $8858 = '', $8859 = 'Unknown', $8860 = 'curl', $8861 = '', $8862 = '', $8863 = '', $8864 = 'source', $8865 = 'alpine', $8866 = 'Alpine Linux', $8867 = '', $8868 = '', $8869 = '3.12', $8870 = '', $8871 = '', $8872 = 'Alpine Linux v3.12', $8873 = '', $8874 = '', $8875 = '', $8876 = '7.66.0-r0', $8877 = 'invalid', $8878 = NULL, $8879 = '{}', $8880 = '{}', $8881 = 'md5', $8882 = '\x2f18635e95978e0c5f0f49003e14b697', $8883 = 'CVE-2019-5482', $8884 = 'alpine-main-v3.12-updater', $8885 = '', $8886 = '0001-01-01 00:00:00+00', $8887 = 'https://www.cve.org/CVERecord?id=CVE-2019-5482', $8888 = '', $8889 = 'Unknown', $8890 = 'curl', $8891 = '', $8892 = '', $8893 = '', $8894 = 'source', $8895 = 'alpine', $8896 = 'Alpine Linux', $8897 = '', $8898 = '', $8899 = '3.12', $8900 = '', $8901 = '', $8902 = 'Alpine Linux v3.12', $8903 = '', $8904 = '', $8905 = '', $8906 = '7.66.0-r0', $8907 = 'invalid', $8908 = NULL, $8909 = '{}', $8910 = '{}', $8911 = 'md5', $8912 = '\xf51ae2b53be25d9bfca82ee8df92c585', $8913 = 'CVE-2021-22876', $8914 = 'alpine-main-v3.12-updater', $8915 = '', $8916 = '0001-01-01 00:00:00+00', $8917 = 'https://www.cve.org/CVERecord?id=CVE-2021-22876', $8918 = '', $8919 = 'Unknown', $8920 = 'curl', $8921 = '', $8922 = '', $8923 = '', $8924 = 'source', $8925 = 'alpine', $8926 = 'Alpine Linux', $8927 = '', $8928 = '', $8929 = '3.12', $8930 = '', $8931 = '', $8932 = 'Alpine Linux v3.12', $8933 = '', $8934 = '', $8935 = '', $8936 = '7.76.0-r0', $8937 = 'invalid', $8938 = NULL, $8939 = '{}', $8940 = '{}', $8941 = 'md5', $8942 = '\x05f8f967cb0e6a65e8ef71bdf05e41b2', $8943 = 'CVE-2021-22890', $8944 = 'alpine-main-v3.12-updater', $8945 = '', $8946 = '0001-01-01 00:00:00+00', $8947 = 'https://www.cve.org/CVERecord?id=CVE-2021-22890', $8948 = '', $8949 = 'Unknown', $8950 = 'curl', $8951 = '', $8952 = '', $8953 = '', $8954 = 'source', $8955 = 'alpine', $8956 = 'Alpine Linux', $8957 = '', $8958 = '', $8959 = '3.12', $8960 = '', $8961 = '', $8962 = 'Alpine Linux v3.12', $8963 = '', $8964 = '', $8965 = '', $8966 = '7.76.0-r0', $8967 = 'invalid', $8968 = NULL, $8969 = '{}', $8970 = '{}', $8971 = 'md5', $8972 = '\xd8a744971abc91651f8b461e998a96d6', $8973 = 'CVE-2022-22576', $8974 = 'alpine-main-v3.12-updater', $8975 = '', $8976 = '0001-01-01 00:00:00+00', $8977 = 'https://www.cve.org/CVERecord?id=CVE-2022-22576', $8978 = '', $8979 = 'Unknown', $8980 = 'curl', $8981 = '', $8982 = '', $8983 = '', $8984 = 'source', $8985 = 'alpine', $8986 = 'Alpine Linux', $8987 = '', $8988 = '', $8989 = '3.12', $8990 = '', $8991 = '', $8992 = 'Alpine Linux v3.12', $8993 = '', $8994 = '', $8995 = '', $8996 = '7.79.1-r1', $8997 = 'invalid', $8998 = NULL, $8999 = '{}', $9000 = '{}', $9001 = 'md5', $9002 = '\xa0518653ef6060ad6e12c2ea1be82ab4', $9003 = 'CVE-2022-27774', $9004 = 'alpine-main-v3.12-updater', $9005 = '', $9006 = '0001-01-01 00:00:00+00', $9007 = 'https://www.cve.org/CVERecord?id=CVE-2022-27774', $9008 = '', $9009 = 'Unknown', $9010 = 'curl', $9011 = '', $9012 = '', $9013 = '', $9014 = 'source', $9015 = 'alpine', $9016 = 'Alpine Linux', $9017 = '', $9018 = '', $9019 = '3.12', $9020 = '', $9021 = '', $9022 = 'Alpine Linux v3.12', $9023 = '', $9024 = '', $9025 = '', $9026 = '7.79.1-r1', $9027 = 'invalid', $9028 = NULL, $9029 = '{}', $9030 = '{}', $9031 = 'md5', $9032 = '\xd6524d4215b7a113410b69156d637578', $9033 = 'CVE-2022-27775', $9034 = 'alpine-main-v3.12-updater', $9035 = '', $9036 = '0001-01-01 00:00:00+00', $9037 = 'https://www.cve.org/CVERecord?id=CVE-2022-27775', $9038 = '', $9039 = 'Unknown', $9040 = 'curl', $9041 = '', $9042 = '', $9043 = '', $9044 = 'source', $9045 = 'alpine', $9046 = 'Alpine Linux', $9047 = '', $9048 = '', $9049 = '3.12', $9050 = '', $9051 = '', $9052 = 'Alpine Linux v3.12', $9053 = '', $9054 = '', $9055 = '', $9056 = '7.79.1-r1', $9057 = 'invalid', $9058 = NULL, $9059 = '{}', $9060 = '{}', $9061 = 'md5', $9062 = '\x18a135331b2bfd62d3d6359a3a51d49e', $9063 = 'CVE-2022-27776', $9064 = 'alpine-main-v3.12-updater', $9065 = '', $9066 = '0001-01-01 00:00:00+00', $9067 = 'https://www.cve.org/CVERecord?id=CVE-2022-27776', $9068 = '', $9069 = 'Unknown', $9070 = 'curl', $9071 = '', $9072 = '', $9073 = '', $9074 = 'source', $9075 = 'alpine', $9076 = 'Alpine Linux', $9077 = '', $9078 = '', $9079 = '3.12', $9080 = '', $9081 = '', $9082 = 'Alpine Linux v3.12', $9083 = '', $9084 = '', $9085 = '', $9086 = '7.79.1-r1', $9087 = 'invalid', $9088 = NULL, $9089 = '{}', $9090 = '{}', $9091 = 'md5', $9092 = '\xbb39c98d5f7212b2758c21ee27fa8891', $9093 = 'CVE-2014-0138', $9094 = 'alpine-main-v3.12-updater', $9095 = '', $9096 = '0001-01-01 00:00:00+00', $9097 = 'https://www.cve.org/CVERecord?id=CVE-2014-0138', $9098 = '', $9099 = 'Unknown', $9100 = 'curl', $9101 = '', $9102 = '', $9103 = '', $9104 = 'source', $9105 = 'alpine', $9106 = 'Alpine Linux', $9107 = '', $9108 = '', $9109 = '3.12', $9110 = '', $9111 = '', $9112 = 'Alpine Linux v3.12', $9113 = '', $9114 = '', $9115 = '', $9116 = '7.36.0-r0', $9117 = 'invalid', $9118 = NULL, $9119 = '{}', $9120 = '{}', $9121 = 'md5', $9122 = '\x5ddea2d463a98d0fc587900c01131fa9', $9123 = 'CVE-2014-0139', $9124 = 'alpine-main-v3.12-updater', $9125 = '', $9126 = '0001-01-01 00:00:00+00', $9127 = 'https://www.cve.org/CVERecord?id=CVE-2014-0139', $9128 = '', $9129 = 'Unknown', $9130 = 'curl', $9131 = '', $9132 = '', $9133 = '', $9134 = 'source', $9135 = 'alpine', $9136 = 'Alpine Linux', $9137 = '', $9138 = '', $9139 = '3.12', $9140 = '', $9141 = '', $9142 = 'Alpine Linux v3.12', $9143 = '', $9144 = '', $9145 = '', $9146 = '7.36.0-r0', $9147 = 'invalid', $9148 = NULL, $9149 = '{}', $9150 = '{}', $9151 = 'md5', $9152 = '\x6e194ac6ed9b2177bca75f29b1174530', $9153 = 'CVE-2017-1000099', $9154 = 'alpine-main-v3.12-updater', $9155 = '', $9156 = '0001-01-01 00:00:00+00', $9157 = 'https://www.cve.org/CVERecord?id=CVE-2017-1000099', $9158 = '', $9159 = 'Unknown', $9160 = 'curl', $9161 = '', $9162 = '', $9163 = '', $9164 = 'source', $9165 = 'alpine', $9166 = 'Alpine Linux', $9167 = '', $9168 = '', $9169 = '3.12', $9170 = '', $9171 = '', $9172 = 'Alpine Linux v3.12', $9173 = '', $9174 = '', $9175 = '', $9176 = '7.55.0-r0', $9177 = 'invalid', $9178 = NULL, $9179 = '{}', $9180 = '{}', $9181 = 'md5', $9182 = '\xe51c6ea5b80b866a8cfa6dbe828d7836', $9183 = 'CVE-2017-1000100', $9184 = 'alpine-main-v3.12-updater', $9185 = '', $9186 = '0001-01-01 00:00:00+00', $9187 = 'https://www.cve.org/CVERecord?id=CVE-2017-1000100', $9188 = '', $9189 = 'Unknown', $9190 = 'curl', $9191 = '', $9192 = '', $9193 = '', $9194 = 'source', $9195 = 'alpine', $9196 = 'Alpine Linux', $9197 = '', $9198 = '', $9199 = '3.12', $9200 = '', $9201 = '', $9202 = 'Alpine Linux v3.12', $9203 = '', $9204 = '', $9205 = '', $9206 = '7.55.0-r0', $9207 = 'invalid', $9208 = NULL, $9209 = '{}', $9210 = '{}', $9211 = 'md5', $9212 = '\xf79e96ef6b72233ed9b9a2e32c1907a9', $9213 = 'CVE-2017-1000101', $9214 = 'alpine-main-v3.12-updater', $9215 = '', $9216 = '0001-01-01 00:00:00+00', $9217 = 'https://www.cve.org/CVERecord?id=CVE-2017-1000101', $9218 = '', $9219 = 'Unknown', $9220 = 'curl', $9221 = '', $9222 = '', $9223 = '', $9224 = 'source', $9225 = 'alpine', $9226 = 'Alpine Linux', $9227 = '', $9228 = '', $9229 = '3.12', $9230 = '', $9231 = '', $9232 = 'Alpine Linux v3.12', $9233 = '', $9234 = '', $9235 = '', $9236 = '7.55.0-r0', $9237 = 'invalid', $9238 = NULL, $9239 = '{}', $9240 = '{}', $9241 = 'md5', $9242 = '\x4cf8c61e2e64e9ab5189fa4ebe2963df', $9243 = 'CVE-2018-16839', $9244 = 'alpine-main-v3.12-updater', $9245 = '', $9246 = '0001-01-01 00:00:00+00', $9247 = 'https://www.cve.org/CVERecord?id=CVE-2018-16839', $9248 = '', $9249 = 'Unknown', $9250 = 'curl', $9251 = '', $9252 = '', $9253 = '', $9254 = 'source', $9255 = 'alpine', $9256 = 'Alpine Linux', $9257 = '', $9258 = '', $9259 = '3.12', $9260 = '', $9261 = '', $9262 = 'Alpine Linux v3.12', $9263 = '', $9264 = '', $9265 = '', $9266 = '7.62.0-r0', $9267 = 'invalid', $9268 = NULL, $9269 = '{}', $9270 = '{}', $9271 = 'md5', $9272 = '\x71d54d206265b1cbd2f38ed3bfc5f5e7', $9273 = 'CVE-2018-16840', $9274 = 'alpine-main-v3.12-updater', $9275 = '', $9276 = '0001-01-01 00:00:00+00', $9277 = 'https://www.cve.org/CVERecord?id=CVE-2018-16840', $9278 = '', $9279 = 'Unknown', $9280 = 'curl', $9281 = '', $9282 = '', $9283 = '', $9284 = 'source', $9285 = 'alpine', $9286 = 'Alpine Linux', $9287 = '', $9288 = '', $9289 = '3.12', $9290 = '', $9291 = '', $9292 = 'Alpine Linux v3.12', $9293 = '', $9294 = '', $9295 = '', $9296 = '7.62.0-r0', $9297 = 'invalid', $9298 = NULL, $9299 = '{}', $9300 = '{}', $9301 = 'md5', $9302 = '\xbac239dd4287645f8c46433644e78fc8', $9303 = 'CVE-2018-16842', $9304 = 'alpine-main-v3.12-updater', $9305 = '', $9306 = '0001-01-01 00:00:00+00', $9307 = 'https://www.cve.org/CVERecord?id=CVE-2018-16842', $9308 = '', $9309 = 'Unknown', $9310 = 'curl', $9311 = '', $9312 = '', $9313 = '', $9314 = 'source', $9315 = 'alpine', $9316 = 'Alpine Linux', $9317 = '', $9318 = '', $9319 = '3.12', $9320 = '', $9321 = '', $9322 = 'Alpine Linux v3.12', $9323 = '', $9324 = '', $9325 = '', $9326 = '7.62.0-r0', $9327 = 'invalid', $9328 = NULL, $9329 = '{}', $9330 = '{}', $9331 = 'md5', $9332 = '\xe4fe63397f7de05f12098cf091a95178', $9333 = 'CVE-2010-3846', $9334 = 'alpine-main-v3.12-updater', $9335 = '', $9336 = '0001-01-01 00:00:00+00', $9337 = 'https://www.cve.org/CVERecord?id=CVE-2010-3846', $9338 = '', $9339 = 'Unknown', $9340 = 'cvs', $9341 = '', $9342 = '', $9343 = '', $9344 = 'source', $9345 = 'alpine', $9346 = 'Alpine Linux', $9347 = '', $9348 = '', $9349 = '3.12', $9350 = '', $9351 = '', $9352 = 'Alpine Linux v3.12', $9353 = '', $9354 = '', $9355 = '', $9356 = '1.12.12-r0', $9357 = 'invalid', $9358 = NULL, $9359 = '{}', $9360 = '{}', $9361 = 'md5', $9362 = '\x2330d8b5715ad13c20b9afe09e0b9f61', $9363 = 'CVE-2012-0804', $9364 = 'alpine-main-v3.12-updater', $9365 = '', $9366 = '0001-01-01 00:00:00+00', $9367 = 'https://www.cve.org/CVERecord?id=CVE-2012-0804', $9368 = '', $9369 = 'Unknown', $9370 = 'cvs', $9371 = '', $9372 = '', $9373 = '', $9374 = 'source', $9375 = 'alpine', $9376 = 'Alpine Linux', $9377 = '', $9378 = '', $9379 = '3.12', $9380 = '', $9381 = '', $9382 = 'Alpine Linux v3.12', $9383 = '', $9384 = '', $9385 = '', $9386 = '1.12.12-r0', $9387 = 'invalid', $9388 = NULL, $9389 = '{}', $9390 = '{}', $9391 = 'md5', $9392 = '\xa3739207bf8deed3eaadf868b1dcdae0', $9393 = 'CVE-2017-12836', $9394 = 'alpine-main-v3.12-updater', $9395 = '', $9396 = '0001-01-01 00:00:00+00', $9397 = 'https://www.cve.org/CVERecord?id=CVE-2017-12836', $9398 = '', $9399 = 'Unknown', $9400 = 'cvs', $9401 = '', $9402 = '', $9403 = '', $9404 = 'source', $9405 = 'alpine', $9406 = 'Alpine Linux', $9407 = '', $9408 = '', $9409 = '3.12', $9410 = '', $9411 = '', $9412 = 'Alpine Linux v3.12', $9413 = '', $9414 = '', $9415 = '', $9416 = '1.12.12-r0', $9417 = 'invalid', $9418 = NULL, $9419 = '{}', $9420 = '{}', $9421 = 'md5', $9422 = '\xee6102d7d0905ddb74c26d94890efc6e', $9423 = 'CVE-2022-24407', $9424 = 'alpine-main-v3.12-updater', $9425 = '', $9426 = '0001-01-01 00:00:00+00', $9427 = 'https://www.cve.org/CVERecord?id=CVE-2022-24407', $9428 = '', $9429 = 'Unknown', $9430 = 'cyrus-sasl', $9431 = '', $9432 = '', $9433 = '', $9434 = 'source', $9435 = 'alpine', $9436 = 'Alpine Linux', $9437 = '', $9438 = '', $9439 = '3.12', $9440 = '', $9441 = '', $9442 = 'Alpine Linux v3.12', $9443 = '', $9444 = '', $9445 = '', $9446 = '2.1.28-r0', $9447 = 'invalid', $9448 = NULL, $9449 = '{}', $9450 = '{}', $9451 = 'md5', $9452 = '\x11533ae782c6287611b8301a409f085a', $9453 = 'CVE-2020-8032', $9454 = 'alpine-main-v3.12-updater', $9455 = '', $9456 = '0001-01-01 00:00:00+00', $9457 = 'https://www.cve.org/CVERecord?id=CVE-2020-8032', $9458 = '', $9459 = 'Unknown', $9460 = 'cyrus-sasl', $9461 = '', $9462 = '', $9463 = '', $9464 = 'source', $9465 = 'alpine', $9466 = 'Alpine Linux', $9467 = '', $9468 = '', $9469 = '3.12', $9470 = '', $9471 = '', $9472 = 'Alpine Linux v3.12', $9473 = '', $9474 = '', $9475 = '', $9476 = '0', $9477 = 'invalid', $9478 = NULL, $9479 = '{}', $9480 = '{}', $9481 = 'md5', $9482 = '\x1ac3f9995290e0eaa6ab0b0c2e437f92', $9483 = 'CVE-2013-4122', $9484 = 'alpine-main-v3.12-updater', $9485 = '', $9486 = '0001-01-01 00:00:00+00', $9487 = 'https://www.cve.org/CVERecord?id=CVE-2013-4122', $9488 = '', $9489 = 'Unknown', $9490 = 'cyrus-sasl', $9491 = '', $9492 = '', $9493 = '', $9494 = 'source', $9495 = 'alpine', $9496 = 'Alpine Linux', $9497 = '', $9498 = '', $9499 = '3.12', $9500 = '', $9501 = '', $9502 = 'Alpine Linux v3.12', $9503 = '', $9504 = '', $9505 = '', $9506 = '2.1.26-r7', $9507 = 'invalid', $9508 = NULL, $9509 = '{}', $9510 = '{}', $9511 = 'md5', $9512 = '\x7fe3840eaa65ec643e7a837a6dfd868e', $9513 = 'CVE-2019-19906', $9514 = 'alpine-main-v3.12-updater', $9515 = '', $9516 = '0001-01-01 00:00:00+00', $9517 = 'https://www.cve.org/CVERecord?id=CVE-2019-19906', $9518 = '', $9519 = 'Unknown', $9520 = 'cyrus-sasl', $9521 = '', $9522 = '', $9523 = '', $9524 = 'source', $9525 = 'alpine', $9526 = 'Alpine Linux', $9527 = '', $9528 = '', $9529 = '3.12', $9530 = '', $9531 = '', $9532 = 'Alpine Linux v3.12', $9533 = '', $9534 = '', $9535 = '', $9536 = '2.1.27-r5', $9537 = 'invalid', $9538 = NULL, $9539 = '{}', $9540 = '{}', $9541 = 'md5', $9542 = '\x22a87cd02d633ef220c98a1237418c77', $9543 = 'CVE-2019-12749', $9544 = 'alpine-main-v3.12-updater', $9545 = '', $9546 = '0001-01-01 00:00:00+00', $9547 = 'https://www.cve.org/CVERecord?id=CVE-2019-12749', $9548 = '', $9549 = 'Unknown', $9550 = 'dbus', $9551 = '', $9552 = '', $9553 = '', $9554 = 'source', $9555 = 'alpine', $9556 = 'Alpine Linux', $9557 = '', $9558 = '', $9559 = '3.12', $9560 = '', $9561 = '', $9562 = 'Alpine Linux v3.12', $9563 = '', $9564 = '', $9565 = '', $9566 = '1.12.16-r0', $9567 = 'invalid', $9568 = NULL, $9569 = '{}', $9570 = '{}', $9571 = 'md5', $9572 = '\x18b711524a60c273537539e77206013d', $9573 = 'CVE-2020-12049', $9574 = 'alpine-main-v3.12-updater', $9575 = '', $9576 = '0001-01-01 00:00:00+00', $9577 = 'https://www.cve.org/CVERecord?id=CVE-2020-12049', $9578 = '', $9579 = 'Unknown', $9580 = 'dbus', $9581 = '', $9582 = '', $9583 = '', $9584 = 'source', $9585 = 'alpine', $9586 = 'Alpine Linux', $9587 = '', $9588 = '', $9589 = '3.12', $9590 = '', $9591 = '', $9592 = 'Alpine Linux v3.12', $9593 = '', $9594 = '', $9595 = '', $9596 = '1.12.18-r0', $9597 = 'invalid', $9598 = NULL, $9599 = '{}', $9600 = '{}', $9601 = 'md5', $9602 = '\x2d7c386f79678f2796220586cfdf90a8', $9603 = 'CVE-2019-6470', $9604 = 'alpine-main-v3.12-updater', $9605 = '', $9606 = '0001-01-01 00:00:00+00', $9607 = 'https://www.cve.org/CVERecord?id=CVE-2019-6470', $9608 = '', $9609 = 'Unknown', $9610 = 'dhcp', $9611 = '', $9612 = '', $9613 = '', $9614 = 'source', $9615 = 'alpine', $9616 = 'Alpine Linux', $9617 = '', $9618 = '', $9619 = '3.12', $9620 = '', $9621 = '', $9622 = 'Alpine Linux v3.12', $9623 = '', $9624 = '', $9625 = '', $9626 = '4.4.1-r0', $9627 = 'invalid', $9628 = NULL, $9629 = '{}', $9630 = '{}', $9631 = 'md5', $9632 = '\x7be1c84c432d5a1447e5b73abbb39390', $9633 = 'CVE-2018-5732', $9634 = 'alpine-main-v3.12-updater', $9635 = '', $9636 = '0001-01-01 00:00:00+00', $9637 = 'https://www.cve.org/CVERecord?id=CVE-2018-5732', $9638 = '', $9639 = 'Unknown', $9640 = 'dhcp', $9641 = '', $9642 = '', $9643 = '', $9644 = 'source', $9645 = 'alpine', $9646 = 'Alpine Linux', $9647 = '', $9648 = '', $9649 = '3.12', $9650 = '', $9651 = '', $9652 = 'Alpine Linux v3.12', $9653 = '', $9654 = '', $9655 = '', $9656 = '4.4.1-r0', $9657 = 'invalid', $9658 = NULL, $9659 = '{}', $9660 = '{}', $9661 = 'md5', $9662 = '\x03c49bcdcb7012a6736a6f2d9fb6cd76', $9663 = 'CVE-2018-5733', $9664 = 'alpine-main-v3.12-updater', $9665 = '', $9666 = '0001-01-01 00:00:00+00', $9667 = 'https://www.cve.org/CVERecord?id=CVE-2018-5733', $9668 = '', $9669 = 'Unknown', $9670 = 'dhcp', $9671 = '', $9672 = '', $9673 = '', $9674 = 'source', $9675 = 'alpine', $9676 = 'Alpine Linux', $9677 = '', $9678 = '', $9679 = '3.12', $9680 = '', $9681 = '', $9682 = 'Alpine Linux v3.12', $9683 = '', $9684 = '', $9685 = '', $9686 = '4.4.1-r0', $9687 = 'invalid', $9688 = NULL, $9689 = '{}', $9690 = '{}', $9691 = 'md5', $9692 = '\x7a7638c211e4d6847b998a094f1a98fb', $9693 = 'CVE-2021-25217', $9694 = 'alpine-main-v3.12-updater', $9695 = '', $9696 = '0001-01-01 00:00:00+00', $9697 = 'https://www.cve.org/CVERecord?id=CVE-2021-25217', $9698 = '', $9699 = 'Unknown', $9700 = 'dhcp', $9701 = '', $9702 = '', $9703 = '', $9704 = 'source', $9705 = 'alpine', $9706 = 'Alpine Linux', $9707 = '', $9708 = '', $9709 = '3.12', $9710 = '', $9711 = '', $9712 = 'Alpine Linux v3.12', $9713 = '', $9714 = '', $9715 = '', $9716 = '4.4.2_p1-r0', $9717 = 'invalid', $9718 = NULL, $9719 = '{}', $9720 = '{}', $9721 = 'md5', $9722 = '\xdfecc8dbedffdfbd8dcd8d7397df2b5a', $9723 = 'CVE-2017-13704', $9724 = 'alpine-main-v3.12-updater', $9725 = '', $9726 = '0001-01-01 00:00:00+00', $9727 = 'https://www.cve.org/CVERecord?id=CVE-2017-13704', $9728 = '', $9729 = 'Unknown', $9730 = 'dnsmasq', $9731 = '', $9732 = '', $9733 = '', $9734 = 'source', $9735 = 'alpine', $9736 = 'Alpine Linux', $9737 = '', $9738 = '', $9739 = '3.12', $9740 = '', $9741 = '', $9742 = 'Alpine Linux v3.12', $9743 = '', $9744 = '', $9745 = '', $9746 = '2.78-r0', $9747 = 'invalid', $9748 = NULL, $9749 = '{}', $9750 = '{}', $9751 = 'md5', $9752 = '\x102a2a524a6230ad20923ae9f2f1502f', $9753 = 'CVE-2017-14491', $9754 = 'alpine-main-v3.12-updater', $9755 = '', $9756 = '0001-01-01 00:00:00+00', $9757 = 'https://www.cve.org/CVERecord?id=CVE-2017-14491', $9758 = '', $9759 = 'Unknown', $9760 = 'dnsmasq', $9761 = '', $9762 = '', $9763 = '', $9764 = 'source', $9765 = 'alpine', $9766 = 'Alpine Linux', $9767 = '', $9768 = '', $9769 = '3.12', $9770 = '', $9771 = '', $9772 = 'Alpine Linux v3.12', $9773 = '', $9774 = '', $9775 = '', $9776 = '2.78-r0', $9777 = 'invalid', $9778 = NULL, $9779 = '{}', $9780 = '{}', $9781 = 'md5', $9782 = '\xc8d76bfb5b564b892231bd87658aae0e', $9783 = 'CVE-2017-14492', $9784 = 'alpine-main-v3.12-updater', $9785 = '', $9786 = '0001-01-01 00:00:00+00', $9787 = 'https://www.cve.org/CVERecord?id=CVE-2017-14492', $9788 = '', $9789 = 'Unknown', $9790 = 'dnsmasq', $9791 = '', $9792 = '', $9793 = '', $9794 = 'source', $9795 = 'alpine', $9796 = 'Alpine Linux', $9797 = '', $9798 = '', $9799 = '3.12', $9800 = '', $9801 = '', $9802 = 'Alpine Linux v3.12', $9803 = '', $9804 = '', $9805 = '', $9806 = '2.78-r0', $9807 = 'invalid', $9808 = NULL, $9809 = '{}', $9810 = '{}', $9811 = 'md5', $9812 = '\xa12727820980ea6d25d3e1547d831053', $9813 = 'CVE-2017-14493', $9814 = 'alpine-main-v3.12-updater', $9815 = '', $9816 = '0001-01-01 00:00:00+00', $9817 = 'https://www.cve.org/CVERecord?id=CVE-2017-14493', $9818 = '', $9819 = 'Unknown', $9820 = 'dnsmasq', $9821 = '', $9822 = '', $9823 = '', $9824 = 'source', $9825 = 'alpine', $9826 = 'Alpine Linux', $9827 = '', $9828 = '', $9829 = '3.12', $9830 = '', $9831 = '', $9832 = 'Alpine Linux v3.12', $9833 = '', $9834 = '', $9835 = '', $9836 = '2.78-r0', $9837 = 'invalid', $9838 = NULL, $9839 = '{}', $9840 = '{}', $9841 = 'md5', $9842 = '\x4c06e80d1f568fff90d0a8b16bc8eea7', $9843 = 'CVE-2017-14494', $9844 = 'alpine-main-v3.12-updater', $9845 = '', $9846 = '0001-01-01 00:00:00+00', $9847 = 'https://www.cve.org/CVERecord?id=CVE-2017-14494', $9848 = '', $9849 = 'Unknown', $9850 = 'dnsmasq', $9851 = '', $9852 = '', $9853 = '', $9854 = 'source', $9855 = 'alpine', $9856 = 'Alpine Linux', $9857 = '', $9858 = '', $9859 = '3.12', $9860 = '', $9861 = '', $9862 = 'Alpine Linux v3.12', $9863 = '', $9864 = '', $9865 = '', $9866 = '2.78-r0', $9867 = 'invalid', $9868 = NULL, $9869 = '{}', $9870 = '{}', $9871 = 'md5', $9872 = '\x33d0ebdef3a701136e9af4357ca6a3e4', $9873 = 'CVE-2017-14495', $9874 = 'alpine-main-v3.12-updater', $9875 = '', $9876 = '0001-01-01 00:00:00+00', $9877 = 'https://www.cve.org/CVERecord?id=CVE-2017-14495', $9878 = '', $9879 = 'Unknown', $9880 = 'dnsmasq', $9881 = '', $9882 = '', $9883 = '', $9884 = 'source', $9885 = 'alpine', $9886 = 'Alpine Linux', $9887 = '', $9888 = '', $9889 = '3.12', $9890 = '', $9891 = '', $9892 = 'Alpine Linux v3.12', $9893 = '', $9894 = '', $9895 = '', $9896 = '2.78-r0', $9897 = 'invalid', $9898 = NULL, $9899 = '{}', $9900 = '{}', $9901 = 'md5', $9902 = '\xa2ded5a683a05179c4626d36ce659d32', $9903 = 'CVE-2017-14496', $9904 = 'alpine-main-v3.12-updater', $9905 = '', $9906 = '0001-01-01 00:00:00+00', $9907 = 'https://www.cve.org/CVERecord?id=CVE-2017-14496', $9908 = '', $9909 = 'Unknown', $9910 = 'dnsmasq', $9911 = '', $9912 = '', $9913 = '', $9914 = 'source', $9915 = 'alpine', $9916 = 'Alpine Linux', $9917 = '', $9918 = '', $9919 = '3.12', $9920 = '', $9921 = '', $9922 = 'Alpine Linux v3.12', $9923 = '', $9924 = '', $9925 = '', $9926 = '2.78-r0', $9927 = 'invalid', $9928 = NULL, $9929 = '{}', $9930 = '{}', $9931 = 'md5', $9932 = '\x7573281780441a6a3a5bed597da5415c', $9933 = 'CVE-2017-15107', $9934 = 'alpine-main-v3.12-updater', $9935 = '', $9936 = '0001-01-01 00:00:00+00', $9937 = 'https://www.cve.org/CVERecord?id=CVE-2017-15107', $9938 = '', $9939 = 'Unknown', $9940 = 'dnsmasq', $9941 = '', $9942 = '', $9943 = '', $9944 = 'source', $9945 = 'alpine', $9946 = 'Alpine Linux', $9947 = '', $9948 = '', $9949 = '3.12', $9950 = '', $9951 = '', $9952 = 'Alpine Linux v3.12', $9953 = '', $9954 = '', $9955 = '', $9956 = '2.79-r0', $9957 = 'invalid', $9958 = NULL, $9959 = '{}', $9960 = '{}', $9961 = 'md5', $9962 = '\x330285c2794fd398fa410770b0ef1cb8', $9963 = 'CVE-2019-14834', $9964 = 'alpine-main-v3.12-updater', $9965 = '', $9966 = '0001-01-01 00:00:00+00', $9967 = 'https://www.cve.org/CVERecord?id=CVE-2019-14834', $9968 = '', $9969 = 'Unknown', $9970 = 'dnsmasq', $9971 = '', $9972 = '', $9973 = '', $9974 = 'source', $9975 = 'alpine', $9976 = 'Alpine Linux', $9977 = '', $9978 = '', $9979 = '3.12', $9980 = '', $9981 = '', $9982 = 'Alpine Linux v3.12', $9983 = '', $9984 = '', $9985 = '', $9986 = '2.80-r5', $9987 = 'invalid', $9988 = NULL, $9989 = '{}', $9990 = '{}', $9991 = 'md5', $9992 = '\x6c0bc7b734b608d417564148dc218376', $9993 = 'CVE-2020-25681', $9994 = 'alpine-main-v3.12-updater', $9995 = '', $9996 = '0001-01-01 00:00:00+00', $9997 = 'https://www.cve.org/CVERecord?id=CVE-2020-25681', $9998 = '', $9999 = 'Unknown', $10000 = 'dnsmasq', $10001 = '', $10002 = '', $10003 = '', $10004 = 'source', $10005 = 'alpine', $10006 = 'Alpine Linux', $10007 = '', $10008 = '', $10009 = '3.12', $10010 = '', $10011 = '', $10012 = 'Alpine Linux v3.12', $10013 = '', $10014 = '', $10015 = '', $10016 = '2.83-r0', $10017 = 'invalid', $10018 = NULL, $10019 = '{}', $10020 = '{}', $10021 = 'md5', $10022 = '\x04d323d21aa1c85a1d6f6ad7ee23bb26', $10023 = 'CVE-2020-25682', $10024 = 'alpine-main-v3.12-updater', $10025 = '', $10026 = '0001-01-01 00:00:00+00', $10027 = 'https://www.cve.org/CVERecord?id=CVE-2020-25682', $10028 = '', $10029 = 'Unknown', $10030 = 'dnsmasq', $10031 = '', $10032 = '', $10033 = '', $10034 = 'source', $10035 = 'alpine', $10036 = 'Alpine Linux', $10037 = '', $10038 = '', $10039 = '3.12', $10040 = '', $10041 = '', $10042 = 'Alpine Linux v3.12', $10043 = '', $10044 = '', $10045 = '', $10046 = '2.83-r0', $10047 = 'invalid', $10048 = NULL, $10049 = '{}', $10050 = '{}', $10051 = 'md5', $10052 = '\xa0dc6239c1dc2577d26494cbca30c29d', $10053 = 'CVE-2020-25683', $10054 = 'alpine-main-v3.12-updater', $10055 = '', $10056 = '0001-01-01 00:00:00+00', $10057 = 'https://www.cve.org/CVERecord?id=CVE-2020-25683', $10058 = '', $10059 = 'Unknown', $10060 = 'dnsmasq', $10061 = '', $10062 = '', $10063 = '', $10064 = 'source', $10065 = 'alpine', $10066 = 'Alpine Linux', $10067 = '', $10068 = '', $10069 = '3.12', $10070 = '', $10071 = '', $10072 = 'Alpine Linux v3.12', $10073 = '', $10074 = '', $10075 = '', $10076 = '2.83-r0', $10077 = 'invalid', $10078 = NULL, $10079 = '{}', $10080 = '{}', $10081 = 'md5', $10082 = '\xa37782f6c88b0bf520675fd01cd0522a', $10083 = 'CVE-2020-25684', $10084 = 'alpine-main-v3.12-updater', $10085 = '', $10086 = '0001-01-01 00:00:00+00', $10087 = 'https://www.cve.org/CVERecord?id=CVE-2020-25684', $10088 = '', $10089 = 'Unknown', $10090 = 'dnsmasq', $10091 = '', $10092 = '', $10093 = '', $10094 = 'source', $10095 = 'alpine', $10096 = 'Alpine Linux', $10097 = '', $10098 = '', $10099 = '3.12', $10100 = '', $10101 = '', $10102 = 'Alpine Linux v3.12', $10103 = '', $10104 = '', $10105 = '', $10106 = '2.83-r0', $10107 = 'invalid', $10108 = NULL, $10109 = '{}', $10110 = '{}', $10111 = 'md5', $10112 = '\x148b785016108ebe5cb1c576e079adbc', $10113 = 'CVE-2020-25685', $10114 = 'alpine-main-v3.12-updater', $10115 = '', $10116 = '0001-01-01 00:00:00+00', $10117 = 'https://www.cve.org/CVERecord?id=CVE-2020-25685', $10118 = '', $10119 = 'Unknown', $10120 = 'dnsmasq', $10121 = '', $10122 = '', $10123 = '', $10124 = 'source', $10125 = 'alpine', $10126 = 'Alpine Linux', $10127 = '', $10128 = '', $10129 = '3.12', $10130 = '', $10131 = '', $10132 = 'Alpine Linux v3.12', $10133 = '', $10134 = '', $10135 = '', $10136 = '2.83-r0', $10137 = 'invalid', $10138 = NULL, $10139 = '{}', $10140 = '{}', $10141 = 'md5', $10142 = '\x11c15ac328a0326fc39f1cce853c3834', $10143 = 'CVE-2020-25686', $10144 = 'alpine-main-v3.12-updater', $10145 = '', $10146 = '0001-01-01 00:00:00+00', $10147 = 'https://www.cve.org/CVERecord?id=CVE-2020-25686', $10148 = '', $10149 = 'Unknown', $10150 = 'dnsmasq', $10151 = '', $10152 = '', $10153 = '', $10154 = 'source', $10155 = 'alpine', $10156 = 'Alpine Linux', $10157 = '', $10158 = '', $10159 = '3.12', $10160 = '', $10161 = '', $10162 = 'Alpine Linux v3.12', $10163 = '', $10164 = '', $10165 = '', $10166 = '2.83-r0', $10167 = 'invalid', $10168 = NULL, $10169 = '{}', $10170 = '{}', $10171 = 'md5', $10172 = '\x790ad485263cd9ead2ddfff30652ae48', $10173 = 'CVE-2020-25687', $10174 = 'alpine-main-v3.12-updater', $10175 = '', $10176 = '0001-01-01 00:00:00+00', $10177 = 'https://www.cve.org/CVERecord?id=CVE-2020-25687', $10178 = '', $10179 = 'Unknown', $10180 = 'dnsmasq', $10181 = '', $10182 = '', $10183 = '', $10184 = 'source', $10185 = 'alpine', $10186 = 'Alpine Linux', $10187 = '', $10188 = '', $10189 = '3.12', $10190 = '', $10191 = '', $10192 = 'Alpine Linux v3.12', $10193 = '', $10194 = '', $10195 = '', $10196 = '2.83-r0', $10197 = 'invalid', $10198 = NULL, $10199 = '{}', $10200 = '{}', $10201 = 'md5', $10202 = '\x5e03d07c86bbb4ed86d1acc483090243', $10203 = 'CVE-2021-3448', $10204 = 'alpine-main-v3.12-updater', $10205 = '', $10206 = '0001-01-01 00:00:00+00', $10207 = 'https://www.cve.org/CVERecord?id=CVE-2021-3448', $10208 = '', $10209 = 'Unknown', $10210 = 'dnsmasq', $10211 = '', $10212 = '', $10213 = '', $10214 = 'source', $10215 = 'alpine', $10216 = 'Alpine Linux', $10217 = '', $10218 = '', $10219 = '3.12', $10220 = '', $10221 = '', $10222 = 'Alpine Linux v3.12', $10223 = '', $10224 = '', $10225 = '', $10226 = '2.85-r0', $10227 = 'invalid', $10228 = NULL, $10229 = '{}', $10230 = '{}', $10231 = 'md5', $10232 = '\xde22ddeae57e61df25a42b091618624c', $10233 = 'CVE-2019-25016', $10234 = 'alpine-main-v3.12-updater', $10235 = '', $10236 = '0001-01-01 00:00:00+00', $10237 = 'https://www.cve.org/CVERecord?id=CVE-2019-25016', $10238 = '', $10239 = 'Unknown', $10240 = 'doas', $10241 = '', $10242 = '', $10243 = '', $10244 = 'source', $10245 = 'alpine', $10246 = 'Alpine Linux', $10247 = '', $10248 = '', $10249 = '3.12', $10250 = '', $10251 = '', $10252 = 'Alpine Linux v3.12', $10253 = '', $10254 = '', $10255 = '', $10256 = '6.6.1-r2', $10257 = 'invalid', $10258 = NULL, $10259 = '{}', $10260 = '{}', $10261 = 'md5', $10262 = '\x27cd29ae8b9aa1a7abe1cbb44c2749bb', $10263 = 'CVE-2019-3814', $10264 = 'alpine-main-v3.12-updater', $10265 = '', $10266 = '0001-01-01 00:00:00+00', $10267 = 'https://www.cve.org/CVERecord?id=CVE-2019-3814', $10268 = '', $10269 = 'Unknown', $10270 = 'dovecot', $10271 = '', $10272 = '', $10273 = '', $10274 = 'source', $10275 = 'alpine', $10276 = 'Alpine Linux', $10277 = '', $10278 = '', $10279 = '3.12', $10280 = '', $10281 = '', $10282 = 'Alpine Linux v3.12', $10283 = '', $10284 = '', $10285 = '', $10286 = '2.3.4.1-r0', $10287 = 'invalid', $10288 = NULL, $10289 = '{}', $10290 = '{}', $10291 = 'md5', $10292 = '\xc5558c25b27d49f202087e53cb89829e', $10293 = 'CVE-2019-7524', $10294 = 'alpine-main-v3.12-updater', $10295 = '', $10296 = '0001-01-01 00:00:00+00', $10297 = 'https://www.cve.org/CVERecord?id=CVE-2019-7524', $10298 = '', $10299 = 'Unknown', $10300 = 'dovecot', $10301 = '', $10302 = '', $10303 = '', $10304 = 'source', $10305 = 'alpine', $10306 = 'Alpine Linux', $10307 = '', $10308 = '', $10309 = '3.12', $10310 = '', $10311 = '', $10312 = 'Alpine Linux v3.12', $10313 = '', $10314 = '', $10315 = '', $10316 = '2.3.5.1-r0', $10317 = 'invalid', $10318 = NULL, $10319 = '{}', $10320 = '{}', $10321 = 'md5', $10322 = '\x431e50f3d5d73d93162e20eede2ab467', $10323 = 'CVE-2019-11499', $10324 = 'alpine-main-v3.12-updater', $10325 = '', $10326 = '0001-01-01 00:00:00+00', $10327 = 'https://www.cve.org/CVERecord?id=CVE-2019-11499', $10328 = '', $10329 = 'Unknown', $10330 = 'dovecot', $10331 = '', $10332 = '', $10333 = '', $10334 = 'source', $10335 = 'alpine', $10336 = 'Alpine Linux', $10337 = '', $10338 = '', $10339 = '3.12', $10340 = '', $10341 = '', $10342 = 'Alpine Linux v3.12', $10343 = '', $10344 = '', $10345 = '', $10346 = '2.3.6-r0', $10347 = 'invalid', $10348 = NULL, $10349 = '{}', $10350 = '{}', $10351 = 'md5', $10352 = '\xa6cdb0d01439ec2ff4326874bde35475', $10353 = 'CVE-2019-11494', $10354 = 'alpine-main-v3.12-updater', $10355 = '', $10356 = '0001-01-01 00:00:00+00', $10357 = 'https://www.cve.org/CVERecord?id=CVE-2019-11494', $10358 = '', $10359 = 'Unknown', $10360 = 'dovecot', $10361 = '', $10362 = '', $10363 = '', $10364 = 'source', $10365 = 'alpine', $10366 = 'Alpine Linux', $10367 = '', $10368 = '', $10369 = '3.12', $10370 = '', $10371 = '', $10372 = 'Alpine Linux v3.12', $10373 = '', $10374 = '', $10375 = '', $10376 = '2.3.6-r0', $10377 = 'invalid', $10378 = NULL, $10379 = '{}', $10380 = '{}', $10381 = 'md5', $10382 = '\xc7aa92d0c7c8ce320bfe6e9d286616af', $10383 = 'CVE-2019-10691', $10384 = 'alpine-main-v3.12-updater', $10385 = '', $10386 = '0001-01-01 00:00:00+00', $10387 = 'https://www.cve.org/CVERecord?id=CVE-2019-10691', $10388 = '', $10389 = 'Unknown', $10390 = 'dovecot', $10391 = '', $10392 = '', $10393 = '', $10394 = 'source', $10395 = 'alpine', $10396 = 'Alpine Linux', $10397 = '', $10398 = '', $10399 = '3.12', $10400 = '', $10401 = '', $10402 = 'Alpine Linux v3.12', $10403 = '', $10404 = '', $10405 = '', $10406 = '2.3.6-r0', $10407 = 'invalid', $10408 = NULL, $10409 = '{}', $10410 = '{}', $10411 = 'md5', $10412 = '\x5abdeb8a3fed794fe3a8784d2ffd7480', $10413 = 'CVE-2017-15130', $10414 = 'alpine-main-v3.12-updater', $10415 = '', $10416 = '0001-01-01 00:00:00+00', $10417 = 'https://www.cve.org/CVERecord?id=CVE-2017-15130', $10418 = '', $10419 = 'Unknown', $10420 = 'dovecot', $10421 = '', $10422 = '', $10423 = '', $10424 = 'source', $10425 = 'alpine', $10426 = 'Alpine Linux', $10427 = '', $10428 = '', $10429 = '3.12', $10430 = '', $10431 = '', $10432 = 'Alpine Linux v3.12', $10433 = '', $10434 = '', $10435 = '', $10436 = '2.3.1-r0', $10437 = 'invalid', $10438 = NULL, $10439 = '{}', $10440 = '{}', $10441 = 'md5', $10442 = '\xd216a2007c37cecc6360f685ff6ea19c', $10443 = 'CVE-2017-14461', $10444 = 'alpine-main-v3.12-updater', $10445 = '', $10446 = '0001-01-01 00:00:00+00', $10447 = 'https://www.cve.org/CVERecord?id=CVE-2017-14461', $10448 = '', $10449 = 'Unknown', $10450 = 'dovecot', $10451 = '', $10452 = '', $10453 = '', $10454 = 'source', $10455 = 'alpine', $10456 = 'Alpine Linux', $10457 = '', $10458 = '', $10459 = '3.12', $10460 = '', $10461 = '', $10462 = 'Alpine Linux v3.12', $10463 = '', $10464 = '', $10465 = '', $10466 = '2.3.1-r0', $10467 = 'invalid', $10468 = NULL, $10469 = '{}', $10470 = '{}', $10471 = 'md5', $10472 = '\xdb0ec309d97bdb6c4a7fa378c38285e7', $10473 = 'CVE-2017-15132', $10474 = 'alpine-main-v3.12-updater', $10475 = '', $10476 = '0001-01-01 00:00:00+00', $10477 = 'https://www.cve.org/CVERecord?id=CVE-2017-15132', $10478 = '', $10479 = 'Unknown', $10480 = 'dovecot', $10481 = '', $10482 = '', $10483 = '', $10484 = 'source', $10485 = 'alpine', $10486 = 'Alpine Linux', $10487 = '', $10488 = '', $10489 = '3.12', $10490 = '', $10491 = '', $10492 = 'Alpine Linux v3.12', $10493 = '', $10494 = '', $10495 = '', $10496 = '2.3.1-r0', $10497 = 'invalid', $10498 = NULL, $10499 = '{}', $10500 = '{}', $10501 = 'md5', $10502 = '\x827e3824f43bf43c29cef802300b0d0d', $10503 = 'CVE-2020-10957', $10504 = 'alpine-main-v3.12-updater', $10505 = '', $10506 = '0001-01-01 00:00:00+00', $10507 = 'https://www.cve.org/CVERecord?id=CVE-2020-10957', $10508 = '', $10509 = 'Unknown', $10510 = 'dovecot', $10511 = '', $10512 = '', $10513 = '', $10514 = 'source', $10515 = 'alpine', $10516 = 'Alpine Linux', $10517 = '', $10518 = '', $10519 = '3.12', $10520 = '', $10521 = '', $10522 = 'Alpine Linux v3.12', $10523 = '', $10524 = '', $10525 = '', $10526 = '2.3.10.1-r0', $10527 = 'invalid', $10528 = NULL, $10529 = '{}', $10530 = '{}', $10531 = 'md5', $10532 = '\xc329e3fd19603965c7ac1eb7ffa8b8d4', $10533 = 'CVE-2020-10958', $10534 = 'alpine-main-v3.12-updater', $10535 = '', $10536 = '0001-01-01 00:00:00+00', $10537 = 'https://www.cve.org/CVERecord?id=CVE-2020-10958', $10538 = '', $10539 = 'Unknown', $10540 = 'dovecot', $10541 = '', $10542 = '', $10543 = '', $10544 = 'source', $10545 = 'alpine', $10546 = 'Alpine Linux', $10547 = '', $10548 = '', $10549 = '3.12', $10550 = '', $10551 = '', $10552 = 'Alpine Linux v3.12', $10553 = '', $10554 = '', $10555 = '', $10556 = '2.3.10.1-r0', $10557 = 'invalid', $10558 = NULL, $10559 = '{}', $10560 = '{}', $10561 = 'md5', $10562 = '\x62dd862c371a489c3a12b78c41850dd0', $10563 = 'CVE-2020-10967', $10564 = 'alpine-main-v3.12-updater', $10565 = '', $10566 = '0001-01-01 00:00:00+00', $10567 = 'https://www.cve.org/CVERecord?id=CVE-2020-10967', $10568 = '', $10569 = 'Unknown', $10570 = 'dovecot', $10571 = '', $10572 = '', $10573 = '', $10574 = 'source', $10575 = 'alpine', $10576 = 'Alpine Linux', $10577 = '', $10578 = '', $10579 = '3.12', $10580 = '', $10581 = '', $10582 = 'Alpine Linux v3.12', $10583 = '', $10584 = '', $10585 = '', $10586 = '2.3.10.1-r0', $10587 = 'invalid', $10588 = NULL, $10589 = '{}', $10590 = '{}', $10591 = 'md5', $10592 = '\x63b2c34a46fbfbab377cb470ae230370', $10593 = 'CVE-2020-12100', $10594 = 'alpine-main-v3.12-updater', $10595 = '', $10596 = '0001-01-01 00:00:00+00', $10597 = 'https://www.cve.org/CVERecord?id=CVE-2020-12100', $10598 = '', $10599 = 'Unknown', $10600 = 'dovecot', $10601 = '', $10602 = '', $10603 = '', $10604 = 'source', $10605 = 'alpine', $10606 = 'Alpine Linux', $10607 = '', $10608 = '', $10609 = '3.12', $10610 = '', $10611 = '', $10612 = 'Alpine Linux v3.12', $10613 = '', $10614 = '', $10615 = '', $10616 = '2.3.11.3-r0', $10617 = 'invalid', $10618 = NULL, $10619 = '{}', $10620 = '{}', $10621 = 'md5', $10622 = '\x6afc768340fcc461501b49f1d405ce82', $10623 = 'CVE-2020-12673', $10624 = 'alpine-main-v3.12-updater', $10625 = '', $10626 = '0001-01-01 00:00:00+00', $10627 = 'https://www.cve.org/CVERecord?id=CVE-2020-12673', $10628 = '', $10629 = 'Unknown', $10630 = 'dovecot', $10631 = '', $10632 = '', $10633 = '', $10634 = 'source', $10635 = 'alpine', $10636 = 'Alpine Linux', $10637 = '', $10638 = '', $10639 = '3.12', $10640 = '', $10641 = '', $10642 = 'Alpine Linux v3.12', $10643 = '', $10644 = '', $10645 = '', $10646 = '2.3.11.3-r0', $10647 = 'invalid', $10648 = NULL, $10649 = '{}', $10650 = '{}', $10651 = 'md5', $10652 = '\x25413bb8834b4f2d575edb84bc109859', $10653 = 'CVE-2020-12674', $10654 = 'alpine-main-v3.12-updater', $10655 = '', $10656 = '0001-01-01 00:00:00+00', $10657 = 'https://www.cve.org/CVERecord?id=CVE-2020-12674', $10658 = '', $10659 = 'Unknown', $10660 = 'dovecot', $10661 = '', $10662 = '', $10663 = '', $10664 = 'source', $10665 = 'alpine', $10666 = 'Alpine Linux', $10667 = '', $10668 = '', $10669 = '3.12', $10670 = '', $10671 = '', $10672 = 'Alpine Linux v3.12', $10673 = '', $10674 = '', $10675 = '', $10676 = '2.3.11.3-r0', $10677 = 'invalid', $10678 = NULL, $10679 = '{}', $10680 = '{}', $10681 = 'md5', $10682 = '\x5dae51ad3defedb3664a316b72034f08', $10683 = 'CVE-2020-24386', $10684 = 'alpine-main-v3.12-updater', $10685 = '', $10686 = '0001-01-01 00:00:00+00', $10687 = 'https://www.cve.org/CVERecord?id=CVE-2020-24386', $10688 = '', $10689 = 'Unknown', $10690 = 'dovecot', $10691 = '', $10692 = '', $10693 = '', $10694 = 'source', $10695 = 'alpine', $10696 = 'Alpine Linux', $10697 = '', $10698 = '', $10699 = '3.12', $10700 = '', $10701 = '', $10702 = 'Alpine Linux v3.12', $10703 = '', $10704 = '', $10705 = '', $10706 = '2.3.13-r0', $10707 = 'invalid', $10708 = NULL, $10709 = '{}', $10710 = '{}', $10711 = 'md5', $10712 = '\xf26df55a1d8ff72ae61ac23fd9750752', $10713 = 'CVE-2020-25275', $10714 = 'alpine-main-v3.12-updater', $10715 = '', $10716 = '0001-01-01 00:00:00+00', $10717 = 'https://www.cve.org/CVERecord?id=CVE-2020-25275', $10718 = '', $10719 = 'Unknown', $10720 = 'dovecot', $10721 = '', $10722 = '', $10723 = '', $10724 = 'source', $10725 = 'alpine', $10726 = 'Alpine Linux', $10727 = '', $10728 = '', $10729 = '3.12', $10730 = '', $10731 = '', $10732 = 'Alpine Linux v3.12', $10733 = '', $10734 = '', $10735 = '', $10736 = '2.3.13-r0', $10737 = 'invalid', $10738 = NULL, $10739 = '{}', $10740 = '{}', $10741 = 'md5', $10742 = '\x6b812570d5450686494e7ecb0a73dd8c', $10743 = 'CVE-2021-29157', $10744 = 'alpine-main-v3.12-updater', $10745 = '', $10746 = '0001-01-01 00:00:00+00', $10747 = 'https://www.cve.org/CVERecord?id=CVE-2021-29157', $10748 = '', $10749 = 'Unknown', $10750 = 'dovecot', $10751 = '', $10752 = '', $10753 = '', $10754 = 'source', $10755 = 'alpine', $10756 = 'Alpine Linux', $10757 = '', $10758 = '', $10759 = '3.12', $10760 = '', $10761 = '', $10762 = 'Alpine Linux v3.12', $10763 = '', $10764 = '', $10765 = '', $10766 = '2.3.15-r0', $10767 = 'invalid', $10768 = NULL, $10769 = '{}', $10770 = '{}', $10771 = 'md5', $10772 = '\x05d8490638804933500fee2de7456262', $10773 = 'CVE-2021-33515', $10774 = 'alpine-main-v3.12-updater', $10775 = '', $10776 = '0001-01-01 00:00:00+00', $10777 = 'https://www.cve.org/CVERecord?id=CVE-2021-33515', $10778 = '', $10779 = 'Unknown', $10780 = 'dovecot', $10781 = '', $10782 = '', $10783 = '', $10784 = 'source', $10785 = 'alpine', $10786 = 'Alpine Linux', $10787 = '', $10788 = '', $10789 = '3.12', $10790 = '', $10791 = '', $10792 = 'Alpine Linux v3.12', $10793 = '', $10794 = '', $10795 = '', $10796 = '2.3.15-r0', $10797 = 'invalid', $10798 = NULL, $10799 = '{}', $10800 = '{}', $10801 = 'md5', $10802 = '\x8c683354c593b1971b6a84c0f125c44b', $10803 = 'CVE-2019-11500', $10804 = 'alpine-main-v3.12-updater', $10805 = '', $10806 = '0001-01-01 00:00:00+00', $10807 = 'https://www.cve.org/CVERecord?id=CVE-2019-11500', $10808 = '', $10809 = 'Unknown', $10810 = 'dovecot', $10811 = '', $10812 = '', $10813 = '', $10814 = 'source', $10815 = 'alpine', $10816 = 'Alpine Linux', $10817 = '', $10818 = '', $10819 = '3.12', $10820 = '', $10821 = '', $10822 = 'Alpine Linux v3.12', $10823 = '', $10824 = '', $10825 = '', $10826 = '2.3.7.2-r0', $10827 = 'invalid', $10828 = NULL, $10829 = '{}', $10830 = '{}', $10831 = 'md5', $10832 = '\x8677b7fa6b05084ce875bfc02100eb13', $10833 = 'CVE-2019-19722', $10834 = 'alpine-main-v3.12-updater', $10835 = '', $10836 = '0001-01-01 00:00:00+00', $10837 = 'https://www.cve.org/CVERecord?id=CVE-2019-19722', $10838 = '', $10839 = 'Unknown', $10840 = 'dovecot', $10841 = '', $10842 = '', $10843 = '', $10844 = 'source', $10845 = 'alpine', $10846 = 'Alpine Linux', $10847 = '', $10848 = '', $10849 = '3.12', $10850 = '', $10851 = '', $10852 = 'Alpine Linux v3.12', $10853 = '', $10854 = '', $10855 = '', $10856 = '2.3.9.2-r0', $10857 = 'invalid', $10858 = NULL, $10859 = '{}', $10860 = '{}', $10861 = 'md5', $10862 = '\xaa9fe38195da97c26e6aa99b48eb3b09', $10863 = 'CVE-2020-7046', $10864 = 'alpine-main-v3.12-updater', $10865 = '', $10866 = '0001-01-01 00:00:00+00', $10867 = 'https://www.cve.org/CVERecord?id=CVE-2020-7046', $10868 = '', $10869 = 'Unknown', $10870 = 'dovecot', $10871 = '', $10872 = '', $10873 = '', $10874 = 'source', $10875 = 'alpine', $10876 = 'Alpine Linux', $10877 = '', $10878 = '', $10879 = '3.12', $10880 = '', $10881 = '', $10882 = 'Alpine Linux v3.12', $10883 = '', $10884 = '', $10885 = '', $10886 = '2.3.9.3-r0', $10887 = 'invalid', $10888 = NULL, $10889 = '{}', $10890 = '{}', $10891 = 'md5', $10892 = '\xec5cd22828e383a506bf43d188cb08db', $10893 = 'CVE-2020-7957', $10894 = 'alpine-main-v3.12-updater', $10895 = '', $10896 = '0001-01-01 00:00:00+00', $10897 = 'https://www.cve.org/CVERecord?id=CVE-2020-7957', $10898 = '', $10899 = 'Unknown', $10900 = 'dovecot', $10901 = '', $10902 = '', $10903 = '', $10904 = 'source', $10905 = 'alpine', $10906 = 'Alpine Linux', $10907 = '', $10908 = '', $10909 = '3.12', $10910 = '', $10911 = '', $10912 = 'Alpine Linux v3.12', $10913 = '', $10914 = '', $10915 = '', $10916 = '2.3.9.3-r0', $10917 = 'invalid', $10918 = NULL, $10919 = '{}', $10920 = '{}', $10921 = 'md5', $10922 = '\xcb1cfd7ba5e6fe355e1a66770dd0939d', $10923 = 'CVE-2018-15599', $10924 = 'alpine-main-v3.12-updater', $10925 = '', $10926 = '0001-01-01 00:00:00+00', $10927 = 'https://www.cve.org/CVERecord?id=CVE-2018-15599', $10928 = '', $10929 = 'Unknown', $10930 = 'dropbear', $10931 = '', $10932 = '', $10933 = '', $10934 = 'source', $10935 = 'alpine', $10936 = 'Alpine Linux', $10937 = '', $10938 = '', $10939 = '3.12', $10940 = '', $10941 = '', $10942 = 'Alpine Linux v3.12', $10943 = '', $10944 = '', $10945 = '', $10946 = '2018.76-r2', $10947 = 'invalid', $10948 = NULL, $10949 = '{}', $10950 = '{}', $10951 = 'md5', $10952 = '\x1e8869b3dffbf278cbf1b010ea621c18', $10953 = 'CVE-2018-20685', $10954 = 'alpine-main-v3.12-updater', $10955 = '', $10956 = '0001-01-01 00:00:00+00', $10957 = 'https://www.cve.org/CVERecord?id=CVE-2018-20685', $10958 = '', $10959 = 'Unknown', $10960 = 'dropbear', $10961 = '', $10962 = '', $10963 = '', $10964 = 'source', $10965 = 'alpine', $10966 = 'Alpine Linux', $10967 = '', $10968 = '', $10969 = '3.12', $10970 = '', $10971 = '', $10972 = 'Alpine Linux v3.12', $10973 = '', $10974 = '', $10975 = '', $10976 = '2019.78-r1', $10977 = 'invalid', $10978 = NULL, $10979 = '{}', $10980 = '{}', $10981 = 'md5', $10982 = '\x2e569e10644f763d03642d7d31df420a', $10983 = 'CVE-2020-36254', $10984 = 'alpine-main-v3.12-updater', $10985 = '', $10986 = '0001-01-01 00:00:00+00', $10987 = 'https://www.cve.org/CVERecord?id=CVE-2020-36254', $10988 = '', $10989 = 'Unknown', $10990 = 'dropbear', $10991 = '', $10992 = '', $10993 = '', $10994 = 'source', $10995 = 'alpine', $10996 = 'Alpine Linux', $10997 = '', $10998 = '', $10999 = '3.12', $11000 = '', $11001 = '', $11002 = 'Alpine Linux v3.12', $11003 = '', $11004 = '', $11005 = '', $11006 = '2019.78-r1', $11007 = 'invalid', $11008 = NULL, $11009 = '{}', $11010 = '{}', $11011 = 'md5', $11012 = '\x14b69789dbe586ea8d2eb327a98c535c', $11013 = 'CVE-2019-5094', $11014 = 'alpine-main-v3.12-updater', $11015 = '', $11016 = '0001-01-01 00:00:00+00', $11017 = 'https://www.cve.org/CVERecord?id=CVE-2019-5094', $11018 = '', $11019 = 'Unknown', $11020 = 'e2fsprogs', $11021 = '', $11022 = '', $11023 = '', $11024 = 'source', $11025 = 'alpine', $11026 = 'Alpine Linux', $11027 = '', $11028 = '', $11029 = '3.12', $11030 = '', $11031 = '', $11032 = 'Alpine Linux v3.12', $11033 = '', $11034 = '', $11035 = '', $11036 = '1.45.4-r0', $11037 = 'invalid', $11038 = NULL, $11039 = '{}', $11040 = '{}', $11041 = 'md5', $11042 = '\xdfff307b5e0807b7d91ab2494e38e271', $11043 = 'CVE-2019-5188', $11044 = 'alpine-main-v3.12-updater', $11045 = '', $11046 = '0001-01-01 00:00:00+00', $11047 = 'https://www.cve.org/CVERecord?id=CVE-2019-5188', $11048 = '', $11049 = 'Unknown', $11050 = 'e2fsprogs', $11051 = '', $11052 = '', $11053 = '', $11054 = 'source', $11055 = 'alpine', $11056 = 'Alpine Linux', $11057 = '', $11058 = '', $11059 = '3.12', $11060 = '', $11061 = '', $11062 = 'Alpine Linux v3.12', $11063 = '', $11064 = '', $11065 = '', $11066 = '1.45.5-r0', $11067 = 'invalid', $11068 = NULL, $11069 = '{}', $11070 = '{}', $11071 = 'md5', $11072 = '\x9b811dd1b9dadd6576daac84ff789479', $11073 = 'CVE-2017-7607', $11074 = 'alpine-main-v3.12-updater', $11075 = '', $11076 = '0001-01-01 00:00:00+00', $11077 = 'https://www.cve.org/CVERecord?id=CVE-2017-7607', $11078 = '', $11079 = 'Unknown', $11080 = 'elfutils', $11081 = '', $11082 = '', $11083 = '', $11084 = 'source', $11085 = 'alpine', $11086 = 'Alpine Linux', $11087 = '', $11088 = '', $11089 = '3.12', $11090 = '', $11091 = '', $11092 = 'Alpine Linux v3.12', $11093 = '', $11094 = '', $11095 = '', $11096 = '0.168-r1', $11097 = 'invalid', $11098 = NULL, $11099 = '{}', $11100 = '{}', $11101 = 'md5', $11102 = '\x04dde18ffcec0fb06b7f6ab084989175', $11103 = 'CVE-2017-7608', $11104 = 'alpine-main-v3.12-updater', $11105 = '', $11106 = '0001-01-01 00:00:00+00', $11107 = 'https://www.cve.org/CVERecord?id=CVE-2017-7608', $11108 = '', $11109 = 'Unknown', $11110 = 'elfutils', $11111 = '', $11112 = '', $11113 = '', $11114 = 'source', $11115 = 'alpine', $11116 = 'Alpine Linux', $11117 = '', $11118 = '', $11119 = '3.12', $11120 = '', $11121 = '', $11122 = 'Alpine Linux v3.12', $11123 = '', $11124 = '', $11125 = '', $11126 = '0.168-r1', $11127 = 'invalid', $11128 = NULL, $11129 = '{}', $11130 = '{}', $11131 = 'md5', $11132 = '\x71d38bdaee7eeaf942944c294f1bfae0', $11133 = 'CVE-2019-16062', $11134 = 'alpine-main-v3.12-updater', $11135 = '', $11136 = '0001-01-01 00:00:00+00', $11137 = 'https://www.cve.org/CVERecord?id=CVE-2019-16062', $11138 = '', $11139 = 'Unknown', $11140 = 'elfutils', $11141 = '', $11142 = '', $11143 = '', $11144 = 'source', $11145 = 'alpine', $11146 = 'Alpine Linux', $11147 = '', $11148 = '', $11149 = '3.12', $11150 = '', $11151 = '', $11152 = 'Alpine Linux v3.12', $11153 = '', $11154 = '', $11155 = '', $11156 = '0.174-r0', $11157 = 'invalid', $11158 = NULL, $11159 = '{}', $11160 = '{}', $11161 = 'md5', $11162 = '\x2c6797de74f3dcef2fd3b792c9c5cf74', $11163 = 'CVE-2019-16402', $11164 = 'alpine-main-v3.12-updater', $11165 = '', $11166 = '0001-01-01 00:00:00+00', $11167 = 'https://www.cve.org/CVERecord?id=CVE-2019-16402', $11168 = '', $11169 = 'Unknown', $11170 = 'elfutils', $11171 = '', $11172 = '', $11173 = '', $11174 = 'source', $11175 = 'alpine', $11176 = 'Alpine Linux', $11177 = '', $11178 = '', $11179 = '3.12', $11180 = '', $11181 = '', $11182 = 'Alpine Linux v3.12', $11183 = '', $11184 = '', $11185 = '', $11186 = '0.174-r0', $11187 = 'invalid', $11188 = NULL, $11189 = '{}', $11190 = '{}', $11191 = 'md5', $11192 = '\x2fe92966d5144603a2b78ea6335a6fd3', $11193 = 'CVE-2019-16403', $11194 = 'alpine-main-v3.12-updater', $11195 = '', $11196 = '0001-01-01 00:00:00+00', $11197 = 'https://www.cve.org/CVERecord?id=CVE-2019-16403', $11198 = '', $11199 = 'Unknown', $11200 = 'elfutils', $11201 = '', $11202 = '', $11203 = '', $11204 = 'source', $11205 = 'alpine', $11206 = 'Alpine Linux', $11207 = '', $11208 = '', $11209 = '3.12', $11210 = '', $11211 = '', $11212 = 'Alpine Linux v3.12', $11213 = '', $11214 = '', $11215 = '', $11216 = '0.174-r0', $11217 = 'invalid', $11218 = NULL, $11219 = '{}', $11220 = '{}', $11221 = 'md5', $11222 = '\x82e31052db38beb48c6ce024520c3c6e', $11223 = 'CVE-2019-18310', $11224 = 'alpine-main-v3.12-updater', $11225 = '', $11226 = '0001-01-01 00:00:00+00', $11227 = 'https://www.cve.org/CVERecord?id=CVE-2019-18310', $11228 = '', $11229 = 'Unknown', $11230 = 'elfutils', $11231 = '', $11232 = '', $11233 = '', $11234 = 'source', $11235 = 'alpine', $11236 = 'Alpine Linux', $11237 = '', $11238 = '', $11239 = '3.12', $11240 = '', $11241 = '', $11242 = 'Alpine Linux v3.12', $11243 = '', $11244 = '', $11245 = '', $11246 = '0.175-r0', $11247 = 'invalid', $11248 = NULL, $11249 = '{}', $11250 = '{}', $11251 = 'md5', $11252 = '\x1d9693ba11170c181f83cc1093b4a9f4', $11253 = 'CVE-2019-18520', $11254 = 'alpine-main-v3.12-updater', $11255 = '', $11256 = '0001-01-01 00:00:00+00', $11257 = 'https://www.cve.org/CVERecord?id=CVE-2019-18520', $11258 = '', $11259 = 'Unknown', $11260 = 'elfutils', $11261 = '', $11262 = '', $11263 = '', $11264 = 'source', $11265 = 'alpine', $11266 = 'Alpine Linux', $11267 = '', $11268 = '', $11269 = '3.12', $11270 = '', $11271 = '', $11272 = 'Alpine Linux v3.12', $11273 = '', $11274 = '', $11275 = '', $11276 = '0.175-r0', $11277 = 'invalid', $11278 = NULL, $11279 = '{}', $11280 = '{}', $11281 = 'md5', $11282 = '\xe77762d1ee79bc7bf61458406ea4319c', $11283 = 'CVE-2019-18521', $11284 = 'alpine-main-v3.12-updater', $11285 = '', $11286 = '0001-01-01 00:00:00+00', $11287 = 'https://www.cve.org/CVERecord?id=CVE-2019-18521', $11288 = '', $11289 = 'Unknown', $11290 = 'elfutils', $11291 = '', $11292 = '', $11293 = '', $11294 = 'source', $11295 = 'alpine', $11296 = 'Alpine Linux', $11297 = '', $11298 = '', $11299 = '3.12', $11300 = '', $11301 = '', $11302 = 'Alpine Linux v3.12', $11303 = '', $11304 = '', $11305 = '', $11306 = '0.175-r0', $11307 = 'invalid', $11308 = NULL, $11309 = '{}', $11310 = '{}', $11311 = 'md5', $11312 = '\x662f31ec809ecfdb9f0ac6692566f854', $11313 = 'CVE-2019-7146', $11314 = 'alpine-main-v3.12-updater', $11315 = '', $11316 = '0001-01-01 00:00:00+00', $11317 = 'https://www.cve.org/CVERecord?id=CVE-2019-7146', $11318 = '', $11319 = 'Unknown', $11320 = 'elfutils', $11321 = '', $11322 = '', $11323 = '', $11324 = 'source', $11325 = 'alpine', $11326 = 'Alpine Linux', $11327 = '', $11328 = '', $11329 = '3.12', $11330 = '', $11331 = '', $11332 = 'Alpine Linux v3.12', $11333 = '', $11334 = '', $11335 = '', $11336 = '0.176-r0', $11337 = 'invalid', $11338 = NULL, $11339 = '{}', $11340 = '{}', $11341 = 'md5', $11342 = '\x2b8db5fb66f087a5a5326ff31b279771', $11343 = 'CVE-2019-7148', $11344 = 'alpine-main-v3.12-updater', $11345 = '', $11346 = '0001-01-01 00:00:00+00', $11347 = 'https://www.cve.org/CVERecord?id=CVE-2019-7148', $11348 = '', $11349 = 'Unknown', $11350 = 'elfutils', $11351 = '', $11352 = '', $11353 = '', $11354 = 'source', $11355 = 'alpine', $11356 = 'Alpine Linux', $11357 = '', $11358 = '', $11359 = '3.12', $11360 = '', $11361 = '', $11362 = 'Alpine Linux v3.12', $11363 = '', $11364 = '', $11365 = '', $11366 = '0.176-r0', $11367 = 'invalid', $11368 = NULL, $11369 = '{}', $11370 = '{}', $11371 = 'md5', $11372 = '\xf04a62f6a0d5911307c26de84677ffc4', $11373 = 'CVE-2019-7149', $11374 = 'alpine-main-v3.12-updater', $11375 = '', $11376 = '0001-01-01 00:00:00+00', $11377 = 'https://www.cve.org/CVERecord?id=CVE-2019-7149', $11378 = '', $11379 = 'Unknown', $11380 = 'elfutils', $11381 = '', $11382 = '', $11383 = '', $11384 = 'source', $11385 = 'alpine', $11386 = 'Alpine Linux', $11387 = '', $11388 = '', $11389 = '3.12', $11390 = '', $11391 = '', $11392 = 'Alpine Linux v3.12', $11393 = '', $11394 = '', $11395 = '', $11396 = '0.176-r0', $11397 = 'invalid', $11398 = NULL, $11399 = '{}', $11400 = '{}', $11401 = 'md5', $11402 = '\xdfe318bc5b30001e6eaa23d08d11ef13', $11403 = 'CVE-2019-7150', $11404 = 'alpine-main-v3.12-updater', $11405 = '', $11406 = '0001-01-01 00:00:00+00', $11407 = 'https://www.cve.org/CVERecord?id=CVE-2019-7150', $11408 = '', $11409 = 'Unknown', $11410 = 'elfutils', $11411 = '', $11412 = '', $11413 = '', $11414 = 'source', $11415 = 'alpine', $11416 = 'Alpine Linux', $11417 = '', $11418 = '', $11419 = '3.12', $11420 = '', $11421 = '', $11422 = 'Alpine Linux v3.12', $11423 = '', $11424 = '', $11425 = '', $11426 = '0.176-r0', $11427 = 'invalid', $11428 = NULL, $11429 = '{}', $11430 = '{}', $11431 = 'md5', $11432 = '\xe058e2a9d2a51c86bbfdb3c5dcae5055', $11433 = 'CVE-2019-7664', $11434 = 'alpine-main-v3.12-updater', $11435 = '', $11436 = '0001-01-01 00:00:00+00', $11437 = 'https://www.cve.org/CVERecord?id=CVE-2019-7664', $11438 = '', $11439 = 'Unknown', $11440 = 'elfutils', $11441 = '', $11442 = '', $11443 = '', $11444 = 'source', $11445 = 'alpine', $11446 = 'Alpine Linux', $11447 = '', $11448 = '', $11449 = '3.12', $11450 = '', $11451 = '', $11452 = 'Alpine Linux v3.12', $11453 = '', $11454 = '', $11455 = '', $11456 = '0.176-r0', $11457 = 'invalid', $11458 = NULL, $11459 = '{}', $11460 = '{}', $11461 = 'md5', $11462 = '\xf0fb395eda5279dfb19ccfe026e74a5e', $11463 = 'CVE-2019-7665', $11464 = 'alpine-main-v3.12-updater', $11465 = '', $11466 = '0001-01-01 00:00:00+00', $11467 = 'https://www.cve.org/CVERecord?id=CVE-2019-7665', $11468 = '', $11469 = 'Unknown', $11470 = 'elfutils', $11471 = '', $11472 = '', $11473 = '', $11474 = 'source', $11475 = 'alpine', $11476 = 'Alpine Linux', $11477 = '', $11478 = '', $11479 = '3.12', $11480 = '', $11481 = '', $11482 = 'Alpine Linux v3.12', $11483 = '', $11484 = '', $11485 = '', $11486 = '0.176-r0', $11487 = 'invalid', $11488 = NULL, $11489 = '{}', $11490 = '{}', $11491 = 'md5', $11492 = '\xf5be48cabef768816fc1838bdeef6b76', $11493 = 'CVE-2019-15903', $11494 = 'alpine-main-v3.12-updater', $11495 = '', $11496 = '0001-01-01 00:00:00+00', $11497 = 'https://www.cve.org/CVERecord?id=CVE-2019-15903', $11498 = '', $11499 = 'Unknown', $11500 = 'expat', $11501 = '', $11502 = '', $11503 = '', $11504 = 'source', $11505 = 'alpine', $11506 = 'Alpine Linux', $11507 = '', $11508 = '', $11509 = '3.12', $11510 = '', $11511 = '', $11512 = 'Alpine Linux v3.12', $11513 = '', $11514 = '', $11515 = '', $11516 = '2.2.7-r1', $11517 = 'invalid', $11518 = NULL, $11519 = '{}', $11520 = '{}', $11521 = 'md5', $11522 = '\x64c4cd681a44cdef31e9369126a46df2', $11523 = 'CVE-2017-9233', $11524 = 'alpine-main-v3.12-updater', $11525 = '', $11526 = '0001-01-01 00:00:00+00', $11527 = 'https://www.cve.org/CVERecord?id=CVE-2017-9233', $11528 = '', $11529 = 'Unknown', $11530 = 'expat', $11531 = '', $11532 = '', $11533 = '', $11534 = 'source', $11535 = 'alpine', $11536 = 'Alpine Linux', $11537 = '', $11538 = '', $11539 = '3.12', $11540 = '', $11541 = '', $11542 = 'Alpine Linux v3.12', $11543 = '', $11544 = '', $11545 = '', $11546 = '2.2.0-r1', $11547 = 'invalid', $11548 = NULL, $11549 = '{}', $11550 = '{}', $11551 = 'md5', $11552 = '\xe34c426f95b86828684a75df01cb9531', $11553 = 'CVE-2021-45960', $11554 = 'alpine-main-v3.12-updater', $11555 = '', $11556 = '0001-01-01 00:00:00+00', $11557 = 'https://www.cve.org/CVERecord?id=CVE-2021-45960', $11558 = '', $11559 = 'Unknown', $11560 = 'expat', $11561 = '', $11562 = '', $11563 = '', $11564 = 'source', $11565 = 'alpine', $11566 = 'Alpine Linux', $11567 = '', $11568 = '', $11569 = '3.12', $11570 = '', $11571 = '', $11572 = 'Alpine Linux v3.12', $11573 = '', $11574 = '', $11575 = '', $11576 = '2.2.10-r0', $11577 = 'invalid', $11578 = NULL, $11579 = '{}', $11580 = '{}', $11581 = 'md5', $11582 = '\x0b7200eb64d064b743a702d88ab6bf1d', $11583 = 'CVE-2021-46143', $11584 = 'alpine-main-v3.12-updater', $11585 = '', $11586 = '0001-01-01 00:00:00+00', $11587 = 'https://www.cve.org/CVERecord?id=CVE-2021-46143', $11588 = '', $11589 = 'Unknown', $11590 = 'expat', $11591 = '', $11592 = '', $11593 = '', $11594 = 'source', $11595 = 'alpine', $11596 = 'Alpine Linux', $11597 = '', $11598 = '', $11599 = '3.12', $11600 = '', $11601 = '', $11602 = 'Alpine Linux v3.12', $11603 = '', $11604 = '', $11605 = '', $11606 = '2.2.10-r0', $11607 = 'invalid', $11608 = NULL, $11609 = '{}', $11610 = '{}', $11611 = 'md5', $11612 = '\xef5ecc5da1cccf88a7fae64caa9ab11a', $11613 = 'CVE-2022-22822', $11614 = 'alpine-main-v3.12-updater', $11615 = '', $11616 = '0001-01-01 00:00:00+00', $11617 = 'https://www.cve.org/CVERecord?id=CVE-2022-22822', $11618 = '', $11619 = 'Unknown', $11620 = 'expat', $11621 = '', $11622 = '', $11623 = '', $11624 = 'source', $11625 = 'alpine', $11626 = 'Alpine Linux', $11627 = '', $11628 = '', $11629 = '3.12', $11630 = '', $11631 = '', $11632 = 'Alpine Linux v3.12', $11633 = '', $11634 = '', $11635 = '', $11636 = '2.2.10-r0', $11637 = 'invalid', $11638 = NULL, $11639 = '{}', $11640 = '{}', $11641 = 'md5', $11642 = '\xa977a02e964f6cc975ecfa074cc897dc', $11643 = 'CVE-2022-22823', $11644 = 'alpine-main-v3.12-updater', $11645 = '', $11646 = '0001-01-01 00:00:00+00', $11647 = 'https://www.cve.org/CVERecord?id=CVE-2022-22823', $11648 = '', $11649 = 'Unknown', $11650 = 'expat', $11651 = '', $11652 = '', $11653 = '', $11654 = 'source', $11655 = 'alpine', $11656 = 'Alpine Linux', $11657 = '', $11658 = '', $11659 = '3.12', $11660 = '', $11661 = '', $11662 = 'Alpine Linux v3.12', $11663 = '', $11664 = '', $11665 = '', $11666 = '2.2.10-r0', $11667 = 'invalid', $11668 = NULL, $11669 = '{}', $11670 = '{}', $11671 = 'md5', $11672 = '\x35dfeb95af747df8f79038fa778ee35b', $11673 = 'CVE-2022-22824', $11674 = 'alpine-main-v3.12-updater', $11675 = '', $11676 = '0001-01-01 00:00:00+00', $11677 = 'https://www.cve.org/CVERecord?id=CVE-2022-22824', $11678 = '', $11679 = 'Unknown', $11680 = 'expat', $11681 = '', $11682 = '', $11683 = '', $11684 = 'source', $11685 = 'alpine', $11686 = 'Alpine Linux', $11687 = '', $11688 = '', $11689 = '3.12', $11690 = '', $11691 = '', $11692 = 'Alpine Linux v3.12', $11693 = '', $11694 = '', $11695 = '', $11696 = '2.2.10-r0', $11697 = 'invalid', $11698 = NULL, $11699 = '{}', $11700 = '{}', $11701 = 'md5', $11702 = '\x18ff696f59e7baf8994325676b4df5a2', $11703 = 'CVE-2022-22825', $11704 = 'alpine-main-v3.12-updater', $11705 = '', $11706 = '0001-01-01 00:00:00+00', $11707 = 'https://www.cve.org/CVERecord?id=CVE-2022-22825', $11708 = '', $11709 = 'Unknown', $11710 = 'expat', $11711 = '', $11712 = '', $11713 = '', $11714 = 'source', $11715 = 'alpine', $11716 = 'Alpine Linux', $11717 = '', $11718 = '', $11719 = '3.12', $11720 = '', $11721 = '', $11722 = 'Alpine Linux v3.12', $11723 = '', $11724 = '', $11725 = '', $11726 = '2.2.10-r0', $11727 = 'invalid', $11728 = NULL, $11729 = '{}', $11730 = '{}', $11731 = 'md5', $11732 = '\x6b8bee35fb1cee06c3623314845c1254', $11733 = 'CVE-2022-22826', $11734 = 'alpine-main-v3.12-updater', $11735 = '', $11736 = '0001-01-01 00:00:00+00', $11737 = 'https://www.cve.org/CVERecord?id=CVE-2022-22826', $11738 = '', $11739 = 'Unknown', $11740 = 'expat', $11741 = '', $11742 = '', $11743 = '', $11744 = 'source', $11745 = 'alpine', $11746 = 'Alpine Linux', $11747 = '', $11748 = '', $11749 = '3.12', $11750 = '', $11751 = '', $11752 = 'Alpine Linux v3.12', $11753 = '', $11754 = '', $11755 = '', $11756 = '2.2.10-r0', $11757 = 'invalid', $11758 = NULL, $11759 = '{}', $11760 = '{}', $11761 = 'md5', $11762 = '\x6ff2727d340f5907e0dbfca840201a1c', $11763 = 'CVE-2022-22827', $11764 = 'alpine-main-v3.12-updater', $11765 = '', $11766 = '0001-01-01 00:00:00+00', $11767 = 'https://www.cve.org/CVERecord?id=CVE-2022-22827', $11768 = '', $11769 = 'Unknown', $11770 = 'expat', $11771 = '', $11772 = '', $11773 = '', $11774 = 'source', $11775 = 'alpine', $11776 = 'Alpine Linux', $11777 = '', $11778 = '', $11779 = '3.12', $11780 = '', $11781 = '', $11782 = 'Alpine Linux v3.12', $11783 = '', $11784 = '', $11785 = '', $11786 = '2.2.10-r0', $11787 = 'invalid', $11788 = NULL, $11789 = '{}', $11790 = '{}', $11791 = 'md5', $11792 = '\x2c1c92553219dc33be2bf32ac7ed3dce', $11793 = 'CVE-2022-23852', $11794 = 'alpine-main-v3.12-updater', $11795 = '', $11796 = '0001-01-01 00:00:00+00', $11797 = 'https://www.cve.org/CVERecord?id=CVE-2022-23852', $11798 = '', $11799 = 'Unknown', $11800 = 'expat', $11801 = '', $11802 = '', $11803 = '', $11804 = 'source', $11805 = 'alpine', $11806 = 'Alpine Linux', $11807 = '', $11808 = '', $11809 = '3.12', $11810 = '', $11811 = '', $11812 = 'Alpine Linux v3.12', $11813 = '', $11814 = '', $11815 = '', $11816 = '2.2.10-r1', $11817 = 'invalid', $11818 = NULL, $11819 = '{}', $11820 = '{}', $11821 = 'md5', $11822 = '\x1df410d98581fcafba7296d7681833dd', $11823 = 'CVE-2022-23990', $11824 = 'alpine-main-v3.12-updater', $11825 = '', $11826 = '0001-01-01 00:00:00+00', $11827 = 'https://www.cve.org/CVERecord?id=CVE-2022-23990', $11828 = '', $11829 = 'Unknown', $11830 = 'expat', $11831 = '', $11832 = '', $11833 = '', $11834 = 'source', $11835 = 'alpine', $11836 = 'Alpine Linux', $11837 = '', $11838 = '', $11839 = '3.12', $11840 = '', $11841 = '', $11842 = 'Alpine Linux v3.12', $11843 = '', $11844 = '', $11845 = '', $11846 = '2.2.10-r1', $11847 = 'invalid', $11848 = NULL, $11849 = '{}', $11850 = '{}', $11851 = 'md5', $11852 = '\xa701c5501e8ca2b8eee919cf855c1ca7', $11853 = 'CVE-2022-25235', $11854 = 'alpine-main-v3.12-updater', $11855 = '', $11856 = '0001-01-01 00:00:00+00', $11857 = 'https://www.cve.org/CVERecord?id=CVE-2022-25235', $11858 = '', $11859 = 'Unknown', $11860 = 'expat', $11861 = '', $11862 = '', $11863 = '', $11864 = 'source', $11865 = 'alpine', $11866 = 'Alpine Linux', $11867 = '', $11868 = '', $11869 = '3.12', $11870 = '', $11871 = '', $11872 = 'Alpine Linux v3.12', $11873 = '', $11874 = '', $11875 = '', $11876 = '2.2.10-r2', $11877 = 'invalid', $11878 = NULL, $11879 = '{}', $11880 = '{}', $11881 = 'md5', $11882 = '\xc5f84c12923ff829bc18344ac70bc56c', $11883 = 'CVE-2022-25236', $11884 = 'alpine-main-v3.12-updater', $11885 = '', $11886 = '0001-01-01 00:00:00+00', $11887 = 'https://www.cve.org/CVERecord?id=CVE-2022-25236', $11888 = '', $11889 = 'Unknown', $11890 = 'expat', $11891 = '', $11892 = '', $11893 = '', $11894 = 'source', $11895 = 'alpine', $11896 = 'Alpine Linux', $11897 = '', $11898 = '', $11899 = '3.12', $11900 = '', $11901 = '', $11902 = 'Alpine Linux v3.12', $11903 = '', $11904 = '', $11905 = '', $11906 = '2.2.10-r2', $11907 = 'invalid', $11908 = NULL, $11909 = '{}', $11910 = '{}', $11911 = 'md5', $11912 = '\x62cdfd03483c76151ba3cda912b74e90', $11913 = 'CVE-2022-25313', $11914 = 'alpine-main-v3.12-updater', $11915 = '', $11916 = '0001-01-01 00:00:00+00', $11917 = 'https://www.cve.org/CVERecord?id=CVE-2022-25313', $11918 = '', $11919 = 'Unknown', $11920 = 'expat', $11921 = '', $11922 = '', $11923 = '', $11924 = 'source', $11925 = 'alpine', $11926 = 'Alpine Linux', $11927 = '', $11928 = '', $11929 = '3.12', $11930 = '', $11931 = '', $11932 = 'Alpine Linux v3.12', $11933 = '', $11934 = '', $11935 = '', $11936 = '2.2.10-r2', $11937 = 'invalid', $11938 = NULL, $11939 = '{}', $11940 = '{}', $11941 = 'md5', $11942 = '\x9fd152c288ffc3ed0dc80d3c00f9f11f', $11943 = 'CVE-2022-25314', $11944 = 'alpine-main-v3.12-updater', $11945 = '', $11946 = '0001-01-01 00:00:00+00', $11947 = 'https://www.cve.org/CVERecord?id=CVE-2022-25314', $11948 = '', $11949 = 'Unknown', $11950 = 'expat', $11951 = '', $11952 = '', $11953 = '', $11954 = 'source', $11955 = 'alpine', $11956 = 'Alpine Linux', $11957 = '', $11958 = '', $11959 = '3.12', $11960 = '', $11961 = '', $11962 = 'Alpine Linux v3.12', $11963 = '', $11964 = '', $11965 = '', $11966 = '2.2.10-r2', $11967 = 'invalid', $11968 = NULL, $11969 = '{}', $11970 = '{}', $11971 = 'md5', $11972 = '\xa7cfc8958873b6762ad5d4b627929071', $11973 = 'CVE-2022-25315', $11974 = 'alpine-main-v3.12-updater', $11975 = '', $11976 = '0001-01-01 00:00:00+00', $11977 = 'https://www.cve.org/CVERecord?id=CVE-2022-25315', $11978 = '', $11979 = 'Unknown', $11980 = 'expat', $11981 = '', $11982 = '', $11983 = '', $11984 = 'source', $11985 = 'alpine', $11986 = 'Alpine Linux', $11987 = '', $11988 = '', $11989 = '3.12', $11990 = '', $11991 = '', $11992 = 'Alpine Linux v3.12', $11993 = '', $11994 = '', $11995 = '', $11996 = '2.2.10-r2', $11997 = 'invalid', $11998 = NULL, $11999 = '{}', $12000 = '{}', $12001 = 'md5', $12002 = '\x32af45e95932f25471f1496379522f49', $12003 = 'CVE-2018-20843', $12004 = 'alpine-main-v3.12-updater', $12005 = '', $12006 = '0001-01-01 00:00:00+00', $12007 = 'https://www.cve.org/CVERecord?id=CVE-2018-20843', $12008 = '', $12009 = 'Unknown', $12010 = 'expat', $12011 = '', $12012 = '', $12013 = '', $12014 = 'source', $12015 = 'alpine', $12016 = 'Alpine Linux', $12017 = '', $12018 = '', $12019 = '3.12', $12020 = '', $12021 = '', $12022 = 'Alpine Linux v3.12', $12023 = '', $12024 = '', $12025 = '', $12026 = '2.2.7-r0', $12027 = 'invalid', $12028 = NULL, $12029 = '{}', $12030 = '{}', $12031 = 'md5', $12032 = '\x1ab08fe880614c559b3e5da0d3aa1760', $12033 = 'CVE-2019-1543', $12034 = 'alpine-main-v3.12-updater', $12035 = '', $12036 = '0001-01-01 00:00:00+00', $12037 = 'https://www.cve.org/CVERecord?id=CVE-2019-1543', $12038 = '', $12039 = 'Unknown', $12040 = 'file', $12041 = '', $12042 = '', $12043 = '', $12044 = 'source', $12045 = 'alpine', $12046 = 'Alpine Linux', $12047 = '', $12048 = '', $12049 = '3.12', $12050 = '', $12051 = '', $12052 = 'Alpine Linux v3.12', $12053 = '', $12054 = '', $12055 = '', $12056 = '5.36-r0', $12057 = 'invalid', $12058 = NULL, $12059 = '{}', $12060 = '{}', $12061 = 'md5', $12062 = '\xa38d595bf9889288ae4a0fb66295e283', $12063 = 'CVE-2019-8904', $12064 = 'alpine-main-v3.12-updater', $12065 = '', $12066 = '0001-01-01 00:00:00+00', $12067 = 'https://www.cve.org/CVERecord?id=CVE-2019-8904', $12068 = '', $12069 = 'Unknown', $12070 = 'file', $12071 = '', $12072 = '', $12073 = '', $12074 = 'source', $12075 = 'alpine', $12076 = 'Alpine Linux', $12077 = '', $12078 = '', $12079 = '3.12', $12080 = '', $12081 = '', $12082 = 'Alpine Linux v3.12', $12083 = '', $12084 = '', $12085 = '', $12086 = '5.36-r0', $12087 = 'invalid', $12088 = NULL, $12089 = '{}', $12090 = '{}', $12091 = 'md5', $12092 = '\x513630371c445e66b76e6dd9c41041f8', $12093 = 'CVE-2019-8905', $12094 = 'alpine-main-v3.12-updater', $12095 = '', $12096 = '0001-01-01 00:00:00+00', $12097 = 'https://www.cve.org/CVERecord?id=CVE-2019-8905', $12098 = '', $12099 = 'Unknown', $12100 = 'file', $12101 = '', $12102 = '', $12103 = '', $12104 = 'source', $12105 = 'alpine', $12106 = 'Alpine Linux', $12107 = '', $12108 = '', $12109 = '3.12', $12110 = '', $12111 = '', $12112 = 'Alpine Linux v3.12', $12113 = '', $12114 = '', $12115 = '', $12116 = '5.36-r0', $12117 = 'invalid', $12118 = NULL, $12119 = '{}', $12120 = '{}', $12121 = 'md5', $12122 = '\x63eaf90854e648088dae33c3e26450bb', $12123 = 'CVE-2019-8906', $12124 = 'alpine-main-v3.12-updater', $12125 = '', $12126 = '0001-01-01 00:00:00+00', $12127 = 'https://www.cve.org/CVERecord?id=CVE-2019-8906', $12128 = '', $12129 = 'Unknown', $12130 = 'file', $12131 = '', $12132 = '', $12133 = '', $12134 = 'source', $12135 = 'alpine', $12136 = 'Alpine Linux', $12137 = '', $12138 = '', $12139 = '3.12', $12140 = '', $12141 = '', $12142 = 'Alpine Linux v3.12', $12143 = '', $12144 = '', $12145 = '', $12146 = '5.36-r0', $12147 = 'invalid', $12148 = NULL, $12149 = '{}', $12150 = '{}', $12151 = 'md5', $12152 = '\xd4dbaa548c70e9380d4cb7299e5d2da3', $12153 = 'CVE-2019-8907', $12154 = 'alpine-main-v3.12-updater', $12155 = '', $12156 = '0001-01-01 00:00:00+00', $12157 = 'https://www.cve.org/CVERecord?id=CVE-2019-8907', $12158 = '', $12159 = 'Unknown', $12160 = 'file', $12161 = '', $12162 = '', $12163 = '', $12164 = 'source', $12165 = 'alpine', $12166 = 'Alpine Linux', $12167 = '', $12168 = '', $12169 = '3.12', $12170 = '', $12171 = '', $12172 = 'Alpine Linux v3.12', $12173 = '', $12174 = '', $12175 = '', $12176 = '5.36-r0', $12177 = 'invalid', $12178 = NULL, $12179 = '{}', $12180 = '{}', $12181 = 'md5', $12182 = '\xd4f3213b8a5428fa6cd9dfa99d5f57da', $12183 = 'CVE-2019-18218', $12184 = 'alpine-main-v3.12-updater', $12185 = '', $12186 = '0001-01-01 00:00:00+00', $12187 = 'https://www.cve.org/CVERecord?id=CVE-2019-18218', $12188 = '', $12189 = 'Unknown', $12190 = 'file', $12191 = '', $12192 = '', $12193 = '', $12194 = 'source', $12195 = 'alpine', $12196 = 'Alpine Linux', $12197 = '', $12198 = '', $12199 = '3.12', $12200 = '', $12201 = '', $12202 = 'Alpine Linux v3.12', $12203 = '', $12204 = '', $12205 = '', $12206 = '5.37-r1', $12207 = 'invalid', $12208 = NULL, $12209 = '{}', $12210 = '{}', $12211 = 'md5', $12212 = '\x8365305caeb635e1ed0804cbf925b95e', $12213 = 'CVE-2017-6888', $12214 = 'alpine-main-v3.12-updater', $12215 = '', $12216 = '0001-01-01 00:00:00+00', $12217 = 'https://www.cve.org/CVERecord?id=CVE-2017-6888', $12218 = '', $12219 = 'Unknown', $12220 = 'flac', $12221 = '', $12222 = '', $12223 = '', $12224 = 'source', $12225 = 'alpine', $12226 = 'Alpine Linux', $12227 = '', $12228 = '', $12229 = '3.12', $12230 = '', $12231 = '', $12232 = 'Alpine Linux v3.12', $12233 = '', $12234 = '', $12235 = '', $12236 = '1.3.2-r2', $12237 = 'invalid', $12238 = NULL, $12239 = '{}', $12240 = '{}', $12241 = 'md5', $12242 = '\xedb1854fe52600ede95c20ed441fe704', $12243 = 'CVE-2020-0499', $12244 = 'alpine-main-v3.12-updater', $12245 = '', $12246 = '0001-01-01 00:00:00+00', $12247 = 'https://www.cve.org/CVERecord?id=CVE-2020-0499', $12248 = '', $12249 = 'Unknown', $12250 = 'flac', $12251 = '', $12252 = '', $12253 = '', $12254 = 'source', $12255 = 'alpine', $12256 = 'Alpine Linux', $12257 = '', $12258 = '', $12259 = '3.12', $12260 = '', $12261 = '', $12262 = 'Alpine Linux v3.12', $12263 = '', $12264 = '', $12265 = '', $12266 = '1.3.4-r0', $12267 = 'invalid', $12268 = NULL, $12269 = '{}', $12270 = '{}', $12271 = 'md5', $12272 = '\x77a14d78efd27854537ec7dc52938092', $12273 = 'CVE-2021-0561', $12274 = 'alpine-main-v3.12-updater', $12275 = '', $12276 = '0001-01-01 00:00:00+00', $12277 = 'https://www.cve.org/CVERecord?id=CVE-2021-0561', $12278 = '', $12279 = 'Unknown', $12280 = 'flac', $12281 = '', $12282 = '', $12283 = '', $12284 = 'source', $12285 = 'alpine', $12286 = 'Alpine Linux', $12287 = '', $12288 = '', $12289 = '3.12', $12290 = '', $12291 = '', $12292 = 'Alpine Linux v3.12', $12293 = '', $12294 = '', $12295 = '', $12296 = '1.3.4-r0', $12297 = 'invalid', $12298 = NULL, $12299 = '{}', $12300 = '{}', $12301 = 'md5', $12302 = '\xc2c29610432f442a36d614c122b22c27', $12303 = 'CVE-2019-11234', $12304 = 'alpine-main-v3.12-updater', $12305 = '', $12306 = '0001-01-01 00:00:00+00', $12307 = 'https://www.cve.org/CVERecord?id=CVE-2019-11234', $12308 = '', $12309 = 'Unknown', $12310 = 'freeradius', $12311 = '', $12312 = '', $12313 = '', $12314 = 'source', $12315 = 'alpine', $12316 = 'Alpine Linux', $12317 = '', $12318 = '', $12319 = '3.12', $12320 = '', $12321 = '', $12322 = 'Alpine Linux v3.12', $12323 = '', $12324 = '', $12325 = '', $12326 = '3.0.19-r0', $12327 = 'invalid', $12328 = NULL, $12329 = '{}', $12330 = '{}', $12331 = 'md5', $12332 = '\x39dc573b572bc85c02fc03aed4af0e98', $12333 = 'CVE-2019-11235', $12334 = 'alpine-main-v3.12-updater', $12335 = '', $12336 = '0001-01-01 00:00:00+00', $12337 = 'https://www.cve.org/CVERecord?id=CVE-2019-11235', $12338 = '', $12339 = 'Unknown', $12340 = 'freeradius', $12341 = '', $12342 = '', $12343 = '', $12344 = 'source', $12345 = 'alpine', $12346 = 'Alpine Linux', $12347 = '', $12348 = '', $12349 = '3.12', $12350 = '', $12351 = '', $12352 = 'Alpine Linux v3.12', $12353 = '', $12354 = '', $12355 = '', $12356 = '3.0.19-r0', $12357 = 'invalid', $12358 = NULL, $12359 = '{}', $12360 = '{}', $12361 = 'md5', $12362 = '\x90d8a4e3da83b85c05c60dbc932ad1e9', $12363 = 'CVE-2019-10143', $12364 = 'alpine-main-v3.12-updater', $12365 = '', $12366 = '0001-01-01 00:00:00+00', $12367 = 'https://www.cve.org/CVERecord?id=CVE-2019-10143', $12368 = '', $12369 = 'Unknown', $12370 = 'freeradius', $12371 = '', $12372 = '', $12373 = '', $12374 = 'source', $12375 = 'alpine', $12376 = 'Alpine Linux', $12377 = '', $12378 = '', $12379 = '3.12', $12380 = '', $12381 = '', $12382 = 'Alpine Linux v3.12', $12383 = '', $12384 = '', $12385 = '', $12386 = '3.0.19-r3', $12387 = 'invalid', $12388 = NULL, $12389 = '{}', $12390 = '{}', $12391 = 'md5', $12392 = '\xd4ffa7dd913832fe05e3c9c8ef53ad73', $12393 = 'CVE-2020-15999', $12394 = 'alpine-main-v3.12-updater', $12395 = '', $12396 = '0001-01-01 00:00:00+00', $12397 = 'https://www.cve.org/CVERecord?id=CVE-2020-15999', $12398 = '', $12399 = 'Unknown', $12400 = 'freetype', $12401 = '', $12402 = '', $12403 = '', $12404 = 'source', $12405 = 'alpine', $12406 = 'Alpine Linux', $12407 = '', $12408 = '', $12409 = '3.12', $12410 = '', $12411 = '', $12412 = 'Alpine Linux v3.12', $12413 = '', $12414 = '', $12415 = '', $12416 = '2.10.4-r0', $12417 = 'invalid', $12418 = NULL, $12419 = '{}', $12420 = '{}', $12421 = 'md5', $12422 = '\x34cb1c69ef13d5c9401a517b10518cab', $12423 = 'CVE-2022-27404', $12424 = 'alpine-main-v3.12-updater', $12425 = '', $12426 = '0001-01-01 00:00:00+00', $12427 = 'https://www.cve.org/CVERecord?id=CVE-2022-27404', $12428 = '', $12429 = 'Unknown', $12430 = 'freetype', $12431 = '', $12432 = '', $12433 = '', $12434 = 'source', $12435 = 'alpine', $12436 = 'Alpine Linux', $12437 = '', $12438 = '', $12439 = '3.12', $12440 = '', $12441 = '', $12442 = 'Alpine Linux v3.12', $12443 = '', $12444 = '', $12445 = '', $12446 = '2.10.4-r1', $12447 = 'invalid', $12448 = NULL, $12449 = '{}', $12450 = '{}', $12451 = 'md5', $12452 = '\xb95840ec01e6bde72f30a13915958cbf', $12453 = 'CVE-2022-27405', $12454 = 'alpine-main-v3.12-updater', $12455 = '', $12456 = '0001-01-01 00:00:00+00', $12457 = 'https://www.cve.org/CVERecord?id=CVE-2022-27405', $12458 = '', $12459 = 'Unknown', $12460 = 'freetype', $12461 = '', $12462 = '', $12463 = '', $12464 = 'source', $12465 = 'alpine', $12466 = 'Alpine Linux', $12467 = '', $12468 = '', $12469 = '3.12', $12470 = '', $12471 = '', $12472 = 'Alpine Linux v3.12', $12473 = '', $12474 = '', $12475 = '', $12476 = '2.10.4-r2', $12477 = 'invalid', $12478 = NULL, $12479 = '{}', $12480 = '{}', $12481 = 'md5', $12482 = '\x775c7ff897edb9069ae069a668088ce1', $12483 = 'CVE-2022-27406', $12484 = 'alpine-main-v3.12-updater', $12485 = '', $12486 = '0001-01-01 00:00:00+00', $12487 = 'https://www.cve.org/CVERecord?id=CVE-2022-27406', $12488 = '', $12489 = 'Unknown', $12490 = 'freetype', $12491 = '', $12492 = '', $12493 = '', $12494 = 'source', $12495 = 'alpine', $12496 = 'Alpine Linux', $12497 = '', $12498 = '', $12499 = '3.12', $12500 = '', $12501 = '', $12502 = 'Alpine Linux v3.12', $12503 = '', $12504 = '', $12505 = '', $12506 = '2.10.4-r2', $12507 = 'invalid', $12508 = NULL, $12509 = '{}', $12510 = '{}', $12511 = 'md5', $12512 = '\x015c72d7cf7f184d7158d3011cc7c3b4', $12513 = 'CVE-2017-8105', $12514 = 'alpine-main-v3.12-updater', $12515 = '', $12516 = '0001-01-01 00:00:00+00', $12517 = 'https://www.cve.org/CVERecord?id=CVE-2017-8105', $12518 = '', $12519 = 'Unknown', $12520 = 'freetype', $12521 = '', $12522 = '', $12523 = '', $12524 = 'source', $12525 = 'alpine', $12526 = 'Alpine Linux', $12527 = '', $12528 = '', $12529 = '3.12', $12530 = '', $12531 = '', $12532 = 'Alpine Linux v3.12', $12533 = '', $12534 = '', $12535 = '', $12536 = '2.7.1-r1', $12537 = 'invalid', $12538 = NULL, $12539 = '{}', $12540 = '{}', $12541 = 'md5', $12542 = '\xbb52b8b170e24b8117367867d4b16136', $12543 = 'CVE-2017-8287', $12544 = 'alpine-main-v3.12-updater', $12545 = '', $12546 = '0001-01-01 00:00:00+00', $12547 = 'https://www.cve.org/CVERecord?id=CVE-2017-8287', $12548 = '', $12549 = 'Unknown', $12550 = 'freetype', $12551 = '', $12552 = '', $12553 = '', $12554 = 'source', $12555 = 'alpine', $12556 = 'Alpine Linux', $12557 = '', $12558 = '', $12559 = '3.12', $12560 = '', $12561 = '', $12562 = 'Alpine Linux v3.12', $12563 = '', $12564 = '', $12565 = '', $12566 = '2.7.1-r1', $12567 = 'invalid', $12568 = NULL, $12569 = '{}', $12570 = '{}', $12571 = 'md5', $12572 = '\x1979c9226f48ca0a1f3144a01cbbc11c', $12573 = 'CVE-2018-6942', $12574 = 'alpine-main-v3.12-updater', $12575 = '', $12576 = '0001-01-01 00:00:00+00', $12577 = 'https://www.cve.org/CVERecord?id=CVE-2018-6942', $12578 = '', $12579 = 'Unknown', $12580 = 'freetype', $12581 = '', $12582 = '', $12583 = '', $12584 = 'source', $12585 = 'alpine', $12586 = 'Alpine Linux', $12587 = '', $12588 = '', $12589 = '3.12', $12590 = '', $12591 = '', $12592 = 'Alpine Linux v3.12', $12593 = '', $12594 = '', $12595 = '', $12596 = '2.9-r1', $12597 = 'invalid', $12598 = NULL, $12599 = '{}', $12600 = '{}', $12601 = 'md5', $12602 = '\xbc09729c97cf1d1a4b1cf524c528a231', $12603 = 'CVE-2019-18397', $12604 = 'alpine-main-v3.12-updater', $12605 = '', $12606 = '0001-01-01 00:00:00+00', $12607 = 'https://www.cve.org/CVERecord?id=CVE-2019-18397', $12608 = '', $12609 = 'Unknown', $12610 = 'fribidi', $12611 = '', $12612 = '', $12613 = '', $12614 = 'source', $12615 = 'alpine', $12616 = 'Alpine Linux', $12617 = '', $12618 = '', $12619 = '3.12', $12620 = '', $12621 = '', $12622 = 'Alpine Linux v3.12', $12623 = '', $12624 = '', $12625 = '', $12626 = '1.0.7-r1', $12627 = 'invalid', $12628 = NULL, $12629 = '{}', $12630 = '{}', $12631 = 'md5', $12632 = '\xed007904b369e57cbd0325e4db95f399', $12633 = 'CVE-2018-10906', $12634 = 'alpine-main-v3.12-updater', $12635 = '', $12636 = '0001-01-01 00:00:00+00', $12637 = 'https://www.cve.org/CVERecord?id=CVE-2018-10906', $12638 = '', $12639 = 'Unknown', $12640 = 'fuse', $12641 = '', $12642 = '', $12643 = '', $12644 = 'source', $12645 = 'alpine', $12646 = 'Alpine Linux', $12647 = '', $12648 = '', $12649 = '3.12', $12650 = '', $12651 = '', $12652 = 'Alpine Linux v3.12', $12653 = '', $12654 = '', $12655 = '', $12656 = '2.9.8-r0', $12657 = 'invalid', $12658 = NULL, $12659 = '{}', $12660 = '{}', $12661 = 'md5', $12662 = '\x4ac85bdf89ed3eb8abcf85c18b309674', $12663 = 'CVE-2018-10906', $12664 = 'alpine-main-v3.12-updater', $12665 = '', $12666 = '0001-01-01 00:00:00+00', $12667 = 'https://www.cve.org/CVERecord?id=CVE-2018-10906', $12668 = '', $12669 = 'Unknown', $12670 = 'fuse3', $12671 = '', $12672 = '', $12673 = '', $12674 = 'source', $12675 = 'alpine', $12676 = 'Alpine Linux', $12677 = '', $12678 = '', $12679 = '3.12', $12680 = '', $12681 = '', $12682 = 'Alpine Linux v3.12', $12683 = '', $12684 = '', $12685 = '', $12686 = '3.2.5-r0', $12687 = 'invalid', $12688 = NULL, $12689 = '{}', $12690 = '{}', $12691 = 'md5', $12692 = '\x6c65f66de3c4f3e9c3f04f6acaa2ee71', $12693 = 'CVE-2018-1000222', $12694 = 'alpine-main-v3.12-updater', $12695 = '', $12696 = '0001-01-01 00:00:00+00', $12697 = 'https://www.cve.org/CVERecord?id=CVE-2018-1000222', $12698 = '', $12699 = 'Unknown', $12700 = 'gd', $12701 = '', $12702 = '', $12703 = '', $12704 = 'source', $12705 = 'alpine', $12706 = 'Alpine Linux', $12707 = '', $12708 = '', $12709 = '3.12', $12710 = '', $12711 = '', $12712 = 'Alpine Linux v3.12', $12713 = '', $12714 = '', $12715 = '', $12716 = '2.2.5-r1', $12717 = 'invalid', $12718 = NULL, $12719 = '{}', $12720 = '{}', $12721 = 'md5', $12722 = '\x34deba4a230e798f802fb95aa37d2c31', $12723 = 'CVE-2018-5711', $12724 = 'alpine-main-v3.12-updater', $12725 = '', $12726 = '0001-01-01 00:00:00+00', $12727 = 'https://www.cve.org/CVERecord?id=CVE-2018-5711', $12728 = '', $12729 = 'Unknown', $12730 = 'gd', $12731 = '', $12732 = '', $12733 = '', $12734 = 'source', $12735 = 'alpine', $12736 = 'Alpine Linux', $12737 = '', $12738 = '', $12739 = '3.12', $12740 = '', $12741 = '', $12742 = 'Alpine Linux v3.12', $12743 = '', $12744 = '', $12745 = '', $12746 = '2.2.5-r2', $12747 = 'invalid', $12748 = NULL, $12749 = '{}', $12750 = '{}', $12751 = 'md5', $12752 = '\x1116ef81c04cf4084f87e9df36b77209', $12753 = 'CVE-2019-6977', $12754 = 'alpine-main-v3.12-updater', $12755 = '', $12756 = '0001-01-01 00:00:00+00', $12757 = 'https://www.cve.org/CVERecord?id=CVE-2019-6977', $12758 = '', $12759 = 'Unknown', $12760 = 'gd', $12761 = '', $12762 = '', $12763 = '', $12764 = 'source', $12765 = 'alpine', $12766 = 'Alpine Linux', $12767 = '', $12768 = '', $12769 = '3.12', $12770 = '', $12771 = '', $12772 = 'Alpine Linux v3.12', $12773 = '', $12774 = '', $12775 = '', $12776 = '2.2.5-r2', $12777 = 'invalid', $12778 = NULL, $12779 = '{}', $12780 = '{}', $12781 = 'md5', $12782 = '\x41940079d848cad17f218556a07ef665', $12783 = 'CVE-2019-6978', $12784 = 'alpine-main-v3.12-updater', $12785 = '', $12786 = '0001-01-01 00:00:00+00', $12787 = 'https://www.cve.org/CVERecord?id=CVE-2019-6978', $12788 = '', $12789 = 'Unknown', $12790 = 'gd', $12791 = '', $12792 = '', $12793 = '', $12794 = 'source', $12795 = 'alpine', $12796 = 'Alpine Linux', $12797 = '', $12798 = '', $12799 = '3.12', $12800 = '', $12801 = '', $12802 = 'Alpine Linux v3.12', $12803 = '', $12804 = '', $12805 = '', $12806 = '2.2.5-r2', $12807 = 'invalid', $12808 = NULL, $12809 = '{}', $12810 = '{}', $12811 = 'md5', $12812 = '\x61e726f203aea279327f66bcc664d3b4', $12813 = 'CVE-2019-11038', $12814 = 'alpine-main-v3.12-updater', $12815 = '', $12816 = '0001-01-01 00:00:00+00', $12817 = 'https://www.cve.org/CVERecord?id=CVE-2019-11038', $12818 = '', $12819 = 'Unknown', $12820 = 'gd', $12821 = '', $12822 = '', $12823 = '', $12824 = 'source', $12825 = 'alpine', $12826 = 'Alpine Linux', $12827 = '', $12828 = '', $12829 = '3.12', $12830 = '', $12831 = '', $12832 = 'Alpine Linux v3.12', $12833 = '', $12834 = '', $12835 = '', $12836 = '2.3.0-r0', $12837 = 'invalid', $12838 = NULL, $12839 = '{}', $12840 = '{}', $12841 = 'md5', $12842 = '\x134d1c9b56998bb981678b29a22684ce', $12843 = 'CVE-2018-14553', $12844 = 'alpine-main-v3.12-updater', $12845 = '', $12846 = '0001-01-01 00:00:00+00', $12847 = 'https://www.cve.org/CVERecord?id=CVE-2018-14553', $12848 = '', $12849 = 'Unknown', $12850 = 'gd', $12851 = '', $12852 = '', $12853 = '', $12854 = 'source', $12855 = 'alpine', $12856 = 'Alpine Linux', $12857 = '', $12858 = '', $12859 = '3.12', $12860 = '', $12861 = '', $12862 = 'Alpine Linux v3.12', $12863 = '', $12864 = '', $12865 = '', $12866 = '2.3.0-r0', $12867 = 'invalid', $12868 = NULL, $12869 = '{}', $12870 = '{}', $12871 = 'md5', $12872 = '\x0774a84aea0fd12d1ce5aa9149a00e60', $12873 = 'CVE-2017-6363', $12874 = 'alpine-main-v3.12-updater', $12875 = '', $12876 = '0001-01-01 00:00:00+00', $12877 = 'https://www.cve.org/CVERecord?id=CVE-2017-6363', $12878 = '', $12879 = 'Unknown', $12880 = 'gd', $12881 = '', $12882 = '', $12883 = '', $12884 = 'source', $12885 = 'alpine', $12886 = 'Alpine Linux', $12887 = '', $12888 = '', $12889 = '3.12', $12890 = '', $12891 = '', $12892 = 'Alpine Linux v3.12', $12893 = '', $12894 = '', $12895 = '', $12896 = '2.3.0-r0', $12897 = 'invalid', $12898 = NULL, $12899 = '{}', $12900 = '{}', $12901 = 'md5', $12902 = '\x9b3ff7f800cd6a537e09cc036d9a50bc', $12903 = 'CVE-2021-38115', $12904 = 'alpine-main-v3.12-updater', $12905 = '', $12906 = '0001-01-01 00:00:00+00', $12907 = 'https://www.cve.org/CVERecord?id=CVE-2021-38115', $12908 = '', $12909 = 'Unknown', $12910 = 'gd', $12911 = '', $12912 = '', $12913 = '', $12914 = 'source', $12915 = 'alpine', $12916 = 'Alpine Linux', $12917 = '', $12918 = '', $12919 = '3.12', $12920 = '', $12921 = '', $12922 = 'Alpine Linux v3.12', $12923 = '', $12924 = '', $12925 = '', $12926 = '2.3.0-r1', $12927 = 'invalid', $12928 = NULL, $12929 = '{}', $12930 = '{}', $12931 = 'md5', $12932 = '\xe1fa235c8bb58144706365204b41bb70', $12933 = 'CVE-2021-40145', $12934 = 'alpine-main-v3.12-updater', $12935 = '', $12936 = '0001-01-01 00:00:00+00', $12937 = 'https://www.cve.org/CVERecord?id=CVE-2021-40145', $12938 = '', $12939 = 'Unknown', $12940 = 'gd', $12941 = '', $12942 = '', $12943 = '', $12944 = 'source', $12945 = 'alpine', $12946 = 'Alpine Linux', $12947 = '', $12948 = '', $12949 = '3.12', $12950 = '', $12951 = '', $12952 = 'Alpine Linux v3.12', $12953 = '', $12954 = '', $12955 = '', $12956 = '2.3.0-r1', $12957 = 'invalid', $12958 = NULL, $12959 = '{}', $12960 = '{}', $12961 = 'md5', $12962 = '\xff5b59c150ecdf3a5fd7567e019a2c99', $12963 = 'CVE-2020-29385', $12964 = 'alpine-main-v3.12-updater', $12965 = '', $12966 = '0001-01-01 00:00:00+00', $12967 = 'https://www.cve.org/CVERecord?id=CVE-2020-29385', $12968 = '', $12969 = 'Unknown', $12970 = 'gdk-pixbuf', $12971 = '', $12972 = '', $12973 = '', $12974 = 'source', $12975 = 'alpine', $12976 = 'Alpine Linux', $12977 = '', $12978 = '', $12979 = '3.12', $12980 = '', $12981 = '', $12982 = 'Alpine Linux v3.12', $12983 = '', $12984 = '', $12985 = '', $12986 = '2.40.0-r4', $12987 = 'invalid', $12988 = NULL, $12989 = '{}', $12990 = '{}', $12991 = 'md5', $12992 = '\x803975cf45e9346fcd689d48d43ca259', $12993 = 'CVE-2017-6311', $12994 = 'alpine-main-v3.12-updater', $12995 = '', $12996 = '0001-01-01 00:00:00+00', $12997 = 'https://www.cve.org/CVERecord?id=CVE-2017-6311', $12998 = '', $12999 = 'Unknown', $13000 = 'gdk-pixbuf', $13001 = '', $13002 = '', $13003 = '', $13004 = 'source', $13005 = 'alpine', $13006 = 'Alpine Linux', $13007 = '', $13008 = '', $13009 = '3.12', $13010 = '', $13011 = '', $13012 = 'Alpine Linux v3.12', $13013 = '', $13014 = '', $13015 = '', $13016 = '2.36.6-r1', $13017 = 'invalid', $13018 = NULL, $13019 = '{}', $13020 = '{}', $13021 = 'md5', $13022 = '\x52003935c41b9443c3886dded97baee2', $13023 = 'CVE-2017-6312', $13024 = 'alpine-main-v3.12-updater', $13025 = '', $13026 = '0001-01-01 00:00:00+00', $13027 = 'https://www.cve.org/CVERecord?id=CVE-2017-6312', $13028 = '', $13029 = 'Unknown', $13030 = 'gdk-pixbuf', $13031 = '', $13032 = '', $13033 = '', $13034 = 'source', $13035 = 'alpine', $13036 = 'Alpine Linux', $13037 = '', $13038 = '', $13039 = '3.12', $13040 = '', $13041 = '', $13042 = 'Alpine Linux v3.12', $13043 = '', $13044 = '', $13045 = '', $13046 = '2.36.6-r1', $13047 = 'invalid', $13048 = NULL, $13049 = '{}', $13050 = '{}', $13051 = 'md5', $13052 = '\x1df9f13d0a24f888513cad43bc563637', $13053 = 'CVE-2017-6314', $13054 = 'alpine-main-v3.12-updater', $13055 = '', $13056 = '0001-01-01 00:00:00+00', $13057 = 'https://www.cve.org/CVERecord?id=CVE-2017-6314', $13058 = '', $13059 = 'Unknown', $13060 = 'gdk-pixbuf', $13061 = '', $13062 = '', $13063 = '', $13064 = 'source', $13065 = 'alpine', $13066 = 'Alpine Linux', $13067 = '', $13068 = '', $13069 = '3.12', $13070 = '', $13071 = '', $13072 = 'Alpine Linux v3.12', $13073 = '', $13074 = '', $13075 = '', $13076 = '2.36.6-r1', $13077 = 'invalid', $13078 = NULL, $13079 = '{}', $13080 = '{}', $13081 = 'md5', $13082 = '\x752132139503bafd5edc686800ad047d', $13083 = 'CVE-2021-20240', $13084 = 'alpine-main-v3.12-updater', $13085 = '', $13086 = '0001-01-01 00:00:00+00', $13087 = 'https://www.cve.org/CVERecord?id=CVE-2021-20240', $13088 = '', $13089 = 'Unknown', $13090 = 'gdk-pixbuf', $13091 = '', $13092 = '', $13093 = '', $13094 = 'source', $13095 = 'alpine', $13096 = 'Alpine Linux', $13097 = '', $13098 = '', $13099 = '3.12', $13100 = '', $13101 = '', $13102 = 'Alpine Linux v3.12', $13103 = '', $13104 = '', $13105 = '', $13106 = '2.40.0-r3', $13107 = 'invalid', $13108 = NULL, $13109 = '{}', $13110 = '{}', $13111 = 'md5', $13112 = '\x23f7acc1ad2e05b47a2d297f309986fd', $13113 = 'CVE-2018-18751', $13114 = 'alpine-main-v3.12-updater', $13115 = '', $13116 = '0001-01-01 00:00:00+00', $13117 = 'https://www.cve.org/CVERecord?id=CVE-2018-18751', $13118 = '', $13119 = 'Unknown', $13120 = 'gettext', $13121 = '', $13122 = '', $13123 = '', $13124 = 'source', $13125 = 'alpine', $13126 = 'Alpine Linux', $13127 = '', $13128 = '', $13129 = '3.12', $13130 = '', $13131 = '', $13132 = 'Alpine Linux v3.12', $13133 = '', $13134 = '', $13135 = '', $13136 = '0.20.1-r0', $13137 = 'invalid', $13138 = NULL, $13139 = '{}', $13140 = '{}', $13141 = 'md5', $13142 = '\xf0689a452968199768d998b6413aea7c', $13143 = 'CVE-2017-7207', $13144 = 'alpine-main-v3.12-updater', $13145 = '', $13146 = '0001-01-01 00:00:00+00', $13147 = 'https://www.cve.org/CVERecord?id=CVE-2017-7207', $13148 = '', $13149 = 'Unknown', $13150 = 'ghostscript', $13151 = '', $13152 = '', $13153 = '', $13154 = 'source', $13155 = 'alpine', $13156 = 'Alpine Linux', $13157 = '', $13158 = '', $13159 = '3.12', $13160 = '', $13161 = '', $13162 = 'Alpine Linux v3.12', $13163 = '', $13164 = '', $13165 = '', $13166 = '9.21-r3', $13167 = 'invalid', $13168 = NULL, $13169 = '{}', $13170 = '{}', $13171 = 'md5', $13172 = '\x5cb7a6493837edadcdcaa100eb4d3a64', $13173 = 'CVE-2017-5951', $13174 = 'alpine-main-v3.12-updater', $13175 = '', $13176 = '0001-01-01 00:00:00+00', $13177 = 'https://www.cve.org/CVERecord?id=CVE-2017-5951', $13178 = '', $13179 = 'Unknown', $13180 = 'ghostscript', $13181 = '', $13182 = '', $13183 = '', $13184 = 'source', $13185 = 'alpine', $13186 = 'Alpine Linux', $13187 = '', $13188 = '', $13189 = '3.12', $13190 = '', $13191 = '', $13192 = 'Alpine Linux v3.12', $13193 = '', $13194 = '', $13195 = '', $13196 = '9.21-r3', $13197 = 'invalid', $13198 = NULL, $13199 = '{}', $13200 = '{}', $13201 = 'md5', $13202 = '\xc33ac6d7327fb4e7a9eb685649d881c0', $13203 = 'CVE-2018-10194', $13204 = 'alpine-main-v3.12-updater', $13205 = '', $13206 = '0001-01-01 00:00:00+00', $13207 = 'https://www.cve.org/CVERecord?id=CVE-2018-10194', $13208 = '', $13209 = 'Unknown', $13210 = 'ghostscript', $13211 = '', $13212 = '', $13213 = '', $13214 = 'source', $13215 = 'alpine', $13216 = 'Alpine Linux', $13217 = '', $13218 = '', $13219 = '3.12', $13220 = '', $13221 = '', $13222 = 'Alpine Linux v3.12', $13223 = '', $13224 = '', $13225 = '', $13226 = '9.23-r0', $13227 = 'invalid', $13228 = NULL, $13229 = '{}', $13230 = '{}', $13231 = 'md5', $13232 = '\xa45db8837f3bc353ac8ce9c0948e3751', $13233 = 'CVE-2018-15908', $13234 = 'alpine-main-v3.12-updater', $13235 = '', $13236 = '0001-01-01 00:00:00+00', $13237 = 'https://www.cve.org/CVERecord?id=CVE-2018-15908', $13238 = '', $13239 = 'Unknown', $13240 = 'ghostscript', $13241 = '', $13242 = '', $13243 = '', $13244 = 'source', $13245 = 'alpine', $13246 = 'Alpine Linux', $13247 = '', $13248 = '', $13249 = '3.12', $13250 = '', $13251 = '', $13252 = 'Alpine Linux v3.12', $13253 = '', $13254 = '', $13255 = '', $13256 = '9.24-r0', $13257 = 'invalid', $13258 = NULL, $13259 = '{}', $13260 = '{}', $13261 = 'md5', $13262 = '\x05f18afdf0edf6459c29207b62512f6f', $13263 = 'CVE-2018-15909', $13264 = 'alpine-main-v3.12-updater', $13265 = '', $13266 = '0001-01-01 00:00:00+00', $13267 = 'https://www.cve.org/CVERecord?id=CVE-2018-15909', $13268 = '', $13269 = 'Unknown', $13270 = 'ghostscript', $13271 = '', $13272 = '', $13273 = '', $13274 = 'source', $13275 = 'alpine', $13276 = 'Alpine Linux', $13277 = '', $13278 = '', $13279 = '3.12', $13280 = '', $13281 = '', $13282 = 'Alpine Linux v3.12', $13283 = '', $13284 = '', $13285 = '', $13286 = '9.24-r0', $13287 = 'invalid', $13288 = NULL, $13289 = '{}', $13290 = '{}', $13291 = 'md5', $13292 = '\xa0e3e1e2f20272615680567dc9213a55', $13293 = 'CVE-2018-15910', $13294 = 'alpine-main-v3.12-updater', $13295 = '', $13296 = '0001-01-01 00:00:00+00', $13297 = 'https://www.cve.org/CVERecord?id=CVE-2018-15910', $13298 = '', $13299 = 'Unknown', $13300 = 'ghostscript', $13301 = '', $13302 = '', $13303 = '', $13304 = 'source', $13305 = 'alpine', $13306 = 'Alpine Linux', $13307 = '', $13308 = '', $13309 = '3.12', $13310 = '', $13311 = '', $13312 = 'Alpine Linux v3.12', $13313 = '', $13314 = '', $13315 = '', $13316 = '9.24-r0', $13317 = 'invalid', $13318 = NULL, $13319 = '{}', $13320 = '{}', $13321 = 'md5', $13322 = '\x1306101254e49ce0d61aeb48dfcc9f2a', $13323 = 'CVE-2018-15911', $13324 = 'alpine-main-v3.12-updater', $13325 = '', $13326 = '0001-01-01 00:00:00+00', $13327 = 'https://www.cve.org/CVERecord?id=CVE-2018-15911', $13328 = '', $13329 = 'Unknown', $13330 = 'ghostscript', $13331 = '', $13332 = '', $13333 = '', $13334 = 'source', $13335 = 'alpine', $13336 = 'Alpine Linux', $13337 = '', $13338 = '', $13339 = '3.12', $13340 = '', $13341 = '', $13342 = 'Alpine Linux v3.12', $13343 = '', $13344 = '', $13345 = '', $13346 = '9.24-r0', $13347 = 'invalid', $13348 = NULL, $13349 = '{}', $13350 = '{}', $13351 = 'md5', $13352 = '\xd32f086ef4d24a89fd28e6ed68e50d88', $13353 = 'CVE-2018-16802', $13354 = 'alpine-main-v3.12-updater', $13355 = '', $13356 = '0001-01-01 00:00:00+00', $13357 = 'https://www.cve.org/CVERecord?id=CVE-2018-16802', $13358 = '', $13359 = 'Unknown', $13360 = 'ghostscript', $13361 = '', $13362 = '', $13363 = '', $13364 = 'source', $13365 = 'alpine', $13366 = 'Alpine Linux', $13367 = '', $13368 = '', $13369 = '3.12', $13370 = '', $13371 = '', $13372 = 'Alpine Linux v3.12', $13373 = '', $13374 = '', $13375 = '', $13376 = '9.25-r0', $13377 = 'invalid', $13378 = NULL, $13379 = '{}', $13380 = '{}', $13381 = 'md5', $13382 = '\x68af315456e3fa9b42ac0d774ff23f58', $13383 = 'CVE-2018-19409', $13384 = 'alpine-main-v3.12-updater', $13385 = '', $13386 = '0001-01-01 00:00:00+00', $13387 = 'https://www.cve.org/CVERecord?id=CVE-2018-19409', $13388 = '', $13389 = 'Unknown', $13390 = 'ghostscript', $13391 = '', $13392 = '', $13393 = '', $13394 = 'source', $13395 = 'alpine', $13396 = 'Alpine Linux', $13397 = '', $13398 = '', $13399 = '3.12', $13400 = '', $13401 = '', $13402 = 'Alpine Linux v3.12', $13403 = '', $13404 = '', $13405 = '', $13406 = '9.26-r0', $13407 = 'invalid', $13408 = NULL, $13409 = '{}', $13410 = '{}', $13411 = 'md5', $13412 = '\x71bea96052bdad09dead45f3a3255342', $13413 = 'CVE-2018-19475', $13414 = 'alpine-main-v3.12-updater', $13415 = '', $13416 = '0001-01-01 00:00:00+00', $13417 = 'https://www.cve.org/CVERecord?id=CVE-2018-19475', $13418 = '', $13419 = 'Unknown', $13420 = 'ghostscript', $13421 = '', $13422 = '', $13423 = '', $13424 = 'source', $13425 = 'alpine', $13426 = 'Alpine Linux', $13427 = '', $13428 = '', $13429 = '3.12', $13430 = '', $13431 = '', $13432 = 'Alpine Linux v3.12', $13433 = '', $13434 = '', $13435 = '', $13436 = '9.26-r0', $13437 = 'invalid', $13438 = NULL, $13439 = '{}', $13440 = '{}', $13441 = 'md5', $13442 = '\x7d07720474ebe942448212cf77217276', $13443 = 'CVE-2018-19476', $13444 = 'alpine-main-v3.12-updater', $13445 = '', $13446 = '0001-01-01 00:00:00+00', $13447 = 'https://www.cve.org/CVERecord?id=CVE-2018-19476', $13448 = '', $13449 = 'Unknown', $13450 = 'ghostscript', $13451 = '', $13452 = '', $13453 = '', $13454 = 'source', $13455 = 'alpine', $13456 = 'Alpine Linux', $13457 = '', $13458 = '', $13459 = '3.12', $13460 = '', $13461 = '', $13462 = 'Alpine Linux v3.12', $13463 = '', $13464 = '', $13465 = '', $13466 = '9.26-r0', $13467 = 'invalid', $13468 = NULL, $13469 = '{}', $13470 = '{}', $13471 = 'md5', $13472 = '\x81d250a85d62e6e26f4cceb8212b6a12', $13473 = 'CVE-2018-19477', $13474 = 'alpine-main-v3.12-updater', $13475 = '', $13476 = '0001-01-01 00:00:00+00', $13477 = 'https://www.cve.org/CVERecord?id=CVE-2018-19477', $13478 = '', $13479 = 'Unknown', $13480 = 'ghostscript', $13481 = '', $13482 = '', $13483 = '', $13484 = 'source', $13485 = 'alpine', $13486 = 'Alpine Linux', $13487 = '', $13488 = '', $13489 = '3.12', $13490 = '', $13491 = '', $13492 = 'Alpine Linux v3.12', $13493 = '', $13494 = '', $13495 = '', $13496 = '9.26-r0', $13497 = 'invalid', $13498 = NULL, $13499 = '{}', $13500 = '{}', $13501 = 'md5', $13502 = '\x0208170b3c26f8943763a616167a65d4', $13503 = 'CVE-2019-14811', $13504 = 'alpine-main-v3.12-updater', $13505 = '', $13506 = '0001-01-01 00:00:00+00', $13507 = 'https://www.cve.org/CVERecord?id=CVE-2019-14811', $13508 = '', $13509 = 'Unknown', $13510 = 'ghostscript', $13511 = '', $13512 = '', $13513 = '', $13514 = 'source', $13515 = 'alpine', $13516 = 'Alpine Linux', $13517 = '', $13518 = '', $13519 = '3.12', $13520 = '', $13521 = '', $13522 = 'Alpine Linux v3.12', $13523 = '', $13524 = '', $13525 = '', $13526 = '9.27-r3', $13527 = 'invalid', $13528 = NULL, $13529 = '{}', $13530 = '{}', $13531 = 'md5', $13532 = '\x8da2d5200b93322eafbd7b8e49fe0888', $13533 = 'CVE-2019-14812', $13534 = 'alpine-main-v3.12-updater', $13535 = '', $13536 = '0001-01-01 00:00:00+00', $13537 = 'https://www.cve.org/CVERecord?id=CVE-2019-14812', $13538 = '', $13539 = 'Unknown', $13540 = 'ghostscript', $13541 = '', $13542 = '', $13543 = '', $13544 = 'source', $13545 = 'alpine', $13546 = 'Alpine Linux', $13547 = '', $13548 = '', $13549 = '3.12', $13550 = '', $13551 = '', $13552 = 'Alpine Linux v3.12', $13553 = '', $13554 = '', $13555 = '', $13556 = '9.27-r3', $13557 = 'invalid', $13558 = NULL, $13559 = '{}', $13560 = '{}', $13561 = 'md5', $13562 = '\x1f525ad7cf957ac69850afab787fdadb', $13563 = 'CVE-2019-14813', $13564 = 'alpine-main-v3.12-updater', $13565 = '', $13566 = '0001-01-01 00:00:00+00', $13567 = 'https://www.cve.org/CVERecord?id=CVE-2019-14813', $13568 = '', $13569 = 'Unknown', $13570 = 'ghostscript', $13571 = '', $13572 = '', $13573 = '', $13574 = 'source', $13575 = 'alpine', $13576 = 'Alpine Linux', $13577 = '', $13578 = '', $13579 = '3.12', $13580 = '', $13581 = '', $13582 = 'Alpine Linux v3.12', $13583 = '', $13584 = '', $13585 = '', $13586 = '9.27-r3', $13587 = 'invalid', $13588 = NULL, $13589 = '{}', $13590 = '{}', $13591 = 'md5', $13592 = '\xfbce1f0fbc433b3dcd6fcec275bc4a88', $13593 = 'CVE-2019-14817', $13594 = 'alpine-main-v3.12-updater', $13595 = '', $13596 = '0001-01-01 00:00:00+00', $13597 = 'https://www.cve.org/CVERecord?id=CVE-2019-14817', $13598 = '', $13599 = 'Unknown', $13600 = 'ghostscript', $13601 = '', $13602 = '', $13603 = '', $13604 = 'source', $13605 = 'alpine', $13606 = 'Alpine Linux', $13607 = '', $13608 = '', $13609 = '3.12', $13610 = '', $13611 = '', $13612 = 'Alpine Linux v3.12', $13613 = '', $13614 = '', $13615 = '', $13616 = '9.27-r4', $13617 = 'invalid', $13618 = NULL, $13619 = '{}', $13620 = '{}', $13621 = 'md5', $13622 = '\xb806b431738d50281a23913e52210211', $13623 = 'CVE-2017-8291', $13624 = 'alpine-main-v3.12-updater', $13625 = '', $13626 = '0001-01-01 00:00:00+00', $13627 = 'https://www.cve.org/CVERecord?id=CVE-2017-8291', $13628 = '', $13629 = 'Unknown', $13630 = 'ghostscript', $13631 = '', $13632 = '', $13633 = '', $13634 = 'source', $13635 = 'alpine', $13636 = 'Alpine Linux', $13637 = '', $13638 = '', $13639 = '3.12', $13640 = '', $13641 = '', $13642 = 'Alpine Linux v3.12', $13643 = '', $13644 = '', $13645 = '', $13646 = '9.21-r2', $13647 = 'invalid', $13648 = NULL, $13649 = '{}', $13650 = '{}', $13651 = 'md5', $13652 = '\xf7a1a02e62e87929457a423d338f892f', $13653 = 'CVE-2019-14869', $13654 = 'alpine-main-v3.12-updater', $13655 = '', $13656 = '0001-01-01 00:00:00+00', $13657 = 'https://www.cve.org/CVERecord?id=CVE-2019-14869', $13658 = '', $13659 = 'Unknown', $13660 = 'ghostscript', $13661 = '', $13662 = '', $13663 = '', $13664 = 'source', $13665 = 'alpine', $13666 = 'Alpine Linux', $13667 = '', $13668 = '', $13669 = '3.12', $13670 = '', $13671 = '', $13672 = 'Alpine Linux v3.12', $13673 = '', $13674 = '', $13675 = '', $13676 = '9.50-r0', $13677 = 'invalid', $13678 = NULL, $13679 = '{}', $13680 = '{}', $13681 = 'md5', $13682 = '\xc3089096b04b50a4a0a084c8c54a74c7', $13683 = 'CVE-2019-3835', $13684 = 'alpine-main-v3.12-updater', $13685 = '', $13686 = '0001-01-01 00:00:00+00', $13687 = 'https://www.cve.org/CVERecord?id=CVE-2019-3835', $13688 = '', $13689 = 'Unknown', $13690 = 'ghostscript', $13691 = '', $13692 = '', $13693 = '', $13694 = 'source', $13695 = 'alpine', $13696 = 'Alpine Linux', $13697 = '', $13698 = '', $13699 = '3.12', $13700 = '', $13701 = '', $13702 = 'Alpine Linux v3.12', $13703 = '', $13704 = '', $13705 = '', $13706 = '9.26-r2', $13707 = 'invalid', $13708 = NULL, $13709 = '{}', $13710 = '{}', $13711 = 'md5', $13712 = '\xa6e4545a79ef93dc7bd5fb67dbe160a2', $13713 = 'CVE-2019-3838', $13714 = 'alpine-main-v3.12-updater', $13715 = '', $13716 = '0001-01-01 00:00:00+00', $13717 = 'https://www.cve.org/CVERecord?id=CVE-2019-3838', $13718 = '', $13719 = 'Unknown', $13720 = 'ghostscript', $13721 = '', $13722 = '', $13723 = '', $13724 = 'source', $13725 = 'alpine', $13726 = 'Alpine Linux', $13727 = '', $13728 = '', $13729 = '3.12', $13730 = '', $13731 = '', $13732 = 'Alpine Linux v3.12', $13733 = '', $13734 = '', $13735 = '', $13736 = '9.26-r2', $13737 = 'invalid', $13738 = NULL, $13739 = '{}', $13740 = '{}', $13741 = 'md5', $13742 = '\xc60f8df056ab81d4a1057dc515ca0641', $13743 = 'CVE-2019-6116', $13744 = 'alpine-main-v3.12-updater', $13745 = '', $13746 = '0001-01-01 00:00:00+00', $13747 = 'https://www.cve.org/CVERecord?id=CVE-2019-6116', $13748 = '', $13749 = 'Unknown', $13750 = 'ghostscript', $13751 = '', $13752 = '', $13753 = '', $13754 = 'source', $13755 = 'alpine', $13756 = 'Alpine Linux', $13757 = '', $13758 = '', $13759 = '3.12', $13760 = '', $13761 = '', $13762 = 'Alpine Linux v3.12', $13763 = '', $13764 = '', $13765 = '', $13766 = '9.26-r2', $13767 = 'invalid', $13768 = NULL, $13769 = '{}', $13770 = '{}', $13771 = 'md5', $13772 = '\x7b063a2f2eeb48f62d44b95d2f634cc7', $13773 = 'CVE-2019-10216', $13774 = 'alpine-main-v3.12-updater', $13775 = '', $13776 = '0001-01-01 00:00:00+00', $13777 = 'https://www.cve.org/CVERecord?id=CVE-2019-10216', $13778 = '', $13779 = 'Unknown', $13780 = 'ghostscript', $13781 = '', $13782 = '', $13783 = '', $13784 = 'source', $13785 = 'alpine', $13786 = 'Alpine Linux', $13787 = '', $13788 = '', $13789 = '3.12', $13790 = '', $13791 = '', $13792 = 'Alpine Linux v3.12', $13793 = '', $13794 = '', $13795 = '', $13796 = '9.27-r2', $13797 = 'invalid', $13798 = NULL, $13799 = '{}', $13800 = '{}', $13801 = 'md5', $13802 = '\xfc3fbbd9d2f3ff53e91ea45562c651b2', $13803 = 'CVE-2020-15900', $13804 = 'alpine-main-v3.12-updater', $13805 = '', $13806 = '0001-01-01 00:00:00+00', $13807 = 'https://www.cve.org/CVERecord?id=CVE-2020-15900', $13808 = '', $13809 = 'Unknown', $13810 = 'ghostscript', $13811 = '', $13812 = '', $13813 = '', $13814 = 'source', $13815 = 'alpine', $13816 = 'Alpine Linux', $13817 = '', $13818 = '', $13819 = '3.12', $13820 = '', $13821 = '', $13822 = 'Alpine Linux v3.12', $13823 = '', $13824 = '', $13825 = '', $13826 = '9.52-r1', $13827 = 'invalid', $13828 = NULL, $13829 = '{}', $13830 = '{}', $13831 = 'md5', $13832 = '\x34462c8e1a4f1b39c48a5a78777cce97', $13833 = 'CVE-2018-17961', $13834 = 'alpine-main-v3.12-updater', $13835 = '', $13836 = '0001-01-01 00:00:00+00', $13837 = 'https://www.cve.org/CVERecord?id=CVE-2018-17961', $13838 = '', $13839 = 'Unknown', $13840 = 'ghostscript', $13841 = '', $13842 = '', $13843 = '', $13844 = 'source', $13845 = 'alpine', $13846 = 'Alpine Linux', $13847 = '', $13848 = '', $13849 = '3.12', $13850 = '', $13851 = '', $13852 = 'Alpine Linux v3.12', $13853 = '', $13854 = '', $13855 = '', $13856 = '9.25-r1', $13857 = 'invalid', $13858 = NULL, $13859 = '{}', $13860 = '{}', $13861 = 'md5', $13862 = '\xb2adc87acf014b28ef4a5c33025234b5', $13863 = 'CVE-2018-18073', $13864 = 'alpine-main-v3.12-updater', $13865 = '', $13866 = '0001-01-01 00:00:00+00', $13867 = 'https://www.cve.org/CVERecord?id=CVE-2018-18073', $13868 = '', $13869 = 'Unknown', $13870 = 'ghostscript', $13871 = '', $13872 = '', $13873 = '', $13874 = 'source', $13875 = 'alpine', $13876 = 'Alpine Linux', $13877 = '', $13878 = '', $13879 = '3.12', $13880 = '', $13881 = '', $13882 = 'Alpine Linux v3.12', $13883 = '', $13884 = '', $13885 = '', $13886 = '9.25-r1', $13887 = 'invalid', $13888 = NULL, $13889 = '{}', $13890 = '{}', $13891 = 'md5', $13892 = '\xad95c28c0a49c1838831cb4a141a792a', $13893 = 'CVE-2018-18284', $13894 = 'alpine-main-v3.12-updater', $13895 = '', $13896 = '0001-01-01 00:00:00+00', $13897 = 'https://www.cve.org/CVERecord?id=CVE-2018-18284', $13898 = '', $13899 = 'Unknown', $13900 = 'ghostscript', $13901 = '', $13902 = '', $13903 = '', $13904 = 'source', $13905 = 'alpine', $13906 = 'Alpine Linux', $13907 = '', $13908 = '', $13909 = '3.12', $13910 = '', $13911 = '', $13912 = 'Alpine Linux v3.12', $13913 = '', $13914 = '', $13915 = '', $13916 = '9.25-r1', $13917 = 'invalid', $13918 = NULL, $13919 = '{}', $13920 = '{}', $13921 = 'md5', $13922 = '\xc19a32742abf57c1600938c3c3625066', $13923 = 'CVE-2018-17456', $13924 = 'alpine-main-v3.12-updater', $13925 = '', $13926 = '0001-01-01 00:00:00+00', $13927 = 'https://www.cve.org/CVERecord?id=CVE-2018-17456', $13928 = '', $13929 = 'Unknown', $13930 = 'git', $13931 = '', $13932 = '', $13933 = '', $13934 = 'source', $13935 = 'alpine', $13936 = 'Alpine Linux', $13937 = '', $13938 = '', $13939 = '3.12', $13940 = '', $13941 = '', $13942 = 'Alpine Linux v3.12', $13943 = '', $13944 = '', $13945 = '', $13946 = '2.19.1-r0', $13947 = 'invalid', $13948 = NULL, $13949 = '{}', $13950 = '{}', $13951 = 'md5', $13952 = '\xa26e1f99e931055270bd5aae9b139a8d', $13953 = 'CVE-2021-21300', $13954 = 'alpine-main-v3.12-updater', $13955 = '', $13956 = '0001-01-01 00:00:00+00', $13957 = 'https://www.cve.org/CVERecord?id=CVE-2021-21300', $13958 = '', $13959 = 'Unknown', $13960 = 'git', $13961 = '', $13962 = '', $13963 = '', $13964 = 'source', $13965 = 'alpine', $13966 = 'Alpine Linux', $13967 = '', $13968 = '', $13969 = '3.12', $13970 = '', $13971 = '', $13972 = 'Alpine Linux v3.12', $13973 = '', $13974 = '', $13975 = '', $13976 = '2.26.3-r0', $13977 = 'invalid', $13978 = NULL, $13979 = '{}', $13980 = '{}', $13981 = 'md5', $13982 = '\xb075e4c4c108574a5b3e563200ea87ea', $13983 = 'CVE-2021-40330', $13984 = 'alpine-main-v3.12-updater', $13985 = '', $13986 = '0001-01-01 00:00:00+00', $13987 = 'https://www.cve.org/CVERecord?id=CVE-2021-40330', $13988 = '', $13989 = 'Unknown', $13990 = 'git', $13991 = '', $13992 = '', $13993 = '', $13994 = 'source', $13995 = 'alpine', $13996 = 'Alpine Linux', $13997 = '', $13998 = '', $13999 = '3.12', $14000 = '', $14001 = '', $14002 = 'Alpine Linux v3.12', $14003 = '', $14004 = '', $14005 = '', $14006 = '2.26.3-r1', $14007 = 'invalid', $14008 = NULL, $14009 = '{}', $14010 = '{}', $14011 = 'md5', $14012 = '\x88bbe9f81fbeb36da85eb2c16e1886a1', $14013 = 'CVE-2021-29468', $14014 = 'alpine-main-v3.12-updater', $14015 = '', $14016 = '0001-01-01 00:00:00+00', $14017 = 'https://www.cve.org/CVERecord?id=CVE-2021-29468', $14018 = '', $14019 = 'Unknown', $14020 = 'git', $14021 = '', $14022 = '', $14023 = '', $14024 = 'source', $14025 = 'alpine', $14026 = 'Alpine Linux', $14027 = '', $14028 = '', $14029 = '3.12', $14030 = '', $14031 = '', $14032 = 'Alpine Linux v3.12', $14033 = '', $14034 = '', $14035 = '', $14036 = '0', $14037 = 'invalid', $14038 = NULL, $14039 = '{}', $14040 = '{}', $14041 = 'md5', $14042 = '\x44a388be83dff6ea0f610553dd5ba0ab', $14043 = 'CVE-2021-46101', $14044 = 'alpine-main-v3.12-updater', $14045 = '', $14046 = '0001-01-01 00:00:00+00', $14047 = 'https://www.cve.org/CVERecord?id=CVE-2021-46101', $14048 = '', $14049 = 'Unknown', $14050 = 'git', $14051 = '', $14052 = '', $14053 = '', $14054 = 'source', $14055 = 'alpine', $14056 = 'Alpine Linux', $14057 = '', $14058 = '', $14059 = '3.12', $14060 = '', $14061 = '', $14062 = 'Alpine Linux v3.12', $14063 = '', $14064 = '', $14065 = '', $14066 = '0', $14067 = 'invalid', $14068 = NULL, $14069 = '{}', $14070 = '{}', $14071 = 'md5', $14072 = '\x0eb79f260ca82184500eb34e52528e61', $14073 = 'CVE-2017-1000117', $14074 = 'alpine-main-v3.12-updater', $14075 = '', $14076 = '0001-01-01 00:00:00+00', $14077 = 'https://www.cve.org/CVERecord?id=CVE-2017-1000117', $14078 = '', $14079 = 'Unknown', $14080 = 'git', $14081 = '', $14082 = '', $14083 = '', $14084 = 'source', $14085 = 'alpine', $14086 = 'Alpine Linux', $14087 = '', $14088 = '', $14089 = '3.12', $14090 = '', $14091 = '', $14092 = 'Alpine Linux v3.12', $14093 = '', $14094 = '', $14095 = '', $14096 = '2.14.1-r0', $14097 = 'invalid', $14098 = NULL, $14099 = '{}', $14100 = '{}', $14101 = 'md5', $14102 = '\x7277fca8c9718859ce4043794eac2c51', $14103 = 'CVE-2020-5260', $14104 = 'alpine-main-v3.12-updater', $14105 = '', $14106 = '0001-01-01 00:00:00+00', $14107 = 'https://www.cve.org/CVERecord?id=CVE-2020-5260', $14108 = '', $14109 = 'Unknown', $14110 = 'git', $14111 = '', $14112 = '', $14113 = '', $14114 = 'source', $14115 = 'alpine', $14116 = 'Alpine Linux', $14117 = '', $14118 = '', $14119 = '3.12', $14120 = '', $14121 = '', $14122 = 'Alpine Linux v3.12', $14123 = '', $14124 = '', $14125 = '', $14126 = '2.26.1-r0', $14127 = 'invalid', $14128 = NULL, $14129 = '{}', $14130 = '{}', $14131 = 'md5', $14132 = '\x62b0bc9106a3dd351e5839740878f085', $14133 = 'CVE-2020-11008', $14134 = 'alpine-main-v3.12-updater', $14135 = '', $14136 = '0001-01-01 00:00:00+00', $14137 = 'https://www.cve.org/CVERecord?id=CVE-2020-11008', $14138 = '', $14139 = 'Unknown', $14140 = 'git', $14141 = '', $14142 = '', $14143 = '', $14144 = 'source', $14145 = 'alpine', $14146 = 'Alpine Linux', $14147 = '', $14148 = '', $14149 = '3.12', $14150 = '', $14151 = '', $14152 = 'Alpine Linux v3.12', $14153 = '', $14154 = '', $14155 = '', $14156 = '2.26.2-r0', $14157 = 'invalid', $14158 = NULL, $14159 = '{}', $14160 = '{}', $14161 = 'md5', $14162 = '\x72d8147d6db234b756f3dfa7fb56f217', $14163 = 'CVE-2018-11233', $14164 = 'alpine-main-v3.12-updater', $14165 = '', $14166 = '0001-01-01 00:00:00+00', $14167 = 'https://www.cve.org/CVERecord?id=CVE-2018-11233', $14168 = '', $14169 = 'Unknown', $14170 = 'git', $14171 = '', $14172 = '', $14173 = '', $14174 = 'source', $14175 = 'alpine', $14176 = 'Alpine Linux', $14177 = '', $14178 = '', $14179 = '3.12', $14180 = '', $14181 = '', $14182 = 'Alpine Linux v3.12', $14183 = '', $14184 = '', $14185 = '', $14186 = '2.17.1-r0', $14187 = 'invalid', $14188 = NULL, $14189 = '{}', $14190 = '{}', $14191 = 'md5', $14192 = '\x9e17d1b726bb6b33238d9c92b88d41e9', $14193 = 'CVE-2018-11235', $14194 = 'alpine-main-v3.12-updater', $14195 = '', $14196 = '0001-01-01 00:00:00+00', $14197 = 'https://www.cve.org/CVERecord?id=CVE-2018-11235', $14198 = '', $14199 = 'Unknown', $14200 = 'git', $14201 = '', $14202 = '', $14203 = '', $14204 = 'source', $14205 = 'alpine', $14206 = 'Alpine Linux', $14207 = '', $14208 = '', $14209 = '3.12', $14210 = '', $14211 = '', $14212 = 'Alpine Linux v3.12', $14213 = '', $14214 = '', $14215 = '', $14216 = '2.17.1-r0', $14217 = 'invalid', $14218 = NULL, $14219 = '{}', $14220 = '{}', $14221 = 'md5', $14222 = '\x2ac555967f208585ec42967d8ca4f227', $14223 = 'CVE-2019-1348', $14224 = 'alpine-main-v3.12-updater', $14225 = '', $14226 = '0001-01-01 00:00:00+00', $14227 = 'https://www.cve.org/CVERecord?id=CVE-2019-1348', $14228 = '', $14229 = 'Unknown', $14230 = 'git', $14231 = '', $14232 = '', $14233 = '', $14234 = 'source', $14235 = 'alpine', $14236 = 'Alpine Linux', $14237 = '', $14238 = '', $14239 = '3.12', $14240 = '', $14241 = '', $14242 = 'Alpine Linux v3.12', $14243 = '', $14244 = '', $14245 = '', $14246 = '2.24.1-r0', $14247 = 'invalid', $14248 = NULL, $14249 = '{}', $14250 = '{}', $14251 = 'md5', $14252 = '\x6447c630b6b8b23b60ab411b6bce71b0', $14253 = 'CVE-2019-1349', $14254 = 'alpine-main-v3.12-updater', $14255 = '', $14256 = '0001-01-01 00:00:00+00', $14257 = 'https://www.cve.org/CVERecord?id=CVE-2019-1349', $14258 = '', $14259 = 'Unknown', $14260 = 'git', $14261 = '', $14262 = '', $14263 = '', $14264 = 'source', $14265 = 'alpine', $14266 = 'Alpine Linux', $14267 = '', $14268 = '', $14269 = '3.12', $14270 = '', $14271 = '', $14272 = 'Alpine Linux v3.12', $14273 = '', $14274 = '', $14275 = '', $14276 = '2.24.1-r0', $14277 = 'invalid', $14278 = NULL, $14279 = '{}', $14280 = '{}', $14281 = 'md5', $14282 = '\xd3913e12b4163a3c27e22f0b138c5aa4', $14283 = 'CVE-2019-1350', $14284 = 'alpine-main-v3.12-updater', $14285 = '', $14286 = '0001-01-01 00:00:00+00', $14287 = 'https://www.cve.org/CVERecord?id=CVE-2019-1350', $14288 = '', $14289 = 'Unknown', $14290 = 'git', $14291 = '', $14292 = '', $14293 = '', $14294 = 'source', $14295 = 'alpine', $14296 = 'Alpine Linux', $14297 = '', $14298 = '', $14299 = '3.12', $14300 = '', $14301 = '', $14302 = 'Alpine Linux v3.12', $14303 = '', $14304 = '', $14305 = '', $14306 = '2.24.1-r0', $14307 = 'invalid', $14308 = NULL, $14309 = '{}', $14310 = '{}', $14311 = 'md5', $14312 = '\xd3912ff2ce97245de81abfcaa208ccd9', $14313 = 'CVE-2019-1351', $14314 = 'alpine-main-v3.12-updater', $14315 = '', $14316 = '0001-01-01 00:00:00+00', $14317 = 'https://www.cve.org/CVERecord?id=CVE-2019-1351', $14318 = '', $14319 = 'Unknown', $14320 = 'git', $14321 = '', $14322 = '', $14323 = '', $14324 = 'source', $14325 = 'alpine', $14326 = 'Alpine Linux', $14327 = '', $14328 = '', $14329 = '3.12', $14330 = '', $14331 = '', $14332 = 'Alpine Linux v3.12', $14333 = '', $14334 = '', $14335 = '', $14336 = '2.24.1-r0', $14337 = 'invalid', $14338 = NULL, $14339 = '{}', $14340 = '{}', $14341 = 'md5', $14342 = '\xc1573dbd1dc911ab80c63d1d43c7ee29', $14343 = 'CVE-2019-1352', $14344 = 'alpine-main-v3.12-updater', $14345 = '', $14346 = '0001-01-01 00:00:00+00', $14347 = 'https://www.cve.org/CVERecord?id=CVE-2019-1352', $14348 = '', $14349 = 'Unknown', $14350 = 'git', $14351 = '', $14352 = '', $14353 = '', $14354 = 'source', $14355 = 'alpine', $14356 = 'Alpine Linux', $14357 = '', $14358 = '', $14359 = '3.12', $14360 = '', $14361 = '', $14362 = 'Alpine Linux v3.12', $14363 = '', $14364 = '', $14365 = '', $14366 = '2.24.1-r0', $14367 = 'invalid', $14368 = NULL, $14369 = '{}', $14370 = '{}', $14371 = 'md5', $14372 = '\x439df2e9ec41cfef8ad417fda52d4789', $14373 = 'CVE-2019-1353', $14374 = 'alpine-main-v3.12-updater', $14375 = '', $14376 = '0001-01-01 00:00:00+00', $14377 = 'https://www.cve.org/CVERecord?id=CVE-2019-1353', $14378 = '', $14379 = 'Unknown', $14380 = 'git', $14381 = '', $14382 = '', $14383 = '', $14384 = 'source', $14385 = 'alpine', $14386 = 'Alpine Linux', $14387 = '', $14388 = '', $14389 = '3.12', $14390 = '', $14391 = '', $14392 = 'Alpine Linux v3.12', $14393 = '', $14394 = '', $14395 = '', $14396 = '2.24.1-r0', $14397 = 'invalid', $14398 = NULL, $14399 = '{}', $14400 = '{}', $14401 = 'md5', $14402 = '\x8cd0c3aaf373cb79c5faa1edfed66184', $14403 = 'CVE-2019-1354', $14404 = 'alpine-main-v3.12-updater', $14405 = '', $14406 = '0001-01-01 00:00:00+00', $14407 = 'https://www.cve.org/CVERecord?id=CVE-2019-1354', $14408 = '', $14409 = 'Unknown', $14410 = 'git', $14411 = '', $14412 = '', $14413 = '', $14414 = 'source', $14415 = 'alpine', $14416 = 'Alpine Linux', $14417 = '', $14418 = '', $14419 = '3.12', $14420 = '', $14421 = '', $14422 = 'Alpine Linux v3.12', $14423 = '', $14424 = '', $14425 = '', $14426 = '2.24.1-r0', $14427 = 'invalid', $14428 = NULL, $14429 = '{}', $14430 = '{}', $14431 = 'md5', $14432 = '\xf607ee6886214262e9f2511e5fcb939d', $14433 = 'CVE-2019-1387', $14434 = 'alpine-main-v3.12-updater', $14435 = '', $14436 = '0001-01-01 00:00:00+00', $14437 = 'https://www.cve.org/CVERecord?id=CVE-2019-1387', $14438 = '', $14439 = 'Unknown', $14440 = 'git', $14441 = '', $14442 = '', $14443 = '', $14444 = 'source', $14445 = 'alpine', $14446 = 'Alpine Linux', $14447 = '', $14448 = '', $14449 = '3.12', $14450 = '', $14451 = '', $14452 = 'Alpine Linux v3.12', $14453 = '', $14454 = '', $14455 = '', $14456 = '2.24.1-r0', $14457 = 'invalid', $14458 = NULL, $14459 = '{}', $14460 = '{}', $14461 = 'md5', $14462 = '\xe96939ce05f8dd4447a213094a19223a', $14463 = 'CVE-2019-19604', $14464 = 'alpine-main-v3.12-updater', $14465 = '', $14466 = '0001-01-01 00:00:00+00', $14467 = 'https://www.cve.org/CVERecord?id=CVE-2019-19604', $14468 = '', $14469 = 'Unknown', $14470 = 'git', $14471 = '', $14472 = '', $14473 = '', $14474 = 'source', $14475 = 'alpine', $14476 = 'Alpine Linux', $14477 = '', $14478 = '', $14479 = '3.12', $14480 = '', $14481 = '', $14482 = 'Alpine Linux v3.12', $14483 = '', $14484 = '', $14485 = '', $14486 = '2.24.1-r0', $14487 = 'invalid', $14488 = NULL, $14489 = '{}', $14490 = '{}', $14491 = 'md5', $14492 = '\x35d8ad12d465ddbc5244b682eeb395a6', $14493 = 'CVE-2018-20683', $14494 = 'alpine-main-v3.12-updater', $14495 = '', $14496 = '0001-01-01 00:00:00+00', $14497 = 'https://www.cve.org/CVERecord?id=CVE-2018-20683', $14498 = '', $14499 = 'Unknown', $14500 = 'gitolite', $14501 = '', $14502 = '', $14503 = '', $14504 = 'source', $14505 = 'alpine', $14506 = 'Alpine Linux', $14507 = '', $14508 = '', $14509 = '3.12', $14510 = '', $14511 = '', $14512 = 'Alpine Linux v3.12', $14513 = '', $14514 = '', $14515 = '', $14516 = '3.6.11-r0', $14517 = 'invalid', $14518 = NULL, $14519 = '{}', $14520 = '{}', $14521 = 'md5', $14522 = '\xd373bef6502f069eed09da8e8bba5604', $14523 = 'CVE-2019-12450', $14524 = 'alpine-main-v3.12-updater', $14525 = '', $14526 = '0001-01-01 00:00:00+00', $14527 = 'https://www.cve.org/CVERecord?id=CVE-2019-12450', $14528 = '', $14529 = 'Unknown', $14530 = 'glib', $14531 = '', $14532 = '', $14533 = '', $14534 = 'source', $14535 = 'alpine', $14536 = 'Alpine Linux', $14537 = '', $14538 = '', $14539 = '3.12', $14540 = '', $14541 = '', $14542 = 'Alpine Linux v3.12', $14543 = '', $14544 = '', $14545 = '', $14546 = '2.60.4-r0', $14547 = 'invalid', $14548 = NULL, $14549 = '{}', $14550 = '{}', $14551 = 'md5', $14552 = '\xb8bd626270c4992b0785151960c4fbf1', $14553 = 'CVE-2020-6750', $14554 = 'alpine-main-v3.12-updater', $14555 = '', $14556 = '0001-01-01 00:00:00+00', $14557 = 'https://www.cve.org/CVERecord?id=CVE-2020-6750', $14558 = '', $14559 = 'Unknown', $14560 = 'glib', $14561 = '', $14562 = '', $14563 = '', $14564 = 'source', $14565 = 'alpine', $14566 = 'Alpine Linux', $14567 = '', $14568 = '', $14569 = '3.12', $14570 = '', $14571 = '', $14572 = 'Alpine Linux v3.12', $14573 = '', $14574 = '', $14575 = '', $14576 = '2.62.5-r0', $14577 = 'invalid', $14578 = NULL, $14579 = '{}', $14580 = '{}', $14581 = 'md5', $14582 = '\x325eb0325c8e279302184268493ff4bc', $14583 = 'CVE-2021-43618', $14584 = 'alpine-main-v3.12-updater', $14585 = '', $14586 = '0001-01-01 00:00:00+00', $14587 = 'https://www.cve.org/CVERecord?id=CVE-2021-43618', $14588 = '', $14589 = 'Unknown', $14590 = 'gmp', $14591 = '', $14592 = '', $14593 = '', $14594 = 'source', $14595 = 'alpine', $14596 = 'Alpine Linux', $14597 = '', $14598 = '', $14599 = '3.12', $14600 = '', $14601 = '', $14602 = 'Alpine Linux v3.12', $14603 = '', $14604 = '', $14605 = '', $14606 = '6.2.1-r1', $14607 = 'invalid', $14608 = NULL, $14609 = '{}', $14610 = '{}', $14611 = 'md5', $14612 = '\x7cdc07d7b9983836367470b3011b9522', $14613 = 'CVE-2019-14855', $14614 = 'alpine-main-v3.12-updater', $14615 = '', $14616 = '0001-01-01 00:00:00+00', $14617 = 'https://www.cve.org/CVERecord?id=CVE-2019-14855', $14618 = '', $14619 = 'Unknown', $14620 = 'gnupg', $14621 = '', $14622 = '', $14623 = '', $14624 = 'source', $14625 = 'alpine', $14626 = 'Alpine Linux', $14627 = '', $14628 = '', $14629 = '3.12', $14630 = '', $14631 = '', $14632 = 'Alpine Linux v3.12', $14633 = '', $14634 = '', $14635 = '', $14636 = '2.2.18-r0', $14637 = 'invalid', $14638 = NULL, $14639 = '{}', $14640 = '{}', $14641 = 'md5', $14642 = '\x722322097649e1c15cd867487262903b', $14643 = 'CVE-2020-25125', $14644 = 'alpine-main-v3.12-updater', $14645 = '', $14646 = '0001-01-01 00:00:00+00', $14647 = 'https://www.cve.org/CVERecord?id=CVE-2020-25125', $14648 = '', $14649 = 'Unknown', $14650 = 'gnupg', $14651 = '', $14652 = '', $14653 = '', $14654 = 'source', $14655 = 'alpine', $14656 = 'Alpine Linux', $14657 = '', $14658 = '', $14659 = '3.12', $14660 = '', $14661 = '', $14662 = 'Alpine Linux v3.12', $14663 = '', $14664 = '', $14665 = '', $14666 = '2.2.23-r0', $14667 = 'invalid', $14668 = NULL, $14669 = '{}', $14670 = '{}', $14671 = 'md5', $14672 = '\x1a3ebf1b792b8ca35aaee5ac5d3ba379', $14673 = 'CVE-2018-12020', $14674 = 'alpine-main-v3.12-updater', $14675 = '', $14676 = '0001-01-01 00:00:00+00', $14677 = 'https://www.cve.org/CVERecord?id=CVE-2018-12020', $14678 = '', $14679 = 'Unknown', $14680 = 'gnupg', $14681 = '', $14682 = '', $14683 = '', $14684 = 'source', $14685 = 'alpine', $14686 = 'Alpine Linux', $14687 = '', $14688 = '', $14689 = '3.12', $14690 = '', $14691 = '', $14692 = 'Alpine Linux v3.12', $14693 = '', $14694 = '', $14695 = '', $14696 = '2.2.8-r0', $14697 = 'invalid', $14698 = NULL, $14699 = '{}', $14700 = '{}', $14701 = 'md5', $14702 = '\x45002cb0578ef6cf6ec570235dac9945', $14703 = 'CVE-2018-12020', $14704 = 'alpine-main-v3.12-updater', $14705 = '', $14706 = '0001-01-01 00:00:00+00', $14707 = 'https://www.cve.org/CVERecord?id=CVE-2018-12020', $14708 = '', $14709 = 'Unknown', $14710 = 'gnupg1', $14711 = '', $14712 = '', $14713 = '', $14714 = 'source', $14715 = 'alpine', $14716 = 'Alpine Linux', $14717 = '', $14718 = '', $14719 = '3.12', $14720 = '', $14721 = '', $14722 = 'Alpine Linux v3.12', $14723 = '', $14724 = '', $14725 = '', $14726 = '1.4.22-r1', $14727 = 'invalid', $14728 = NULL, $14729 = '{}', $14730 = '{}', $14731 = 'md5', $14732 = '\x6cfca8f51842167c92a5281273b6f896', $14733 = 'CVE-2017-7526', $14734 = 'alpine-main-v3.12-updater', $14735 = '', $14736 = '0001-01-01 00:00:00+00', $14737 = 'https://www.cve.org/CVERecord?id=CVE-2017-7526', $14738 = '', $14739 = 'Unknown', $14740 = 'gnupg1', $14741 = '', $14742 = '', $14743 = '', $14744 = 'source', $14745 = 'alpine', $14746 = 'Alpine Linux', $14747 = '', $14748 = '', $14749 = '3.12', $14750 = '', $14751 = '', $14752 = 'Alpine Linux v3.12', $14753 = '', $14754 = '', $14755 = '', $14756 = '1.4.23-r0', $14757 = 'invalid', $14758 = NULL, $14759 = '{}', $14760 = '{}', $14761 = 'md5', $14762 = '\xa7a312b2d80cb0799e330a0c12d6ce12', $14763 = 'CVE-2020-13777 GNUTLS-SA-2020-06-03', $14764 = 'alpine-main-v3.12-updater', $14765 = '', $14766 = '0001-01-01 00:00:00+00', $14767 = 'https://www.cve.org/CVERecord?id=CVE-2020-13777 GNUTLS-SA-2020-06-03', $14768 = '', $14769 = 'Unknown', $14770 = 'gnutls', $14771 = '', $14772 = '', $14773 = '', $14774 = 'source', $14775 = 'alpine', $14776 = 'Alpine Linux', $14777 = '', $14778 = '', $14779 = '3.12', $14780 = '', $14781 = '', $14782 = 'Alpine Linux v3.12', $14783 = '', $14784 = '', $14785 = '', $14786 = '3.6.14-r0', $14787 = 'invalid', $14788 = NULL, $14789 = '{}', $14790 = '{}', $14791 = 'md5', $14792 = '\x30c627d5198609588109fa756f557319', $14793 = 'CVE-2020-24659 GNUTLS-SA-2020-09-04', $14794 = 'alpine-main-v3.12-updater', $14795 = '', $14796 = '0001-01-01 00:00:00+00', $14797 = 'https://www.cve.org/CVERecord?id=CVE-2020-24659 GNUTLS-SA-2020-09-04', $14798 = '', $14799 = 'Unknown', $14800 = 'gnutls', $14801 = '', $14802 = '', $14803 = '', $14804 = 'source', $14805 = 'alpine', $14806 = 'Alpine Linux', $14807 = '', $14808 = '', $14809 = '3.12', $14810 = '', $14811 = '', $14812 = 'Alpine Linux v3.12', $14813 = '', $14814 = '', $14815 = '', $14816 = '3.6.15-r0', $14817 = 'invalid', $14818 = NULL, $14819 = '{}', $14820 = '{}', $14821 = 'md5', $14822 = '\x44e37acded0545400f942a309c89672e', $14823 = 'CVE-2021-20231', $14824 = 'alpine-main-v3.12-updater', $14825 = '', $14826 = '0001-01-01 00:00:00+00', $14827 = 'https://www.cve.org/CVERecord?id=CVE-2021-20231', $14828 = '', $14829 = 'Unknown', $14830 = 'gnutls', $14831 = '', $14832 = '', $14833 = '', $14834 = 'source', $14835 = 'alpine', $14836 = 'Alpine Linux', $14837 = '', $14838 = '', $14839 = '3.12', $14840 = '', $14841 = '', $14842 = 'Alpine Linux v3.12', $14843 = '', $14844 = '', $14845 = '', $14846 = '3.6.15-r1', $14847 = 'invalid', $14848 = NULL, $14849 = '{}', $14850 = '{}', $14851 = 'md5', $14852 = '\x66c08b20800723e032bdc9184ffcc16a', $14853 = 'CVE-2021-20232', $14854 = 'alpine-main-v3.12-updater', $14855 = '', $14856 = '0001-01-01 00:00:00+00', $14857 = 'https://www.cve.org/CVERecord?id=CVE-2021-20232', $14858 = '', $14859 = 'Unknown', $14860 = 'gnutls', $14861 = '', $14862 = '', $14863 = '', $14864 = 'source', $14865 = 'alpine', $14866 = 'Alpine Linux', $14867 = '', $14868 = '', $14869 = '3.12', $14870 = '', $14871 = '', $14872 = 'Alpine Linux v3.12', $14873 = '', $14874 = '', $14875 = '', $14876 = '3.6.15-r1', $14877 = 'invalid', $14878 = NULL, $14879 = '{}', $14880 = '{}', $14881 = 'md5', $14882 = '\x2a439978466b20a899034d4b40245da9', $14883 = 'CVE-2019-3836', $14884 = 'alpine-main-v3.12-updater', $14885 = '', $14886 = '0001-01-01 00:00:00+00', $14887 = 'https://www.cve.org/CVERecord?id=CVE-2019-3836', $14888 = '', $14889 = 'Unknown', $14890 = 'gnutls', $14891 = '', $14892 = '', $14893 = '', $14894 = 'source', $14895 = 'alpine', $14896 = 'Alpine Linux', $14897 = '', $14898 = '', $14899 = '3.12', $14900 = '', $14901 = '', $14902 = 'Alpine Linux v3.12', $14903 = '', $14904 = '', $14905 = '', $14906 = '3.6.7-r0', $14907 = 'invalid', $14908 = NULL, $14909 = '{}', $14910 = '{}', $14911 = 'md5', $14912 = '\x3f3b92c46b50cf6d2f6271e40be408e7', $14913 = 'CVE-2019-3829', $14914 = 'alpine-main-v3.12-updater', $14915 = '', $14916 = '0001-01-01 00:00:00+00', $14917 = 'https://www.cve.org/CVERecord?id=CVE-2019-3829', $14918 = '', $14919 = 'Unknown', $14920 = 'gnutls', $14921 = '', $14922 = '', $14923 = '', $14924 = 'source', $14925 = 'alpine', $14926 = 'Alpine Linux', $14927 = '', $14928 = '', $14929 = '3.12', $14930 = '', $14931 = '', $14932 = 'Alpine Linux v3.12', $14933 = '', $14934 = '', $14935 = '', $14936 = '3.6.7-r0', $14937 = 'invalid', $14938 = NULL, $14939 = '{}', $14940 = '{}', $14941 = 'md5', $14942 = '\x604bf569d75ca16b6bf8ae481b4915af', $14943 = 'CVE-2017-7507', $14944 = 'alpine-main-v3.12-updater', $14945 = '', $14946 = '0001-01-01 00:00:00+00', $14947 = 'https://www.cve.org/CVERecord?id=CVE-2017-7507', $14948 = '', $14949 = 'Unknown', $14950 = 'gnutls', $14951 = '', $14952 = '', $14953 = '', $14954 = 'source', $14955 = 'alpine', $14956 = 'Alpine Linux', $14957 = '', $14958 = '', $14959 = '3.12', $14960 = '', $14961 = '', $14962 = 'Alpine Linux v3.12', $14963 = '', $14964 = '', $14965 = '', $14966 = '3.5.13-r0', $14967 = 'invalid', $14968 = NULL, $14969 = '{}', $14970 = '{}', $14971 = 'md5', $14972 = '\xd59039ed7cf12908b4dd8b3b9e7a7793', $14973 = 'CVE-2020-11501 GNUTLS-SA-2020-03-31', $14974 = 'alpine-main-v3.12-updater', $14975 = '', $14976 = '0001-01-01 00:00:00+00', $14977 = 'https://www.cve.org/CVERecord?id=CVE-2020-11501 GNUTLS-SA-2020-03-31', $14978 = '', $14979 = 'Unknown', $14980 = 'gnutls', $14981 = '', $14982 = '', $14983 = '', $14984 = 'source', $14985 = 'alpine', $14986 = 'Alpine Linux', $14987 = '', $14988 = '', $14989 = '3.12', $14990 = '', $14991 = '', $14992 = 'Alpine Linux v3.12', $14993 = '', $14994 = '', $14995 = '', $14996 = '3.6.13-r0', $14997 = 'invalid', $14998 = NULL, $14999 = '{}', $15000 = '{}', $15001 = 'md5', $15002 = '\xf4e39eb895836041f09141bb18e8e7c4', $15003 = 'CVE-2021-0308', $15004 = 'alpine-main-v3.12-updater', $15005 = '', $15006 = '0001-01-01 00:00:00+00', $15007 = 'https://www.cve.org/CVERecord?id=CVE-2021-0308', $15008 = '', $15009 = 'Unknown', $15010 = 'gptfdisk', $15011 = '', $15012 = '', $15013 = '', $15014 = 'source', $15015 = 'alpine', $15016 = 'Alpine Linux', $15017 = '', $15018 = '', $15019 = '3.12', $15020 = '', $15021 = '', $15022 = 'Alpine Linux v3.12', $15023 = '', $15024 = '', $15025 = '', $15026 = '1.0.6-r0', $15027 = 'invalid', $15028 = NULL, $15029 = '{}', $15030 = '{}', $15031 = 'md5', $15032 = '\x2baab46fad404606cdb307b6b9946fa8', $15033 = 'CVE-2020-18032', $15034 = 'alpine-main-v3.12-updater', $15035 = '', $15036 = '0001-01-01 00:00:00+00', $15037 = 'https://www.cve.org/CVERecord?id=CVE-2020-18032', $15038 = '', $15039 = 'Unknown', $15040 = 'graphviz', $15041 = '', $15042 = '', $15043 = '', $15044 = 'source', $15045 = 'alpine', $15046 = 'Alpine Linux', $15047 = '', $15048 = '', $15049 = '3.12', $15050 = '', $15051 = '', $15052 = 'Alpine Linux v3.12', $15053 = '', $15054 = '', $15055 = '', $15056 = '2.44.0-r1', $15057 = 'invalid', $15058 = NULL, $15059 = '{}', $15060 = '{}', $15061 = 'md5', $15062 = '\x581cf6af94b073bdacf480f724a612bf', $15063 = 'CVE-2019-9928', $15064 = 'alpine-main-v3.12-updater', $15065 = '', $15066 = '0001-01-01 00:00:00+00', $15067 = 'https://www.cve.org/CVERecord?id=CVE-2019-9928', $15068 = '', $15069 = 'Unknown', $15070 = 'gst-plugins-base', $15071 = '', $15072 = '', $15073 = '', $15074 = 'source', $15075 = 'alpine', $15076 = 'Alpine Linux', $15077 = '', $15078 = '', $15079 = '3.12', $15080 = '', $15081 = '', $15082 = 'Alpine Linux v3.12', $15083 = '', $15084 = '', $15085 = '', $15086 = '1.16.0-r0', $15087 = 'invalid', $15088 = NULL, $15089 = '{}', $15090 = '{}', $15091 = 'md5', $15092 = '\x856fa385809fbe6351c063c950398959', $15093 = 'CVE-2022-1271', $15094 = 'alpine-main-v3.12-updater', $15095 = '', $15096 = '0001-01-01 00:00:00+00', $15097 = 'https://www.cve.org/CVERecord?id=CVE-2022-1271', $15098 = '', $15099 = 'Unknown', $15100 = 'gzip', $15101 = '', $15102 = '', $15103 = '', $15104 = 'source', $15105 = 'alpine', $15106 = 'Alpine Linux', $15107 = '', $15108 = '', $15109 = '3.12', $15110 = '', $15111 = '', $15112 = 'Alpine Linux v3.12', $15113 = '', $15114 = '', $15115 = '', $15116 = '1.12-r0', $15117 = 'invalid', $15118 = NULL, $15119 = '{}', $15120 = '{}', $15121 = 'md5', $15122 = '\x25f6dafe8e40d0ae1d6520ef05eb187f', $15123 = 'CVE-2020-11100', $15124 = 'alpine-main-v3.12-updater', $15125 = '', $15126 = '0001-01-01 00:00:00+00', $15127 = 'https://www.cve.org/CVERecord?id=CVE-2020-11100', $15128 = '', $15129 = 'Unknown', $15130 = 'haproxy', $15131 = '', $15132 = '', $15133 = '', $15134 = 'source', $15135 = 'alpine', $15136 = 'Alpine Linux', $15137 = '', $15138 = '', $15139 = '3.12', $15140 = '', $15141 = '', $15142 = 'Alpine Linux v3.12', $15143 = '', $15144 = '', $15145 = '', $15146 = '2.1.4-r0', $15147 = 'invalid', $15148 = NULL, $15149 = '{}', $15150 = '{}', $15151 = 'md5', $15152 = '\x545b9ea68077921aff118ad17215acec', $15153 = 'CVE-2022-0711', $15154 = 'alpine-main-v3.12-updater', $15155 = '', $15156 = '0001-01-01 00:00:00+00', $15157 = 'https://www.cve.org/CVERecord?id=CVE-2022-0711', $15158 = '', $15159 = 'Unknown', $15160 = 'haproxy', $15161 = '', $15162 = '', $15163 = '', $15164 = 'source', $15165 = 'alpine', $15166 = 'Alpine Linux', $15167 = '', $15168 = '', $15169 = '3.12', $15170 = '', $15171 = '', $15172 = 'Alpine Linux v3.12', $15173 = '', $15174 = '', $15175 = '', $15176 = '2.2.21-r0', $15177 = 'invalid', $15178 = NULL, $15179 = '{}', $15180 = '{}', $15181 = 'md5', $15182 = '\x108e6b75168c6ae519be024491479780', $15183 = 'CVE-2021-29133', $15184 = 'alpine-main-v3.12-updater', $15185 = '', $15186 = '0001-01-01 00:00:00+00', $15187 = 'https://www.cve.org/CVERecord?id=CVE-2021-29133', $15188 = '', $15189 = 'Unknown', $15190 = 'haserl', $15191 = '', $15192 = '', $15193 = '', $15194 = 'source', $15195 = 'alpine', $15196 = 'Alpine Linux', $15197 = '', $15198 = '', $15199 = '3.12', $15200 = '', $15201 = '', $15202 = 'Alpine Linux v3.12', $15203 = '', $15204 = '', $15205 = '', $15206 = '0.9.36-r0', $15207 = 'invalid', $15208 = NULL, $15209 = '{}', $15210 = '{}', $15211 = 'md5', $15212 = '\xda111ebe0d5ebcc686fa7a9d0fe33583', $15213 = 'CVE-2017-17439', $15214 = 'alpine-main-v3.12-updater', $15215 = '', $15216 = '0001-01-01 00:00:00+00', $15217 = 'https://www.cve.org/CVERecord?id=CVE-2017-17439', $15218 = '', $15219 = 'Unknown', $15220 = 'heimdal', $15221 = '', $15222 = '', $15223 = '', $15224 = 'source', $15225 = 'alpine', $15226 = 'Alpine Linux', $15227 = '', $15228 = '', $15229 = '3.12', $15230 = '', $15231 = '', $15232 = 'Alpine Linux v3.12', $15233 = '', $15234 = '', $15235 = '', $15236 = '7.4.0-r2', $15237 = 'invalid', $15238 = NULL, $15239 = '{}', $15240 = '{}', $15241 = 'md5', $15242 = '\x382eac4fc50fb91a7a3951ffa28f619d', $15243 = 'CVE-2018-16860', $15244 = 'alpine-main-v3.12-updater', $15245 = '', $15246 = '0001-01-01 00:00:00+00', $15247 = 'https://www.cve.org/CVERecord?id=CVE-2018-16860', $15248 = '', $15249 = 'Unknown', $15250 = 'heimdal', $15251 = '', $15252 = '', $15253 = '', $15254 = 'source', $15255 = 'alpine', $15256 = 'Alpine Linux', $15257 = '', $15258 = '', $15259 = '3.12', $15260 = '', $15261 = '', $15262 = 'Alpine Linux v3.12', $15263 = '', $15264 = '', $15265 = '', $15266 = '7.5.3-r4', $15267 = 'invalid', $15268 = NULL, $15269 = '{}', $15270 = '{}', $15271 = 'md5', $15272 = '\x691d1f0caea428342fde111b12a2bd29', $15273 = 'CVE-2017-11103', $15274 = 'alpine-main-v3.12-updater', $15275 = '', $15276 = '0001-01-01 00:00:00+00', $15277 = 'https://www.cve.org/CVERecord?id=CVE-2017-11103', $15278 = '', $15279 = 'Unknown', $15280 = 'heimdal', $15281 = '', $15282 = '', $15283 = '', $15284 = 'source', $15285 = 'alpine', $15286 = 'Alpine Linux', $15287 = '', $15288 = '', $15289 = '3.12', $15290 = '', $15291 = '', $15292 = 'Alpine Linux v3.12', $15293 = '', $15294 = '', $15295 = '', $15296 = '7.4.0-r0', $15297 = 'invalid', $15298 = NULL, $15299 = '{}', $15300 = '{}', $15301 = 'md5', $15302 = '\x388959bb35257048851779fcdc886538', $15303 = 'CVE-2017-13077', $15304 = 'alpine-main-v3.12-updater', $15305 = '', $15306 = '0001-01-01 00:00:00+00', $15307 = 'https://www.cve.org/CVERecord?id=CVE-2017-13077', $15308 = '', $15309 = 'Unknown', $15310 = 'hostapd', $15311 = '', $15312 = '', $15313 = '', $15314 = 'source', $15315 = 'alpine', $15316 = 'Alpine Linux', $15317 = '', $15318 = '', $15319 = '3.12', $15320 = '', $15321 = '', $15322 = 'Alpine Linux v3.12', $15323 = '', $15324 = '', $15325 = '', $15326 = '2.6-r2', $15327 = 'invalid', $15328 = NULL, $15329 = '{}', $15330 = '{}', $15331 = 'md5', $15332 = '\x711881f309e85332a3d8a8feb5fc6488', $15333 = 'CVE-2017-13078', $15334 = 'alpine-main-v3.12-updater', $15335 = '', $15336 = '0001-01-01 00:00:00+00', $15337 = 'https://www.cve.org/CVERecord?id=CVE-2017-13078', $15338 = '', $15339 = 'Unknown', $15340 = 'hostapd', $15341 = '', $15342 = '', $15343 = '', $15344 = 'source', $15345 = 'alpine', $15346 = 'Alpine Linux', $15347 = '', $15348 = '', $15349 = '3.12', $15350 = '', $15351 = '', $15352 = 'Alpine Linux v3.12', $15353 = '', $15354 = '', $15355 = '', $15356 = '2.6-r2', $15357 = 'invalid', $15358 = NULL, $15359 = '{}', $15360 = '{}', $15361 = 'md5', $15362 = '\x2a8b33e814ba1efe26d1078c0c6f4c47', $15363 = 'CVE-2017-13079', $15364 = 'alpine-main-v3.12-updater', $15365 = '', $15366 = '0001-01-01 00:00:00+00', $15367 = 'https://www.cve.org/CVERecord?id=CVE-2017-13079', $15368 = '', $15369 = 'Unknown', $15370 = 'hostapd', $15371 = '', $15372 = '', $15373 = '', $15374 = 'source', $15375 = 'alpine', $15376 = 'Alpine Linux', $15377 = '', $15378 = '', $15379 = '3.12', $15380 = '', $15381 = '', $15382 = 'Alpine Linux v3.12', $15383 = '', $15384 = '', $15385 = '', $15386 = '2.6-r2', $15387 = 'invalid', $15388 = NULL, $15389 = '{}', $15390 = '{}', $15391 = 'md5', $15392 = '\xfea2ed6325f3e69c5473a37ef58e9718', $15393 = 'CVE-2017-13080', $15394 = 'alpine-main-v3.12-updater', $15395 = '', $15396 = '0001-01-01 00:00:00+00', $15397 = 'https://www.cve.org/CVERecord?id=CVE-2017-13080', $15398 = '', $15399 = 'Unknown', $15400 = 'hostapd', $15401 = '', $15402 = '', $15403 = '', $15404 = 'source', $15405 = 'alpine', $15406 = 'Alpine Linux', $15407 = '', $15408 = '', $15409 = '3.12', $15410 = '', $15411 = '', $15412 = 'Alpine Linux v3.12', $15413 = '', $15414 = '', $15415 = '', $15416 = '2.6-r2', $15417 = 'invalid', $15418 = NULL, $15419 = '{}', $15420 = '{}', $15421 = 'md5', $15422 = '\xabab07afe4f7884ab7c38fde9327fc4e', $15423 = 'CVE-2017-13081', $15424 = 'alpine-main-v3.12-updater', $15425 = '', $15426 = '0001-01-01 00:00:00+00', $15427 = 'https://www.cve.org/CVERecord?id=CVE-2017-13081', $15428 = '', $15429 = 'Unknown', $15430 = 'hostapd', $15431 = '', $15432 = '', $15433 = '', $15434 = 'source', $15435 = 'alpine', $15436 = 'Alpine Linux', $15437 = '', $15438 = '', $15439 = '3.12', $15440 = '', $15441 = '', $15442 = 'Alpine Linux v3.12', $15443 = '', $15444 = '', $15445 = '', $15446 = '2.6-r2', $15447 = 'invalid', $15448 = NULL, $15449 = '{}', $15450 = '{}', $15451 = 'md5', $15452 = '\x0852101a1ca69e9d56b0384e40be72d8', $15453 = 'CVE-2017-13082', $15454 = 'alpine-main-v3.12-updater', $15455 = '', $15456 = '0001-01-01 00:00:00+00', $15457 = 'https://www.cve.org/CVERecord?id=CVE-2017-13082', $15458 = '', $15459 = 'Unknown', $15460 = 'hostapd', $15461 = '', $15462 = '', $15463 = '', $15464 = 'source', $15465 = 'alpine', $15466 = 'Alpine Linux', $15467 = '', $15468 = '', $15469 = '3.12', $15470 = '', $15471 = '', $15472 = 'Alpine Linux v3.12', $15473 = '', $15474 = '', $15475 = '', $15476 = '2.6-r2', $15477 = 'invalid', $15478 = NULL, $15479 = '{}', $15480 = '{}', $15481 = 'md5', $15482 = '\xe5e07e1829b7ab45b4de74510d0ca309', $15483 = 'CVE-2017-13086', $15484 = 'alpine-main-v3.12-updater', $15485 = '', $15486 = '0001-01-01 00:00:00+00', $15487 = 'https://www.cve.org/CVERecord?id=CVE-2017-13086', $15488 = '', $15489 = 'Unknown', $15490 = 'hostapd', $15491 = '', $15492 = '', $15493 = '', $15494 = 'source', $15495 = 'alpine', $15496 = 'Alpine Linux', $15497 = '', $15498 = '', $15499 = '3.12', $15500 = '', $15501 = '', $15502 = 'Alpine Linux v3.12', $15503 = '', $15504 = '', $15505 = '', $15506 = '2.6-r2', $15507 = 'invalid', $15508 = NULL, $15509 = '{}', $15510 = '{}', $15511 = 'md5', $15512 = '\x7be4daf0db407c50b0c0cf66dbc1b18f', $15513 = 'CVE-2017-13087', $15514 = 'alpine-main-v3.12-updater', $15515 = '', $15516 = '0001-01-01 00:00:00+00', $15517 = 'https://www.cve.org/CVERecord?id=CVE-2017-13087', $15518 = '', $15519 = 'Unknown', $15520 = 'hostapd', $15521 = '', $15522 = '', $15523 = '', $15524 = 'source', $15525 = 'alpine', $15526 = 'Alpine Linux', $15527 = '', $15528 = '', $15529 = '3.12', $15530 = '', $15531 = '', $15532 = 'Alpine Linux v3.12', $15533 = '', $15534 = '', $15535 = '', $15536 = '2.6-r2', $15537 = 'invalid', $15538 = NULL, $15539 = '{}', $15540 = '{}', $15541 = 'md5', $15542 = '\xd569cde930330f1efff546e5116cde85', $15543 = 'CVE-2017-13088', $15544 = 'alpine-main-v3.12-updater', $15545 = '', $15546 = '0001-01-01 00:00:00+00', $15547 = 'https://www.cve.org/CVERecord?id=CVE-2017-13088', $15548 = '', $15549 = 'Unknown', $15550 = 'hostapd', $15551 = '', $15552 = '', $15553 = '', $15554 = 'source', $15555 = 'alpine', $15556 = 'Alpine Linux', $15557 = '', $15558 = '', $15559 = '3.12', $15560 = '', $15561 = '', $15562 = 'Alpine Linux v3.12', $15563 = '', $15564 = '', $15565 = '', $15566 = '2.6-r2', $15567 = 'invalid', $15568 = NULL, $15569 = '{}', $15570 = '{}', $15571 = 'md5', $15572 = '\xf442f9f904da0318b7c441a551708d5a', $15573 = 'CVE-2019-11555', $15574 = 'alpine-main-v3.12-updater', $15575 = '', $15576 = '0001-01-01 00:00:00+00', $15577 = 'https://www.cve.org/CVERecord?id=CVE-2019-11555', $15578 = '', $15579 = 'Unknown', $15580 = 'hostapd', $15581 = '', $15582 = '', $15583 = '', $15584 = 'source', $15585 = 'alpine', $15586 = 'Alpine Linux', $15587 = '', $15588 = '', $15589 = '3.12', $15590 = '', $15591 = '', $15592 = 'Alpine Linux v3.12', $15593 = '', $15594 = '', $15595 = '', $15596 = '2.8-r0', $15597 = 'invalid', $15598 = NULL, $15599 = '{}', $15600 = '{}', $15601 = 'md5', $15602 = '\x0706f303c25ed5221cfd89877da2e013', $15603 = 'CVE-2019-9496', $15604 = 'alpine-main-v3.12-updater', $15605 = '', $15606 = '0001-01-01 00:00:00+00', $15607 = 'https://www.cve.org/CVERecord?id=CVE-2019-9496', $15608 = '', $15609 = 'Unknown', $15610 = 'hostapd', $15611 = '', $15612 = '', $15613 = '', $15614 = 'source', $15615 = 'alpine', $15616 = 'Alpine Linux', $15617 = '', $15618 = '', $15619 = '3.12', $15620 = '', $15621 = '', $15622 = 'Alpine Linux v3.12', $15623 = '', $15624 = '', $15625 = '', $15626 = '2.8-r0', $15627 = 'invalid', $15628 = NULL, $15629 = '{}', $15630 = '{}', $15631 = 'md5', $15632 = '\x223d732a297c030deb6cb5349a746b10', $15633 = 'CVE-2019-16275', $15634 = 'alpine-main-v3.12-updater', $15635 = '', $15636 = '0001-01-01 00:00:00+00', $15637 = 'https://www.cve.org/CVERecord?id=CVE-2019-16275', $15638 = '', $15639 = 'Unknown', $15640 = 'hostapd', $15641 = '', $15642 = '', $15643 = '', $15644 = 'source', $15645 = 'alpine', $15646 = 'Alpine Linux', $15647 = '', $15648 = '', $15649 = '3.12', $15650 = '', $15651 = '', $15652 = 'Alpine Linux v3.12', $15653 = '', $15654 = '', $15655 = '', $15656 = '2.9-r1', $15657 = 'invalid', $15658 = NULL, $15659 = '{}', $15660 = '{}', $15661 = 'md5', $15662 = '\x502484505c66b48f885773328424b2c8', $15663 = 'CVE-2020-12695', $15664 = 'alpine-main-v3.12-updater', $15665 = '', $15666 = '0001-01-01 00:00:00+00', $15667 = 'https://www.cve.org/CVERecord?id=CVE-2020-12695', $15668 = '', $15669 = 'Unknown', $15670 = 'hostapd', $15671 = '', $15672 = '', $15673 = '', $15674 = 'source', $15675 = 'alpine', $15676 = 'Alpine Linux', $15677 = '', $15678 = '', $15679 = '3.12', $15680 = '', $15681 = '', $15682 = 'Alpine Linux v3.12', $15683 = '', $15684 = '', $15685 = '', $15686 = '2.9-r2', $15687 = 'invalid', $15688 = NULL, $15689 = '{}', $15690 = '{}', $15691 = 'md5', $15692 = '\x8ee3eff4bee0830cdf4fcc553695b6b3', $15693 = 'CVE-2021-30004', $15694 = 'alpine-main-v3.12-updater', $15695 = '', $15696 = '0001-01-01 00:00:00+00', $15697 = 'https://www.cve.org/CVERecord?id=CVE-2021-30004', $15698 = '', $15699 = 'Unknown', $15700 = 'hostapd', $15701 = '', $15702 = '', $15703 = '', $15704 = 'source', $15705 = 'alpine', $15706 = 'Alpine Linux', $15707 = '', $15708 = '', $15709 = '3.12', $15710 = '', $15711 = '', $15712 = 'Alpine Linux v3.12', $15713 = '', $15714 = '', $15715 = '', $15716 = '2.9-r3', $15717 = 'invalid', $15718 = NULL, $15719 = '{}', $15720 = '{}', $15721 = 'md5', $15722 = '\xeb2d3bc471ba7fdf72a97741f44c2dc6', $15723 = 'CVE-2022-23303', $15724 = 'alpine-main-v3.12-updater', $15725 = '', $15726 = '0001-01-01 00:00:00+00', $15727 = 'https://www.cve.org/CVERecord?id=CVE-2022-23303', $15728 = '', $15729 = 'Unknown', $15730 = 'hostapd', $15731 = '', $15732 = '', $15733 = '', $15734 = 'source', $15735 = 'alpine', $15736 = 'Alpine Linux', $15737 = '', $15738 = '', $15739 = '3.12', $15740 = '', $15741 = '', $15742 = 'Alpine Linux v3.12', $15743 = '', $15744 = '', $15745 = '', $15746 = '2.9-r4', $15747 = 'invalid', $15748 = NULL, $15749 = '{}', $15750 = '{}', $15751 = 'md5', $15752 = '\xe5b53b95c511b61333975ec702d4ac97', $15753 = 'CVE-2022-23304', $15754 = 'alpine-main-v3.12-updater', $15755 = '', $15756 = '0001-01-01 00:00:00+00', $15757 = 'https://www.cve.org/CVERecord?id=CVE-2022-23304', $15758 = '', $15759 = 'Unknown', $15760 = 'hostapd', $15761 = '', $15762 = '', $15763 = '', $15764 = 'source', $15765 = 'alpine', $15766 = 'Alpine Linux', $15767 = '', $15768 = '', $15769 = '3.12', $15770 = '', $15771 = '', $15772 = 'Alpine Linux v3.12', $15773 = '', $15774 = '', $15775 = '', $15776 = '2.9-r4', $15777 = 'invalid', $15778 = NULL, $15779 = '{}', $15780 = '{}', $15781 = 'md5', $15782 = '\xd11804f0cf6a553f8c5a3eab8b3be81c', $15783 = 'CVE-2019-16707', $15784 = 'alpine-main-v3.12-updater', $15785 = '', $15786 = '0001-01-01 00:00:00+00', $15787 = 'https://www.cve.org/CVERecord?id=CVE-2019-16707', $15788 = '', $15789 = 'Unknown', $15790 = 'hunspell', $15791 = '', $15792 = '', $15793 = '', $15794 = 'source', $15795 = 'alpine', $15796 = 'Alpine Linux', $15797 = '', $15798 = '', $15799 = '3.12', $15800 = '', $15801 = '', $15802 = 'Alpine Linux v3.12', $15803 = '', $15804 = '', $15805 = '', $15806 = '1.7.0-r1', $15807 = 'invalid', $15808 = NULL, $15809 = '{}', $15810 = '{}', $15811 = 'md5', $15812 = '\xe6d619110e00922f06bab0b7d0f6b936', $15813 = 'CVE-2018-17141', $15814 = 'alpine-main-v3.12-updater', $15815 = '', $15816 = '0001-01-01 00:00:00+00', $15817 = 'https://www.cve.org/CVERecord?id=CVE-2018-17141', $15818 = '', $15819 = 'Unknown', $15820 = 'hylafax', $15821 = '', $15822 = '', $15823 = '', $15824 = 'source', $15825 = 'alpine', $15826 = 'Alpine Linux', $15827 = '', $15828 = '', $15829 = '3.12', $15830 = '', $15831 = '', $15832 = 'Alpine Linux v3.12', $15833 = '', $15834 = '', $15835 = '', $15836 = '6.0.6-r5', $15837 = 'invalid', $15838 = NULL, $15839 = '{}', $15840 = '{}', $15841 = 'md5', $15842 = '\xa446bef1e8ae9b0b83ab566d91a803c2', $15843 = 'CVE-2020-15396', $15844 = 'alpine-main-v3.12-updater', $15845 = '', $15846 = '0001-01-01 00:00:00+00', $15847 = 'https://www.cve.org/CVERecord?id=CVE-2020-15396', $15848 = '', $15849 = 'Unknown', $15850 = 'hylafaxplus', $15851 = '', $15852 = '', $15853 = '', $15854 = 'source', $15855 = 'alpine', $15856 = 'Alpine Linux', $15857 = '', $15858 = '', $15859 = '3.12', $15860 = '', $15861 = '', $15862 = 'Alpine Linux v3.12', $15863 = '', $15864 = '', $15865 = '', $15866 = '7.0.2-r2', $15867 = 'invalid', $15868 = NULL, $15869 = '{}', $15870 = '{}', $15871 = 'md5', $15872 = '\x65e3a711cede5ab1772c4dc417e84729', $15873 = 'CVE-2020-15397', $15874 = 'alpine-main-v3.12-updater', $15875 = '', $15876 = '0001-01-01 00:00:00+00', $15877 = 'https://www.cve.org/CVERecord?id=CVE-2020-15397', $15878 = '', $15879 = 'Unknown', $15880 = 'hylafaxplus', $15881 = '', $15882 = '', $15883 = '', $15884 = 'source', $15885 = 'alpine', $15886 = 'Alpine Linux', $15887 = '', $15888 = '', $15889 = '3.12', $15890 = '', $15891 = '', $15892 = 'Alpine Linux v3.12', $15893 = '', $15894 = '', $15895 = '', $15896 = '7.0.2-r2', $15897 = 'invalid', $15898 = NULL, $15899 = '{}', $15900 = '{}', $15901 = 'md5', $15902 = '\x90f72df6d3692c05a94f89ed74ea2c27', $15903 = 'CVE-2018-18820', $15904 = 'alpine-main-v3.12-updater', $15905 = '', $15906 = '0001-01-01 00:00:00+00', $15907 = 'https://www.cve.org/CVERecord?id=CVE-2018-18820', $15908 = '', $15909 = 'Unknown', $15910 = 'icecast', $15911 = '', $15912 = '', $15913 = '', $15914 = 'source', $15915 = 'alpine', $15916 = 'Alpine Linux', $15917 = '', $15918 = '', $15919 = '3.12', $15920 = '', $15921 = '', $15922 = 'Alpine Linux v3.12', $15923 = '', $15924 = '', $15925 = '', $15926 = '2.4.4-r0', $15927 = 'invalid', $15928 = NULL, $15929 = '{}', $15930 = '{}', $15931 = 'md5', $15932 = '\x73b68f04b361bd1dffcb34044d77c375', $15933 = 'CVE-2016-6293', $15934 = 'alpine-main-v3.12-updater', $15935 = '', $15936 = '0001-01-01 00:00:00+00', $15937 = 'https://www.cve.org/CVERecord?id=CVE-2016-6293', $15938 = '', $15939 = 'Unknown', $15940 = 'icu', $15941 = '', $15942 = '', $15943 = '', $15944 = 'source', $15945 = 'alpine', $15946 = 'Alpine Linux', $15947 = '', $15948 = '', $15949 = '3.12', $15950 = '', $15951 = '', $15952 = 'Alpine Linux v3.12', $15953 = '', $15954 = '', $15955 = '', $15956 = '57.1-r1', $15957 = 'invalid', $15958 = NULL, $15959 = '{}', $15960 = '{}', $15961 = 'md5', $15962 = '\x527490af2e6f2e89c85fc5bb4e9fdd92', $15963 = 'CVE-2016-7415', $15964 = 'alpine-main-v3.12-updater', $15965 = '', $15966 = '0001-01-01 00:00:00+00', $15967 = 'https://www.cve.org/CVERecord?id=CVE-2016-7415', $15968 = '', $15969 = 'Unknown', $15970 = 'icu', $15971 = '', $15972 = '', $15973 = '', $15974 = 'source', $15975 = 'alpine', $15976 = 'Alpine Linux', $15977 = '', $15978 = '', $15979 = '3.12', $15980 = '', $15981 = '', $15982 = 'Alpine Linux v3.12', $15983 = '', $15984 = '', $15985 = '', $15986 = '58.1-r1', $15987 = 'invalid', $15988 = NULL, $15989 = '{}', $15990 = '{}', $15991 = 'md5', $15992 = '\x975bab0d5714fcb85b40c481d55ca360', $15993 = 'CVE-2017-7867', $15994 = 'alpine-main-v3.12-updater', $15995 = '', $15996 = '0001-01-01 00:00:00+00', $15997 = 'https://www.cve.org/CVERecord?id=CVE-2017-7867', $15998 = '', $15999 = 'Unknown', $16000 = 'icu', $16001 = '', $16002 = '', $16003 = '', $16004 = 'source', $16005 = 'alpine', $16006 = 'Alpine Linux', $16007 = '', $16008 = '', $16009 = '3.12', $16010 = '', $16011 = '', $16012 = 'Alpine Linux v3.12', $16013 = '', $16014 = '', $16015 = '', $16016 = '58.2-r2', $16017 = 'invalid', $16018 = NULL, $16019 = '{}', $16020 = '{}', $16021 = 'md5', $16022 = '\x11745eaa9c1d3914355064542c34c36b', $16023 = 'CVE-2017-7868', $16024 = 'alpine-main-v3.12-updater', $16025 = '', $16026 = '0001-01-01 00:00:00+00', $16027 = 'https://www.cve.org/CVERecord?id=CVE-2017-7868', $16028 = '', $16029 = 'Unknown', $16030 = 'icu', $16031 = '', $16032 = '', $16033 = '', $16034 = 'source', $16035 = 'alpine', $16036 = 'Alpine Linux', $16037 = '', $16038 = '', $16039 = '3.12', $16040 = '', $16041 = '', $16042 = 'Alpine Linux v3.12', $16043 = '', $16044 = '', $16045 = '', $16046 = '58.2-r2', $16047 = 'invalid', $16048 = NULL, $16049 = '{}', $16050 = '{}', $16051 = 'md5', $16052 = '\x3117aa65d3265287233ef8011b516efc', $16053 = 'CVE-2020-10531', $16054 = 'alpine-main-v3.12-updater', $16055 = '', $16056 = '0001-01-01 00:00:00+00', $16057 = 'https://www.cve.org/CVERecord?id=CVE-2020-10531', $16058 = '', $16059 = 'Unknown', $16060 = 'icu', $16061 = '', $16062 = '', $16063 = '', $16064 = 'source', $16065 = 'alpine', $16066 = 'Alpine Linux', $16067 = '', $16068 = '', $16069 = '3.12', $16070 = '', $16071 = '', $16072 = 'Alpine Linux v3.12', $16073 = '', $16074 = '', $16075 = '', $16076 = '65.1-r1', $16077 = 'invalid', $16078 = NULL, $16079 = '{}', $16080 = '{}', $16081 = 'md5', $16082 = '\x878abafdbcc1262891b4075f9e5020db', $16083 = 'CVE-2019-20795', $16084 = 'alpine-main-v3.12-updater', $16085 = '', $16086 = '0001-01-01 00:00:00+00', $16087 = 'https://www.cve.org/CVERecord?id=CVE-2019-20795', $16088 = '', $16089 = 'Unknown', $16090 = 'iproute2', $16091 = '', $16092 = '', $16093 = '', $16094 = 'source', $16095 = 'alpine', $16096 = 'Alpine Linux', $16097 = '', $16098 = '', $16099 = '3.12', $16100 = '', $16101 = '', $16102 = 'Alpine Linux v3.12', $16103 = '', $16104 = '', $16105 = '', $16106 = '5.1.0-r0', $16107 = 'invalid', $16108 = NULL, $16109 = '{}', $16110 = '{}', $16111 = 'md5', $16112 = '\x0ac6de8d586857c0f18024656986ba47', $16113 = 'CVE-2021-29376', $16114 = 'alpine-main-v3.12-updater', $16115 = '', $16116 = '0001-01-01 00:00:00+00', $16117 = 'https://www.cve.org/CVERecord?id=CVE-2021-29376', $16118 = '', $16119 = 'Unknown', $16120 = 'ircii', $16121 = '', $16122 = '', $16123 = '', $16124 = 'source', $16125 = 'alpine', $16126 = 'Alpine Linux', $16127 = '', $16128 = '', $16129 = '3.12', $16130 = '', $16131 = '', $16132 = 'Alpine Linux v3.12', $16133 = '', $16134 = '', $16135 = '', $16136 = '20210314-r0', $16137 = 'invalid', $16138 = NULL, $16139 = '{}', $16140 = '{}', $16141 = 'md5', $16142 = '\x6142048bdd9d96e03b429fc4832f4fed', $16143 = 'CVE-2018-7050', $16144 = 'alpine-main-v3.12-updater', $16145 = '', $16146 = '0001-01-01 00:00:00+00', $16147 = 'https://www.cve.org/CVERecord?id=CVE-2018-7050', $16148 = '', $16149 = 'Unknown', $16150 = 'irssi', $16151 = '', $16152 = '', $16153 = '', $16154 = 'source', $16155 = 'alpine', $16156 = 'Alpine Linux', $16157 = '', $16158 = '', $16159 = '3.12', $16160 = '', $16161 = '', $16162 = 'Alpine Linux v3.12', $16163 = '', $16164 = '', $16165 = '', $16166 = '1.1.1-r0', $16167 = 'invalid', $16168 = NULL, $16169 = '{}', $16170 = '{}', $16171 = 'md5', $16172 = '\xd4f23af4ef6c0a3cab3b5414cf34e9d1', $16173 = 'CVE-2018-7051', $16174 = 'alpine-main-v3.12-updater', $16175 = '', $16176 = '0001-01-01 00:00:00+00', $16177 = 'https://www.cve.org/CVERecord?id=CVE-2018-7051', $16178 = '', $16179 = 'Unknown', $16180 = 'irssi', $16181 = '', $16182 = '', $16183 = '', $16184 = 'source', $16185 = 'alpine', $16186 = 'Alpine Linux', $16187 = '', $16188 = '', $16189 = '3.12', $16190 = '', $16191 = '', $16192 = 'Alpine Linux v3.12', $16193 = '', $16194 = '', $16195 = '', $16196 = '1.1.1-r0', $16197 = 'invalid', $16198 = NULL, $16199 = '{}', $16200 = '{}', $16201 = 'md5', $16202 = '\x1c61ffc3f2228c285353e9b7bf041645', $16203 = 'CVE-2018-7052', $16204 = 'alpine-main-v3.12-updater', $16205 = '', $16206 = '0001-01-01 00:00:00+00', $16207 = 'https://www.cve.org/CVERecord?id=CVE-2018-7052', $16208 = '', $16209 = 'Unknown', $16210 = 'irssi', $16211 = '', $16212 = '', $16213 = '', $16214 = 'source', $16215 = 'alpine', $16216 = 'Alpine Linux', $16217 = '', $16218 = '', $16219 = '3.12', $16220 = '', $16221 = '', $16222 = 'Alpine Linux v3.12', $16223 = '', $16224 = '', $16225 = '', $16226 = '1.1.1-r0', $16227 = 'invalid', $16228 = NULL, $16229 = '{}', $16230 = '{}', $16231 = 'md5', $16232 = '\xc1fce13271e63ea4bba1cf5c1da25dd4', $16233 = 'CVE-2018-7053', $16234 = 'alpine-main-v3.12-updater', $16235 = '', $16236 = '0001-01-01 00:00:00+00', $16237 = 'https://www.cve.org/CVERecord?id=CVE-2018-7053', $16238 = '', $16239 = 'Unknown', $16240 = 'irssi', $16241 = '', $16242 = '', $16243 = '', $16244 = 'source', $16245 = 'alpine', $16246 = 'Alpine Linux', $16247 = '', $16248 = '', $16249 = '3.12', $16250 = '', $16251 = '', $16252 = 'Alpine Linux v3.12', $16253 = '', $16254 = '', $16255 = '', $16256 = '1.1.1-r0', $16257 = 'invalid', $16258 = NULL, $16259 = '{}', $16260 = '{}', $16261 = 'md5', $16262 = '\x81eb4ecec4be5533013822793f21381f', $16263 = 'CVE-2018-7054', $16264 = 'alpine-main-v3.12-updater', $16265 = '', $16266 = '0001-01-01 00:00:00+00', $16267 = 'https://www.cve.org/CVERecord?id=CVE-2018-7054', $16268 = '', $16269 = 'Unknown', $16270 = 'irssi', $16271 = '', $16272 = '', $16273 = '', $16274 = 'source', $16275 = 'alpine', $16276 = 'Alpine Linux', $16277 = '', $16278 = '', $16279 = '3.12', $16280 = '', $16281 = '', $16282 = 'Alpine Linux v3.12', $16283 = '', $16284 = '', $16285 = '', $16286 = '1.1.1-r0', $16287 = 'invalid', $16288 = NULL, $16289 = '{}', $16290 = '{}', $16291 = 'md5', $16292 = '\x36967bd47c011b7a49f9c31347586120', $16293 = 'CVE-2019-5882', $16294 = 'alpine-main-v3.12-updater', $16295 = '', $16296 = '0001-01-01 00:00:00+00', $16297 = 'https://www.cve.org/CVERecord?id=CVE-2019-5882', $16298 = '', $16299 = 'Unknown', $16300 = 'irssi', $16301 = '', $16302 = '', $16303 = '', $16304 = 'source', $16305 = 'alpine', $16306 = 'Alpine Linux', $16307 = '', $16308 = '', $16309 = '3.12', $16310 = '', $16311 = '', $16312 = 'Alpine Linux v3.12', $16313 = '', $16314 = '', $16315 = '', $16316 = '1.1.2-r0', $16317 = 'invalid', $16318 = NULL, $16319 = '{}', $16320 = '{}', $16321 = 'md5', $16322 = '\x9aa59f6d783f90a9bc3f094ade060448', $16323 = 'CVE-2019-13045', $16324 = 'alpine-main-v3.12-updater', $16325 = '', $16326 = '0001-01-01 00:00:00+00', $16327 = 'https://www.cve.org/CVERecord?id=CVE-2019-13045', $16328 = '', $16329 = 'Unknown', $16330 = 'irssi', $16331 = '', $16332 = '', $16333 = '', $16334 = 'source', $16335 = 'alpine', $16336 = 'Alpine Linux', $16337 = '', $16338 = '', $16339 = '3.12', $16340 = '', $16341 = '', $16342 = 'Alpine Linux v3.12', $16343 = '', $16344 = '', $16345 = '', $16346 = '1.2.1-r0', $16347 = 'invalid', $16348 = NULL, $16349 = '{}', $16350 = '{}', $16351 = 'md5', $16352 = '\x46698931d9661263c2d12477b172b2eb', $16353 = 'CVE-2019-15717', $16354 = 'alpine-main-v3.12-updater', $16355 = '', $16356 = '0001-01-01 00:00:00+00', $16357 = 'https://www.cve.org/CVERecord?id=CVE-2019-15717', $16358 = '', $16359 = 'Unknown', $16360 = 'irssi', $16361 = '', $16362 = '', $16363 = '', $16364 = 'source', $16365 = 'alpine', $16366 = 'Alpine Linux', $16367 = '', $16368 = '', $16369 = '3.12', $16370 = '', $16371 = '', $16372 = 'Alpine Linux v3.12', $16373 = '', $16374 = '', $16375 = '', $16376 = '1.2.2-r0', $16377 = 'invalid', $16378 = NULL, $16379 = '{}', $16380 = '{}', $16381 = 'md5', $16382 = '\x0db4ad65ee0d70905ff1d2f113d33fbd', $16383 = 'CVE-2017-9468', $16384 = 'alpine-main-v3.12-updater', $16385 = '', $16386 = '0001-01-01 00:00:00+00', $16387 = 'https://www.cve.org/CVERecord?id=CVE-2017-9468', $16388 = '', $16389 = 'Unknown', $16390 = 'irssi', $16391 = '', $16392 = '', $16393 = '', $16394 = 'source', $16395 = 'alpine', $16396 = 'Alpine Linux', $16397 = '', $16398 = '', $16399 = '3.12', $16400 = '', $16401 = '', $16402 = 'Alpine Linux v3.12', $16403 = '', $16404 = '', $16405 = '', $16406 = '1.0.3-r0', $16407 = 'invalid', $16408 = NULL, $16409 = '{}', $16410 = '{}', $16411 = 'md5', $16412 = '\x1462a1b2e383b9dd1b6bb94c80837d32', $16413 = 'CVE-2017-9469', $16414 = 'alpine-main-v3.12-updater', $16415 = '', $16416 = '0001-01-01 00:00:00+00', $16417 = 'https://www.cve.org/CVERecord?id=CVE-2017-9469', $16418 = '', $16419 = 'Unknown', $16420 = 'irssi', $16421 = '', $16422 = '', $16423 = '', $16424 = 'source', $16425 = 'alpine', $16426 = 'Alpine Linux', $16427 = '', $16428 = '', $16429 = '3.12', $16430 = '', $16431 = '', $16432 = 'Alpine Linux v3.12', $16433 = '', $16434 = '', $16435 = '', $16436 = '1.0.3-r0', $16437 = 'invalid', $16438 = NULL, $16439 = '{}', $16440 = '{}', $16441 = 'md5', $16442 = '\x4165c875fa35a27f1daf58bcd3ac77ec', $16443 = 'CVE-2017-10965', $16444 = 'alpine-main-v3.12-updater', $16445 = '', $16446 = '0001-01-01 00:00:00+00', $16447 = 'https://www.cve.org/CVERecord?id=CVE-2017-10965', $16448 = '', $16449 = 'Unknown', $16450 = 'irssi', $16451 = '', $16452 = '', $16453 = '', $16454 = 'source', $16455 = 'alpine', $16456 = 'Alpine Linux', $16457 = '', $16458 = '', $16459 = '3.12', $16460 = '', $16461 = '', $16462 = 'Alpine Linux v3.12', $16463 = '', $16464 = '', $16465 = '', $16466 = '1.0.4-r0', $16467 = 'invalid', $16468 = NULL, $16469 = '{}', $16470 = '{}', $16471 = 'md5', $16472 = '\xc0e9bc1017a56da6e4df0c4a952b2328', $16473 = 'CVE-2017-10966', $16474 = 'alpine-main-v3.12-updater', $16475 = '', $16476 = '0001-01-01 00:00:00+00', $16477 = 'https://www.cve.org/CVERecord?id=CVE-2017-10966', $16478 = '', $16479 = 'Unknown', $16480 = 'irssi', $16481 = '', $16482 = '', $16483 = '', $16484 = 'source', $16485 = 'alpine', $16486 = 'Alpine Linux', $16487 = '', $16488 = '', $16489 = '3.12', $16490 = '', $16491 = '', $16492 = 'Alpine Linux v3.12', $16493 = '', $16494 = '', $16495 = '', $16496 = '1.0.4-r0', $16497 = 'invalid', $16498 = NULL, $16499 = '{}', $16500 = '{}', $16501 = 'md5', $16502 = '\x97efc92ed82b6e602f31e3a05709c3f8', $16503 = 'CVE-2017-15721', $16504 = 'alpine-main-v3.12-updater', $16505 = '', $16506 = '0001-01-01 00:00:00+00', $16507 = 'https://www.cve.org/CVERecord?id=CVE-2017-15721', $16508 = '', $16509 = 'Unknown', $16510 = 'irssi', $16511 = '', $16512 = '', $16513 = '', $16514 = 'source', $16515 = 'alpine', $16516 = 'Alpine Linux', $16517 = '', $16518 = '', $16519 = '3.12', $16520 = '', $16521 = '', $16522 = 'Alpine Linux v3.12', $16523 = '', $16524 = '', $16525 = '', $16526 = '1.0.5-r0', $16527 = 'invalid', $16528 = NULL, $16529 = '{}', $16530 = '{}', $16531 = 'md5', $16532 = '\x7e10d0aea17a6362331b2aeb1a14da08', $16533 = 'CVE-2017-15722', $16534 = 'alpine-main-v3.12-updater', $16535 = '', $16536 = '0001-01-01 00:00:00+00', $16537 = 'https://www.cve.org/CVERecord?id=CVE-2017-15722', $16538 = '', $16539 = 'Unknown', $16540 = 'irssi', $16541 = '', $16542 = '', $16543 = '', $16544 = 'source', $16545 = 'alpine', $16546 = 'Alpine Linux', $16547 = '', $16548 = '', $16549 = '3.12', $16550 = '', $16551 = '', $16552 = 'Alpine Linux v3.12', $16553 = '', $16554 = '', $16555 = '', $16556 = '1.0.5-r0', $16557 = 'invalid', $16558 = NULL, $16559 = '{}', $16560 = '{}', $16561 = 'md5', $16562 = '\x56e39ec84258ccd3d8da6d33bd908d90', $16563 = 'CVE-2017-15723', $16564 = 'alpine-main-v3.12-updater', $16565 = '', $16566 = '0001-01-01 00:00:00+00', $16567 = 'https://www.cve.org/CVERecord?id=CVE-2017-15723', $16568 = '', $16569 = 'Unknown', $16570 = 'irssi', $16571 = '', $16572 = '', $16573 = '', $16574 = 'source', $16575 = 'alpine', $16576 = 'Alpine Linux', $16577 = '', $16578 = '', $16579 = '3.12', $16580 = '', $16581 = '', $16582 = 'Alpine Linux v3.12', $16583 = '', $16584 = '', $16585 = '', $16586 = '1.0.5-r0', $16587 = 'invalid', $16588 = NULL, $16589 = '{}', $16590 = '{}', $16591 = 'md5', $16592 = '\xf22cfeaaeca9f4a87baf8a1814665099', $16593 = 'CVE-2017-15227', $16594 = 'alpine-main-v3.12-updater', $16595 = '', $16596 = '0001-01-01 00:00:00+00', $16597 = 'https://www.cve.org/CVERecord?id=CVE-2017-15227', $16598 = '', $16599 = 'Unknown', $16600 = 'irssi', $16601 = '', $16602 = '', $16603 = '', $16604 = 'source', $16605 = 'alpine', $16606 = 'Alpine Linux', $16607 = '', $16608 = '', $16609 = '3.12', $16610 = '', $16611 = '', $16612 = 'Alpine Linux v3.12', $16613 = '', $16614 = '', $16615 = '', $16616 = '1.0.5-r0', $16617 = 'invalid', $16618 = NULL, $16619 = '{}', $16620 = '{}', $16621 = 'md5', $16622 = '\x11f4f386a8e4c64aafda687a9435dd76', $16623 = 'CVE-2017-15228', $16624 = 'alpine-main-v3.12-updater', $16625 = '', $16626 = '0001-01-01 00:00:00+00', $16627 = 'https://www.cve.org/CVERecord?id=CVE-2017-15228', $16628 = '', $16629 = 'Unknown', $16630 = 'irssi', $16631 = '', $16632 = '', $16633 = '', $16634 = 'source', $16635 = 'alpine', $16636 = 'Alpine Linux', $16637 = '', $16638 = '', $16639 = '3.12', $16640 = '', $16641 = '', $16642 = 'Alpine Linux v3.12', $16643 = '', $16644 = '', $16645 = '', $16646 = '1.0.5-r0', $16647 = 'invalid', $16648 = NULL, $16649 = '{}', $16650 = '{}', $16651 = 'md5', $16652 = '\xda2582fd4e186fb8a8931411562b68a0', $16653 = 'CVE-2018-5205', $16654 = 'alpine-main-v3.12-updater', $16655 = '', $16656 = '0001-01-01 00:00:00+00', $16657 = 'https://www.cve.org/CVERecord?id=CVE-2018-5205', $16658 = '', $16659 = 'Unknown', $16660 = 'irssi', $16661 = '', $16662 = '', $16663 = '', $16664 = 'source', $16665 = 'alpine', $16666 = 'Alpine Linux', $16667 = '', $16668 = '', $16669 = '3.12', $16670 = '', $16671 = '', $16672 = 'Alpine Linux v3.12', $16673 = '', $16674 = '', $16675 = '', $16676 = '1.0.6-r0', $16677 = 'invalid', $16678 = NULL, $16679 = '{}', $16680 = '{}', $16681 = 'md5', $16682 = '\x9564f172bb1f0e728146570d52d4a97b', $16683 = 'CVE-2018-5206', $16684 = 'alpine-main-v3.12-updater', $16685 = '', $16686 = '0001-01-01 00:00:00+00', $16687 = 'https://www.cve.org/CVERecord?id=CVE-2018-5206', $16688 = '', $16689 = 'Unknown', $16690 = 'irssi', $16691 = '', $16692 = '', $16693 = '', $16694 = 'source', $16695 = 'alpine', $16696 = 'Alpine Linux', $16697 = '', $16698 = '', $16699 = '3.12', $16700 = '', $16701 = '', $16702 = 'Alpine Linux v3.12', $16703 = '', $16704 = '', $16705 = '', $16706 = '1.0.6-r0', $16707 = 'invalid', $16708 = NULL, $16709 = '{}', $16710 = '{}', $16711 = 'md5', $16712 = '\x840976f8b9bc2e2800aebba0be8ce764', $16713 = 'CVE-2018-5207', $16714 = 'alpine-main-v3.12-updater', $16715 = '', $16716 = '0001-01-01 00:00:00+00', $16717 = 'https://www.cve.org/CVERecord?id=CVE-2018-5207', $16718 = '', $16719 = 'Unknown', $16720 = 'irssi', $16721 = '', $16722 = '', $16723 = '', $16724 = 'source', $16725 = 'alpine', $16726 = 'Alpine Linux', $16727 = '', $16728 = '', $16729 = '3.12', $16730 = '', $16731 = '', $16732 = 'Alpine Linux v3.12', $16733 = '', $16734 = '', $16735 = '', $16736 = '1.0.6-r0', $16737 = 'invalid', $16738 = NULL, $16739 = '{}', $16740 = '{}', $16741 = 'md5', $16742 = '\x307f00399430e61a3275a638ce2da7c2', $16743 = 'CVE-2018-5208', $16744 = 'alpine-main-v3.12-updater', $16745 = '', $16746 = '0001-01-01 00:00:00+00', $16747 = 'https://www.cve.org/CVERecord?id=CVE-2018-5208', $16748 = '', $16749 = 'Unknown', $16750 = 'irssi', $16751 = '', $16752 = '', $16753 = '', $16754 = 'source', $16755 = 'alpine', $16756 = 'Alpine Linux', $16757 = '', $16758 = '', $16759 = '3.12', $16760 = '', $16761 = '', $16762 = 'Alpine Linux v3.12', $16763 = '', $16764 = '', $16765 = '', $16766 = '1.0.6-r0', $16767 = 'invalid', $16768 = NULL, $16769 = '{}', $16770 = '{}', $16771 = 'md5', $16772 = '\x4646950d95b5792f1d7276857ce2d459', $16773 = 'CVE-2020-36325', $16774 = 'alpine-main-v3.12-updater', $16775 = '', $16776 = '0001-01-01 00:00:00+00', $16777 = 'https://www.cve.org/CVERecord?id=CVE-2020-36325', $16778 = '', $16779 = 'Unknown', $16780 = 'jansson', $16781 = '', $16782 = '', $16783 = '', $16784 = 'source', $16785 = 'alpine', $16786 = 'Alpine Linux', $16787 = '', $16788 = '', $16789 = '3.12', $16790 = '', $16791 = '', $16792 = 'Alpine Linux v3.12', $16793 = '', $16794 = '', $16795 = '', $16796 = '0', $16797 = 'invalid', $16798 = NULL, $16799 = '{}', $16800 = '{}', $16801 = 'md5', $16802 = '\x5bed54bf568d5f4383fc4ae9c8137689', $16803 = 'CVE-2020-12268', $16804 = 'alpine-main-v3.12-updater', $16805 = '', $16806 = '0001-01-01 00:00:00+00', $16807 = 'https://www.cve.org/CVERecord?id=CVE-2020-12268', $16808 = '', $16809 = 'Unknown', $16810 = 'jbig2dec', $16811 = '', $16812 = '', $16813 = '', $16814 = 'source', $16815 = 'alpine', $16816 = 'Alpine Linux', $16817 = '', $16818 = '', $16819 = '3.12', $16820 = '', $16821 = '', $16822 = 'Alpine Linux v3.12', $16823 = '', $16824 = '', $16825 = '', $16826 = '0.18-r0', $16827 = 'invalid', $16828 = NULL, $16829 = '{}', $16830 = '{}', $16831 = 'md5', $16832 = '\x5d3629f11f985d3b1c8ae2d6db329fd4', $16833 = 'CVE-2016-4074', $16834 = 'alpine-main-v3.12-updater', $16835 = '', $16836 = '0001-01-01 00:00:00+00', $16837 = 'https://www.cve.org/CVERecord?id=CVE-2016-4074', $16838 = '', $16839 = 'Unknown', $16840 = 'jq', $16841 = '', $16842 = '', $16843 = '', $16844 = 'source', $16845 = 'alpine', $16846 = 'Alpine Linux', $16847 = '', $16848 = '', $16849 = '3.12', $16850 = '', $16851 = '', $16852 = 'Alpine Linux v3.12', $16853 = '', $16854 = '', $16855 = '', $16856 = '1.6_rc1-r0', $16857 = 'invalid', $16858 = NULL, $16859 = '{}', $16860 = '{}', $16861 = 'md5', $16862 = '\x2871b16e8df0e2aae100ef353f1561ef', $16863 = 'CVE-2020-12762', $16864 = 'alpine-main-v3.12-updater', $16865 = '', $16866 = '0001-01-01 00:00:00+00', $16867 = 'https://www.cve.org/CVERecord?id=CVE-2020-12762', $16868 = '', $16869 = 'Unknown', $16870 = 'json-c', $16871 = '', $16872 = '', $16873 = '', $16874 = 'source', $16875 = 'alpine', $16876 = 'Alpine Linux', $16877 = '', $16878 = '', $16879 = '3.12', $16880 = '', $16881 = '', $16882 = 'Alpine Linux v3.12', $16883 = '', $16884 = '', $16885 = '', $16886 = '0.14-r1', $16887 = 'invalid', $16888 = NULL, $16889 = '{}', $16890 = '{}', $16891 = 'md5', $16892 = '\xdb8ad10f69277fce1925b4ba2aa07b0b', $16893 = 'CVE-2018-14767', $16894 = 'alpine-main-v3.12-updater', $16895 = '', $16896 = '0001-01-01 00:00:00+00', $16897 = 'https://www.cve.org/CVERecord?id=CVE-2018-14767', $16898 = '', $16899 = 'Unknown', $16900 = 'kamailio', $16901 = '', $16902 = '', $16903 = '', $16904 = 'source', $16905 = 'alpine', $16906 = 'Alpine Linux', $16907 = '', $16908 = '', $16909 = '3.12', $16910 = '', $16911 = '', $16912 = 'Alpine Linux v3.12', $16913 = '', $16914 = '', $16915 = '', $16916 = '5.1.4-r0', $16917 = 'invalid', $16918 = NULL, $16919 = '{}', $16920 = '{}', $16921 = 'md5', $16922 = '\x964880fdd51ffd68c3080d17982f6f1d', $16923 = 'CVE-2020-28196', $16924 = 'alpine-main-v3.12-updater', $16925 = '', $16926 = '0001-01-01 00:00:00+00', $16927 = 'https://www.cve.org/CVERecord?id=CVE-2020-28196', $16928 = '', $16929 = 'Unknown', $16930 = 'krb5', $16931 = '', $16932 = '', $16933 = '', $16934 = 'source', $16935 = 'alpine', $16936 = 'Alpine Linux', $16937 = '', $16938 = '', $16939 = '3.12', $16940 = '', $16941 = '', $16942 = 'Alpine Linux v3.12', $16943 = '', $16944 = '', $16945 = '', $16946 = '1.18.3-r0', $16947 = 'invalid', $16948 = NULL, $16949 = '{}', $16950 = '{}', $16951 = 'md5', $16952 = '\xd2289f28994db5a31ccd78d9984ff494', $16953 = 'CVE-2021-36222', $16954 = 'alpine-main-v3.12-updater', $16955 = '', $16956 = '0001-01-01 00:00:00+00', $16957 = 'https://www.cve.org/CVERecord?id=CVE-2021-36222', $16958 = '', $16959 = 'Unknown', $16960 = 'krb5', $16961 = '', $16962 = '', $16963 = '', $16964 = 'source', $16965 = 'alpine', $16966 = 'Alpine Linux', $16967 = '', $16968 = '', $16969 = '3.12', $16970 = '', $16971 = '', $16972 = 'Alpine Linux v3.12', $16973 = '', $16974 = '', $16975 = '', $16976 = '1.18.4-r0', $16977 = 'invalid', $16978 = NULL, $16979 = '{}', $16980 = '{}', $16981 = 'md5', $16982 = '\xc4f3d0586f18d2fb4766bfe9c029925b', $16983 = 'CVE-2021-37750', $16984 = 'alpine-main-v3.12-updater', $16985 = '', $16986 = '0001-01-01 00:00:00+00', $16987 = 'https://www.cve.org/CVERecord?id=CVE-2021-37750', $16988 = '', $16989 = 'Unknown', $16990 = 'krb5', $16991 = '', $16992 = '', $16993 = '', $16994 = 'source', $16995 = 'alpine', $16996 = 'Alpine Linux', $16997 = '', $16998 = '', $16999 = '3.12', $17000 = '', $17001 = '', $17002 = 'Alpine Linux v3.12', $17003 = '', $17004 = '', $17005 = '', $17006 = '1.18.5-r0', $17007 = 'invalid', $17008 = NULL, $17009 = '{}', $17010 = '{}', $17011 = 'md5', $17012 = '\x23445bc986dbb4dc5963064d310548d4', $17013 = 'CVE-2017-15088', $17014 = 'alpine-main-v3.12-updater', $17015 = '', $17016 = '0001-01-01 00:00:00+00', $17017 = 'https://www.cve.org/CVERecord?id=CVE-2017-15088', $17018 = '', $17019 = 'Unknown', $17020 = 'krb5', $17021 = '', $17022 = '', $17023 = '', $17024 = 'source', $17025 = 'alpine', $17026 = 'Alpine Linux', $17027 = '', $17028 = '', $17029 = '3.12', $17030 = '', $17031 = '', $17032 = 'Alpine Linux v3.12', $17033 = '', $17034 = '', $17035 = '', $17036 = '1.15.3-r0', $17037 = 'invalid', $17038 = NULL, $17039 = '{}', $17040 = '{}', $17041 = 'md5', $17042 = '\xf8bda159f82edd03fd64130d1f00726e', $17043 = 'CVE-2018-5709', $17044 = 'alpine-main-v3.12-updater', $17045 = '', $17046 = '0001-01-01 00:00:00+00', $17047 = 'https://www.cve.org/CVERecord?id=CVE-2018-5709', $17048 = '', $17049 = 'Unknown', $17050 = 'krb5', $17051 = '', $17052 = '', $17053 = '', $17054 = 'source', $17055 = 'alpine', $17056 = 'Alpine Linux', $17057 = '', $17058 = '', $17059 = '3.12', $17060 = '', $17061 = '', $17062 = 'Alpine Linux v3.12', $17063 = '', $17064 = '', $17065 = '', $17066 = '1.15.3-r0', $17067 = 'invalid', $17068 = NULL, $17069 = '{}', $17070 = '{}', $17071 = 'md5', $17072 = '\x6d900a14d7dcccbb11141f98c6f84f19', $17073 = 'CVE-2018-5710', $17074 = 'alpine-main-v3.12-updater', $17075 = '', $17076 = '0001-01-01 00:00:00+00', $17077 = 'https://www.cve.org/CVERecord?id=CVE-2018-5710', $17078 = '', $17079 = 'Unknown', $17080 = 'krb5', $17081 = '', $17082 = '', $17083 = '', $17084 = 'source', $17085 = 'alpine', $17086 = 'Alpine Linux', $17087 = '', $17088 = '', $17089 = '3.12', $17090 = '', $17091 = '', $17092 = 'Alpine Linux v3.12', $17093 = '', $17094 = '', $17095 = '', $17096 = '1.15.3-r0', $17097 = 'invalid', $17098 = NULL, $17099 = '{}', $17100 = '{}', $17101 = 'md5', $17102 = '\xae63b964a63ebf4b880f18bc49f62746', $17103 = 'CVE-2018-20217', $17104 = 'alpine-main-v3.12-updater', $17105 = '', $17106 = '0001-01-01 00:00:00+00', $17107 = 'https://www.cve.org/CVERecord?id=CVE-2018-20217', $17108 = '', $17109 = 'Unknown', $17110 = 'krb5', $17111 = '', $17112 = '', $17113 = '', $17114 = 'source', $17115 = 'alpine', $17116 = 'Alpine Linux', $17117 = '', $17118 = '', $17119 = '3.12', $17120 = '', $17121 = '', $17122 = 'Alpine Linux v3.12', $17123 = '', $17124 = '', $17125 = '', $17126 = '1.15.4-r0', $17127 = 'invalid', $17128 = NULL, $17129 = '{}', $17130 = '{}', $17131 = 'md5', $17132 = '\x2249db9075ab5c0d3ed7311145baed8f', $17133 = 'CVE-2015-9099', $17134 = 'alpine-main-v3.12-updater', $17135 = '', $17136 = '0001-01-01 00:00:00+00', $17137 = 'https://www.cve.org/CVERecord?id=CVE-2015-9099', $17138 = '', $17139 = 'Unknown', $17140 = 'lame', $17141 = '', $17142 = '', $17143 = '', $17144 = 'source', $17145 = 'alpine', $17146 = 'Alpine Linux', $17147 = '', $17148 = '', $17149 = '3.12', $17150 = '', $17151 = '', $17152 = 'Alpine Linux v3.12', $17153 = '', $17154 = '', $17155 = '', $17156 = '3.99.5-r6', $17157 = 'invalid', $17158 = NULL, $17159 = '{}', $17160 = '{}', $17161 = 'md5', $17162 = '\xada7b11011f6373a14c2edd67d401bad', $17163 = 'CVE-2015-9100', $17164 = 'alpine-main-v3.12-updater', $17165 = '', $17166 = '0001-01-01 00:00:00+00', $17167 = 'https://www.cve.org/CVERecord?id=CVE-2015-9100', $17168 = '', $17169 = 'Unknown', $17170 = 'lame', $17171 = '', $17172 = '', $17173 = '', $17174 = 'source', $17175 = 'alpine', $17176 = 'Alpine Linux', $17177 = '', $17178 = '', $17179 = '3.12', $17180 = '', $17181 = '', $17182 = 'Alpine Linux v3.12', $17183 = '', $17184 = '', $17185 = '', $17186 = '3.99.5-r6', $17187 = 'invalid', $17188 = NULL, $17189 = '{}', $17190 = '{}', $17191 = 'md5', $17192 = '\x36b4ff60e239f35de573886b07fde766', $17193 = 'CVE-2017-9410', $17194 = 'alpine-main-v3.12-updater', $17195 = '', $17196 = '0001-01-01 00:00:00+00', $17197 = 'https://www.cve.org/CVERecord?id=CVE-2017-9410', $17198 = '', $17199 = 'Unknown', $17200 = 'lame', $17201 = '', $17202 = '', $17203 = '', $17204 = 'source', $17205 = 'alpine', $17206 = 'Alpine Linux', $17207 = '', $17208 = '', $17209 = '3.12', $17210 = '', $17211 = '', $17212 = 'Alpine Linux v3.12', $17213 = '', $17214 = '', $17215 = '', $17216 = '3.99.5-r6', $17217 = 'invalid', $17218 = NULL, $17219 = '{}', $17220 = '{}', $17221 = 'md5', $17222 = '\xf58f60f58ace846e0c75552ed2f01dc0', $17223 = 'CVE-2017-9411', $17224 = 'alpine-main-v3.12-updater', $17225 = '', $17226 = '0001-01-01 00:00:00+00', $17227 = 'https://www.cve.org/CVERecord?id=CVE-2017-9411', $17228 = '', $17229 = 'Unknown', $17230 = 'lame', $17231 = '', $17232 = '', $17233 = '', $17234 = 'source', $17235 = 'alpine', $17236 = 'Alpine Linux', $17237 = '', $17238 = '', $17239 = '3.12', $17240 = '', $17241 = '', $17242 = 'Alpine Linux v3.12', $17243 = '', $17244 = '', $17245 = '', $17246 = '3.99.5-r6', $17247 = 'invalid', $17248 = NULL, $17249 = '{}', $17250 = '{}', $17251 = 'md5', $17252 = '\xad8351bc20a291dd68ab04563fed0da4', $17253 = 'CVE-2017-9412', $17254 = 'alpine-main-v3.12-updater', $17255 = '', $17256 = '0001-01-01 00:00:00+00', $17257 = 'https://www.cve.org/CVERecord?id=CVE-2017-9412', $17258 = '', $17259 = 'Unknown', $17260 = 'lame', $17261 = '', $17262 = '', $17263 = '', $17264 = 'source', $17265 = 'alpine', $17266 = 'Alpine Linux', $17267 = '', $17268 = '', $17269 = '3.12', $17270 = '', $17271 = '', $17272 = 'Alpine Linux v3.12', $17273 = '', $17274 = '', $17275 = '', $17276 = '3.99.5-r6', $17277 = 'invalid', $17278 = NULL, $17279 = '{}', $17280 = '{}', $17281 = 'md5', $17282 = '\x02eec63796ebfdffcb55a21c0cdc4c6d', $17283 = 'CVE-2017-11720', $17284 = 'alpine-main-v3.12-updater', $17285 = '', $17286 = '0001-01-01 00:00:00+00', $17287 = 'https://www.cve.org/CVERecord?id=CVE-2017-11720', $17288 = '', $17289 = 'Unknown', $17290 = 'lame', $17291 = '', $17292 = '', $17293 = '', $17294 = 'source', $17295 = 'alpine', $17296 = 'Alpine Linux', $17297 = '', $17298 = '', $17299 = '3.12', $17300 = '', $17301 = '', $17302 = 'Alpine Linux v3.12', $17303 = '', $17304 = '', $17305 = '', $17306 = '3.99.5-r6', $17307 = 'invalid', $17308 = NULL, $17309 = '{}', $17310 = '{}', $17311 = 'md5', $17312 = '\xdb5fea2da7cada7c03ad29bdafc59d6f', $17313 = 'CVE-2016-10165', $17314 = 'alpine-main-v3.12-updater', $17315 = '', $17316 = '0001-01-01 00:00:00+00', $17317 = 'https://www.cve.org/CVERecord?id=CVE-2016-10165', $17318 = '', $17319 = 'Unknown', $17320 = 'lcms2', $17321 = '', $17322 = '', $17323 = '', $17324 = 'source', $17325 = 'alpine', $17326 = 'Alpine Linux', $17327 = '', $17328 = '', $17329 = '3.12', $17330 = '', $17331 = '', $17332 = 'Alpine Linux v3.12', $17333 = '', $17334 = '', $17335 = '', $17336 = '2.8-r1', $17337 = 'invalid', $17338 = NULL, $17339 = '{}', $17340 = '{}', $17341 = 'md5', $17342 = '\x2a18c5c789021a91ad377e808e177f82', $17343 = 'CVE-2018-16435', $17344 = 'alpine-main-v3.12-updater', $17345 = '', $17346 = '0001-01-01 00:00:00+00', $17347 = 'https://www.cve.org/CVERecord?id=CVE-2018-16435', $17348 = '', $17349 = 'Unknown', $17350 = 'lcms2', $17351 = '', $17352 = '', $17353 = '', $17354 = 'source', $17355 = 'alpine', $17356 = 'Alpine Linux', $17357 = '', $17358 = '', $17359 = '3.12', $17360 = '', $17361 = '', $17362 = 'Alpine Linux v3.12', $17363 = '', $17364 = '', $17365 = '', $17366 = '2.9-r1', $17367 = 'invalid', $17368 = NULL, $17369 = '{}', $17370 = '{}', $17371 = 'md5', $17372 = '\x336675478aea251a1ccbbb26aa7a19e5', $17373 = 'CVE-2018-1140', $17374 = 'alpine-main-v3.12-updater', $17375 = '', $17376 = '0001-01-01 00:00:00+00', $17377 = 'https://www.cve.org/CVERecord?id=CVE-2018-1140', $17378 = '', $17379 = 'Unknown', $17380 = 'ldb', $17381 = '', $17382 = '', $17383 = '', $17384 = 'source', $17385 = 'alpine', $17386 = 'Alpine Linux', $17387 = '', $17388 = '', $17389 = '3.12', $17390 = '', $17391 = '', $17392 = 'Alpine Linux v3.12', $17393 = '', $17394 = '', $17395 = '', $17396 = '1.3.5-r0', $17397 = 'invalid', $17398 = NULL, $17399 = '{}', $17400 = '{}', $17401 = 'md5', $17402 = '\xb01ed7b2789d988583f5204e6753ba05', $17403 = 'CVE-2017-1000231', $17404 = 'alpine-main-v3.12-updater', $17405 = '', $17406 = '0001-01-01 00:00:00+00', $17407 = 'https://www.cve.org/CVERecord?id=CVE-2017-1000231', $17408 = '', $17409 = 'Unknown', $17410 = 'ldns', $17411 = '', $17412 = '', $17413 = '', $17414 = 'source', $17415 = 'alpine', $17416 = 'Alpine Linux', $17417 = '', $17418 = '', $17419 = '3.12', $17420 = '', $17421 = '', $17422 = 'Alpine Linux v3.12', $17423 = '', $17424 = '', $17425 = '', $17426 = '1.7.0-r1', $17427 = 'invalid', $17428 = NULL, $17429 = '{}', $17430 = '{}', $17431 = 'md5', $17432 = '\xc25d1f1d9a80e2a145cdc54e989c301c', $17433 = 'CVE-2017-1000232', $17434 = 'alpine-main-v3.12-updater', $17435 = '', $17436 = '0001-01-01 00:00:00+00', $17437 = 'https://www.cve.org/CVERecord?id=CVE-2017-1000232', $17438 = '', $17439 = 'Unknown', $17440 = 'ldns', $17441 = '', $17442 = '', $17443 = '', $17444 = 'source', $17445 = 'alpine', $17446 = 'Alpine Linux', $17447 = '', $17448 = '', $17449 = '3.12', $17450 = '', $17451 = '', $17452 = 'Alpine Linux v3.12', $17453 = '', $17454 = '', $17455 = '', $17456 = '1.7.0-r1', $17457 = 'invalid', $17458 = NULL, $17459 = '{}', $17460 = '{}', $17461 = 'md5', $17462 = '\xc4103349c985d5f6edc4599c3aa9c9de', $17463 = 'CVE-2018-10916', $17464 = 'alpine-main-v3.12-updater', $17465 = '', $17466 = '0001-01-01 00:00:00+00', $17467 = 'https://www.cve.org/CVERecord?id=CVE-2018-10916', $17468 = '', $17469 = 'Unknown', $17470 = 'lftp', $17471 = '', $17472 = '', $17473 = '', $17474 = 'source', $17475 = 'alpine', $17476 = 'Alpine Linux', $17477 = '', $17478 = '', $17479 = '3.12', $17480 = '', $17481 = '', $17482 = 'Alpine Linux v3.12', $17483 = '', $17484 = '', $17485 = '', $17486 = '4.8.4-r0', $17487 = 'invalid', $17488 = NULL, $17489 = '{}', $17490 = '{}', $17491 = 'md5', $17492 = '\x67e99025fd14a2134d7d91d57ac8d564', $17493 = 'CVE-2017-11548', $17494 = 'alpine-main-v3.12-updater', $17495 = '', $17496 = '0001-01-01 00:00:00+00', $17497 = 'https://www.cve.org/CVERecord?id=CVE-2017-11548', $17498 = '', $17499 = 'Unknown', $17500 = 'libao', $17501 = '', $17502 = '', $17503 = '', $17504 = 'source', $17505 = 'alpine', $17506 = 'Alpine Linux', $17507 = '', $17508 = '', $17509 = '3.12', $17510 = '', $17511 = '', $17512 = 'Alpine Linux v3.12', $17513 = '', $17514 = '', $17515 = '', $17516 = '1.2.0-r3', $17517 = 'invalid', $17518 = NULL, $17519 = '{}', $17520 = '{}', $17521 = 'md5', $17522 = '\xc1949e81ebbdc2bf352e8e8940f43540', $17523 = 'CVE-2019-18408', $17524 = 'alpine-main-v3.12-updater', $17525 = '', $17526 = '0001-01-01 00:00:00+00', $17527 = 'https://www.cve.org/CVERecord?id=CVE-2019-18408', $17528 = '', $17529 = 'Unknown', $17530 = 'libarchive', $17531 = '', $17532 = '', $17533 = '', $17534 = 'source', $17535 = 'alpine', $17536 = 'Alpine Linux', $17537 = '', $17538 = '', $17539 = '3.12', $17540 = '', $17541 = '', $17542 = 'Alpine Linux v3.12', $17543 = '', $17544 = '', $17545 = '', $17546 = '3.4.0-r0', $17547 = 'invalid', $17548 = NULL, $17549 = '{}', $17550 = '{}', $17551 = 'md5', $17552 = '\xef5ed6372b0d0ed24f0e8f1b04caaae7', $17553 = 'CVE-2020-19221', $17554 = 'alpine-main-v3.12-updater', $17555 = '', $17556 = '0001-01-01 00:00:00+00', $17557 = 'https://www.cve.org/CVERecord?id=CVE-2020-19221', $17558 = '', $17559 = 'Unknown', $17560 = 'libarchive', $17561 = '', $17562 = '', $17563 = '', $17564 = 'source', $17565 = 'alpine', $17566 = 'Alpine Linux', $17567 = '', $17568 = '', $17569 = '3.12', $17570 = '', $17571 = '', $17572 = 'Alpine Linux v3.12', $17573 = '', $17574 = '', $17575 = '', $17576 = '3.4.2-r0', $17577 = 'invalid', $17578 = NULL, $17579 = '{}', $17580 = '{}', $17581 = 'md5', $17582 = '\x5ec61dfcdd823e36f70762db88ef653d', $17583 = 'CVE-2020-9308', $17584 = 'alpine-main-v3.12-updater', $17585 = '', $17586 = '0001-01-01 00:00:00+00', $17587 = 'https://www.cve.org/CVERecord?id=CVE-2020-9308', $17588 = '', $17589 = 'Unknown', $17590 = 'libarchive', $17591 = '', $17592 = '', $17593 = '', $17594 = 'source', $17595 = 'alpine', $17596 = 'Alpine Linux', $17597 = '', $17598 = '', $17599 = '3.12', $17600 = '', $17601 = '', $17602 = 'Alpine Linux v3.12', $17603 = '', $17604 = '', $17605 = '', $17606 = '3.4.2-r0', $17607 = 'invalid', $17608 = NULL, $17609 = '{}', $17610 = '{}', $17611 = 'md5', $17612 = '\x896aaefeb15ca86e221b4dbd44082977', $17613 = 'CVE-2017-14166', $17614 = 'alpine-main-v3.12-updater', $17615 = '', $17616 = '0001-01-01 00:00:00+00', $17617 = 'https://www.cve.org/CVERecord?id=CVE-2017-14166', $17618 = '', $17619 = 'Unknown', $17620 = 'libarchive', $17621 = '', $17622 = '', $17623 = '', $17624 = 'source', $17625 = 'alpine', $17626 = 'Alpine Linux', $17627 = '', $17628 = '', $17629 = '3.12', $17630 = '', $17631 = '', $17632 = 'Alpine Linux v3.12', $17633 = '', $17634 = '', $17635 = '', $17636 = '3.3.2-r1', $17637 = 'invalid', $17638 = NULL, $17639 = '{}', $17640 = '{}', $17641 = 'md5', $17642 = '\xdcea02215aff81de94a392734522cf5d', $17643 = 'CVE-2019-20367', $17644 = 'alpine-main-v3.12-updater', $17645 = '', $17646 = '0001-01-01 00:00:00+00', $17647 = 'https://www.cve.org/CVERecord?id=CVE-2019-20367', $17648 = '', $17649 = 'Unknown', $17650 = 'libbsd', $17651 = '', $17652 = '', $17653 = '', $17654 = 'source', $17655 = 'alpine', $17656 = 'Alpine Linux', $17657 = '', $17658 = '', $17659 = '3.12', $17660 = '', $17661 = '', $17662 = 'Alpine Linux v3.12', $17663 = '', $17664 = '', $17665 = '', $17666 = '0.10.0-r0', $17667 = 'invalid', $17668 = NULL, $17669 = '{}', $17670 = '{}', $17671 = 'md5', $17672 = '\x434338ea88c25215b84a3ae9bd2e163e', $17673 = 'CVE-2016-10195', $17674 = 'alpine-main-v3.12-updater', $17675 = '', $17676 = '0001-01-01 00:00:00+00', $17677 = 'https://www.cve.org/CVERecord?id=CVE-2016-10195', $17678 = '', $17679 = 'Unknown', $17680 = 'libevent', $17681 = '', $17682 = '', $17683 = '', $17684 = 'source', $17685 = 'alpine', $17686 = 'Alpine Linux', $17687 = '', $17688 = '', $17689 = '3.12', $17690 = '', $17691 = '', $17692 = 'Alpine Linux v3.12', $17693 = '', $17694 = '', $17695 = '', $17696 = '2.1.8-r0', $17697 = 'invalid', $17698 = NULL, $17699 = '{}', $17700 = '{}', $17701 = 'md5', $17702 = '\x0869e1ce789481d6606c96b4e01e85f1', $17703 = 'CVE-2016-10196', $17704 = 'alpine-main-v3.12-updater', $17705 = '', $17706 = '0001-01-01 00:00:00+00', $17707 = 'https://www.cve.org/CVERecord?id=CVE-2016-10196', $17708 = '', $17709 = 'Unknown', $17710 = 'libevent', $17711 = '', $17712 = '', $17713 = '', $17714 = 'source', $17715 = 'alpine', $17716 = 'Alpine Linux', $17717 = '', $17718 = '', $17719 = '3.12', $17720 = '', $17721 = '', $17722 = 'Alpine Linux v3.12', $17723 = '', $17724 = '', $17725 = '', $17726 = '2.1.8-r0', $17727 = 'invalid', $17728 = NULL, $17729 = '{}', $17730 = '{}', $17731 = 'md5', $17732 = '\x9956f4969af2abf29d1a88ab6fbe60f9', $17733 = 'CVE-2016-10197', $17734 = 'alpine-main-v3.12-updater', $17735 = '', $17736 = '0001-01-01 00:00:00+00', $17737 = 'https://www.cve.org/CVERecord?id=CVE-2016-10197', $17738 = '', $17739 = 'Unknown', $17740 = 'libevent', $17741 = '', $17742 = '', $17743 = '', $17744 = 'source', $17745 = 'alpine', $17746 = 'Alpine Linux', $17747 = '', $17748 = '', $17749 = '3.12', $17750 = '', $17751 = '', $17752 = 'Alpine Linux v3.12', $17753 = '', $17754 = '', $17755 = '', $17756 = '2.1.8-r0', $17757 = 'invalid', $17758 = NULL, $17759 = '{}', $17760 = '{}', $17761 = 'md5', $17762 = '\xef31c42a238a70ea7301d72722bb4da1', $17763 = 'CVE-2009-3895', $17764 = 'alpine-main-v3.12-updater', $17765 = '', $17766 = '0001-01-01 00:00:00+00', $17767 = 'https://www.cve.org/CVERecord?id=CVE-2009-3895', $17768 = '', $17769 = 'Unknown', $17770 = 'libexif', $17771 = '', $17772 = '', $17773 = '', $17774 = 'source', $17775 = 'alpine', $17776 = 'Alpine Linux', $17777 = '', $17778 = '', $17779 = '3.12', $17780 = '', $17781 = '', $17782 = 'Alpine Linux v3.12', $17783 = '', $17784 = '', $17785 = '', $17786 = '0.6.19-r0', $17787 = 'invalid', $17788 = NULL, $17789 = '{}', $17790 = '{}', $17791 = 'md5', $17792 = '\x76c09be8de143354210414fa3ead1115', $17793 = 'CVE-2012-2812', $17794 = 'alpine-main-v3.12-updater', $17795 = '', $17796 = '0001-01-01 00:00:00+00', $17797 = 'https://www.cve.org/CVERecord?id=CVE-2012-2812', $17798 = '', $17799 = 'Unknown', $17800 = 'libexif', $17801 = '', $17802 = '', $17803 = '', $17804 = 'source', $17805 = 'alpine', $17806 = 'Alpine Linux', $17807 = '', $17808 = '', $17809 = '3.12', $17810 = '', $17811 = '', $17812 = 'Alpine Linux v3.12', $17813 = '', $17814 = '', $17815 = '', $17816 = '0.6.21-r0', $17817 = 'invalid', $17818 = NULL, $17819 = '{}', $17820 = '{}', $17821 = 'md5', $17822 = '\x227e8b87dd4b47c0fb2fd91e9741c759', $17823 = 'CVE-2012-2813', $17824 = 'alpine-main-v3.12-updater', $17825 = '', $17826 = '0001-01-01 00:00:00+00', $17827 = 'https://www.cve.org/CVERecord?id=CVE-2012-2813', $17828 = '', $17829 = 'Unknown', $17830 = 'libexif', $17831 = '', $17832 = '', $17833 = '', $17834 = 'source', $17835 = 'alpine', $17836 = 'Alpine Linux', $17837 = '', $17838 = '', $17839 = '3.12', $17840 = '', $17841 = '', $17842 = 'Alpine Linux v3.12', $17843 = '', $17844 = '', $17845 = '', $17846 = '0.6.21-r0', $17847 = 'invalid', $17848 = NULL, $17849 = '{}', $17850 = '{}', $17851 = 'md5', $17852 = '\x8a26d0fda1bdf039c521137a99d9f26e', $17853 = 'CVE-2012-2814', $17854 = 'alpine-main-v3.12-updater', $17855 = '', $17856 = '0001-01-01 00:00:00+00', $17857 = 'https://www.cve.org/CVERecord?id=CVE-2012-2814', $17858 = '', $17859 = 'Unknown', $17860 = 'libexif', $17861 = '', $17862 = '', $17863 = '', $17864 = 'source', $17865 = 'alpine', $17866 = 'Alpine Linux', $17867 = '', $17868 = '', $17869 = '3.12', $17870 = '', $17871 = '', $17872 = 'Alpine Linux v3.12', $17873 = '', $17874 = '', $17875 = '', $17876 = '0.6.21-r0', $17877 = 'invalid', $17878 = NULL, $17879 = '{}', $17880 = '{}', $17881 = 'md5', $17882 = '\x1d033dfdaa873ff86e7f436b1bfadef6', $17883 = 'CVE-2012-2836', $17884 = 'alpine-main-v3.12-updater', $17885 = '', $17886 = '0001-01-01 00:00:00+00', $17887 = 'https://www.cve.org/CVERecord?id=CVE-2012-2836', $17888 = '', $17889 = 'Unknown', $17890 = 'libexif', $17891 = '', $17892 = '', $17893 = '', $17894 = 'source', $17895 = 'alpine', $17896 = 'Alpine Linux', $17897 = '', $17898 = '', $17899 = '3.12', $17900 = '', $17901 = '', $17902 = 'Alpine Linux v3.12', $17903 = '', $17904 = '', $17905 = '', $17906 = '0.6.21-r0', $17907 = 'invalid', $17908 = NULL, $17909 = '{}', $17910 = '{}', $17911 = 'md5', $17912 = '\xbb76296207ecc6fcefc4bcb77a69019f', $17913 = 'CVE-2012-2837', $17914 = 'alpine-main-v3.12-updater', $17915 = '', $17916 = '0001-01-01 00:00:00+00', $17917 = 'https://www.cve.org/CVERecord?id=CVE-2012-2837', $17918 = '', $17919 = 'Unknown', $17920 = 'libexif', $17921 = '', $17922 = '', $17923 = '', $17924 = 'source', $17925 = 'alpine', $17926 = 'Alpine Linux', $17927 = '', $17928 = '', $17929 = '3.12', $17930 = '', $17931 = '', $17932 = 'Alpine Linux v3.12', $17933 = '', $17934 = '', $17935 = '', $17936 = '0.6.21-r0', $17937 = 'invalid', $17938 = NULL, $17939 = '{}', $17940 = '{}', $17941 = 'md5', $17942 = '\xa8309f258a64367e5789d1ad3b9879c0', $17943 = 'CVE-2012-2840', $17944 = 'alpine-main-v3.12-updater', $17945 = '', $17946 = '0001-01-01 00:00:00+00', $17947 = 'https://www.cve.org/CVERecord?id=CVE-2012-2840', $17948 = '', $17949 = 'Unknown', $17950 = 'libexif', $17951 = '', $17952 = '', $17953 = '', $17954 = 'source', $17955 = 'alpine', $17956 = 'Alpine Linux', $17957 = '', $17958 = '', $17959 = '3.12', $17960 = '', $17961 = '', $17962 = 'Alpine Linux v3.12', $17963 = '', $17964 = '', $17965 = '', $17966 = '0.6.21-r0', $17967 = 'invalid', $17968 = NULL, $17969 = '{}', $17970 = '{}', $17971 = 'md5', $17972 = '\x14f56088f64556535e999b62d6dacb7e', $17973 = 'CVE-2012-2841', $17974 = 'alpine-main-v3.12-updater', $17975 = '', $17976 = '0001-01-01 00:00:00+00', $17977 = 'https://www.cve.org/CVERecord?id=CVE-2012-2841', $17978 = '', $17979 = 'Unknown', $17980 = 'libexif', $17981 = '', $17982 = '', $17983 = '', $17984 = 'source', $17985 = 'alpine', $17986 = 'Alpine Linux', $17987 = '', $17988 = '', $17989 = '3.12', $17990 = '', $17991 = '', $17992 = 'Alpine Linux v3.12', $17993 = '', $17994 = '', $17995 = '', $17996 = '0.6.21-r0', $17997 = 'invalid', $17998 = NULL, $17999 = '{}', $18000 = '{}', $18001 = 'md5', $18002 = '\xe5ce95e40614b82faebb768669d9be0f', $18003 = 'CVE-2012-2845', $18004 = 'alpine-main-v3.12-updater', $18005 = '', $18006 = '0001-01-01 00:00:00+00', $18007 = 'https://www.cve.org/CVERecord?id=CVE-2012-2845', $18008 = '', $18009 = 'Unknown', $18010 = 'libexif', $18011 = '', $18012 = '', $18013 = '', $18014 = 'source', $18015 = 'alpine', $18016 = 'Alpine Linux', $18017 = '', $18018 = '', $18019 = '3.12', $18020 = '', $18021 = '', $18022 = 'Alpine Linux v3.12', $18023 = '', $18024 = '', $18025 = '', $18026 = '0.6.21-r0', $18027 = 'invalid', $18028 = NULL, $18029 = '{}', $18030 = '{}', $18031 = 'md5', $18032 = '\x60498dc3d30da17b72d5358c365bb5c1', $18033 = 'CVE-2017-7544', $18034 = 'alpine-main-v3.12-updater', $18035 = '', $18036 = '0001-01-01 00:00:00+00', $18037 = 'https://www.cve.org/CVERecord?id=CVE-2017-7544', $18038 = '', $18039 = 'Unknown', $18040 = 'libexif', $18041 = '', $18042 = '', $18043 = '', $18044 = 'source', $18045 = 'alpine', $18046 = 'Alpine Linux', $18047 = '', $18048 = '', $18049 = '3.12', $18050 = '', $18051 = '', $18052 = 'Alpine Linux v3.12', $18053 = '', $18054 = '', $18055 = '', $18056 = '0.6.21-r3', $18057 = 'invalid', $18058 = NULL, $18059 = '{}', $18060 = '{}', $18061 = 'md5', $18062 = '\x669056d57657dd7bfecd647bc1a39c5e', $18063 = 'CVE-2018-20030', $18064 = 'alpine-main-v3.12-updater', $18065 = '', $18066 = '0001-01-01 00:00:00+00', $18067 = 'https://www.cve.org/CVERecord?id=CVE-2018-20030', $18068 = '', $18069 = 'Unknown', $18070 = 'libexif', $18071 = '', $18072 = '', $18073 = '', $18074 = 'source', $18075 = 'alpine', $18076 = 'Alpine Linux', $18077 = '', $18078 = '', $18079 = '3.12', $18080 = '', $18081 = '', $18082 = 'Alpine Linux v3.12', $18083 = '', $18084 = '', $18085 = '', $18086 = '0.6.22-r0', $18087 = 'invalid', $18088 = NULL, $18089 = '{}', $18090 = '{}', $18091 = 'md5', $18092 = '\x68f2c429a9e34cfc33f006f9822db7f9', $18093 = 'CVE-2020-13114', $18094 = 'alpine-main-v3.12-updater', $18095 = '', $18096 = '0001-01-01 00:00:00+00', $18097 = 'https://www.cve.org/CVERecord?id=CVE-2020-13114', $18098 = '', $18099 = 'Unknown', $18100 = 'libexif', $18101 = '', $18102 = '', $18103 = '', $18104 = 'source', $18105 = 'alpine', $18106 = 'Alpine Linux', $18107 = '', $18108 = '', $18109 = '3.12', $18110 = '', $18111 = '', $18112 = 'Alpine Linux v3.12', $18113 = '', $18114 = '', $18115 = '', $18116 = '0.6.22-r0', $18117 = 'invalid', $18118 = NULL, $18119 = '{}', $18120 = '{}', $18121 = 'md5', $18122 = '\x59c5dde887e310190d3c7e2f9b894428', $18123 = 'CVE-2020-13113', $18124 = 'alpine-main-v3.12-updater', $18125 = '', $18126 = '0001-01-01 00:00:00+00', $18127 = 'https://www.cve.org/CVERecord?id=CVE-2020-13113', $18128 = '', $18129 = 'Unknown', $18130 = 'libexif', $18131 = '', $18132 = '', $18133 = '', $18134 = 'source', $18135 = 'alpine', $18136 = 'Alpine Linux', $18137 = '', $18138 = '', $18139 = '3.12', $18140 = '', $18141 = '', $18142 = 'Alpine Linux v3.12', $18143 = '', $18144 = '', $18145 = '', $18146 = '0.6.22-r0', $18147 = 'invalid', $18148 = NULL, $18149 = '{}', $18150 = '{}', $18151 = 'md5', $18152 = '\x3161f9443a9705800718b3434c7f2092', $18153 = 'CVE-2020-13112', $18154 = 'alpine-main-v3.12-updater', $18155 = '', $18156 = '0001-01-01 00:00:00+00', $18157 = 'https://www.cve.org/CVERecord?id=CVE-2020-13112', $18158 = '', $18159 = 'Unknown', $18160 = 'libexif', $18161 = '', $18162 = '', $18163 = '', $18164 = 'source', $18165 = 'alpine', $18166 = 'Alpine Linux', $18167 = '', $18168 = '', $18169 = '3.12', $18170 = '', $18171 = '', $18172 = 'Alpine Linux v3.12', $18173 = '', $18174 = '', $18175 = '', $18176 = '0.6.22-r0', $18177 = 'invalid', $18178 = NULL, $18179 = '{}', $18180 = '{}', $18181 = 'md5', $18182 = '\xb8be52dbb648b7d50fc4e8de293d5a67', $18183 = 'CVE-2020-0093', $18184 = 'alpine-main-v3.12-updater', $18185 = '', $18186 = '0001-01-01 00:00:00+00', $18187 = 'https://www.cve.org/CVERecord?id=CVE-2020-0093', $18188 = '', $18189 = 'Unknown', $18190 = 'libexif', $18191 = '', $18192 = '', $18193 = '', $18194 = 'source', $18195 = 'alpine', $18196 = 'Alpine Linux', $18197 = '', $18198 = '', $18199 = '3.12', $18200 = '', $18201 = '', $18202 = 'Alpine Linux v3.12', $18203 = '', $18204 = '', $18205 = '', $18206 = '0.6.22-r0', $18207 = 'invalid', $18208 = NULL, $18209 = '{}', $18210 = '{}', $18211 = 'md5', $18212 = '\xf306dcc38d4251c013c934f0ba574cef', $18213 = 'CVE-2019-9278', $18214 = 'alpine-main-v3.12-updater', $18215 = '', $18216 = '0001-01-01 00:00:00+00', $18217 = 'https://www.cve.org/CVERecord?id=CVE-2019-9278', $18218 = '', $18219 = 'Unknown', $18220 = 'libexif', $18221 = '', $18222 = '', $18223 = '', $18224 = 'source', $18225 = 'alpine', $18226 = 'Alpine Linux', $18227 = '', $18228 = '', $18229 = '3.12', $18230 = '', $18231 = '', $18232 = 'Alpine Linux v3.12', $18233 = '', $18234 = '', $18235 = '', $18236 = '0.6.22-r0', $18237 = 'invalid', $18238 = NULL, $18239 = '{}', $18240 = '{}', $18241 = 'md5', $18242 = '\xa2db08072e2d2f7089d6405d31a4aa67', $18243 = 'CVE-2020-12767', $18244 = 'alpine-main-v3.12-updater', $18245 = '', $18246 = '0001-01-01 00:00:00+00', $18247 = 'https://www.cve.org/CVERecord?id=CVE-2020-12767', $18248 = '', $18249 = 'Unknown', $18250 = 'libexif', $18251 = '', $18252 = '', $18253 = '', $18254 = 'source', $18255 = 'alpine', $18256 = 'Alpine Linux', $18257 = '', $18258 = '', $18259 = '3.12', $18260 = '', $18261 = '', $18262 = 'Alpine Linux v3.12', $18263 = '', $18264 = '', $18265 = '', $18266 = '0.6.22-r0', $18267 = 'invalid', $18268 = NULL, $18269 = '{}', $18270 = '{}', $18271 = 'md5', $18272 = '\x49cf401fc15c676813551116e693e34e', $18273 = 'CVE-2016-6328', $18274 = 'alpine-main-v3.12-updater', $18275 = '', $18276 = '0001-01-01 00:00:00+00', $18277 = 'https://www.cve.org/CVERecord?id=CVE-2016-6328', $18278 = '', $18279 = 'Unknown', $18280 = 'libexif', $18281 = '', $18282 = '', $18283 = '', $18284 = 'source', $18285 = 'alpine', $18286 = 'Alpine Linux', $18287 = '', $18288 = '', $18289 = '3.12', $18290 = '', $18291 = '', $18292 = 'Alpine Linux v3.12', $18293 = '', $18294 = '', $18295 = '', $18296 = '0.6.22-r0', $18297 = 'invalid', $18298 = NULL, $18299 = '{}', $18300 = '{}', $18301 = 'md5', $18302 = '\xa75ee8f69086fb0381192260af05f35e', $18303 = 'CVE-2018-0495', $18304 = 'alpine-main-v3.12-updater', $18305 = '', $18306 = '0001-01-01 00:00:00+00', $18307 = 'https://www.cve.org/CVERecord?id=CVE-2018-0495', $18308 = '', $18309 = 'Unknown', $18310 = 'libgcrypt', $18311 = '', $18312 = '', $18313 = '', $18314 = 'source', $18315 = 'alpine', $18316 = 'Alpine Linux', $18317 = '', $18318 = '', $18319 = '3.12', $18320 = '', $18321 = '', $18322 = 'Alpine Linux v3.12', $18323 = '', $18324 = '', $18325 = '', $18326 = '1.8.3-r0', $18327 = 'invalid', $18328 = NULL, $18329 = '{}', $18330 = '{}', $18331 = 'md5', $18332 = '\xddedce88c6531eb4fe82495d3b7371d4', $18333 = 'CVE-2019-12904', $18334 = 'alpine-main-v3.12-updater', $18335 = '', $18336 = '0001-01-01 00:00:00+00', $18337 = 'https://www.cve.org/CVERecord?id=CVE-2019-12904', $18338 = '', $18339 = 'Unknown', $18340 = 'libgcrypt', $18341 = '', $18342 = '', $18343 = '', $18344 = 'source', $18345 = 'alpine', $18346 = 'Alpine Linux', $18347 = '', $18348 = '', $18349 = '3.12', $18350 = '', $18351 = '', $18352 = 'Alpine Linux v3.12', $18353 = '', $18354 = '', $18355 = '', $18356 = '1.8.4-r2', $18357 = 'invalid', $18358 = NULL, $18359 = '{}', $18360 = '{}', $18361 = 'md5', $18362 = '\xda13e0e932afdadc16a5c718304f6162', $18363 = 'CVE-2019-13627', $18364 = 'alpine-main-v3.12-updater', $18365 = '', $18366 = '0001-01-01 00:00:00+00', $18367 = 'https://www.cve.org/CVERecord?id=CVE-2019-13627', $18368 = '', $18369 = 'Unknown', $18370 = 'libgcrypt', $18371 = '', $18372 = '', $18373 = '', $18374 = 'source', $18375 = 'alpine', $18376 = 'Alpine Linux', $18377 = '', $18378 = '', $18379 = '3.12', $18380 = '', $18381 = '', $18382 = 'Alpine Linux v3.12', $18383 = '', $18384 = '', $18385 = '', $18386 = '1.8.5-r0', $18387 = 'invalid', $18388 = NULL, $18389 = '{}', $18390 = '{}', $18391 = 'md5', $18392 = '\x628449804e965dbff45e7140bb4bd0e1', $18393 = 'CVE-2021-33560', $18394 = 'alpine-main-v3.12-updater', $18395 = '', $18396 = '0001-01-01 00:00:00+00', $18397 = 'https://www.cve.org/CVERecord?id=CVE-2021-33560', $18398 = '', $18399 = 'Unknown', $18400 = 'libgcrypt', $18401 = '', $18402 = '', $18403 = '', $18404 = 'source', $18405 = 'alpine', $18406 = 'Alpine Linux', $18407 = '', $18408 = '', $18409 = '3.12', $18410 = '', $18411 = '', $18412 = 'Alpine Linux v3.12', $18413 = '', $18414 = '', $18415 = '', $18416 = '1.8.8-r0', $18417 = 'invalid', $18418 = NULL, $18419 = '{}', $18420 = '{}', $18421 = 'md5', $18422 = '\x1478391c6025376708b8fb6ed479aa90', $18423 = 'CVE-2021-40528', $18424 = 'alpine-main-v3.12-updater', $18425 = '', $18426 = '0001-01-01 00:00:00+00', $18427 = 'https://www.cve.org/CVERecord?id=CVE-2021-40528', $18428 = '', $18429 = 'Unknown', $18430 = 'libgcrypt', $18431 = '', $18432 = '', $18433 = '', $18434 = 'source', $18435 = 'alpine', $18436 = 'Alpine Linux', $18437 = '', $18438 = '', $18439 = '3.12', $18440 = '', $18441 = '', $18442 = 'Alpine Linux v3.12', $18443 = '', $18444 = '', $18445 = '', $18446 = '1.8.8-r1', $18447 = 'invalid', $18448 = NULL, $18449 = '{}', $18450 = '{}', $18451 = 'md5', $18452 = '\xca5cf1e5fc3bbccc5623873fc76a5283', $18453 = 'CVE-2017-2626', $18454 = 'alpine-main-v3.12-updater', $18455 = '', $18456 = '0001-01-01 00:00:00+00', $18457 = 'https://www.cve.org/CVERecord?id=CVE-2017-2626', $18458 = '', $18459 = 'Unknown', $18460 = 'libice', $18461 = '', $18462 = '', $18463 = '', $18464 = 'source', $18465 = 'alpine', $18466 = 'Alpine Linux', $18467 = '', $18468 = '', $18469 = '3.12', $18470 = '', $18471 = '', $18472 = 'Alpine Linux v3.12', $18473 = '', $18474 = '', $18475 = '', $18476 = '1.0.10-r0', $18477 = 'invalid', $18478 = NULL, $18479 = '{}', $18480 = '{}', $18481 = 'md5', $18482 = '\x8ba0b4720156806b43aa9147cfa83723', $18483 = 'CVE-2015-8948', $18484 = 'alpine-main-v3.12-updater', $18485 = '', $18486 = '0001-01-01 00:00:00+00', $18487 = 'https://www.cve.org/CVERecord?id=CVE-2015-8948', $18488 = '', $18489 = 'Unknown', $18490 = 'libidn', $18491 = '', $18492 = '', $18493 = '', $18494 = 'source', $18495 = 'alpine', $18496 = 'Alpine Linux', $18497 = '', $18498 = '', $18499 = '3.12', $18500 = '', $18501 = '', $18502 = 'Alpine Linux v3.12', $18503 = '', $18504 = '', $18505 = '', $18506 = '1.33-r0', $18507 = 'invalid', $18508 = NULL, $18509 = '{}', $18510 = '{}', $18511 = 'md5', $18512 = '\x86dea5a8cdbde9d0cce39f8db422f962', $18513 = 'CVE-2016-6261', $18514 = 'alpine-main-v3.12-updater', $18515 = '', $18516 = '0001-01-01 00:00:00+00', $18517 = 'https://www.cve.org/CVERecord?id=CVE-2016-6261', $18518 = '', $18519 = 'Unknown', $18520 = 'libidn', $18521 = '', $18522 = '', $18523 = '', $18524 = 'source', $18525 = 'alpine', $18526 = 'Alpine Linux', $18527 = '', $18528 = '', $18529 = '3.12', $18530 = '', $18531 = '', $18532 = 'Alpine Linux v3.12', $18533 = '', $18534 = '', $18535 = '', $18536 = '1.33-r0', $18537 = 'invalid', $18538 = NULL, $18539 = '{}', $18540 = '{}', $18541 = 'md5', $18542 = '\x10baf602b02c633a505cacdec0bf4932', $18543 = 'CVE-2016-6262', $18544 = 'alpine-main-v3.12-updater', $18545 = '', $18546 = '0001-01-01 00:00:00+00', $18547 = 'https://www.cve.org/CVERecord?id=CVE-2016-6262', $18548 = '', $18549 = 'Unknown', $18550 = 'libidn', $18551 = '', $18552 = '', $18553 = '', $18554 = 'source', $18555 = 'alpine', $18556 = 'Alpine Linux', $18557 = '', $18558 = '', $18559 = '3.12', $18560 = '', $18561 = '', $18562 = 'Alpine Linux v3.12', $18563 = '', $18564 = '', $18565 = '', $18566 = '1.33-r0', $18567 = 'invalid', $18568 = NULL, $18569 = '{}', $18570 = '{}', $18571 = 'md5', $18572 = '\xcb1a9456f82b77055a6ba5faa69c233e', $18573 = 'CVE-2016-6263', $18574 = 'alpine-main-v3.12-updater', $18575 = '', $18576 = '0001-01-01 00:00:00+00', $18577 = 'https://www.cve.org/CVERecord?id=CVE-2016-6263', $18578 = '', $18579 = 'Unknown', $18580 = 'libidn', $18581 = '', $18582 = '', $18583 = '', $18584 = 'source', $18585 = 'alpine', $18586 = 'Alpine Linux', $18587 = '', $18588 = '', $18589 = '3.12', $18590 = '', $18591 = '', $18592 = 'Alpine Linux v3.12', $18593 = '', $18594 = '', $18595 = '', $18596 = '1.33-r0', $18597 = 'invalid', $18598 = NULL, $18599 = '{}', $18600 = '{}', $18601 = 'md5', $18602 = '\x80c50d43145a0f2e452872ba7c0d72a2', $18603 = 'CVE-2019-18224', $18604 = 'alpine-main-v3.12-updater', $18605 = '', $18606 = '0001-01-01 00:00:00+00', $18607 = 'https://www.cve.org/CVERecord?id=CVE-2019-18224', $18608 = '', $18609 = 'Unknown', $18610 = 'libidn2', $18611 = '', $18612 = '', $18613 = '', $18614 = 'source', $18615 = 'alpine', $18616 = 'Alpine Linux', $18617 = '', $18618 = '', $18619 = '3.12', $18620 = '', $18621 = '', $18622 = 'Alpine Linux v3.12', $18623 = '', $18624 = '', $18625 = '', $18626 = '2.1.1-r0', $18627 = 'invalid', $18628 = NULL, $18629 = '{}', $18630 = '{}', $18631 = 'md5', $18632 = '\x55c8f0795bdcfd12af375093809ff506', $18633 = 'CVE-2019-12290', $18634 = 'alpine-main-v3.12-updater', $18635 = '', $18636 = '0001-01-01 00:00:00+00', $18637 = 'https://www.cve.org/CVERecord?id=CVE-2019-12290', $18638 = '', $18639 = 'Unknown', $18640 = 'libidn2', $18641 = '', $18642 = '', $18643 = '', $18644 = 'source', $18645 = 'alpine', $18646 = 'Alpine Linux', $18647 = '', $18648 = '', $18649 = '3.12', $18650 = '', $18651 = '', $18652 = 'Alpine Linux v3.12', $18653 = '', $18654 = '', $18655 = '', $18656 = '2.2.0-r0', $18657 = 'invalid', $18658 = NULL, $18659 = '{}', $18660 = '{}', $18661 = 'md5', $18662 = '\x4e9afb6c6128aa777e269e6897d13cbb', $18663 = 'CVE-2018-1152', $18664 = 'alpine-main-v3.12-updater', $18665 = '', $18666 = '0001-01-01 00:00:00+00', $18667 = 'https://www.cve.org/CVERecord?id=CVE-2018-1152', $18668 = '', $18669 = 'Unknown', $18670 = 'libjpeg-turbo', $18671 = '', $18672 = '', $18673 = '', $18674 = 'source', $18675 = 'alpine', $18676 = 'Alpine Linux', $18677 = '', $18678 = '', $18679 = '3.12', $18680 = '', $18681 = '', $18682 = 'Alpine Linux v3.12', $18683 = '', $18684 = '', $18685 = '', $18686 = '1.5.3-r2', $18687 = 'invalid', $18688 = NULL, $18689 = '{}', $18690 = '{}', $18691 = 'md5', $18692 = '\xd82d138069b814ac9985b9eb80fffbf9', $18693 = 'CVE-2018-11813', $18694 = 'alpine-main-v3.12-updater', $18695 = '', $18696 = '0001-01-01 00:00:00+00', $18697 = 'https://www.cve.org/CVERecord?id=CVE-2018-11813', $18698 = '', $18699 = 'Unknown', $18700 = 'libjpeg-turbo', $18701 = '', $18702 = '', $18703 = '', $18704 = 'source', $18705 = 'alpine', $18706 = 'Alpine Linux', $18707 = '', $18708 = '', $18709 = '3.12', $18710 = '', $18711 = '', $18712 = 'Alpine Linux v3.12', $18713 = '', $18714 = '', $18715 = '', $18716 = '1.5.3-r3', $18717 = 'invalid', $18718 = NULL, $18719 = '{}', $18720 = '{}', $18721 = 'md5', $18722 = '\xfc563a8a08277f849655056cf638246f', $18723 = 'CVE-2018-20330', $18724 = 'alpine-main-v3.12-updater', $18725 = '', $18726 = '0001-01-01 00:00:00+00', $18727 = 'https://www.cve.org/CVERecord?id=CVE-2018-20330', $18728 = '', $18729 = 'Unknown', $18730 = 'libjpeg-turbo', $18731 = '', $18732 = '', $18733 = '', $18734 = 'source', $18735 = 'alpine', $18736 = 'Alpine Linux', $18737 = '', $18738 = '', $18739 = '3.12', $18740 = '', $18741 = '', $18742 = 'Alpine Linux v3.12', $18743 = '', $18744 = '', $18745 = '', $18746 = '2.0.2-r0', $18747 = 'invalid', $18748 = NULL, $18749 = '{}', $18750 = '{}', $18751 = 'md5', $18752 = '\xcb71d06c6718356899b880376070df64', $18753 = 'CVE-2018-19664', $18754 = 'alpine-main-v3.12-updater', $18755 = '', $18756 = '0001-01-01 00:00:00+00', $18757 = 'https://www.cve.org/CVERecord?id=CVE-2018-19664', $18758 = '', $18759 = 'Unknown', $18760 = 'libjpeg-turbo', $18761 = '', $18762 = '', $18763 = '', $18764 = 'source', $18765 = 'alpine', $18766 = 'Alpine Linux', $18767 = '', $18768 = '', $18769 = '3.12', $18770 = '', $18771 = '', $18772 = 'Alpine Linux v3.12', $18773 = '', $18774 = '', $18775 = '', $18776 = '2.0.2-r0', $18777 = 'invalid', $18778 = NULL, $18779 = '{}', $18780 = '{}', $18781 = 'md5', $18782 = '\x51567d8a526f69d938411a535a9e8919', $18783 = 'CVE-2019-2201', $18784 = 'alpine-main-v3.12-updater', $18785 = '', $18786 = '0001-01-01 00:00:00+00', $18787 = 'https://www.cve.org/CVERecord?id=CVE-2019-2201', $18788 = '', $18789 = 'Unknown', $18790 = 'libjpeg-turbo', $18791 = '', $18792 = '', $18793 = '', $18794 = 'source', $18795 = 'alpine', $18796 = 'Alpine Linux', $18797 = '', $18798 = '', $18799 = '3.12', $18800 = '', $18801 = '', $18802 = 'Alpine Linux v3.12', $18803 = '', $18804 = '', $18805 = '', $18806 = '2.0.4-r0', $18807 = 'invalid', $18808 = NULL, $18809 = '{}', $18810 = '{}', $18811 = 'md5', $18812 = '\xa91a94ead7ad19d5b4d592374d8b3c38', $18813 = 'CVE-2020-13790', $18814 = 'alpine-main-v3.12-updater', $18815 = '', $18816 = '0001-01-01 00:00:00+00', $18817 = 'https://www.cve.org/CVERecord?id=CVE-2020-13790', $18818 = '', $18819 = 'Unknown', $18820 = 'libjpeg-turbo', $18821 = '', $18822 = '', $18823 = '', $18824 = 'source', $18825 = 'alpine', $18826 = 'Alpine Linux', $18827 = '', $18828 = '', $18829 = '3.12', $18830 = '', $18831 = '', $18832 = 'Alpine Linux v3.12', $18833 = '', $18834 = '', $18835 = '', $18836 = '2.0.4-r2', $18837 = 'invalid', $18838 = NULL, $18839 = '{}', $18840 = '{}', $18841 = 'md5', $18842 = '\xde98927a6e8abd09ef06c5a4fc8c9e10', $18843 = 'CVE-2021-20205', $18844 = 'alpine-main-v3.12-updater', $18845 = '', $18846 = '0001-01-01 00:00:00+00', $18847 = 'https://www.cve.org/CVERecord?id=CVE-2021-20205', $18848 = '', $18849 = 'Unknown', $18850 = 'libjpeg-turbo', $18851 = '', $18852 = '', $18853 = '', $18854 = 'source', $18855 = 'alpine', $18856 = 'Alpine Linux', $18857 = '', $18858 = '', $18859 = '3.12', $18860 = '', $18861 = '', $18862 = 'Alpine Linux v3.12', $18863 = '', $18864 = '', $18865 = '', $18866 = '2.1.0-r0', $18867 = 'invalid', $18868 = NULL, $18869 = '{}', $18870 = '{}', $18871 = 'md5', $18872 = '\x97fd5ca847cd84f5a72918b4265e5d24', $18873 = 'CVE-2020-28241', $18874 = 'alpine-main-v3.12-updater', $18875 = '', $18876 = '0001-01-01 00:00:00+00', $18877 = 'https://www.cve.org/CVERecord?id=CVE-2020-28241', $18878 = '', $18879 = 'Unknown', $18880 = 'libmaxminddb', $18881 = '', $18882 = '', $18883 = '', $18884 = 'source', $18885 = 'alpine', $18886 = 'Alpine Linux', $18887 = '', $18888 = '', $18889 = '3.12', $18890 = '', $18891 = '', $18892 = 'Alpine Linux v3.12', $18893 = '', $18894 = '', $18895 = '', $18896 = '1.4.3-r0', $18897 = 'invalid', $18898 = NULL, $18899 = '{}', $18900 = '{}', $18901 = 'md5', $18902 = '\x25d6758dc892542da97adcfb91dc9b85', $18903 = 'CVE-2018-16301', $18904 = 'alpine-main-v3.12-updater', $18905 = '', $18906 = '0001-01-01 00:00:00+00', $18907 = 'https://www.cve.org/CVERecord?id=CVE-2018-16301', $18908 = '', $18909 = 'Unknown', $18910 = 'libpcap', $18911 = '', $18912 = '', $18913 = '', $18914 = 'source', $18915 = 'alpine', $18916 = 'Alpine Linux', $18917 = '', $18918 = '', $18919 = '3.12', $18920 = '', $18921 = '', $18922 = 'Alpine Linux v3.12', $18923 = '', $18924 = '', $18925 = '', $18926 = '1.9.1-r0', $18927 = 'invalid', $18928 = NULL, $18929 = '{}', $18930 = '{}', $18931 = 'md5', $18932 = '\x0a171ae0bcc59b2fb4f9e42917c4ac25', $18933 = 'CVE-2019-15161', $18934 = 'alpine-main-v3.12-updater', $18935 = '', $18936 = '0001-01-01 00:00:00+00', $18937 = 'https://www.cve.org/CVERecord?id=CVE-2019-15161', $18938 = '', $18939 = 'Unknown', $18940 = 'libpcap', $18941 = '', $18942 = '', $18943 = '', $18944 = 'source', $18945 = 'alpine', $18946 = 'Alpine Linux', $18947 = '', $18948 = '', $18949 = '3.12', $18950 = '', $18951 = '', $18952 = 'Alpine Linux v3.12', $18953 = '', $18954 = '', $18955 = '', $18956 = '1.9.1-r0', $18957 = 'invalid', $18958 = NULL, $18959 = '{}', $18960 = '{}', $18961 = 'md5', $18962 = '\x9af72b9448fa3c1b23770bab36559d2d', $18963 = 'CVE-2019-15162', $18964 = 'alpine-main-v3.12-updater', $18965 = '', $18966 = '0001-01-01 00:00:00+00', $18967 = 'https://www.cve.org/CVERecord?id=CVE-2019-15162', $18968 = '', $18969 = 'Unknown', $18970 = 'libpcap', $18971 = '', $18972 = '', $18973 = '', $18974 = 'source', $18975 = 'alpine', $18976 = 'Alpine Linux', $18977 = '', $18978 = '', $18979 = '3.12', $18980 = '', $18981 = '', $18982 = 'Alpine Linux v3.12', $18983 = '', $18984 = '', $18985 = '', $18986 = '1.9.1-r0', $18987 = 'invalid', $18988 = NULL, $18989 = '{}', $18990 = '{}', $18991 = 'md5', $18992 = '\x698838a53dee942457f162a764ee0f2e', $18993 = 'CVE-2019-15163', $18994 = 'alpine-main-v3.12-updater', $18995 = '', $18996 = '0001-01-01 00:00:00+00', $18997 = 'https://www.cve.org/CVERecord?id=CVE-2019-15163', $18998 = '', $18999 = 'Unknown', $19000 = 'libpcap', $19001 = '', $19002 = '', $19003 = '', $19004 = 'source', $19005 = 'alpine', $19006 = 'Alpine Linux', $19007 = '', $19008 = '', $19009 = '3.12', $19010 = '', $19011 = '', $19012 = 'Alpine Linux v3.12', $19013 = '', $19014 = '', $19015 = '', $19016 = '1.9.1-r0', $19017 = 'invalid', $19018 = NULL, $19019 = '{}', $19020 = '{}', $19021 = 'md5', $19022 = '\x6c1b9cd2d8412cb322fc40fe1ed4fea0', $19023 = 'CVE-2019-15164', $19024 = 'alpine-main-v3.12-updater', $19025 = '', $19026 = '0001-01-01 00:00:00+00', $19027 = 'https://www.cve.org/CVERecord?id=CVE-2019-15164', $19028 = '', $19029 = 'Unknown', $19030 = 'libpcap', $19031 = '', $19032 = '', $19033 = '', $19034 = 'source', $19035 = 'alpine', $19036 = 'Alpine Linux', $19037 = '', $19038 = '', $19039 = '3.12', $19040 = '', $19041 = '', $19042 = 'Alpine Linux v3.12', $19043 = '', $19044 = '', $19045 = '', $19046 = '1.9.1-r0', $19047 = 'invalid', $19048 = NULL, $19049 = '{}', $19050 = '{}', $19051 = 'md5', $19052 = '\xf23590ab73341e14c005da499559fc5f', $19053 = 'CVE-2019-15165', $19054 = 'alpine-main-v3.12-updater', $19055 = '', $19056 = '0001-01-01 00:00:00+00', $19057 = 'https://www.cve.org/CVERecord?id=CVE-2019-15165', $19058 = '', $19059 = 'Unknown', $19060 = 'libpcap', $19061 = '', $19062 = '', $19063 = '', $19064 = 'source', $19065 = 'alpine', $19066 = 'Alpine Linux', $19067 = '', $19068 = '', $19069 = '3.12', $19070 = '', $19071 = '', $19072 = 'Alpine Linux v3.12', $19073 = '', $19074 = '', $19075 = '', $19076 = '1.9.1-r0', $19077 = 'invalid', $19078 = NULL, $19079 = '{}', $19080 = '{}', $19081 = 'md5', $19082 = '\x05c57168ebaac73ef5dcb83f91d1ad38', $19083 = 'CVE-2019-7317', $19084 = 'alpine-main-v3.12-updater', $19085 = '', $19086 = '0001-01-01 00:00:00+00', $19087 = 'https://www.cve.org/CVERecord?id=CVE-2019-7317', $19088 = '', $19089 = 'Unknown', $19090 = 'libpng', $19091 = '', $19092 = '', $19093 = '', $19094 = 'source', $19095 = 'alpine', $19096 = 'Alpine Linux', $19097 = '', $19098 = '', $19099 = '3.12', $19100 = '', $19101 = '', $19102 = 'Alpine Linux v3.12', $19103 = '', $19104 = '', $19105 = '', $19106 = '1.6.37-r0', $19107 = 'invalid', $19108 = NULL, $19109 = '{}', $19110 = '{}', $19111 = 'md5', $19112 = '\x584379c4398ce2b857cbe83dd4cc6129', $19113 = 'CVE-2018-14048', $19114 = 'alpine-main-v3.12-updater', $19115 = '', $19116 = '0001-01-01 00:00:00+00', $19117 = 'https://www.cve.org/CVERecord?id=CVE-2018-14048', $19118 = '', $19119 = 'Unknown', $19120 = 'libpng', $19121 = '', $19122 = '', $19123 = '', $19124 = 'source', $19125 = 'alpine', $19126 = 'Alpine Linux', $19127 = '', $19128 = '', $19129 = '3.12', $19130 = '', $19131 = '', $19132 = 'Alpine Linux v3.12', $19133 = '', $19134 = '', $19135 = '', $19136 = '1.6.37-r0', $19137 = 'invalid', $19138 = NULL, $19139 = '{}', $19140 = '{}', $19141 = 'md5', $19142 = '\xd92241a64a549cc76681c4c53a58c3ce', $19143 = 'CVE-2018-14550', $19144 = 'alpine-main-v3.12-updater', $19145 = '', $19146 = '0001-01-01 00:00:00+00', $19147 = 'https://www.cve.org/CVERecord?id=CVE-2018-14550', $19148 = '', $19149 = 'Unknown', $19150 = 'libpng', $19151 = '', $19152 = '', $19153 = '', $19154 = 'source', $19155 = 'alpine', $19156 = 'Alpine Linux', $19157 = '', $19158 = '', $19159 = '3.12', $19160 = '', $19161 = '', $19162 = 'Alpine Linux v3.12', $19163 = '', $19164 = '', $19165 = '', $19166 = '1.6.37-r0', $19167 = 'invalid', $19168 = NULL, $19169 = '{}', $19170 = '{}', $19171 = 'md5', $19172 = '\x6d29528968701d7f97d92780e54914fd', $19173 = 'CVE-2018-0732', $19174 = 'alpine-main-v3.12-updater', $19175 = '', $19176 = '0001-01-01 00:00:00+00', $19177 = 'https://www.cve.org/CVERecord?id=CVE-2018-0732', $19178 = '', $19179 = 'Unknown', $19180 = 'libressl', $19181 = '', $19182 = '', $19183 = '', $19184 = 'source', $19185 = 'alpine', $19186 = 'Alpine Linux', $19187 = '', $19188 = '', $19189 = '3.12', $19190 = '', $19191 = '', $19192 = 'Alpine Linux v3.12', $19193 = '', $19194 = '', $19195 = '', $19196 = '2.7.4-r0', $19197 = 'invalid', $19198 = NULL, $19199 = '{}', $19200 = '{}', $19201 = 'md5', $19202 = '\xab7e9823529cbb3d263aff28bbe1b162', $19203 = 'CVE-2018-0495', $19204 = 'alpine-main-v3.12-updater', $19205 = '', $19206 = '0001-01-01 00:00:00+00', $19207 = 'https://www.cve.org/CVERecord?id=CVE-2018-0495', $19208 = '', $19209 = 'Unknown', $19210 = 'libressl', $19211 = '', $19212 = '', $19213 = '', $19214 = 'source', $19215 = 'alpine', $19216 = 'Alpine Linux', $19217 = '', $19218 = '', $19219 = '3.12', $19220 = '', $19221 = '', $19222 = 'Alpine Linux v3.12', $19223 = '', $19224 = '', $19225 = '', $19226 = '2.7.4-r0', $19227 = 'invalid', $19228 = NULL, $19229 = '{}', $19230 = '{}', $19231 = 'md5', $19232 = '\xd7269036ed68117dd306cf1abebfd75e', $19233 = 'CVE-2017-8301', $19234 = 'alpine-main-v3.12-updater', $19235 = '', $19236 = '0001-01-01 00:00:00+00', $19237 = 'https://www.cve.org/CVERecord?id=CVE-2017-8301', $19238 = '', $19239 = 'Unknown', $19240 = 'libressl', $19241 = '', $19242 = '', $19243 = '', $19244 = 'source', $19245 = 'alpine', $19246 = 'Alpine Linux', $19247 = '', $19248 = '', $19249 = '3.12', $19250 = '', $19251 = '', $19252 = 'Alpine Linux v3.12', $19253 = '', $19254 = '', $19255 = '', $19256 = '2.5.3-r1', $19257 = 'invalid', $19258 = NULL, $19259 = '{}', $19260 = '{}', $19261 = 'md5', $19262 = '\x2f3e1d79741ab1128bb126e6394b5cbc', $19263 = 'CVE-2019-9893', $19264 = 'alpine-main-v3.12-updater', $19265 = '', $19266 = '0001-01-01 00:00:00+00', $19267 = 'https://www.cve.org/CVERecord?id=CVE-2019-9893', $19268 = '', $19269 = 'Unknown', $19270 = 'libseccomp', $19271 = '', $19272 = '', $19273 = '', $19274 = 'source', $19275 = 'alpine', $19276 = 'Alpine Linux', $19277 = '', $19278 = '', $19279 = '3.12', $19280 = '', $19281 = '', $19282 = 'Alpine Linux v3.12', $19283 = '', $19284 = '', $19285 = '', $19286 = '2.4.0-r0', $19287 = 'invalid', $19288 = NULL, $19289 = '{}', $19290 = '{}', $19291 = 'md5', $19292 = '\x57df125ab0513bcc5ff35925680905ac', $19293 = 'CVE-2019-3832', $19294 = 'alpine-main-v3.12-updater', $19295 = '', $19296 = '0001-01-01 00:00:00+00', $19297 = 'https://www.cve.org/CVERecord?id=CVE-2019-3832', $19298 = '', $19299 = 'Unknown', $19300 = 'libsndfile', $19301 = '', $19302 = '', $19303 = '', $19304 = 'source', $19305 = 'alpine', $19306 = 'Alpine Linux', $19307 = '', $19308 = '', $19309 = '3.12', $19310 = '', $19311 = '', $19312 = 'Alpine Linux v3.12', $19313 = '', $19314 = '', $19315 = '', $19316 = '1.0.28-r8', $19317 = 'invalid', $19318 = NULL, $19319 = '{}', $19320 = '{}', $19321 = 'md5', $19322 = '\x7c55020ca00b40533b24cf477340d3ef', $19323 = 'CVE-2018-19758', $19324 = 'alpine-main-v3.12-updater', $19325 = '', $19326 = '0001-01-01 00:00:00+00', $19327 = 'https://www.cve.org/CVERecord?id=CVE-2018-19758', $19328 = '', $19329 = 'Unknown', $19330 = 'libsndfile', $19331 = '', $19332 = '', $19333 = '', $19334 = 'source', $19335 = 'alpine', $19336 = 'Alpine Linux', $19337 = '', $19338 = '', $19339 = '3.12', $19340 = '', $19341 = '', $19342 = 'Alpine Linux v3.12', $19343 = '', $19344 = '', $19345 = '', $19346 = '1.0.28-r8', $19347 = 'invalid', $19348 = NULL, $19349 = '{}', $19350 = '{}', $19351 = 'md5', $19352 = '\xad40ae7f402fa7f91b954407e337b1c9', $19353 = 'CVE-2017-7585', $19354 = 'alpine-main-v3.12-updater', $19355 = '', $19356 = '0001-01-01 00:00:00+00', $19357 = 'https://www.cve.org/CVERecord?id=CVE-2017-7585', $19358 = '', $19359 = 'Unknown', $19360 = 'libsndfile', $19361 = '', $19362 = '', $19363 = '', $19364 = 'source', $19365 = 'alpine', $19366 = 'Alpine Linux', $19367 = '', $19368 = '', $19369 = '3.12', $19370 = '', $19371 = '', $19372 = 'Alpine Linux v3.12', $19373 = '', $19374 = '', $19375 = '', $19376 = '1.0.28-r0', $19377 = 'invalid', $19378 = NULL, $19379 = '{}', $19380 = '{}', $19381 = 'md5', $19382 = '\x5dcd0b3c3d79489daa88b1abd7df9c67', $19383 = 'CVE-2017-7741', $19384 = 'alpine-main-v3.12-updater', $19385 = '', $19386 = '0001-01-01 00:00:00+00', $19387 = 'https://www.cve.org/CVERecord?id=CVE-2017-7741', $19388 = '', $19389 = 'Unknown', $19390 = 'libsndfile', $19391 = '', $19392 = '', $19393 = '', $19394 = 'source', $19395 = 'alpine', $19396 = 'Alpine Linux', $19397 = '', $19398 = '', $19399 = '3.12', $19400 = '', $19401 = '', $19402 = 'Alpine Linux v3.12', $19403 = '', $19404 = '', $19405 = '', $19406 = '1.0.28-r0', $19407 = 'invalid', $19408 = NULL, $19409 = '{}', $19410 = '{}', $19411 = 'md5', $19412 = '\x8a805e7b780e8cf92907b7f0a0292857', $19413 = 'CVE-2017-7742', $19414 = 'alpine-main-v3.12-updater', $19415 = '', $19416 = '0001-01-01 00:00:00+00', $19417 = 'https://www.cve.org/CVERecord?id=CVE-2017-7742', $19418 = '', $19419 = 'Unknown', $19420 = 'libsndfile', $19421 = '', $19422 = '', $19423 = '', $19424 = 'source', $19425 = 'alpine', $19426 = 'Alpine Linux', $19427 = '', $19428 = '', $19429 = '3.12', $19430 = '', $19431 = '', $19432 = 'Alpine Linux v3.12', $19433 = '', $19434 = '', $19435 = '', $19436 = '1.0.28-r0', $19437 = 'invalid', $19438 = NULL, $19439 = '{}', $19440 = '{}', $19441 = 'md5', $19442 = '\xfeac1e29955870d25fa144b97326985c', $19443 = 'CVE-2017-8361', $19444 = 'alpine-main-v3.12-updater', $19445 = '', $19446 = '0001-01-01 00:00:00+00', $19447 = 'https://www.cve.org/CVERecord?id=CVE-2017-8361', $19448 = '', $19449 = 'Unknown', $19450 = 'libsndfile', $19451 = '', $19452 = '', $19453 = '', $19454 = 'source', $19455 = 'alpine', $19456 = 'Alpine Linux', $19457 = '', $19458 = '', $19459 = '3.12', $19460 = '', $19461 = '', $19462 = 'Alpine Linux v3.12', $19463 = '', $19464 = '', $19465 = '', $19466 = '1.0.28-r1', $19467 = 'invalid', $19468 = NULL, $19469 = '{}', $19470 = '{}', $19471 = 'md5', $19472 = '\x0e1ab7285ac11f914931d88c6e54784d', $19473 = 'CVE-2017-8362', $19474 = 'alpine-main-v3.12-updater', $19475 = '', $19476 = '0001-01-01 00:00:00+00', $19477 = 'https://www.cve.org/CVERecord?id=CVE-2017-8362', $19478 = '', $19479 = 'Unknown', $19480 = 'libsndfile', $19481 = '', $19482 = '', $19483 = '', $19484 = 'source', $19485 = 'alpine', $19486 = 'Alpine Linux', $19487 = '', $19488 = '', $19489 = '3.12', $19490 = '', $19491 = '', $19492 = 'Alpine Linux v3.12', $19493 = '', $19494 = '', $19495 = '', $19496 = '1.0.28-r1', $19497 = 'invalid', $19498 = NULL, $19499 = '{}', $19500 = '{}', $19501 = 'md5', $19502 = '\x371850bb2ccd12fa556fe462b5310114', $19503 = 'CVE-2017-8363', $19504 = 'alpine-main-v3.12-updater', $19505 = '', $19506 = '0001-01-01 00:00:00+00', $19507 = 'https://www.cve.org/CVERecord?id=CVE-2017-8363', $19508 = '', $19509 = 'Unknown', $19510 = 'libsndfile', $19511 = '', $19512 = '', $19513 = '', $19514 = 'source', $19515 = 'alpine', $19516 = 'Alpine Linux', $19517 = '', $19518 = '', $19519 = '3.12', $19520 = '', $19521 = '', $19522 = 'Alpine Linux v3.12', $19523 = '', $19524 = '', $19525 = '', $19526 = '1.0.28-r1', $19527 = 'invalid', $19528 = NULL, $19529 = '{}', $19530 = '{}', $19531 = 'md5', $19532 = '\x39c0f5436401021283e0f3ba971518f8', $19533 = 'CVE-2017-8365', $19534 = 'alpine-main-v3.12-updater', $19535 = '', $19536 = '0001-01-01 00:00:00+00', $19537 = 'https://www.cve.org/CVERecord?id=CVE-2017-8365', $19538 = '', $19539 = 'Unknown', $19540 = 'libsndfile', $19541 = '', $19542 = '', $19543 = '', $19544 = 'source', $19545 = 'alpine', $19546 = 'Alpine Linux', $19547 = '', $19548 = '', $19549 = '3.12', $19550 = '', $19551 = '', $19552 = 'Alpine Linux v3.12', $19553 = '', $19554 = '', $19555 = '', $19556 = '1.0.28-r1', $19557 = 'invalid', $19558 = NULL, $19559 = '{}', $19560 = '{}', $19561 = 'md5', $19562 = '\xda524b71d30bfabcb3b4b11cf791a33f', $19563 = 'CVE-2017-12562', $19564 = 'alpine-main-v3.12-updater', $19565 = '', $19566 = '0001-01-01 00:00:00+00', $19567 = 'https://www.cve.org/CVERecord?id=CVE-2017-12562', $19568 = '', $19569 = 'Unknown', $19570 = 'libsndfile', $19571 = '', $19572 = '', $19573 = '', $19574 = 'source', $19575 = 'alpine', $19576 = 'Alpine Linux', $19577 = '', $19578 = '', $19579 = '3.12', $19580 = '', $19581 = '', $19582 = 'Alpine Linux v3.12', $19583 = '', $19584 = '', $19585 = '', $19586 = '1.0.28-r2', $19587 = 'invalid', $19588 = NULL, $19589 = '{}', $19590 = '{}', $19591 = 'md5', $19592 = '\x79d6468ea977a127fa87e250fce6cdde', $19593 = 'CVE-2018-13139', $19594 = 'alpine-main-v3.12-updater', $19595 = '', $19596 = '0001-01-01 00:00:00+00', $19597 = 'https://www.cve.org/CVERecord?id=CVE-2018-13139', $19598 = '', $19599 = 'Unknown', $19600 = 'libsndfile', $19601 = '', $19602 = '', $19603 = '', $19604 = 'source', $19605 = 'alpine', $19606 = 'Alpine Linux', $19607 = '', $19608 = '', $19609 = '3.12', $19610 = '', $19611 = '', $19612 = 'Alpine Linux v3.12', $19613 = '', $19614 = '', $19615 = '', $19616 = '1.0.28-r4', $19617 = 'invalid', $19618 = NULL, $19619 = '{}', $19620 = '{}', $19621 = 'md5', $19622 = '\x6e59fbd16b8bb26e494fcddc57eaf011', $19623 = 'CVE-2017-17456', $19624 = 'alpine-main-v3.12-updater', $19625 = '', $19626 = '0001-01-01 00:00:00+00', $19627 = 'https://www.cve.org/CVERecord?id=CVE-2017-17456', $19628 = '', $19629 = 'Unknown', $19630 = 'libsndfile', $19631 = '', $19632 = '', $19633 = '', $19634 = 'source', $19635 = 'alpine', $19636 = 'Alpine Linux', $19637 = '', $19638 = '', $19639 = '3.12', $19640 = '', $19641 = '', $19642 = 'Alpine Linux v3.12', $19643 = '', $19644 = '', $19645 = '', $19646 = '1.0.28-r6', $19647 = 'invalid', $19648 = NULL, $19649 = '{}', $19650 = '{}', $19651 = 'md5', $19652 = '\xbe9dddc6a2fc4b382822d3827ffe5ca5', $19653 = 'CVE-2017-17457', $19654 = 'alpine-main-v3.12-updater', $19655 = '', $19656 = '0001-01-01 00:00:00+00', $19657 = 'https://www.cve.org/CVERecord?id=CVE-2017-17457', $19658 = '', $19659 = 'Unknown', $19660 = 'libsndfile', $19661 = '', $19662 = '', $19663 = '', $19664 = 'source', $19665 = 'alpine', $19666 = 'Alpine Linux', $19667 = '', $19668 = '', $19669 = '3.12', $19670 = '', $19671 = '', $19672 = 'Alpine Linux v3.12', $19673 = '', $19674 = '', $19675 = '', $19676 = '1.0.28-r6', $19677 = 'invalid', $19678 = NULL, $19679 = '{}', $19680 = '{}', $19681 = 'md5', $19682 = '\x3045ab6be989857de5451eda4016fe42', $19683 = 'CVE-2018-19661', $19684 = 'alpine-main-v3.12-updater', $19685 = '', $19686 = '0001-01-01 00:00:00+00', $19687 = 'https://www.cve.org/CVERecord?id=CVE-2018-19661', $19688 = '', $19689 = 'Unknown', $19690 = 'libsndfile', $19691 = '', $19692 = '', $19693 = '', $19694 = 'source', $19695 = 'alpine', $19696 = 'Alpine Linux', $19697 = '', $19698 = '', $19699 = '3.12', $19700 = '', $19701 = '', $19702 = 'Alpine Linux v3.12', $19703 = '', $19704 = '', $19705 = '', $19706 = '1.0.28-r6', $19707 = 'invalid', $19708 = NULL, $19709 = '{}', $19710 = '{}', $19711 = 'md5', $19712 = '\xc6cd0309f5d03ce7c5a91f053cbe6c3b', $19713 = 'CVE-2018-19662', $19714 = 'alpine-main-v3.12-updater', $19715 = '', $19716 = '0001-01-01 00:00:00+00', $19717 = 'https://www.cve.org/CVERecord?id=CVE-2018-19662', $19718 = '', $19719 = 'Unknown', $19720 = 'libsndfile', $19721 = '', $19722 = '', $19723 = '', $19724 = 'source', $19725 = 'alpine', $19726 = 'Alpine Linux', $19727 = '', $19728 = '', $19729 = '3.12', $19730 = '', $19731 = '', $19732 = 'Alpine Linux v3.12', $19733 = '', $19734 = '', $19735 = '', $19736 = '1.0.28-r6', $19737 = 'invalid', $19738 = NULL, $19739 = '{}', $19740 = '{}', $19741 = 'md5', $19742 = '\x69e1c5e40d2f679d9ce91bd0774edfee', $19743 = 'CVE-2021-20314', $19744 = 'alpine-main-v3.12-updater', $19745 = '', $19746 = '0001-01-01 00:00:00+00', $19747 = 'https://www.cve.org/CVERecord?id=CVE-2021-20314', $19748 = '', $19749 = 'Unknown', $19750 = 'libspf2', $19751 = '', $19752 = '', $19753 = '', $19754 = 'source', $19755 = 'alpine', $19756 = 'Alpine Linux', $19757 = '', $19758 = '', $19759 = '3.12', $19760 = '', $19761 = '', $19762 = 'Alpine Linux v3.12', $19763 = '', $19764 = '', $19765 = '', $19766 = '1.2.10-r5', $19767 = 'invalid', $19768 = NULL, $19769 = '{}', $19770 = '{}', $19771 = 'md5', $19772 = '\x27797944af041fe270f555dcd8b709a1', $19773 = 'CVE-2019-13115', $19774 = 'alpine-main-v3.12-updater', $19775 = '', $19776 = '0001-01-01 00:00:00+00', $19777 = 'https://www.cve.org/CVERecord?id=CVE-2019-13115', $19778 = '', $19779 = 'Unknown', $19780 = 'libssh2', $19781 = '', $19782 = '', $19783 = '', $19784 = 'source', $19785 = 'alpine', $19786 = 'Alpine Linux', $19787 = '', $19788 = '', $19789 = '3.12', $19790 = '', $19791 = '', $19792 = 'Alpine Linux v3.12', $19793 = '', $19794 = '', $19795 = '', $19796 = '1.9.0-r0', $19797 = 'invalid', $19798 = NULL, $19799 = '{}', $19800 = '{}', $19801 = 'md5', $19802 = '\x8f5203b42339144a4609ee65e9ee86f2', $19803 = 'CVE-2019-17498', $19804 = 'alpine-main-v3.12-updater', $19805 = '', $19806 = '0001-01-01 00:00:00+00', $19807 = 'https://www.cve.org/CVERecord?id=CVE-2019-17498', $19808 = '', $19809 = 'Unknown', $19810 = 'libssh2', $19811 = '', $19812 = '', $19813 = '', $19814 = 'source', $19815 = 'alpine', $19816 = 'Alpine Linux', $19817 = '', $19818 = '', $19819 = '3.12', $19820 = '', $19821 = '', $19822 = 'Alpine Linux v3.12', $19823 = '', $19824 = '', $19825 = '', $19826 = '1.9.0-r1', $19827 = 'invalid', $19828 = NULL, $19829 = '{}', $19830 = '{}', $19831 = 'md5', $19832 = '\xf9fdf6d77fd00274e5c8160704f0ab18', $19833 = 'CVE-2019-3855', $19834 = 'alpine-main-v3.12-updater', $19835 = '', $19836 = '0001-01-01 00:00:00+00', $19837 = 'https://www.cve.org/CVERecord?id=CVE-2019-3855', $19838 = '', $19839 = 'Unknown', $19840 = 'libssh2', $19841 = '', $19842 = '', $19843 = '', $19844 = 'source', $19845 = 'alpine', $19846 = 'Alpine Linux', $19847 = '', $19848 = '', $19849 = '3.12', $19850 = '', $19851 = '', $19852 = 'Alpine Linux v3.12', $19853 = '', $19854 = '', $19855 = '', $19856 = '1.8.1-r0', $19857 = 'invalid', $19858 = NULL, $19859 = '{}', $19860 = '{}', $19861 = 'md5', $19862 = '\xd3d82106c4938c5dd612edd1d2e4db79', $19863 = 'CVE-2019-3856', $19864 = 'alpine-main-v3.12-updater', $19865 = '', $19866 = '0001-01-01 00:00:00+00', $19867 = 'https://www.cve.org/CVERecord?id=CVE-2019-3856', $19868 = '', $19869 = 'Unknown', $19870 = 'libssh2', $19871 = '', $19872 = '', $19873 = '', $19874 = 'source', $19875 = 'alpine', $19876 = 'Alpine Linux', $19877 = '', $19878 = '', $19879 = '3.12', $19880 = '', $19881 = '', $19882 = 'Alpine Linux v3.12', $19883 = '', $19884 = '', $19885 = '', $19886 = '1.8.1-r0', $19887 = 'invalid', $19888 = NULL, $19889 = '{}', $19890 = '{}', $19891 = 'md5', $19892 = '\x9caa6a764a6c8daedd092ee802de9a89', $19893 = 'CVE-2019-3857', $19894 = 'alpine-main-v3.12-updater', $19895 = '', $19896 = '0001-01-01 00:00:00+00', $19897 = 'https://www.cve.org/CVERecord?id=CVE-2019-3857', $19898 = '', $19899 = 'Unknown', $19900 = 'libssh2', $19901 = '', $19902 = '', $19903 = '', $19904 = 'source', $19905 = 'alpine', $19906 = 'Alpine Linux', $19907 = '', $19908 = '', $19909 = '3.12', $19910 = '', $19911 = '', $19912 = 'Alpine Linux v3.12', $19913 = '', $19914 = '', $19915 = '', $19916 = '1.8.1-r0', $19917 = 'invalid', $19918 = NULL, $19919 = '{}', $19920 = '{}', $19921 = 'md5', $19922 = '\x30d199b63446b836dc8d4a9c9c4a8841', $19923 = 'CVE-2019-3858', $19924 = 'alpine-main-v3.12-updater', $19925 = '', $19926 = '0001-01-01 00:00:00+00', $19927 = 'https://www.cve.org/CVERecord?id=CVE-2019-3858', $19928 = '', $19929 = 'Unknown', $19930 = 'libssh2', $19931 = '', $19932 = '', $19933 = '', $19934 = 'source', $19935 = 'alpine', $19936 = 'Alpine Linux', $19937 = '', $19938 = '', $19939 = '3.12', $19940 = '', $19941 = '', $19942 = 'Alpine Linux v3.12', $19943 = '', $19944 = '', $19945 = '', $19946 = '1.8.1-r0', $19947 = 'invalid', $19948 = NULL, $19949 = '{}', $19950 = '{}', $19951 = 'md5', $19952 = '\x29aa464d3834088b438388ee60e92478', $19953 = 'CVE-2019-3859', $19954 = 'alpine-main-v3.12-updater', $19955 = '', $19956 = '0001-01-01 00:00:00+00', $19957 = 'https://www.cve.org/CVERecord?id=CVE-2019-3859', $19958 = '', $19959 = 'Unknown', $19960 = 'libssh2', $19961 = '', $19962 = '', $19963 = '', $19964 = 'source', $19965 = 'alpine', $19966 = 'Alpine Linux', $19967 = '', $19968 = '', $19969 = '3.12', $19970 = '', $19971 = '', $19972 = 'Alpine Linux v3.12', $19973 = '', $19974 = '', $19975 = '', $19976 = '1.8.1-r0', $19977 = 'invalid', $19978 = NULL, $19979 = '{}', $19980 = '{}', $19981 = 'md5', $19982 = '\x901d8ba4909bfabafb0656da9eb80aed', $19983 = 'CVE-2019-3860', $19984 = 'alpine-main-v3.12-updater', $19985 = '', $19986 = '0001-01-01 00:00:00+00', $19987 = 'https://www.cve.org/CVERecord?id=CVE-2019-3860', $19988 = '', $19989 = 'Unknown', $19990 = 'libssh2', $19991 = '', $19992 = '', $19993 = '', $19994 = 'source', $19995 = 'alpine', $19996 = 'Alpine Linux', $19997 = '', $19998 = '', $19999 = '3.12', $20000 = '', $20001 = '', $20002 = 'Alpine Linux v3.12', $20003 = '', $20004 = '', $20005 = '', $20006 = '1.8.1-r0', $20007 = 'invalid', $20008 = NULL, $20009 = '{}', $20010 = '{}', $20011 = 'md5', $20012 = '\xe37525bd9537bc8588a4428e40147d3c', $20013 = 'CVE-2019-3861', $20014 = 'alpine-main-v3.12-updater', $20015 = '', $20016 = '0001-01-01 00:00:00+00', $20017 = 'https://www.cve.org/CVERecord?id=CVE-2019-3861', $20018 = '', $20019 = 'Unknown', $20020 = 'libssh2', $20021 = '', $20022 = '', $20023 = '', $20024 = 'source', $20025 = 'alpine', $20026 = 'Alpine Linux', $20027 = '', $20028 = '', $20029 = '3.12', $20030 = '', $20031 = '', $20032 = 'Alpine Linux v3.12', $20033 = '', $20034 = '', $20035 = '', $20036 = '1.8.1-r0', $20037 = 'invalid', $20038 = NULL, $20039 = '{}', $20040 = '{}', $20041 = 'md5', $20042 = '\x8c5510b3cb05c56e0fcf6551757f3950', $20043 = 'CVE-2019-3862', $20044 = 'alpine-main-v3.12-updater', $20045 = '', $20046 = '0001-01-01 00:00:00+00', $20047 = 'https://www.cve.org/CVERecord?id=CVE-2019-3862', $20048 = '', $20049 = 'Unknown', $20050 = 'libssh2', $20051 = '', $20052 = '', $20053 = '', $20054 = 'source', $20055 = 'alpine', $20056 = 'Alpine Linux', $20057 = '', $20058 = '', $20059 = '3.12', $20060 = '', $20061 = '', $20062 = 'Alpine Linux v3.12', $20063 = '', $20064 = '', $20065 = '', $20066 = '1.8.1-r0', $20067 = 'invalid', $20068 = NULL, $20069 = '{}', $20070 = '{}', $20071 = 'md5', $20072 = '\x6e3eeae4a7a464da3c047cef19a8fbf1', $20073 = 'CVE-2019-3863', $20074 = 'alpine-main-v3.12-updater', $20075 = '', $20076 = '0001-01-01 00:00:00+00', $20077 = 'https://www.cve.org/CVERecord?id=CVE-2019-3863', $20078 = '', $20079 = 'Unknown', $20080 = 'libssh2', $20081 = '', $20082 = '', $20083 = '', $20084 = 'source', $20085 = 'alpine', $20086 = 'Alpine Linux', $20087 = '', $20088 = '', $20089 = '3.12', $20090 = '', $20091 = '', $20092 = 'Alpine Linux v3.12', $20093 = '', $20094 = '', $20095 = '', $20096 = '1.8.1-r0', $20097 = 'invalid', $20098 = NULL, $20099 = '{}', $20100 = '{}', $20101 = 'md5', $20102 = '\x6d025237bcc8e282a249186504505101', $20103 = 'CVE-2017-10790', $20104 = 'alpine-main-v3.12-updater', $20105 = '', $20106 = '0001-01-01 00:00:00+00', $20107 = 'https://www.cve.org/CVERecord?id=CVE-2017-10790', $20108 = '', $20109 = 'Unknown', $20110 = 'libtasn1', $20111 = '', $20112 = '', $20113 = '', $20114 = 'source', $20115 = 'alpine', $20116 = 'Alpine Linux', $20117 = '', $20118 = '', $20119 = '3.12', $20120 = '', $20121 = '', $20122 = 'Alpine Linux v3.12', $20123 = '', $20124 = '', $20125 = '', $20126 = '4.12-r1', $20127 = 'invalid', $20128 = NULL, $20129 = '{}', $20130 = '{}', $20131 = 'md5', $20132 = '\x31ff3c046e56c7e65efbeb5d77f80276', $20133 = 'CVE-2018-6003', $20134 = 'alpine-main-v3.12-updater', $20135 = '', $20136 = '0001-01-01 00:00:00+00', $20137 = 'https://www.cve.org/CVERecord?id=CVE-2018-6003', $20138 = '', $20139 = 'Unknown', $20140 = 'libtasn1', $20141 = '', $20142 = '', $20143 = '', $20144 = 'source', $20145 = 'alpine', $20146 = 'Alpine Linux', $20147 = '', $20148 = '', $20149 = '3.12', $20150 = '', $20151 = '', $20152 = 'Alpine Linux v3.12', $20153 = '', $20154 = '', $20155 = '', $20156 = '4.13-r0', $20157 = 'invalid', $20158 = NULL, $20159 = '{}', $20160 = '{}', $20161 = 'md5', $20162 = '\xc124fe2efb13a8d28c02d9b42ae2efe8', $20163 = 'CVE-2018-1000654', $20164 = 'alpine-main-v3.12-updater', $20165 = '', $20166 = '0001-01-01 00:00:00+00', $20167 = 'https://www.cve.org/CVERecord?id=CVE-2018-1000654', $20168 = '', $20169 = 'Unknown', $20170 = 'libtasn1', $20171 = '', $20172 = '', $20173 = '', $20174 = 'source', $20175 = 'alpine', $20176 = 'Alpine Linux', $20177 = '', $20178 = '', $20179 = '3.12', $20180 = '', $20181 = '', $20182 = 'Alpine Linux v3.12', $20183 = '', $20184 = '', $20185 = '', $20186 = '4.14-r0', $20187 = 'invalid', $20188 = NULL, $20189 = '{}', $20190 = '{}', $20191 = 'md5', $20192 = '\xfbc0edeb42be9619ffdb0b0fb8ffa050', $20193 = 'CVE-2020-8252', $20194 = 'alpine-main-v3.12-updater', $20195 = '', $20196 = '0001-01-01 00:00:00+00', $20197 = 'https://www.cve.org/CVERecord?id=CVE-2020-8252', $20198 = '', $20199 = 'Unknown', $20200 = 'libuv', $20201 = '', $20202 = '', $20203 = '', $20204 = 'source', $20205 = 'alpine', $20206 = 'Alpine Linux', $20207 = '', $20208 = '', $20209 = '3.12', $20210 = '', $20211 = '', $20212 = 'Alpine Linux v3.12', $20213 = '', $20214 = '', $20215 = '', $20216 = '1.38.1-r0', $20217 = 'invalid', $20218 = NULL, $20219 = '{}', $20220 = '{}', $20221 = 'md5', $20222 = '\xce9b3d4fed17535610dab12ebf661bc4', $20223 = 'CVE-2019-10168', $20224 = 'alpine-main-v3.12-updater', $20225 = '', $20226 = '0001-01-01 00:00:00+00', $20227 = 'https://www.cve.org/CVERecord?id=CVE-2019-10168', $20228 = '', $20229 = 'Unknown', $20230 = 'libvirt', $20231 = '', $20232 = '', $20233 = '', $20234 = 'source', $20235 = 'alpine', $20236 = 'Alpine Linux', $20237 = '', $20238 = '', $20239 = '3.12', $20240 = '', $20241 = '', $20242 = 'Alpine Linux v3.12', $20243 = '', $20244 = '', $20245 = '', $20246 = '5.5.0-r0', $20247 = 'invalid', $20248 = NULL, $20249 = '{}', $20250 = '{}', $20251 = 'md5', $20252 = '\x5c47c5715ecc3fcac854f1433befecab', $20253 = 'CVE-2019-10167', $20254 = 'alpine-main-v3.12-updater', $20255 = '', $20256 = '0001-01-01 00:00:00+00', $20257 = 'https://www.cve.org/CVERecord?id=CVE-2019-10167', $20258 = '', $20259 = 'Unknown', $20260 = 'libvirt', $20261 = '', $20262 = '', $20263 = '', $20264 = 'source', $20265 = 'alpine', $20266 = 'Alpine Linux', $20267 = '', $20268 = '', $20269 = '3.12', $20270 = '', $20271 = '', $20272 = 'Alpine Linux v3.12', $20273 = '', $20274 = '', $20275 = '', $20276 = '5.5.0-r0', $20277 = 'invalid', $20278 = NULL, $20279 = '{}', $20280 = '{}', $20281 = 'md5', $20282 = '\xfc7ec828c43edef20576b80be0399683', $20283 = 'CVE-2019-10166', $20284 = 'alpine-main-v3.12-updater', $20285 = '', $20286 = '0001-01-01 00:00:00+00', $20287 = 'https://www.cve.org/CVERecord?id=CVE-2019-10166', $20288 = '', $20289 = 'Unknown', $20290 = 'libvirt', $20291 = '', $20292 = '', $20293 = '', $20294 = 'source', $20295 = 'alpine', $20296 = 'Alpine Linux', $20297 = '', $20298 = '', $20299 = '3.12', $20300 = '', $20301 = '', $20302 = 'Alpine Linux v3.12', $20303 = '', $20304 = '', $20305 = '', $20306 = '5.5.0-r0', $20307 = 'invalid', $20308 = NULL, $20309 = '{}', $20310 = '{}', $20311 = 'md5', $20312 = '\x834e9c8bb409c2829bc9de8df5edebfa', $20313 = 'CVE-2019-10161', $20314 = 'alpine-main-v3.12-updater', $20315 = '', $20316 = '0001-01-01 00:00:00+00', $20317 = 'https://www.cve.org/CVERecord?id=CVE-2019-10161', $20318 = '', $20319 = 'Unknown', $20320 = 'libvirt', $20321 = '', $20322 = '', $20323 = '', $20324 = 'source', $20325 = 'alpine', $20326 = 'Alpine Linux', $20327 = '', $20328 = '', $20329 = '3.12', $20330 = '', $20331 = '', $20332 = 'Alpine Linux v3.12', $20333 = '', $20334 = '', $20335 = '', $20336 = '5.5.0-r0', $20337 = 'invalid', $20338 = NULL, $20339 = '{}', $20340 = '{}', $20341 = 'md5', $20342 = '\x38b97d97150323e983851df329a4a74a', $20343 = 'CVE-2020-14339', $20344 = 'alpine-main-v3.12-updater', $20345 = '', $20346 = '0001-01-01 00:00:00+00', $20347 = 'https://www.cve.org/CVERecord?id=CVE-2020-14339', $20348 = '', $20349 = 'Unknown', $20350 = 'libvirt', $20351 = '', $20352 = '', $20353 = '', $20354 = 'source', $20355 = 'alpine', $20356 = 'Alpine Linux', $20357 = '', $20358 = '', $20359 = '3.12', $20360 = '', $20361 = '', $20362 = 'Alpine Linux v3.12', $20363 = '', $20364 = '', $20365 = '', $20366 = '6.6.0-r0', $20367 = 'invalid', $20368 = NULL, $20369 = '{}', $20370 = '{}', $20371 = 'md5', $20372 = '\x6295cb0a6e198e29818d9ff2e3d10126', $20373 = 'CVE-2020-25637', $20374 = 'alpine-main-v3.12-updater', $20375 = '', $20376 = '0001-01-01 00:00:00+00', $20377 = 'https://www.cve.org/CVERecord?id=CVE-2020-25637', $20378 = '', $20379 = 'Unknown', $20380 = 'libvirt', $20381 = '', $20382 = '', $20383 = '', $20384 = 'source', $20385 = 'alpine', $20386 = 'Alpine Linux', $20387 = '', $20388 = '', $20389 = '3.12', $20390 = '', $20391 = '', $20392 = 'Alpine Linux v3.12', $20393 = '', $20394 = '', $20395 = '', $20396 = '6.6.0-r3', $20397 = 'invalid', $20398 = NULL, $20399 = '{}', $20400 = '{}', $20401 = 'md5', $20402 = '\xe8a4f134d84c3b8d1496c41f42556e35', $20403 = 'CVE-2017-14632', $20404 = 'alpine-main-v3.12-updater', $20405 = '', $20406 = '0001-01-01 00:00:00+00', $20407 = 'https://www.cve.org/CVERecord?id=CVE-2017-14632', $20408 = '', $20409 = 'Unknown', $20410 = 'libvorbis', $20411 = '', $20412 = '', $20413 = '', $20414 = 'source', $20415 = 'alpine', $20416 = 'Alpine Linux', $20417 = '', $20418 = '', $20419 = '3.12', $20420 = '', $20421 = '', $20422 = 'Alpine Linux v3.12', $20423 = '', $20424 = '', $20425 = '', $20426 = '1.3.5-r4', $20427 = 'invalid', $20428 = NULL, $20429 = '{}', $20430 = '{}', $20431 = 'md5', $20432 = '\x932a4309949ad0fadfa5b8f162d81a39', $20433 = 'CVE-2017-14633', $20434 = 'alpine-main-v3.12-updater', $20435 = '', $20436 = '0001-01-01 00:00:00+00', $20437 = 'https://www.cve.org/CVERecord?id=CVE-2017-14633', $20438 = '', $20439 = 'Unknown', $20440 = 'libvorbis', $20441 = '', $20442 = '', $20443 = '', $20444 = 'source', $20445 = 'alpine', $20446 = 'Alpine Linux', $20447 = '', $20448 = '', $20449 = '3.12', $20450 = '', $20451 = '', $20452 = 'Alpine Linux v3.12', $20453 = '', $20454 = '', $20455 = '', $20456 = '1.3.5-r4', $20457 = 'invalid', $20458 = NULL, $20459 = '{}', $20460 = '{}', $20461 = 'md5', $20462 = '\x340cf48c75b8b807ff86ccae1355621b', $20463 = 'CVE-2018-5146', $20464 = 'alpine-main-v3.12-updater', $20465 = '', $20466 = '0001-01-01 00:00:00+00', $20467 = 'https://www.cve.org/CVERecord?id=CVE-2018-5146', $20468 = '', $20469 = 'Unknown', $20470 = 'libvorbis', $20471 = '', $20472 = '', $20473 = '', $20474 = 'source', $20475 = 'alpine', $20476 = 'Alpine Linux', $20477 = '', $20478 = '', $20479 = '3.12', $20480 = '', $20481 = '', $20482 = 'Alpine Linux v3.12', $20483 = '', $20484 = '', $20485 = '', $20486 = '1.3.6-r0', $20487 = 'invalid', $20488 = NULL, $20489 = '{}', $20490 = '{}', $20491 = 'md5', $20492 = '\xca696007cea326cee9c89e18e86c63cc', $20493 = 'CVE-2018-10392', $20494 = 'alpine-main-v3.12-updater', $20495 = '', $20496 = '0001-01-01 00:00:00+00', $20497 = 'https://www.cve.org/CVERecord?id=CVE-2018-10392', $20498 = '', $20499 = 'Unknown', $20500 = 'libvorbis', $20501 = '', $20502 = '', $20503 = '', $20504 = 'source', $20505 = 'alpine', $20506 = 'Alpine Linux', $20507 = '', $20508 = '', $20509 = '3.12', $20510 = '', $20511 = '', $20512 = 'Alpine Linux v3.12', $20513 = '', $20514 = '', $20515 = '', $20516 = '1.3.6-r1', $20517 = 'invalid', $20518 = NULL, $20519 = '{}', $20520 = '{}', $20521 = 'md5', $20522 = '\xfaa2d6b651c4fc5d4165502f50ebcab4', $20523 = 'CVE-2018-10393', $20524 = 'alpine-main-v3.12-updater', $20525 = '', $20526 = '0001-01-01 00:00:00+00', $20527 = 'https://www.cve.org/CVERecord?id=CVE-2018-10393', $20528 = '', $20529 = 'Unknown', $20530 = 'libvorbis', $20531 = '', $20532 = '', $20533 = '', $20534 = 'source', $20535 = 'alpine', $20536 = 'Alpine Linux', $20537 = '', $20538 = '', $20539 = '3.12', $20540 = '', $20541 = '', $20542 = 'Alpine Linux v3.12', $20543 = '', $20544 = '', $20545 = '', $20546 = '1.3.6-r2', $20547 = 'invalid', $20548 = NULL, $20549 = '{}', $20550 = '{}', $20551 = 'md5', $20552 = '\xebc0d9fccbcb18f939affdf89ac1f414', $20553 = 'CVE-2017-14160', $20554 = 'alpine-main-v3.12-updater', $20555 = '', $20556 = '0001-01-01 00:00:00+00', $20557 = 'https://www.cve.org/CVERecord?id=CVE-2017-14160', $20558 = '', $20559 = 'Unknown', $20560 = 'libvorbis', $20561 = '', $20562 = '', $20563 = '', $20564 = 'source', $20565 = 'alpine', $20566 = 'Alpine Linux', $20567 = '', $20568 = '', $20569 = '3.12', $20570 = '', $20571 = '', $20572 = 'Alpine Linux v3.12', $20573 = '', $20574 = '', $20575 = '', $20576 = '1.3.5-r3', $20577 = 'invalid', $20578 = NULL, $20579 = '{}', $20580 = '{}', $20581 = 'md5', $20582 = '\x028769cf499bf522497feb6d8a189afb', $20583 = 'CVE-2020-14344', $20584 = 'alpine-main-v3.12-updater', $20585 = '', $20586 = '0001-01-01 00:00:00+00', $20587 = 'https://www.cve.org/CVERecord?id=CVE-2020-14344', $20588 = '', $20589 = 'Unknown', $20590 = 'libx11', $20591 = '', $20592 = '', $20593 = '', $20594 = 'source', $20595 = 'alpine', $20596 = 'Alpine Linux', $20597 = '', $20598 = '', $20599 = '3.12', $20600 = '', $20601 = '', $20602 = 'Alpine Linux v3.12', $20603 = '', $20604 = '', $20605 = '', $20606 = '1.6.10-r0', $20607 = 'invalid', $20608 = NULL, $20609 = '{}', $20610 = '{}', $20611 = 'md5', $20612 = '\xa32566ae09d7aac4fa8148d2a6b7adc5', $20613 = 'CVE-2020-14363', $20614 = 'alpine-main-v3.12-updater', $20615 = '', $20616 = '0001-01-01 00:00:00+00', $20617 = 'https://www.cve.org/CVERecord?id=CVE-2020-14363', $20618 = '', $20619 = 'Unknown', $20620 = 'libx11', $20621 = '', $20622 = '', $20623 = '', $20624 = 'source', $20625 = 'alpine', $20626 = 'Alpine Linux', $20627 = '', $20628 = '', $20629 = '3.12', $20630 = '', $20631 = '', $20632 = 'Alpine Linux v3.12', $20633 = '', $20634 = '', $20635 = '', $20636 = '1.6.12-r0', $20637 = 'invalid', $20638 = NULL, $20639 = '{}', $20640 = '{}', $20641 = 'md5', $20642 = '\x7178c20997aac3c1fb54882c6feb63ce', $20643 = 'CVE-2021-31535', $20644 = 'alpine-main-v3.12-updater', $20645 = '', $20646 = '0001-01-01 00:00:00+00', $20647 = 'https://www.cve.org/CVERecord?id=CVE-2021-31535', $20648 = '', $20649 = 'Unknown', $20650 = 'libx11', $20651 = '', $20652 = '', $20653 = '', $20654 = 'source', $20655 = 'alpine', $20656 = 'Alpine Linux', $20657 = '', $20658 = '', $20659 = '3.12', $20660 = '', $20661 = '', $20662 = 'Alpine Linux v3.12', $20663 = '', $20664 = '', $20665 = '', $20666 = '1.6.12-r1', $20667 = 'invalid', $20668 = NULL, $20669 = '{}', $20670 = '{}', $20671 = 'md5', $20672 = '\xe06bc44b0ac30a9cd379025662acb1b4', $20673 = 'CVE-2018-14598', $20674 = 'alpine-main-v3.12-updater', $20675 = '', $20676 = '0001-01-01 00:00:00+00', $20677 = 'https://www.cve.org/CVERecord?id=CVE-2018-14598', $20678 = '', $20679 = 'Unknown', $20680 = 'libx11', $20681 = '', $20682 = '', $20683 = '', $20684 = 'source', $20685 = 'alpine', $20686 = 'Alpine Linux', $20687 = '', $20688 = '', $20689 = '3.12', $20690 = '', $20691 = '', $20692 = 'Alpine Linux v3.12', $20693 = '', $20694 = '', $20695 = '', $20696 = '1.6.6-r0', $20697 = 'invalid', $20698 = NULL, $20699 = '{}', $20700 = '{}', $20701 = 'md5', $20702 = '\xd677c7ff6e26b08507fb65db2c80d089', $20703 = 'CVE-2018-14599', $20704 = 'alpine-main-v3.12-updater', $20705 = '', $20706 = '0001-01-01 00:00:00+00', $20707 = 'https://www.cve.org/CVERecord?id=CVE-2018-14599', $20708 = '', $20709 = 'Unknown', $20710 = 'libx11', $20711 = '', $20712 = '', $20713 = '', $20714 = 'source', $20715 = 'alpine', $20716 = 'Alpine Linux', $20717 = '', $20718 = '', $20719 = '3.12', $20720 = '', $20721 = '', $20722 = 'Alpine Linux v3.12', $20723 = '', $20724 = '', $20725 = '', $20726 = '1.6.6-r0', $20727 = 'invalid', $20728 = NULL, $20729 = '{}', $20730 = '{}', $20731 = 'md5', $20732 = '\xd981cc4d08c4d6dd2cd8143cfa340454', $20733 = 'CVE-2018-14600', $20734 = 'alpine-main-v3.12-updater', $20735 = '', $20736 = '0001-01-01 00:00:00+00', $20737 = 'https://www.cve.org/CVERecord?id=CVE-2018-14600', $20738 = '', $20739 = 'Unknown', $20740 = 'libx11', $20741 = '', $20742 = '', $20743 = '', $20744 = 'source', $20745 = 'alpine', $20746 = 'Alpine Linux', $20747 = '', $20748 = '', $20749 = '3.12', $20750 = '', $20751 = '', $20752 = 'Alpine Linux v3.12', $20753 = '', $20754 = '', $20755 = '', $20756 = '1.6.6-r0', $20757 = 'invalid', $20758 = NULL, $20759 = '{}', $20760 = '{}', $20761 = 'md5', $20762 = '\x506efcfca687084e7b418f921bcb72e5', $20763 = 'CVE-2017-16612', $20764 = 'alpine-main-v3.12-updater', $20765 = '', $20766 = '0001-01-01 00:00:00+00', $20767 = 'https://www.cve.org/CVERecord?id=CVE-2017-16612', $20768 = '', $20769 = 'Unknown', $20770 = 'libxcursor', $20771 = '', $20772 = '', $20773 = '', $20774 = 'source', $20775 = 'alpine', $20776 = 'Alpine Linux', $20777 = '', $20778 = '', $20779 = '3.12', $20780 = '', $20781 = '', $20782 = 'Alpine Linux v3.12', $20783 = '', $20784 = '', $20785 = '', $20786 = '1.1.15-r0', $20787 = 'invalid', $20788 = NULL, $20789 = '{}', $20790 = '{}', $20791 = 'md5', $20792 = '\x6d2619022a800b8e6954cb37b3dd37a9', $20793 = 'CVE-2017-2625', $20794 = 'alpine-main-v3.12-updater', $20795 = '', $20796 = '0001-01-01 00:00:00+00', $20797 = 'https://www.cve.org/CVERecord?id=CVE-2017-2625', $20798 = '', $20799 = 'Unknown', $20800 = 'libxdmcp', $20801 = '', $20802 = '', $20803 = '', $20804 = 'source', $20805 = 'alpine', $20806 = 'Alpine Linux', $20807 = '', $20808 = '', $20809 = '3.12', $20810 = '', $20811 = '', $20812 = 'Alpine Linux v3.12', $20813 = '', $20814 = '', $20815 = '', $20816 = '1.1.2-r3', $20817 = 'invalid', $20818 = NULL, $20819 = '{}', $20820 = '{}', $20821 = 'md5', $20822 = '\x1a0cf7d0c40ae32261269284e28e600b', $20823 = 'CVE-2017-16611', $20824 = 'alpine-main-v3.12-updater', $20825 = '', $20826 = '0001-01-01 00:00:00+00', $20827 = 'https://www.cve.org/CVERecord?id=CVE-2017-16611', $20828 = '', $20829 = 'Unknown', $20830 = 'libxfont', $20831 = '', $20832 = '', $20833 = '', $20834 = 'source', $20835 = 'alpine', $20836 = 'Alpine Linux', $20837 = '', $20838 = '', $20839 = '3.12', $20840 = '', $20841 = '', $20842 = 'Alpine Linux v3.12', $20843 = '', $20844 = '', $20845 = '', $20846 = '1.5.4-r0', $20847 = 'invalid', $20848 = NULL, $20849 = '{}', $20850 = '{}', $20851 = 'md5', $20852 = '\x4c01089a426d449faaab409e24ced8cb', $20853 = 'CVE-2017-16611', $20854 = 'alpine-main-v3.12-updater', $20855 = '', $20856 = '0001-01-01 00:00:00+00', $20857 = 'https://www.cve.org/CVERecord?id=CVE-2017-16611', $20858 = '', $20859 = 'Unknown', $20860 = 'libxfont2', $20861 = '', $20862 = '', $20863 = '', $20864 = 'source', $20865 = 'alpine', $20866 = 'Alpine Linux', $20867 = '', $20868 = '', $20869 = '3.12', $20870 = '', $20871 = '', $20872 = 'Alpine Linux v3.12', $20873 = '', $20874 = '', $20875 = '', $20876 = '2.0.3-r0', $20877 = 'invalid', $20878 = NULL, $20879 = '{}', $20880 = '{}', $20881 = 'md5', $20882 = '\x3af5c3114322f23cf2182e9f476b196a', $20883 = 'CVE-2021-3517', $20884 = 'alpine-main-v3.12-updater', $20885 = '', $20886 = '0001-01-01 00:00:00+00', $20887 = 'https://www.cve.org/CVERecord?id=CVE-2021-3517', $20888 = '', $20889 = 'Unknown', $20890 = 'libxml2', $20891 = '', $20892 = '', $20893 = '', $20894 = 'source', $20895 = 'alpine', $20896 = 'Alpine Linux', $20897 = '', $20898 = '', $20899 = '3.12', $20900 = '', $20901 = '', $20902 = 'Alpine Linux v3.12', $20903 = '', $20904 = '', $20905 = '', $20906 = '2.9.10-r6', $20907 = 'invalid', $20908 = NULL, $20909 = '{}', $20910 = '{}', $20911 = 'md5', $20912 = '\x755ab9952e950347a974e2196eeba792', $20913 = 'CVE-2021-3518', $20914 = 'alpine-main-v3.12-updater', $20915 = '', $20916 = '0001-01-01 00:00:00+00', $20917 = 'https://www.cve.org/CVERecord?id=CVE-2021-3518', $20918 = '', $20919 = 'Unknown', $20920 = 'libxml2', $20921 = '', $20922 = '', $20923 = '', $20924 = 'source', $20925 = 'alpine', $20926 = 'Alpine Linux', $20927 = '', $20928 = '', $20929 = '3.12', $20930 = '', $20931 = '', $20932 = 'Alpine Linux v3.12', $20933 = '', $20934 = '', $20935 = '', $20936 = '2.9.10-r6', $20937 = 'invalid', $20938 = NULL, $20939 = '{}', $20940 = '{}', $20941 = 'md5', $20942 = '\xcd6c079e3cc02a7ecf72599cb3173332', $20943 = 'CVE-2021-3537', $20944 = 'alpine-main-v3.12-updater', $20945 = '', $20946 = '0001-01-01 00:00:00+00', $20947 = 'https://www.cve.org/CVERecord?id=CVE-2021-3537', $20948 = '', $20949 = 'Unknown', $20950 = 'libxml2', $20951 = '', $20952 = '', $20953 = '', $20954 = 'source', $20955 = 'alpine', $20956 = 'Alpine Linux', $20957 = '', $20958 = '', $20959 = '3.12', $20960 = '', $20961 = '', $20962 = 'Alpine Linux v3.12', $20963 = '', $20964 = '', $20965 = '', $20966 = '2.9.10-r6', $20967 = 'invalid', $20968 = NULL, $20969 = '{}', $20970 = '{}', $20971 = 'md5', $20972 = '\x89b1637791936e3c921461b2ba353a14', $20973 = 'CVE-2021-3541', $20974 = 'alpine-main-v3.12-updater', $20975 = '', $20976 = '0001-01-01 00:00:00+00', $20977 = 'https://www.cve.org/CVERecord?id=CVE-2021-3541', $20978 = '', $20979 = 'Unknown', $20980 = 'libxml2', $20981 = '', $20982 = '', $20983 = '', $20984 = 'source', $20985 = 'alpine', $20986 = 'Alpine Linux', $20987 = '', $20988 = '', $20989 = '3.12', $20990 = '', $20991 = '', $20992 = 'Alpine Linux v3.12', $20993 = '', $20994 = '', $20995 = '', $20996 = '2.9.12-r0', $20997 = 'invalid', $20998 = NULL, $20999 = '{}', $21000 = '{}', $21001 = 'md5', $21002 = '\x408097353fd694bd496e62d3d1c5c363', $21003 = 'CVE-2016-9318', $21004 = 'alpine-main-v3.12-updater', $21005 = '', $21006 = '0001-01-01 00:00:00+00', $21007 = 'https://www.cve.org/CVERecord?id=CVE-2016-9318', $21008 = '', $21009 = 'Unknown', $21010 = 'libxml2', $21011 = '', $21012 = '', $21013 = '', $21014 = 'source', $21015 = 'alpine', $21016 = 'Alpine Linux', $21017 = '', $21018 = '', $21019 = '3.12', $21020 = '', $21021 = '', $21022 = 'Alpine Linux v3.12', $21023 = '', $21024 = '', $21025 = '', $21026 = '2.9.4-r2', $21027 = 'invalid', $21028 = NULL, $21029 = '{}', $21030 = '{}', $21031 = 'md5', $21032 = '\xa6a70fd3b875c2eb7378305e8987e3c3', $21033 = 'CVE-2020-7595', $21034 = 'alpine-main-v3.12-updater', $21035 = '', $21036 = '0001-01-01 00:00:00+00', $21037 = 'https://www.cve.org/CVERecord?id=CVE-2020-7595', $21038 = '', $21039 = 'Unknown', $21040 = 'libxml2', $21041 = '', $21042 = '', $21043 = '', $21044 = 'source', $21045 = 'alpine', $21046 = 'Alpine Linux', $21047 = '', $21048 = '', $21049 = '3.12', $21050 = '', $21051 = '', $21052 = 'Alpine Linux v3.12', $21053 = '', $21054 = '', $21055 = '', $21056 = '2.9.8-r3', $21057 = 'invalid', $21058 = NULL, $21059 = '{}', $21060 = '{}', $21061 = 'md5', $21062 = '\xcb9d57944b1e875320b7e4187744faf0', $21063 = 'CVE-2019-20388', $21064 = 'alpine-main-v3.12-updater', $21065 = '', $21066 = '0001-01-01 00:00:00+00', $21067 = 'https://www.cve.org/CVERecord?id=CVE-2019-20388', $21068 = '', $21069 = 'Unknown', $21070 = 'libxml2', $21071 = '', $21072 = '', $21073 = '', $21074 = 'source', $21075 = 'alpine', $21076 = 'Alpine Linux', $21077 = '', $21078 = '', $21079 = '3.12', $21080 = '', $21081 = '', $21082 = 'Alpine Linux v3.12', $21083 = '', $21084 = '', $21085 = '', $21086 = '2.9.10-r4', $21087 = 'invalid', $21088 = NULL, $21089 = '{}', $21090 = '{}', $21091 = 'md5', $21092 = '\xd6aa00a1e350cb05b6698d148da59cee', $21093 = 'CVE-2020-24977', $21094 = 'alpine-main-v3.12-updater', $21095 = '', $21096 = '0001-01-01 00:00:00+00', $21097 = 'https://www.cve.org/CVERecord?id=CVE-2020-24977', $21098 = '', $21099 = 'Unknown', $21100 = 'libxml2', $21101 = '', $21102 = '', $21103 = '', $21104 = 'source', $21105 = 'alpine', $21106 = 'Alpine Linux', $21107 = '', $21108 = '', $21109 = '3.12', $21110 = '', $21111 = '', $21112 = 'Alpine Linux v3.12', $21113 = '', $21114 = '', $21115 = '', $21116 = '2.9.10-r5', $21117 = 'invalid', $21118 = NULL, $21119 = '{}', $21120 = '{}', $21121 = 'md5', $21122 = '\x3e4a680febf4a8a06645a1438419cfa2', $21123 = 'CVE-2016-5131', $21124 = 'alpine-main-v3.12-updater', $21125 = '', $21126 = '0001-01-01 00:00:00+00', $21127 = 'https://www.cve.org/CVERecord?id=CVE-2016-5131', $21128 = '', $21129 = 'Unknown', $21130 = 'libxml2', $21131 = '', $21132 = '', $21133 = '', $21134 = 'source', $21135 = 'alpine', $21136 = 'Alpine Linux', $21137 = '', $21138 = '', $21139 = '3.12', $21140 = '', $21141 = '', $21142 = 'Alpine Linux v3.12', $21143 = '', $21144 = '', $21145 = '', $21146 = '2.9.4-r1', $21147 = 'invalid', $21148 = NULL, $21149 = '{}', $21150 = '{}', $21151 = 'md5', $21152 = '\x1a4e01de3568b34d9b8251f125dac46e', $21153 = 'CVE-2017-5969', $21154 = 'alpine-main-v3.12-updater', $21155 = '', $21156 = '0001-01-01 00:00:00+00', $21157 = 'https://www.cve.org/CVERecord?id=CVE-2017-5969', $21158 = '', $21159 = 'Unknown', $21160 = 'libxml2', $21161 = '', $21162 = '', $21163 = '', $21164 = 'source', $21165 = 'alpine', $21166 = 'Alpine Linux', $21167 = '', $21168 = '', $21169 = '3.12', $21170 = '', $21171 = '', $21172 = 'Alpine Linux v3.12', $21173 = '', $21174 = '', $21175 = '', $21176 = '2.9.4-r4', $21177 = 'invalid', $21178 = NULL, $21179 = '{}', $21180 = '{}', $21181 = 'md5', $21182 = '\x0a1861911e7cea3c2b6ce3cbd2088420', $21183 = 'CVE-2018-9251', $21184 = 'alpine-main-v3.12-updater', $21185 = '', $21186 = '0001-01-01 00:00:00+00', $21187 = 'https://www.cve.org/CVERecord?id=CVE-2018-9251', $21188 = '', $21189 = 'Unknown', $21190 = 'libxml2', $21191 = '', $21192 = '', $21193 = '', $21194 = 'source', $21195 = 'alpine', $21196 = 'Alpine Linux', $21197 = '', $21198 = '', $21199 = '3.12', $21200 = '', $21201 = '', $21202 = 'Alpine Linux v3.12', $21203 = '', $21204 = '', $21205 = '', $21206 = '2.9.8-r1', $21207 = 'invalid', $21208 = NULL, $21209 = '{}', $21210 = '{}', $21211 = 'md5', $21212 = '\xafe421fe1037dc3292fcfd2826b62fc2', $21213 = 'CVE-2018-14404', $21214 = 'alpine-main-v3.12-updater', $21215 = '', $21216 = '0001-01-01 00:00:00+00', $21217 = 'https://www.cve.org/CVERecord?id=CVE-2018-14404', $21218 = '', $21219 = 'Unknown', $21220 = 'libxml2', $21221 = '', $21222 = '', $21223 = '', $21224 = 'source', $21225 = 'alpine', $21226 = 'Alpine Linux', $21227 = '', $21228 = '', $21229 = '3.12', $21230 = '', $21231 = '', $21232 = 'Alpine Linux v3.12', $21233 = '', $21234 = '', $21235 = '', $21236 = '2.9.8-r1', $21237 = 'invalid', $21238 = NULL, $21239 = '{}', $21240 = '{}', $21241 = 'md5', $21242 = '\x43179179836d6085566dcfcd1ef16893', $21243 = 'CVE-2018-14567', $21244 = 'alpine-main-v3.12-updater', $21245 = '', $21246 = '0001-01-01 00:00:00+00', $21247 = 'https://www.cve.org/CVERecord?id=CVE-2018-14567', $21248 = '', $21249 = 'Unknown', $21250 = 'libxml2', $21251 = '', $21252 = '', $21253 = '', $21254 = 'source', $21255 = 'alpine', $21256 = 'Alpine Linux', $21257 = '', $21258 = '', $21259 = '3.12', $21260 = '', $21261 = '', $21262 = 'Alpine Linux v3.12', $21263 = '', $21264 = '', $21265 = '', $21266 = '2.9.8-r1', $21267 = 'invalid', $21268 = NULL, $21269 = '{}', $21270 = '{}', $21271 = 'md5', $21272 = '\xb14d7f6cf5bde23ea2321e0c47c733e4', $21273 = 'CVE-2022-23308', $21274 = 'alpine-main-v3.12-updater', $21275 = '', $21276 = '0001-01-01 00:00:00+00', $21277 = 'https://www.cve.org/CVERecord?id=CVE-2022-23308', $21278 = '', $21279 = 'Unknown', $21280 = 'libxml2', $21281 = '', $21282 = '', $21283 = '', $21284 = 'source', $21285 = 'alpine', $21286 = 'Alpine Linux', $21287 = '', $21288 = '', $21289 = '3.12', $21290 = '', $21291 = '', $21292 = 'Alpine Linux v3.12', $21293 = '', $21294 = '', $21295 = '', $21296 = '2.9.13-r0', $21297 = 'invalid', $21298 = NULL, $21299 = '{}', $21300 = '{}', $21301 = 'md5', $21302 = '\xbf79820730889157df6a7171826264af', $21303 = 'CVE-2022-29824', $21304 = 'alpine-main-v3.12-updater', $21305 = '', $21306 = '0001-01-01 00:00:00+00', $21307 = 'https://www.cve.org/CVERecord?id=CVE-2022-29824', $21308 = '', $21309 = 'Unknown', $21310 = 'libxml2', $21311 = '', $21312 = '', $21313 = '', $21314 = 'source', $21315 = 'alpine', $21316 = 'Alpine Linux', $21317 = '', $21318 = '', $21319 = '3.12', $21320 = '', $21321 = '', $21322 = 'Alpine Linux v3.12', $21323 = '', $21324 = '', $21325 = '', $21326 = '2.9.14-r0', $21327 = 'invalid', $21328 = NULL, $21329 = '{}', $21330 = '{}', $21331 = 'md5', $21332 = '\x823203fcbf0d4924838ab9986bc2cd75', $21333 = 'CVE-2017-5029', $21334 = 'alpine-main-v3.12-updater', $21335 = '', $21336 = '0001-01-01 00:00:00+00', $21337 = 'https://www.cve.org/CVERecord?id=CVE-2017-5029', $21338 = '', $21339 = 'Unknown', $21340 = 'libxslt', $21341 = '', $21342 = '', $21343 = '', $21344 = 'source', $21345 = 'alpine', $21346 = 'Alpine Linux', $21347 = '', $21348 = '', $21349 = '3.12', $21350 = '', $21351 = '', $21352 = 'Alpine Linux v3.12', $21353 = '', $21354 = '', $21355 = '', $21356 = '1.1.29-r1', $21357 = 'invalid', $21358 = NULL, $21359 = '{}', $21360 = '{}', $21361 = 'md5', $21362 = '\xaa410d5a39cd0fa88a9cf732f63aa0dc', $21363 = 'CVE-2019-11068', $21364 = 'alpine-main-v3.12-updater', $21365 = '', $21366 = '0001-01-01 00:00:00+00', $21367 = 'https://www.cve.org/CVERecord?id=CVE-2019-11068', $21368 = '', $21369 = 'Unknown', $21370 = 'libxslt', $21371 = '', $21372 = '', $21373 = '', $21374 = 'source', $21375 = 'alpine', $21376 = 'Alpine Linux', $21377 = '', $21378 = '', $21379 = '3.12', $21380 = '', $21381 = '', $21382 = 'Alpine Linux v3.12', $21383 = '', $21384 = '', $21385 = '', $21386 = '1.1.33-r1', $21387 = 'invalid', $21388 = NULL, $21389 = '{}', $21390 = '{}', $21391 = 'md5', $21392 = '\x7844b4e73ac03f5a579b7c26380bc2f9', $21393 = 'CVE-2019-18197', $21394 = 'alpine-main-v3.12-updater', $21395 = '', $21396 = '0001-01-01 00:00:00+00', $21397 = 'https://www.cve.org/CVERecord?id=CVE-2019-18197', $21398 = '', $21399 = 'Unknown', $21400 = 'libxslt', $21401 = '', $21402 = '', $21403 = '', $21404 = 'source', $21405 = 'alpine', $21406 = 'Alpine Linux', $21407 = '', $21408 = '', $21409 = '3.12', $21410 = '', $21411 = '', $21412 = 'Alpine Linux v3.12', $21413 = '', $21414 = '', $21415 = '', $21416 = '1.1.33-r3', $21417 = 'invalid', $21418 = NULL, $21419 = '{}', $21420 = '{}', $21421 = 'md5', $21422 = '\x708547f46b2dd5465db5c2d6ee80ff69', $21423 = 'CVE-2019-13117', $21424 = 'alpine-main-v3.12-updater', $21425 = '', $21426 = '0001-01-01 00:00:00+00', $21427 = 'https://www.cve.org/CVERecord?id=CVE-2019-13117', $21428 = '', $21429 = 'Unknown', $21430 = 'libxslt', $21431 = '', $21432 = '', $21433 = '', $21434 = 'source', $21435 = 'alpine', $21436 = 'Alpine Linux', $21437 = '', $21438 = '', $21439 = '3.12', $21440 = '', $21441 = '', $21442 = 'Alpine Linux v3.12', $21443 = '', $21444 = '', $21445 = '', $21446 = '1.1.34-r0', $21447 = 'invalid', $21448 = NULL, $21449 = '{}', $21450 = '{}', $21451 = 'md5', $21452 = '\x7dbdaa8faa2ab811d5de1e6e992305bc', $21453 = 'CVE-2019-13118', $21454 = 'alpine-main-v3.12-updater', $21455 = '', $21456 = '0001-01-01 00:00:00+00', $21457 = 'https://www.cve.org/CVERecord?id=CVE-2019-13118', $21458 = '', $21459 = 'Unknown', $21460 = 'libxslt', $21461 = '', $21462 = '', $21463 = '', $21464 = 'source', $21465 = 'alpine', $21466 = 'Alpine Linux', $21467 = '', $21468 = '', $21469 = '3.12', $21470 = '', $21471 = '', $21472 = 'Alpine Linux v3.12', $21473 = '', $21474 = '', $21475 = '', $21476 = '1.1.34-r0', $21477 = 'invalid', $21478 = NULL, $21479 = '{}', $21480 = '{}', $21481 = 'md5', $21482 = '\x63c139b694468b996ec7f522088e2770', $21483 = 'CVE-2021-30560', $21484 = 'alpine-main-v3.12-updater', $21485 = '', $21486 = '0001-01-01 00:00:00+00', $21487 = 'https://www.cve.org/CVERecord?id=CVE-2021-30560', $21488 = '', $21489 = 'Unknown', $21490 = 'libxslt', $21491 = '', $21492 = '', $21493 = '', $21494 = 'source', $21495 = 'alpine', $21496 = 'Alpine Linux', $21497 = '', $21498 = '', $21499 = '3.12', $21500 = '', $21501 = '', $21502 = 'Alpine Linux v3.12', $21503 = '', $21504 = '', $21505 = '', $21506 = '1.1.35-r0', $21507 = 'invalid', $21508 = NULL, $21509 = '{}', $21510 = '{}', $21511 = 'md5', $21512 = '\x65e21f78d90f6958788c9ba50f468bb9', $21513 = 'CVE-2019-6706', $21514 = 'alpine-main-v3.12-updater', $21515 = '', $21516 = '0001-01-01 00:00:00+00', $21517 = 'https://www.cve.org/CVERecord?id=CVE-2019-6706', $21518 = '', $21519 = 'Unknown', $21520 = 'lua5.3', $21521 = '', $21522 = '', $21523 = '', $21524 = 'source', $21525 = 'alpine', $21526 = 'Alpine Linux', $21527 = '', $21528 = '', $21529 = '3.12', $21530 = '', $21531 = '', $21532 = 'Alpine Linux v3.12', $21533 = '', $21534 = '', $21535 = '', $21536 = '5.3.5-r2', $21537 = 'invalid', $21538 = NULL, $21539 = '{}', $21540 = '{}', $21541 = 'md5', $21542 = '\xd4164b740ac61174db86c5a7dcce7d48', $21543 = 'CVE-2018-6556', $21544 = 'alpine-main-v3.12-updater', $21545 = '', $21546 = '0001-01-01 00:00:00+00', $21547 = 'https://www.cve.org/CVERecord?id=CVE-2018-6556', $21548 = '', $21549 = 'Unknown', $21550 = 'lxc', $21551 = '', $21552 = '', $21553 = '', $21554 = 'source', $21555 = 'alpine', $21556 = 'Alpine Linux', $21557 = '', $21558 = '', $21559 = '3.12', $21560 = '', $21561 = '', $21562 = 'Alpine Linux v3.12', $21563 = '', $21564 = '', $21565 = '', $21566 = '2.1.1-r9', $21567 = 'invalid', $21568 = NULL, $21569 = '{}', $21570 = '{}', $21571 = 'md5', $21572 = '\x0d864fa87ab3452bde3d10504f1c8629', $21573 = 'CVE-2019-5736', $21574 = 'alpine-main-v3.12-updater', $21575 = '', $21576 = '0001-01-01 00:00:00+00', $21577 = 'https://www.cve.org/CVERecord?id=CVE-2019-5736', $21578 = '', $21579 = 'Unknown', $21580 = 'lxc', $21581 = '', $21582 = '', $21583 = '', $21584 = 'source', $21585 = 'alpine', $21586 = 'Alpine Linux', $21587 = '', $21588 = '', $21589 = '3.12', $21590 = '', $21591 = '', $21592 = 'Alpine Linux v3.12', $21593 = '', $21594 = '', $21595 = '', $21596 = '3.1.0-r1', $21597 = 'invalid', $21598 = NULL, $21599 = '{}', $21600 = '{}', $21601 = 'md5', $21602 = '\x501a04ddf0a5feee452b5c0c7e932957', $21603 = 'CVE-2019-17543', $21604 = 'alpine-main-v3.12-updater', $21605 = '', $21606 = '0001-01-01 00:00:00+00', $21607 = 'https://www.cve.org/CVERecord?id=CVE-2019-17543', $21608 = '', $21609 = 'Unknown', $21610 = 'lz4', $21611 = '', $21612 = '', $21613 = '', $21614 = 'source', $21615 = 'alpine', $21616 = 'Alpine Linux', $21617 = '', $21618 = '', $21619 = '3.12', $21620 = '', $21621 = '', $21622 = 'Alpine Linux v3.12', $21623 = '', $21624 = '', $21625 = '', $21626 = '1.9.2-r0', $21627 = 'invalid', $21628 = NULL, $21629 = '{}', $21630 = '{}', $21631 = 'md5', $21632 = '\x602cc2eb7097f62261cc1d43deff7744', $21633 = 'CVE-2021-3520', $21634 = 'alpine-main-v3.12-updater', $21635 = '', $21636 = '0001-01-01 00:00:00+00', $21637 = 'https://www.cve.org/CVERecord?id=CVE-2021-3520', $21638 = '', $21639 = 'Unknown', $21640 = 'lz4', $21641 = '', $21642 = '', $21643 = '', $21644 = 'source', $21645 = 'alpine', $21646 = 'Alpine Linux', $21647 = '', $21648 = '', $21649 = '3.12', $21650 = '', $21651 = '', $21652 = 'Alpine Linux v3.12', $21653 = '', $21654 = '', $21655 = '', $21656 = '1.9.2-r1', $21657 = 'invalid', $21658 = NULL, $21659 = '{}', $21660 = '{}', $21661 = 'md5', $21662 = '\x84e5e56b661b2ccb1c942781a6e14946', $21663 = 'CVE-2020-15180', $21664 = 'alpine-main-v3.12-updater', $21665 = '', $21666 = '0001-01-01 00:00:00+00', $21667 = 'https://www.cve.org/CVERecord?id=CVE-2020-15180', $21668 = '', $21669 = 'Unknown', $21670 = 'mariadb', $21671 = '', $21672 = '', $21673 = '', $21674 = 'source', $21675 = 'alpine', $21676 = 'Alpine Linux', $21677 = '', $21678 = '', $21679 = '3.12', $21680 = '', $21681 = '', $21682 = 'Alpine Linux v3.12', $21683 = '', $21684 = '', $21685 = '', $21686 = '10.4.15-r0', $21687 = 'invalid', $21688 = NULL, $21689 = '{}', $21690 = '{}', $21691 = 'md5', $21692 = '\x7962b3d4ad53ce54f1c88b70bcdcb59c', $21693 = 'CVE-2021-46659', $21694 = 'alpine-main-v3.12-updater', $21695 = '', $21696 = '0001-01-01 00:00:00+00', $21697 = 'https://www.cve.org/CVERecord?id=CVE-2021-46659', $21698 = '', $21699 = 'Unknown', $21700 = 'mariadb', $21701 = '', $21702 = '', $21703 = '', $21704 = 'source', $21705 = 'alpine', $21706 = 'Alpine Linux', $21707 = '', $21708 = '', $21709 = '3.12', $21710 = '', $21711 = '', $21712 = 'Alpine Linux v3.12', $21713 = '', $21714 = '', $21715 = '', $21716 = '10.4.24-r0', $21717 = 'invalid', $21718 = NULL, $21719 = '{}', $21720 = '{}', $21721 = 'md5', $21722 = '\x26bd897f5fe3ea925cb60ee5c4ffc526', $21723 = 'CVE-2021-46661', $21724 = 'alpine-main-v3.12-updater', $21725 = '', $21726 = '0001-01-01 00:00:00+00', $21727 = 'https://www.cve.org/CVERecord?id=CVE-2021-46661', $21728 = '', $21729 = 'Unknown', $21730 = 'mariadb', $21731 = '', $21732 = '', $21733 = '', $21734 = 'source', $21735 = 'alpine', $21736 = 'Alpine Linux', $21737 = '', $21738 = '', $21739 = '3.12', $21740 = '', $21741 = '', $21742 = 'Alpine Linux v3.12', $21743 = '', $21744 = '', $21745 = '', $21746 = '10.4.24-r0', $21747 = 'invalid', $21748 = NULL, $21749 = '{}', $21750 = '{}', $21751 = 'md5', $21752 = '\xf44747ba3cd6bd26b6fd1f266b0e4217', $21753 = 'CVE-2021-46663', $21754 = 'alpine-main-v3.12-updater', $21755 = '', $21756 = '0001-01-01 00:00:00+00', $21757 = 'https://www.cve.org/CVERecord?id=CVE-2021-46663', $21758 = '', $21759 = 'Unknown', $21760 = 'mariadb', $21761 = '', $21762 = '', $21763 = '', $21764 = 'source', $21765 = 'alpine', $21766 = 'Alpine Linux', $21767 = '', $21768 = '', $21769 = '3.12', $21770 = '', $21771 = '', $21772 = 'Alpine Linux v3.12', $21773 = '', $21774 = '', $21775 = '', $21776 = '10.4.24-r0', $21777 = 'invalid', $21778 = NULL, $21779 = '{}', $21780 = '{}', $21781 = 'md5', $21782 = '\x7b644aa3b6ce5015828f640abfe0b860', $21783 = 'CVE-2021-46664', $21784 = 'alpine-main-v3.12-updater', $21785 = '', $21786 = '0001-01-01 00:00:00+00', $21787 = 'https://www.cve.org/CVERecord?id=CVE-2021-46664', $21788 = '', $21789 = 'Unknown', $21790 = 'mariadb', $21791 = '', $21792 = '', $21793 = '', $21794 = 'source', $21795 = 'alpine', $21796 = 'Alpine Linux', $21797 = '', $21798 = '', $21799 = '3.12', $21800 = '', $21801 = '', $21802 = 'Alpine Linux v3.12', $21803 = '', $21804 = '', $21805 = '', $21806 = '10.4.24-r0', $21807 = 'invalid', $21808 = NULL, $21809 = '{}', $21810 = '{}', $21811 = 'md5', $21812 = '\x44f7b3923657e732de0fddc8a177a6aa', $21813 = 'CVE-2021-46665', $21814 = 'alpine-main-v3.12-updater', $21815 = '', $21816 = '0001-01-01 00:00:00+00', $21817 = 'https://www.cve.org/CVERecord?id=CVE-2021-46665', $21818 = '', $21819 = 'Unknown', $21820 = 'mariadb', $21821 = '', $21822 = '', $21823 = '', $21824 = 'source', $21825 = 'alpine', $21826 = 'Alpine Linux', $21827 = '', $21828 = '', $21829 = '3.12', $21830 = '', $21831 = '', $21832 = 'Alpine Linux v3.12', $21833 = '', $21834 = '', $21835 = '', $21836 = '10.4.24-r0', $21837 = 'invalid', $21838 = NULL, $21839 = '{}', $21840 = '{}', $21841 = 'md5', $21842 = '\xb6be305b674e6f44bfd308836afd8ac1', $21843 = 'CVE-2021-46668', $21844 = 'alpine-main-v3.12-updater', $21845 = '', $21846 = '0001-01-01 00:00:00+00', $21847 = 'https://www.cve.org/CVERecord?id=CVE-2021-46668', $21848 = '', $21849 = 'Unknown', $21850 = 'mariadb', $21851 = '', $21852 = '', $21853 = '', $21854 = 'source', $21855 = 'alpine', $21856 = 'Alpine Linux', $21857 = '', $21858 = '', $21859 = '3.12', $21860 = '', $21861 = '', $21862 = 'Alpine Linux v3.12', $21863 = '', $21864 = '', $21865 = '', $21866 = '10.4.24-r0', $21867 = 'invalid', $21868 = NULL, $21869 = '{}', $21870 = '{}', $21871 = 'md5', $21872 = '\x3b9666a5d3521d557fd78b5c35c979f1', $21873 = 'CVE-2022-24048', $21874 = 'alpine-main-v3.12-updater', $21875 = '', $21876 = '0001-01-01 00:00:00+00', $21877 = 'https://www.cve.org/CVERecord?id=CVE-2022-24048', $21878 = '', $21879 = 'Unknown', $21880 = 'mariadb', $21881 = '', $21882 = '', $21883 = '', $21884 = 'source', $21885 = 'alpine', $21886 = 'Alpine Linux', $21887 = '', $21888 = '', $21889 = '3.12', $21890 = '', $21891 = '', $21892 = 'Alpine Linux v3.12', $21893 = '', $21894 = '', $21895 = '', $21896 = '10.4.24-r0', $21897 = 'invalid', $21898 = NULL, $21899 = '{}', $21900 = '{}', $21901 = 'md5', $21902 = '\x2de0c38a5db97cd8bf0366a20cb0b6e9', $21903 = 'CVE-2022-24050', $21904 = 'alpine-main-v3.12-updater', $21905 = '', $21906 = '0001-01-01 00:00:00+00', $21907 = 'https://www.cve.org/CVERecord?id=CVE-2022-24050', $21908 = '', $21909 = 'Unknown', $21910 = 'mariadb', $21911 = '', $21912 = '', $21913 = '', $21914 = 'source', $21915 = 'alpine', $21916 = 'Alpine Linux', $21917 = '', $21918 = '', $21919 = '3.12', $21920 = '', $21921 = '', $21922 = 'Alpine Linux v3.12', $21923 = '', $21924 = '', $21925 = '', $21926 = '10.4.24-r0', $21927 = 'invalid', $21928 = NULL, $21929 = '{}', $21930 = '{}', $21931 = 'md5', $21932 = '\x59d21e830afdbe41d48eeface7a64af0', $21933 = 'CVE-2022-24051', $21934 = 'alpine-main-v3.12-updater', $21935 = '', $21936 = '0001-01-01 00:00:00+00', $21937 = 'https://www.cve.org/CVERecord?id=CVE-2022-24051', $21938 = '', $21939 = 'Unknown', $21940 = 'mariadb', $21941 = '', $21942 = '', $21943 = '', $21944 = 'source', $21945 = 'alpine', $21946 = 'Alpine Linux', $21947 = '', $21948 = '', $21949 = '3.12', $21950 = '', $21951 = '', $21952 = 'Alpine Linux v3.12', $21953 = '', $21954 = '', $21955 = '', $21956 = '10.4.24-r0', $21957 = 'invalid', $21958 = NULL, $21959 = '{}', $21960 = '{}', $21961 = 'md5', $21962 = '\x7b7f2c1afedb2728ed2e91f77e5813db', $21963 = 'CVE-2022-24052', $21964 = 'alpine-main-v3.12-updater', $21965 = '', $21966 = '0001-01-01 00:00:00+00', $21967 = 'https://www.cve.org/CVERecord?id=CVE-2022-24052', $21968 = '', $21969 = 'Unknown', $21970 = 'mariadb', $21971 = '', $21972 = '', $21973 = '', $21974 = 'source', $21975 = 'alpine', $21976 = 'Alpine Linux', $21977 = '', $21978 = '', $21979 = '3.12', $21980 = '', $21981 = '', $21982 = 'Alpine Linux v3.12', $21983 = '', $21984 = '', $21985 = '', $21986 = '10.4.24-r0', $21987 = 'invalid', $21988 = NULL, $21989 = '{}', $21990 = '{}', $21991 = 'md5', $21992 = '\x00b1e7d82b168c870fc6b92b82f85973', $21993 = 'CVE-2019-2805', $21994 = 'alpine-main-v3.12-updater', $21995 = '', $21996 = '0001-01-01 00:00:00+00', $21997 = 'https://www.cve.org/CVERecord?id=CVE-2019-2805', $21998 = '', $21999 = 'Unknown', $22000 = 'mariadb', $22001 = '', $22002 = '', $22003 = '', $22004 = 'source', $22005 = 'alpine', $22006 = 'Alpine Linux', $22007 = '', $22008 = '', $22009 = '3.12', $22010 = '', $22011 = '', $22012 = 'Alpine Linux v3.12', $22013 = '', $22014 = '', $22015 = '', $22016 = '10.4.7-r0', $22017 = 'invalid', $22018 = NULL, $22019 = '{}', $22020 = '{}', $22021 = 'md5', $22022 = '\x03011a0dfea2a13b3eb1bfa067ae0e1a', $22023 = 'CVE-2019-2740', $22024 = 'alpine-main-v3.12-updater', $22025 = '', $22026 = '0001-01-01 00:00:00+00', $22027 = 'https://www.cve.org/CVERecord?id=CVE-2019-2740', $22028 = '', $22029 = 'Unknown', $22030 = 'mariadb', $22031 = '', $22032 = '', $22033 = '', $22034 = 'source', $22035 = 'alpine', $22036 = 'Alpine Linux', $22037 = '', $22038 = '', $22039 = '3.12', $22040 = '', $22041 = '', $22042 = 'Alpine Linux v3.12', $22043 = '', $22044 = '', $22045 = '', $22046 = '10.4.7-r0', $22047 = 'invalid', $22048 = NULL, $22049 = '{}', $22050 = '{}', $22051 = 'md5', $22052 = '\x3aa86bd2aefd72a9374b35d0575e55db', $22053 = 'CVE-2019-2739', $22054 = 'alpine-main-v3.12-updater', $22055 = '', $22056 = '0001-01-01 00:00:00+00', $22057 = 'https://www.cve.org/CVERecord?id=CVE-2019-2739', $22058 = '', $22059 = 'Unknown', $22060 = 'mariadb', $22061 = '', $22062 = '', $22063 = '', $22064 = 'source', $22065 = 'alpine', $22066 = 'Alpine Linux', $22067 = '', $22068 = '', $22069 = '3.12', $22070 = '', $22071 = '', $22072 = 'Alpine Linux v3.12', $22073 = '', $22074 = '', $22075 = '', $22076 = '10.4.7-r0', $22077 = 'invalid', $22078 = NULL, $22079 = '{}', $22080 = '{}', $22081 = 'md5', $22082 = '\x06d93dcea2d2f8c5647d2d8e6be416b2', $22083 = 'CVE-2019-2737', $22084 = 'alpine-main-v3.12-updater', $22085 = '', $22086 = '0001-01-01 00:00:00+00', $22087 = 'https://www.cve.org/CVERecord?id=CVE-2019-2737', $22088 = '', $22089 = 'Unknown', $22090 = 'mariadb', $22091 = '', $22092 = '', $22093 = '', $22094 = 'source', $22095 = 'alpine', $22096 = 'Alpine Linux', $22097 = '', $22098 = '', $22099 = '3.12', $22100 = '', $22101 = '', $22102 = 'Alpine Linux v3.12', $22103 = '', $22104 = '', $22105 = '', $22106 = '10.4.7-r0', $22107 = 'invalid', $22108 = NULL, $22109 = '{}', $22110 = '{}', $22111 = 'md5', $22112 = '\xc4178371507f3b9dff12dcd81c1dd37c', $22113 = 'CVE-2019-2758', $22114 = 'alpine-main-v3.12-updater', $22115 = '', $22116 = '0001-01-01 00:00:00+00', $22117 = 'https://www.cve.org/CVERecord?id=CVE-2019-2758', $22118 = '', $22119 = 'Unknown', $22120 = 'mariadb', $22121 = '', $22122 = '', $22123 = '', $22124 = 'source', $22125 = 'alpine', $22126 = 'Alpine Linux', $22127 = '', $22128 = '', $22129 = '3.12', $22130 = '', $22131 = '', $22132 = 'Alpine Linux v3.12', $22133 = '', $22134 = '', $22135 = '', $22136 = '10.4.7-r0', $22137 = 'invalid', $22138 = NULL, $22139 = '{}', $22140 = '{}', $22141 = 'md5', $22142 = '\xa67bfe67fae9462d2f07e826cf327bad', $22143 = 'CVE-2017-3313', $22144 = 'alpine-main-v3.12-updater', $22145 = '', $22146 = '0001-01-01 00:00:00+00', $22147 = 'https://www.cve.org/CVERecord?id=CVE-2017-3313', $22148 = '', $22149 = 'Unknown', $22150 = 'mariadb', $22151 = '', $22152 = '', $22153 = '', $22154 = 'source', $22155 = 'alpine', $22156 = 'Alpine Linux', $22157 = '', $22158 = '', $22159 = '3.12', $22160 = '', $22161 = '', $22162 = 'Alpine Linux v3.12', $22163 = '', $22164 = '', $22165 = '', $22166 = '10.1.22-r0', $22167 = 'invalid', $22168 = NULL, $22169 = '{}', $22170 = '{}', $22171 = 'md5', $22172 = '\xd91449c71add46fd9a2610a64abc188c', $22173 = 'CVE-2017-3302', $22174 = 'alpine-main-v3.12-updater', $22175 = '', $22176 = '0001-01-01 00:00:00+00', $22177 = 'https://www.cve.org/CVERecord?id=CVE-2017-3302', $22178 = '', $22179 = 'Unknown', $22180 = 'mariadb', $22181 = '', $22182 = '', $22183 = '', $22184 = 'source', $22185 = 'alpine', $22186 = 'Alpine Linux', $22187 = '', $22188 = '', $22189 = '3.12', $22190 = '', $22191 = '', $22192 = 'Alpine Linux v3.12', $22193 = '', $22194 = '', $22195 = '', $22196 = '10.1.22-r0', $22197 = 'invalid', $22198 = NULL, $22199 = '{}', $22200 = '{}', $22201 = 'md5', $22202 = '\x3f3be1fe651457fe58763693e9b3c1fd', $22203 = 'CVE-2019-2510', $22204 = 'alpine-main-v3.12-updater', $22205 = '', $22206 = '0001-01-01 00:00:00+00', $22207 = 'https://www.cve.org/CVERecord?id=CVE-2019-2510', $22208 = '', $22209 = 'Unknown', $22210 = 'mariadb', $22211 = '', $22212 = '', $22213 = '', $22214 = 'source', $22215 = 'alpine', $22216 = 'Alpine Linux', $22217 = '', $22218 = '', $22219 = '3.12', $22220 = '', $22221 = '', $22222 = 'Alpine Linux v3.12', $22223 = '', $22224 = '', $22225 = '', $22226 = '10.3.13-r0', $22227 = 'invalid', $22228 = NULL, $22229 = '{}', $22230 = '{}', $22231 = 'md5', $22232 = '\xe8c16b14603119446feef5e5b229109e', $22233 = 'CVE-2019-2537', $22234 = 'alpine-main-v3.12-updater', $22235 = '', $22236 = '0001-01-01 00:00:00+00', $22237 = 'https://www.cve.org/CVERecord?id=CVE-2019-2537', $22238 = '', $22239 = 'Unknown', $22240 = 'mariadb', $22241 = '', $22242 = '', $22243 = '', $22244 = 'source', $22245 = 'alpine', $22246 = 'Alpine Linux', $22247 = '', $22248 = '', $22249 = '3.12', $22250 = '', $22251 = '', $22252 = 'Alpine Linux v3.12', $22253 = '', $22254 = '', $22255 = '', $22256 = '10.3.13-r0', $22257 = 'invalid', $22258 = NULL, $22259 = '{}', $22260 = '{}', $22261 = 'md5', $22262 = '\x7aa0e1358afd47310ea3efe62b8bb707', $22263 = 'CVE-2020-2574', $22264 = 'alpine-main-v3.12-updater', $22265 = '', $22266 = '0001-01-01 00:00:00+00', $22267 = 'https://www.cve.org/CVERecord?id=CVE-2020-2574', $22268 = '', $22269 = 'Unknown', $22270 = 'mariadb', $22271 = '', $22272 = '', $22273 = '', $22274 = 'source', $22275 = 'alpine', $22276 = 'Alpine Linux', $22277 = '', $22278 = '', $22279 = '3.12', $22280 = '', $22281 = '', $22282 = 'Alpine Linux v3.12', $22283 = '', $22284 = '', $22285 = '', $22286 = '10.4.12-r0', $22287 = 'invalid', $22288 = NULL, $22289 = '{}', $22290 = '{}', $22291 = 'md5', $22292 = '\x45a2da97c91d35bddb9b0bdfef515a50', $22293 = 'CVE-2020-2752', $22294 = 'alpine-main-v3.12-updater', $22295 = '', $22296 = '0001-01-01 00:00:00+00', $22297 = 'https://www.cve.org/CVERecord?id=CVE-2020-2752', $22298 = '', $22299 = 'Unknown', $22300 = 'mariadb', $22301 = '', $22302 = '', $22303 = '', $22304 = 'source', $22305 = 'alpine', $22306 = 'Alpine Linux', $22307 = '', $22308 = '', $22309 = '3.12', $22310 = '', $22311 = '', $22312 = 'Alpine Linux v3.12', $22313 = '', $22314 = '', $22315 = '', $22316 = '10.4.13-r0', $22317 = 'invalid', $22318 = NULL, $22319 = '{}', $22320 = '{}', $22321 = 'md5', $22322 = '\x53199c3f8b5a7659d3771c053aea8cdb', $22323 = 'CVE-2020-2760', $22324 = 'alpine-main-v3.12-updater', $22325 = '', $22326 = '0001-01-01 00:00:00+00', $22327 = 'https://www.cve.org/CVERecord?id=CVE-2020-2760', $22328 = '', $22329 = 'Unknown', $22330 = 'mariadb', $22331 = '', $22332 = '', $22333 = '', $22334 = 'source', $22335 = 'alpine', $22336 = 'Alpine Linux', $22337 = '', $22338 = '', $22339 = '3.12', $22340 = '', $22341 = '', $22342 = 'Alpine Linux v3.12', $22343 = '', $22344 = '', $22345 = '', $22346 = '10.4.13-r0', $22347 = 'invalid', $22348 = NULL, $22349 = '{}', $22350 = '{}', $22351 = 'md5', $22352 = '\x3fa417a1fd454b896bdea00730fdb13d', $22353 = 'CVE-2020-2812', $22354 = 'alpine-main-v3.12-updater', $22355 = '', $22356 = '0001-01-01 00:00:00+00', $22357 = 'https://www.cve.org/CVERecord?id=CVE-2020-2812', $22358 = '', $22359 = 'Unknown', $22360 = 'mariadb', $22361 = '', $22362 = '', $22363 = '', $22364 = 'source', $22365 = 'alpine', $22366 = 'Alpine Linux', $22367 = '', $22368 = '', $22369 = '3.12', $22370 = '', $22371 = '', $22372 = 'Alpine Linux v3.12', $22373 = '', $22374 = '', $22375 = '', $22376 = '10.4.13-r0', $22377 = 'invalid', $22378 = NULL, $22379 = '{}', $22380 = '{}', $22381 = 'md5', $22382 = '\x00be1c734c9f92094a51d474cd608294', $22383 = 'CVE-2020-2814', $22384 = 'alpine-main-v3.12-updater', $22385 = '', $22386 = '0001-01-01 00:00:00+00', $22387 = 'https://www.cve.org/CVERecord?id=CVE-2020-2814', $22388 = '', $22389 = 'Unknown', $22390 = 'mariadb', $22391 = '', $22392 = '', $22393 = '', $22394 = 'source', $22395 = 'alpine', $22396 = 'Alpine Linux', $22397 = '', $22398 = '', $22399 = '3.12', $22400 = '', $22401 = '', $22402 = 'Alpine Linux v3.12', $22403 = '', $22404 = '', $22405 = '', $22406 = '10.4.13-r0', $22407 = 'invalid', $22408 = NULL, $22409 = '{}', $22410 = '{}', $22411 = 'md5', $22412 = '\x9bf99c74afa280a4a47ccc4350144250', $22413 = 'CVE-2018-2786', $22414 = 'alpine-main-v3.12-updater', $22415 = '', $22416 = '0001-01-01 00:00:00+00', $22417 = 'https://www.cve.org/CVERecord?id=CVE-2018-2786', $22418 = '', $22419 = 'Unknown', $22420 = 'mariadb', $22421 = '', $22422 = '', $22423 = '', $22424 = 'source', $22425 = 'alpine', $22426 = 'Alpine Linux', $22427 = '', $22428 = '', $22429 = '3.12', $22430 = '', $22431 = '', $22432 = 'Alpine Linux v3.12', $22433 = '', $22434 = '', $22435 = '', $22436 = '10.2.15-r0', $22437 = 'invalid', $22438 = NULL, $22439 = '{}', $22440 = '{}', $22441 = 'md5', $22442 = '\x5c6a607ec83e4e7c581526a468d3bb87', $22443 = 'CVE-2018-2759', $22444 = 'alpine-main-v3.12-updater', $22445 = '', $22446 = '0001-01-01 00:00:00+00', $22447 = 'https://www.cve.org/CVERecord?id=CVE-2018-2759', $22448 = '', $22449 = 'Unknown', $22450 = 'mariadb', $22451 = '', $22452 = '', $22453 = '', $22454 = 'source', $22455 = 'alpine', $22456 = 'Alpine Linux', $22457 = '', $22458 = '', $22459 = '3.12', $22460 = '', $22461 = '', $22462 = 'Alpine Linux v3.12', $22463 = '', $22464 = '', $22465 = '', $22466 = '10.2.15-r0', $22467 = 'invalid', $22468 = NULL, $22469 = '{}', $22470 = '{}', $22471 = 'md5', $22472 = '\x79435125d7f60a374283ea0310053eec', $22473 = 'CVE-2018-2777', $22474 = 'alpine-main-v3.12-updater', $22475 = '', $22476 = '0001-01-01 00:00:00+00', $22477 = 'https://www.cve.org/CVERecord?id=CVE-2018-2777', $22478 = '', $22479 = 'Unknown', $22480 = 'mariadb', $22481 = '', $22482 = '', $22483 = '', $22484 = 'source', $22485 = 'alpine', $22486 = 'Alpine Linux', $22487 = '', $22488 = '', $22489 = '3.12', $22490 = '', $22491 = '', $22492 = 'Alpine Linux v3.12', $22493 = '', $22494 = '', $22495 = '', $22496 = '10.2.15-r0', $22497 = 'invalid', $22498 = NULL, $22499 = '{}', $22500 = '{}', $22501 = 'md5', $22502 = '\xa50ea572a80a02654f30bddb6f38e5cb', $22503 = 'CVE-2018-2810', $22504 = 'alpine-main-v3.12-updater', $22505 = '', $22506 = '0001-01-01 00:00:00+00', $22507 = 'https://www.cve.org/CVERecord?id=CVE-2018-2810', $22508 = '', $22509 = 'Unknown', $22510 = 'mariadb', $22511 = '', $22512 = '', $22513 = '', $22514 = 'source', $22515 = 'alpine', $22516 = 'Alpine Linux', $22517 = '', $22518 = '', $22519 = '3.12', $22520 = '', $22521 = '', $22522 = 'Alpine Linux v3.12', $22523 = '', $22524 = '', $22525 = '', $22526 = '10.2.15-r0', $22527 = 'invalid', $22528 = NULL, $22529 = '{}', $22530 = '{}', $22531 = 'md5', $22532 = '\x6328047ebd6798048870c0b8b1288d9f', $22533 = 'CVE-2018-2782', $22534 = 'alpine-main-v3.12-updater', $22535 = '', $22536 = '0001-01-01 00:00:00+00', $22537 = 'https://www.cve.org/CVERecord?id=CVE-2018-2782', $22538 = '', $22539 = 'Unknown', $22540 = 'mariadb', $22541 = '', $22542 = '', $22543 = '', $22544 = 'source', $22545 = 'alpine', $22546 = 'Alpine Linux', $22547 = '', $22548 = '', $22549 = '3.12', $22550 = '', $22551 = '', $22552 = 'Alpine Linux v3.12', $22553 = '', $22554 = '', $22555 = '', $22556 = '10.2.15-r0', $22557 = 'invalid', $22558 = NULL, $22559 = '{}', $22560 = '{}', $22561 = 'md5', $22562 = '\x8c6aed3e193d420da6e82b726b577721', $22563 = 'CVE-2018-2784', $22564 = 'alpine-main-v3.12-updater', $22565 = '', $22566 = '0001-01-01 00:00:00+00', $22567 = 'https://www.cve.org/CVERecord?id=CVE-2018-2784', $22568 = '', $22569 = 'Unknown', $22570 = 'mariadb', $22571 = '', $22572 = '', $22573 = '', $22574 = 'source', $22575 = 'alpine', $22576 = 'Alpine Linux', $22577 = '', $22578 = '', $22579 = '3.12', $22580 = '', $22581 = '', $22582 = 'Alpine Linux v3.12', $22583 = '', $22584 = '', $22585 = '', $22586 = '10.2.15-r0', $22587 = 'invalid', $22588 = NULL, $22589 = '{}', $22590 = '{}', $22591 = 'md5', $22592 = '\x33ca0abab8ee22f69fb00cbff79ebf36', $22593 = 'CVE-2018-2787', $22594 = 'alpine-main-v3.12-updater', $22595 = '', $22596 = '0001-01-01 00:00:00+00', $22597 = 'https://www.cve.org/CVERecord?id=CVE-2018-2787', $22598 = '', $22599 = 'Unknown', $22600 = 'mariadb', $22601 = '', $22602 = '', $22603 = '', $22604 = 'source', $22605 = 'alpine', $22606 = 'Alpine Linux', $22607 = '', $22608 = '', $22609 = '3.12', $22610 = '', $22611 = '', $22612 = 'Alpine Linux v3.12', $22613 = '', $22614 = '', $22615 = '', $22616 = '10.2.15-r0', $22617 = 'invalid', $22618 = NULL, $22619 = '{}', $22620 = '{}', $22621 = 'md5', $22622 = '\xc9f57883262c9f796e38ab0ff663e71a', $22623 = 'CVE-2018-2766', $22624 = 'alpine-main-v3.12-updater', $22625 = '', $22626 = '0001-01-01 00:00:00+00', $22627 = 'https://www.cve.org/CVERecord?id=CVE-2018-2766', $22628 = '', $22629 = 'Unknown', $22630 = 'mariadb', $22631 = '', $22632 = '', $22633 = '', $22634 = 'source', $22635 = 'alpine', $22636 = 'Alpine Linux', $22637 = '', $22638 = '', $22639 = '3.12', $22640 = '', $22641 = '', $22642 = 'Alpine Linux v3.12', $22643 = '', $22644 = '', $22645 = '', $22646 = '10.2.15-r0', $22647 = 'invalid', $22648 = NULL, $22649 = '{}', $22650 = '{}', $22651 = 'md5', $22652 = '\x71dda3cfc205f8bc13f80200ea5402f9', $22653 = 'CVE-2018-2755', $22654 = 'alpine-main-v3.12-updater', $22655 = '', $22656 = '0001-01-01 00:00:00+00', $22657 = 'https://www.cve.org/CVERecord?id=CVE-2018-2755', $22658 = '', $22659 = 'Unknown', $22660 = 'mariadb', $22661 = '', $22662 = '', $22663 = '', $22664 = 'source', $22665 = 'alpine', $22666 = 'Alpine Linux', $22667 = '', $22668 = '', $22669 = '3.12', $22670 = '', $22671 = '', $22672 = 'Alpine Linux v3.12', $22673 = '', $22674 = '', $22675 = '', $22676 = '10.2.15-r0', $22677 = 'invalid', $22678 = NULL, $22679 = '{}', $22680 = '{}', $22681 = 'md5', $22682 = '\x1f966a28c68cfdafca90da87dd9e5cba', $22683 = 'CVE-2018-2819', $22684 = 'alpine-main-v3.12-updater', $22685 = '', $22686 = '0001-01-01 00:00:00+00', $22687 = 'https://www.cve.org/CVERecord?id=CVE-2018-2819', $22688 = '', $22689 = 'Unknown', $22690 = 'mariadb', $22691 = '', $22692 = '', $22693 = '', $22694 = 'source', $22695 = 'alpine', $22696 = 'Alpine Linux', $22697 = '', $22698 = '', $22699 = '3.12', $22700 = '', $22701 = '', $22702 = 'Alpine Linux v3.12', $22703 = '', $22704 = '', $22705 = '', $22706 = '10.2.15-r0', $22707 = 'invalid', $22708 = NULL, $22709 = '{}', $22710 = '{}', $22711 = 'md5', $22712 = '\x7f14c20b9663746482b1d133b9c5a718', $22713 = 'CVE-2018-2817', $22714 = 'alpine-main-v3.12-updater', $22715 = '', $22716 = '0001-01-01 00:00:00+00', $22717 = 'https://www.cve.org/CVERecord?id=CVE-2018-2817', $22718 = '', $22719 = 'Unknown', $22720 = 'mariadb', $22721 = '', $22722 = '', $22723 = '', $22724 = 'source', $22725 = 'alpine', $22726 = 'Alpine Linux', $22727 = '', $22728 = '', $22729 = '3.12', $22730 = '', $22731 = '', $22732 = 'Alpine Linux v3.12', $22733 = '', $22734 = '', $22735 = '', $22736 = '10.2.15-r0', $22737 = 'invalid', $22738 = NULL, $22739 = '{}', $22740 = '{}', $22741 = 'md5', $22742 = '\xa5f67566c708968f3ec71ab8f1982aa4', $22743 = 'CVE-2018-2761', $22744 = 'alpine-main-v3.12-updater', $22745 = '', $22746 = '0001-01-01 00:00:00+00', $22747 = 'https://www.cve.org/CVERecord?id=CVE-2018-2761', $22748 = '', $22749 = 'Unknown', $22750 = 'mariadb', $22751 = '', $22752 = '', $22753 = '', $22754 = 'source', $22755 = 'alpine', $22756 = 'Alpine Linux', $22757 = '', $22758 = '', $22759 = '3.12', $22760 = '', $22761 = '', $22762 = 'Alpine Linux v3.12', $22763 = '', $22764 = '', $22765 = '', $22766 = '10.2.15-r0', $22767 = 'invalid', $22768 = NULL, $22769 = '{}', $22770 = '{}', $22771 = 'md5', $22772 = '\x631708b992035372970099f56d3ecb8d', $22773 = 'CVE-2018-2781', $22774 = 'alpine-main-v3.12-updater', $22775 = '', $22776 = '0001-01-01 00:00:00+00', $22777 = 'https://www.cve.org/CVERecord?id=CVE-2018-2781', $22778 = '', $22779 = 'Unknown', $22780 = 'mariadb', $22781 = '', $22782 = '', $22783 = '', $22784 = 'source', $22785 = 'alpine', $22786 = 'Alpine Linux', $22787 = '', $22788 = '', $22789 = '3.12', $22790 = '', $22791 = '', $22792 = 'Alpine Linux v3.12', $22793 = '', $22794 = '', $22795 = '', $22796 = '10.2.15-r0', $22797 = 'invalid', $22798 = NULL, $22799 = '{}', $22800 = '{}', $22801 = 'md5', $22802 = '\xf767dc877b354a7addd239497d2cd9d8', $22803 = 'CVE-2018-2771', $22804 = 'alpine-main-v3.12-updater', $22805 = '', $22806 = '0001-01-01 00:00:00+00', $22807 = 'https://www.cve.org/CVERecord?id=CVE-2018-2771', $22808 = '', $22809 = 'Unknown', $22810 = 'mariadb', $22811 = '', $22812 = '', $22813 = '', $22814 = 'source', $22815 = 'alpine', $22816 = 'Alpine Linux', $22817 = '', $22818 = '', $22819 = '3.12', $22820 = '', $22821 = '', $22822 = 'Alpine Linux v3.12', $22823 = '', $22824 = '', $22825 = '', $22826 = '10.2.15-r0', $22827 = 'invalid', $22828 = NULL, $22829 = '{}', $22830 = '{}', $22831 = 'md5', $22832 = '\xd69c4f5965401da508b0d6648f12894d', $22833 = 'CVE-2018-2813', $22834 = 'alpine-main-v3.12-updater', $22835 = '', $22836 = '0001-01-01 00:00:00+00', $22837 = 'https://www.cve.org/CVERecord?id=CVE-2018-2813', $22838 = '', $22839 = 'Unknown', $22840 = 'mariadb', $22841 = '', $22842 = '', $22843 = '', $22844 = 'source', $22845 = 'alpine', $22846 = 'Alpine Linux', $22847 = '', $22848 = '', $22849 = '3.12', $22850 = '', $22851 = '', $22852 = 'Alpine Linux v3.12', $22853 = '', $22854 = '', $22855 = '', $22856 = '10.2.15-r0', $22857 = 'invalid', $22858 = NULL, $22859 = '{}', $22860 = '{}', $22861 = 'md5', $22862 = '\x5941cf234d595fe8e9977ab8eb5d5287', $22863 = 'CVE-2019-2938', $22864 = 'alpine-main-v3.12-updater', $22865 = '', $22866 = '0001-01-01 00:00:00+00', $22867 = 'https://www.cve.org/CVERecord?id=CVE-2019-2938', $22868 = '', $22869 = 'Unknown', $22870 = 'mariadb', $22871 = '', $22872 = '', $22873 = '', $22874 = 'source', $22875 = 'alpine', $22876 = 'Alpine Linux', $22877 = '', $22878 = '', $22879 = '3.12', $22880 = '', $22881 = '', $22882 = 'Alpine Linux v3.12', $22883 = '', $22884 = '', $22885 = '', $22886 = '10.4.10-r0', $22887 = 'invalid', $22888 = NULL, $22889 = '{}', $22890 = '{}', $22891 = 'md5', $22892 = '\xfa7dee47a94286444ca5e6fbfe49d6b3', $22893 = 'CVE-2019-2974', $22894 = 'alpine-main-v3.12-updater', $22895 = '', $22896 = '0001-01-01 00:00:00+00', $22897 = 'https://www.cve.org/CVERecord?id=CVE-2019-2974', $22898 = '', $22899 = 'Unknown', $22900 = 'mariadb', $22901 = '', $22902 = '', $22903 = '', $22904 = 'source', $22905 = 'alpine', $22906 = 'Alpine Linux', $22907 = '', $22908 = '', $22909 = '3.12', $22910 = '', $22911 = '', $22912 = 'Alpine Linux v3.12', $22913 = '', $22914 = '', $22915 = '', $22916 = '10.4.10-r0', $22917 = 'invalid', $22918 = NULL, $22919 = '{}', $22920 = '{}', $22921 = 'md5', $22922 = '\xb08a761e88af6f3df9ed8f5f7e4f0eb6', $22923 = 'CVE-2021-35604', $22924 = 'alpine-main-v3.12-updater', $22925 = '', $22926 = '0001-01-01 00:00:00+00', $22927 = 'https://www.cve.org/CVERecord?id=CVE-2021-35604', $22928 = '', $22929 = 'Unknown', $22930 = 'mariadb', $22931 = '', $22932 = '', $22933 = '', $22934 = 'source', $22935 = 'alpine', $22936 = 'Alpine Linux', $22937 = '', $22938 = '', $22939 = '3.12', $22940 = '', $22941 = '', $22942 = 'Alpine Linux v3.12', $22943 = '', $22944 = '', $22945 = '', $22946 = '10.4.22-r0', $22947 = 'invalid', $22948 = NULL, $22949 = '{}', $22950 = '{}', $22951 = 'md5', $22952 = '\x61d8c76bc4b37e505b09a10b6aff8766', $22953 = 'CVE-2016-6664', $22954 = 'alpine-main-v3.12-updater', $22955 = '', $22956 = '0001-01-01 00:00:00+00', $22957 = 'https://www.cve.org/CVERecord?id=CVE-2016-6664', $22958 = '', $22959 = 'Unknown', $22960 = 'mariadb', $22961 = '', $22962 = '', $22963 = '', $22964 = 'source', $22965 = 'alpine', $22966 = 'Alpine Linux', $22967 = '', $22968 = '', $22969 = '3.12', $22970 = '', $22971 = '', $22972 = 'Alpine Linux v3.12', $22973 = '', $22974 = '', $22975 = '', $22976 = '10.1.21-r0', $22977 = 'invalid', $22978 = NULL, $22979 = '{}', $22980 = '{}', $22981 = 'md5', $22982 = '\xefcc1de7308d6b6e34df080c26ff17bd', $22983 = 'CVE-2017-3238', $22984 = 'alpine-main-v3.12-updater', $22985 = '', $22986 = '0001-01-01 00:00:00+00', $22987 = 'https://www.cve.org/CVERecord?id=CVE-2017-3238', $22988 = '', $22989 = 'Unknown', $22990 = 'mariadb', $22991 = '', $22992 = '', $22993 = '', $22994 = 'source', $22995 = 'alpine', $22996 = 'Alpine Linux', $22997 = '', $22998 = '', $22999 = '3.12', $23000 = '', $23001 = '', $23002 = 'Alpine Linux v3.12', $23003 = '', $23004 = '', $23005 = '', $23006 = '10.1.21-r0', $23007 = 'invalid', $23008 = NULL, $23009 = '{}', $23010 = '{}', $23011 = 'md5', $23012 = '\xe449d7e6e150ab8186f782c7c6ac60e2', $23013 = 'CVE-2017-3243', $23014 = 'alpine-main-v3.12-updater', $23015 = '', $23016 = '0001-01-01 00:00:00+00', $23017 = 'https://www.cve.org/CVERecord?id=CVE-2017-3243', $23018 = '', $23019 = 'Unknown', $23020 = 'mariadb', $23021 = '', $23022 = '', $23023 = '', $23024 = 'source', $23025 = 'alpine', $23026 = 'Alpine Linux', $23027 = '', $23028 = '', $23029 = '3.12', $23030 = '', $23031 = '', $23032 = 'Alpine Linux v3.12', $23033 = '', $23034 = '', $23035 = '', $23036 = '10.1.21-r0', $23037 = 'invalid', $23038 = NULL, $23039 = '{}', $23040 = '{}', $23041 = 'md5', $23042 = '\x0a46d0b28e2965e611f5f558841823a6', $23043 = 'CVE-2017-3244', $23044 = 'alpine-main-v3.12-updater', $23045 = '', $23046 = '0001-01-01 00:00:00+00', $23047 = 'https://www.cve.org/CVERecord?id=CVE-2017-3244', $23048 = '', $23049 = 'Unknown', $23050 = 'mariadb', $23051 = '', $23052 = '', $23053 = '', $23054 = 'source', $23055 = 'alpine', $23056 = 'Alpine Linux', $23057 = '', $23058 = '', $23059 = '3.12', $23060 = '', $23061 = '', $23062 = 'Alpine Linux v3.12', $23063 = '', $23064 = '', $23065 = '', $23066 = '10.1.21-r0', $23067 = 'invalid', $23068 = NULL, $23069 = '{}', $23070 = '{}', $23071 = 'md5', $23072 = '\xd3497980063ca5a633a0cffd7ab54017', $23073 = 'CVE-2017-3257', $23074 = 'alpine-main-v3.12-updater', $23075 = '', $23076 = '0001-01-01 00:00:00+00', $23077 = 'https://www.cve.org/CVERecord?id=CVE-2017-3257', $23078 = '', $23079 = 'Unknown', $23080 = 'mariadb', $23081 = '', $23082 = '', $23083 = '', $23084 = 'source', $23085 = 'alpine', $23086 = 'Alpine Linux', $23087 = '', $23088 = '', $23089 = '3.12', $23090 = '', $23091 = '', $23092 = 'Alpine Linux v3.12', $23093 = '', $23094 = '', $23095 = '', $23096 = '10.1.21-r0', $23097 = 'invalid', $23098 = NULL, $23099 = '{}', $23100 = '{}', $23101 = 'md5', $23102 = '\xc2da74d87779f983ea465b87bec10d2d', $23103 = 'CVE-2017-3258', $23104 = 'alpine-main-v3.12-updater', $23105 = '', $23106 = '0001-01-01 00:00:00+00', $23107 = 'https://www.cve.org/CVERecord?id=CVE-2017-3258', $23108 = '', $23109 = 'Unknown', $23110 = 'mariadb', $23111 = '', $23112 = '', $23113 = '', $23114 = 'source', $23115 = 'alpine', $23116 = 'Alpine Linux', $23117 = '', $23118 = '', $23119 = '3.12', $23120 = '', $23121 = '', $23122 = 'Alpine Linux v3.12', $23123 = '', $23124 = '', $23125 = '', $23126 = '10.1.21-r0', $23127 = 'invalid', $23128 = NULL, $23129 = '{}', $23130 = '{}', $23131 = 'md5', $23132 = '\x6d0e7782b8e222393ded8be706a3a6a9', $23133 = 'CVE-2017-3265', $23134 = 'alpine-main-v3.12-updater', $23135 = '', $23136 = '0001-01-01 00:00:00+00', $23137 = 'https://www.cve.org/CVERecord?id=CVE-2017-3265', $23138 = '', $23139 = 'Unknown', $23140 = 'mariadb', $23141 = '', $23142 = '', $23143 = '', $23144 = 'source', $23145 = 'alpine', $23146 = 'Alpine Linux', $23147 = '', $23148 = '', $23149 = '3.12', $23150 = '', $23151 = '', $23152 = 'Alpine Linux v3.12', $23153 = '', $23154 = '', $23155 = '', $23156 = '10.1.21-r0', $23157 = 'invalid', $23158 = NULL, $23159 = '{}', $23160 = '{}', $23161 = 'md5', $23162 = '\x5ac17dc73824f543ee4fc0c47248c040', $23163 = 'CVE-2017-3291', $23164 = 'alpine-main-v3.12-updater', $23165 = '', $23166 = '0001-01-01 00:00:00+00', $23167 = 'https://www.cve.org/CVERecord?id=CVE-2017-3291', $23168 = '', $23169 = 'Unknown', $23170 = 'mariadb', $23171 = '', $23172 = '', $23173 = '', $23174 = 'source', $23175 = 'alpine', $23176 = 'Alpine Linux', $23177 = '', $23178 = '', $23179 = '3.12', $23180 = '', $23181 = '', $23182 = 'Alpine Linux v3.12', $23183 = '', $23184 = '', $23185 = '', $23186 = '10.1.21-r0', $23187 = 'invalid', $23188 = NULL, $23189 = '{}', $23190 = '{}', $23191 = 'md5', $23192 = '\x36a7f10bc1ffafc3c25c287c8dc1a764', $23193 = 'CVE-2017-3312', $23194 = 'alpine-main-v3.12-updater', $23195 = '', $23196 = '0001-01-01 00:00:00+00', $23197 = 'https://www.cve.org/CVERecord?id=CVE-2017-3312', $23198 = '', $23199 = 'Unknown', $23200 = 'mariadb', $23201 = '', $23202 = '', $23203 = '', $23204 = 'source', $23205 = 'alpine', $23206 = 'Alpine Linux', $23207 = '', $23208 = '', $23209 = '3.12', $23210 = '', $23211 = '', $23212 = 'Alpine Linux v3.12', $23213 = '', $23214 = '', $23215 = '', $23216 = '10.1.21-r0', $23217 = 'invalid', $23218 = NULL, $23219 = '{}', $23220 = '{}', $23221 = 'md5', $23222 = '\xbd7a5ff1f4f5f6ecf8b3a4785f090c83', $23223 = 'CVE-2017-3317', $23224 = 'alpine-main-v3.12-updater', $23225 = '', $23226 = '0001-01-01 00:00:00+00', $23227 = 'https://www.cve.org/CVERecord?id=CVE-2017-3317', $23228 = '', $23229 = 'Unknown', $23230 = 'mariadb', $23231 = '', $23232 = '', $23233 = '', $23234 = 'source', $23235 = 'alpine', $23236 = 'Alpine Linux', $23237 = '', $23238 = '', $23239 = '3.12', $23240 = '', $23241 = '', $23242 = 'Alpine Linux v3.12', $23243 = '', $23244 = '', $23245 = '', $23246 = '10.1.21-r0', $23247 = 'invalid', $23248 = NULL, $23249 = '{}', $23250 = '{}', $23251 = 'md5', $23252 = '\x4c32fc8a9d44a75b356643e7b0080f13', $23253 = 'CVE-2017-3318', $23254 = 'alpine-main-v3.12-updater', $23255 = '', $23256 = '0001-01-01 00:00:00+00', $23257 = 'https://www.cve.org/CVERecord?id=CVE-2017-3318', $23258 = '', $23259 = 'Unknown', $23260 = 'mariadb', $23261 = '', $23262 = '', $23263 = '', $23264 = 'source', $23265 = 'alpine', $23266 = 'Alpine Linux', $23267 = '', $23268 = '', $23269 = '3.12', $23270 = '', $23271 = '', $23272 = 'Alpine Linux v3.12', $23273 = '', $23274 = '', $23275 = '', $23276 = '10.1.21-r0', $23277 = 'invalid', $23278 = NULL, $23279 = '{}', $23280 = '{}', $23281 = 'md5', $23282 = '\xab1dcae4acdf209b1b4c15e89bb12784', $23283 = 'CVE-2019-2614', $23284 = 'alpine-main-v3.12-updater', $23285 = '', $23286 = '0001-01-01 00:00:00+00', $23287 = 'https://www.cve.org/CVERecord?id=CVE-2019-2614', $23288 = '', $23289 = 'Unknown', $23290 = 'mariadb', $23291 = '', $23292 = '', $23293 = '', $23294 = 'source', $23295 = 'alpine', $23296 = 'Alpine Linux', $23297 = '', $23298 = '', $23299 = '3.12', $23300 = '', $23301 = '', $23302 = 'Alpine Linux v3.12', $23303 = '', $23304 = '', $23305 = '', $23306 = '10.3.15-r0', $23307 = 'invalid', $23308 = NULL, $23309 = '{}', $23310 = '{}', $23311 = 'md5', $23312 = '\x51b5e7e614ac15b8de0f6e48d7eafe21', $23313 = 'CVE-2019-2627', $23314 = 'alpine-main-v3.12-updater', $23315 = '', $23316 = '0001-01-01 00:00:00+00', $23317 = 'https://www.cve.org/CVERecord?id=CVE-2019-2627', $23318 = '', $23319 = 'Unknown', $23320 = 'mariadb', $23321 = '', $23322 = '', $23323 = '', $23324 = 'source', $23325 = 'alpine', $23326 = 'Alpine Linux', $23327 = '', $23328 = '', $23329 = '3.12', $23330 = '', $23331 = '', $23332 = 'Alpine Linux v3.12', $23333 = '', $23334 = '', $23335 = '', $23336 = '10.3.15-r0', $23337 = 'invalid', $23338 = NULL, $23339 = '{}', $23340 = '{}', $23341 = 'md5', $23342 = '\x2c5359d66581f2ddd2243305ca64b462', $23343 = 'CVE-2019-2628', $23344 = 'alpine-main-v3.12-updater', $23345 = '', $23346 = '0001-01-01 00:00:00+00', $23347 = 'https://www.cve.org/CVERecord?id=CVE-2019-2628', $23348 = '', $23349 = 'Unknown', $23350 = 'mariadb', $23351 = '', $23352 = '', $23353 = '', $23354 = 'source', $23355 = 'alpine', $23356 = 'Alpine Linux', $23357 = '', $23358 = '', $23359 = '3.12', $23360 = '', $23361 = '', $23362 = 'Alpine Linux v3.12', $23363 = '', $23364 = '', $23365 = '', $23366 = '10.3.15-r0', $23367 = 'invalid', $23368 = NULL, $23369 = '{}', $23370 = '{}', $23371 = 'md5', $23372 = '\x3633fcd506a8a49da3ab9a7e7eb57825', $23373 = 'CVE-2021-27928', $23374 = 'alpine-main-v3.12-updater', $23375 = '', $23376 = '0001-01-01 00:00:00+00', $23377 = 'https://www.cve.org/CVERecord?id=CVE-2021-27928', $23378 = '', $23379 = 'Unknown', $23380 = 'mariadb', $23381 = '', $23382 = '', $23383 = '', $23384 = 'source', $23385 = 'alpine', $23386 = 'Alpine Linux', $23387 = '', $23388 = '', $23389 = '3.12', $23390 = '', $23391 = '', $23392 = 'Alpine Linux v3.12', $23393 = '', $23394 = '', $23395 = '', $23396 = '10.4.18-r0', $23397 = 'invalid', $23398 = NULL, $23399 = '{}', $23400 = '{}', $23401 = 'md5', $23402 = '\x7569c09baa60340bd9e0d7cd574b9b0c', $23403 = 'CVE-2021-2154', $23404 = 'alpine-main-v3.12-updater', $23405 = '', $23406 = '0001-01-01 00:00:00+00', $23407 = 'https://www.cve.org/CVERecord?id=CVE-2021-2154', $23408 = '', $23409 = 'Unknown', $23410 = 'mariadb', $23411 = '', $23412 = '', $23413 = '', $23414 = 'source', $23415 = 'alpine', $23416 = 'Alpine Linux', $23417 = '', $23418 = '', $23419 = '3.12', $23420 = '', $23421 = '', $23422 = 'Alpine Linux v3.12', $23423 = '', $23424 = '', $23425 = '', $23426 = '10.4.19-r0', $23427 = 'invalid', $23428 = NULL, $23429 = '{}', $23430 = '{}', $23431 = 'md5', $23432 = '\xd7b2dd5cfe8f0b2d4ce27be700048e7f', $23433 = 'CVE-2021-2166', $23434 = 'alpine-main-v3.12-updater', $23435 = '', $23436 = '0001-01-01 00:00:00+00', $23437 = 'https://www.cve.org/CVERecord?id=CVE-2021-2166', $23438 = '', $23439 = 'Unknown', $23440 = 'mariadb', $23441 = '', $23442 = '', $23443 = '', $23444 = 'source', $23445 = 'alpine', $23446 = 'Alpine Linux', $23447 = '', $23448 = '', $23449 = '3.12', $23450 = '', $23451 = '', $23452 = 'Alpine Linux v3.12', $23453 = '', $23454 = '', $23455 = '', $23456 = '10.4.19-r0', $23457 = 'invalid', $23458 = NULL, $23459 = '{}', $23460 = '{}', $23461 = 'md5', $23462 = '\x38811dbf596818cb76d70f1e343e046c', $23463 = 'CVE-2018-3282', $23464 = 'alpine-main-v3.12-updater', $23465 = '', $23466 = '0001-01-01 00:00:00+00', $23467 = 'https://www.cve.org/CVERecord?id=CVE-2018-3282', $23468 = '', $23469 = 'Unknown', $23470 = 'mariadb', $23471 = '', $23472 = '', $23473 = '', $23474 = 'source', $23475 = 'alpine', $23476 = 'Alpine Linux', $23477 = '', $23478 = '', $23479 = '3.12', $23480 = '', $23481 = '', $23482 = 'Alpine Linux v3.12', $23483 = '', $23484 = '', $23485 = '', $23486 = '10.3.11-r0', $23487 = 'invalid', $23488 = NULL, $23489 = '{}', $23490 = '{}', $23491 = 'md5', $23492 = '\xe79865f438f776f1eb156654d77dc6f6', $23493 = 'CVE-2016-9843', $23494 = 'alpine-main-v3.12-updater', $23495 = '', $23496 = '0001-01-01 00:00:00+00', $23497 = 'https://www.cve.org/CVERecord?id=CVE-2016-9843', $23498 = '', $23499 = 'Unknown', $23500 = 'mariadb', $23501 = '', $23502 = '', $23503 = '', $23504 = 'source', $23505 = 'alpine', $23506 = 'Alpine Linux', $23507 = '', $23508 = '', $23509 = '3.12', $23510 = '', $23511 = '', $23512 = 'Alpine Linux v3.12', $23513 = '', $23514 = '', $23515 = '', $23516 = '10.3.11-r0', $23517 = 'invalid', $23518 = NULL, $23519 = '{}', $23520 = '{}', $23521 = 'md5', $23522 = '\x221e7da5ffe5a13aadb2c142c4f03f71', $23523 = 'CVE-2018-3174', $23524 = 'alpine-main-v3.12-updater', $23525 = '', $23526 = '0001-01-01 00:00:00+00', $23527 = 'https://www.cve.org/CVERecord?id=CVE-2018-3174', $23528 = '', $23529 = 'Unknown', $23530 = 'mariadb', $23531 = '', $23532 = '', $23533 = '', $23534 = 'source', $23535 = 'alpine', $23536 = 'Alpine Linux', $23537 = '', $23538 = '', $23539 = '3.12', $23540 = '', $23541 = '', $23542 = 'Alpine Linux v3.12', $23543 = '', $23544 = '', $23545 = '', $23546 = '10.3.11-r0', $23547 = 'invalid', $23548 = NULL, $23549 = '{}', $23550 = '{}', $23551 = 'md5', $23552 = '\x36c52bc5fa282c52010378497b1b1695', $23553 = 'CVE-2018-3143', $23554 = 'alpine-main-v3.12-updater', $23555 = '', $23556 = '0001-01-01 00:00:00+00', $23557 = 'https://www.cve.org/CVERecord?id=CVE-2018-3143', $23558 = '', $23559 = 'Unknown', $23560 = 'mariadb', $23561 = '', $23562 = '', $23563 = '', $23564 = 'source', $23565 = 'alpine', $23566 = 'Alpine Linux', $23567 = '', $23568 = '', $23569 = '3.12', $23570 = '', $23571 = '', $23572 = 'Alpine Linux v3.12', $23573 = '', $23574 = '', $23575 = '', $23576 = '10.3.11-r0', $23577 = 'invalid', $23578 = NULL, $23579 = '{}', $23580 = '{}', $23581 = 'md5', $23582 = '\xadfcc3702bb9fc33848d1e1851d9f4db', $23583 = 'CVE-2018-3156', $23584 = 'alpine-main-v3.12-updater', $23585 = '', $23586 = '0001-01-01 00:00:00+00', $23587 = 'https://www.cve.org/CVERecord?id=CVE-2018-3156', $23588 = '', $23589 = 'Unknown', $23590 = 'mariadb', $23591 = '', $23592 = '', $23593 = '', $23594 = 'source', $23595 = 'alpine', $23596 = 'Alpine Linux', $23597 = '', $23598 = '', $23599 = '3.12', $23600 = '', $23601 = '', $23602 = 'Alpine Linux v3.12', $23603 = '', $23604 = '', $23605 = '', $23606 = '10.3.11-r0', $23607 = 'invalid', $23608 = NULL, $23609 = '{}', $23610 = '{}', $23611 = 'md5', $23612 = '\x6aa568f56a7b56970f15c4aef60b5a6b', $23613 = 'CVE-2018-3251', $23614 = 'alpine-main-v3.12-updater', $23615 = '', $23616 = '0001-01-01 00:00:00+00', $23617 = 'https://www.cve.org/CVERecord?id=CVE-2018-3251', $23618 = '', $23619 = 'Unknown', $23620 = 'mariadb', $23621 = '', $23622 = '', $23623 = '', $23624 = 'source', $23625 = 'alpine', $23626 = 'Alpine Linux', $23627 = '', $23628 = '', $23629 = '3.12', $23630 = '', $23631 = '', $23632 = 'Alpine Linux v3.12', $23633 = '', $23634 = '', $23635 = '', $23636 = '10.3.11-r0', $23637 = 'invalid', $23638 = NULL, $23639 = '{}', $23640 = '{}', $23641 = 'md5', $23642 = '\x03a3fcb519cd5d1d0cfe650117f4c67b', $23643 = 'CVE-2018-3185', $23644 = 'alpine-main-v3.12-updater', $23645 = '', $23646 = '0001-01-01 00:00:00+00', $23647 = 'https://www.cve.org/CVERecord?id=CVE-2018-3185', $23648 = '', $23649 = 'Unknown', $23650 = 'mariadb', $23651 = '', $23652 = '', $23653 = '', $23654 = 'source', $23655 = 'alpine', $23656 = 'Alpine Linux', $23657 = '', $23658 = '', $23659 = '3.12', $23660 = '', $23661 = '', $23662 = 'Alpine Linux v3.12', $23663 = '', $23664 = '', $23665 = '', $23666 = '10.3.11-r0', $23667 = 'invalid', $23668 = NULL, $23669 = '{}', $23670 = '{}', $23671 = 'md5', $23672 = '\x253261b53c292eee3d235ee60a698085', $23673 = 'CVE-2018-3277', $23674 = 'alpine-main-v3.12-updater', $23675 = '', $23676 = '0001-01-01 00:00:00+00', $23677 = 'https://www.cve.org/CVERecord?id=CVE-2018-3277', $23678 = '', $23679 = 'Unknown', $23680 = 'mariadb', $23681 = '', $23682 = '', $23683 = '', $23684 = 'source', $23685 = 'alpine', $23686 = 'Alpine Linux', $23687 = '', $23688 = '', $23689 = '3.12', $23690 = '', $23691 = '', $23692 = 'Alpine Linux v3.12', $23693 = '', $23694 = '', $23695 = '', $23696 = '10.3.11-r0', $23697 = 'invalid', $23698 = NULL, $23699 = '{}', $23700 = '{}', $23701 = 'md5', $23702 = '\x2db7ebd9ff73b2a01d1828453fc0a861', $23703 = 'CVE-2018-3162', $23704 = 'alpine-main-v3.12-updater', $23705 = '', $23706 = '0001-01-01 00:00:00+00', $23707 = 'https://www.cve.org/CVERecord?id=CVE-2018-3162', $23708 = '', $23709 = 'Unknown', $23710 = 'mariadb', $23711 = '', $23712 = '', $23713 = '', $23714 = 'source', $23715 = 'alpine', $23716 = 'Alpine Linux', $23717 = '', $23718 = '', $23719 = '3.12', $23720 = '', $23721 = '', $23722 = 'Alpine Linux v3.12', $23723 = '', $23724 = '', $23725 = '', $23726 = '10.3.11-r0', $23727 = 'invalid', $23728 = NULL, $23729 = '{}', $23730 = '{}', $23731 = 'md5', $23732 = '\x791f328de0bc73c626fd97fccee29607', $23733 = 'CVE-2018-3173', $23734 = 'alpine-main-v3.12-updater', $23735 = '', $23736 = '0001-01-01 00:00:00+00', $23737 = 'https://www.cve.org/CVERecord?id=CVE-2018-3173', $23738 = '', $23739 = 'Unknown', $23740 = 'mariadb', $23741 = '', $23742 = '', $23743 = '', $23744 = 'source', $23745 = 'alpine', $23746 = 'Alpine Linux', $23747 = '', $23748 = '', $23749 = '3.12', $23750 = '', $23751 = '', $23752 = 'Alpine Linux v3.12', $23753 = '', $23754 = '', $23755 = '', $23756 = '10.3.11-r0', $23757 = 'invalid', $23758 = NULL, $23759 = '{}', $23760 = '{}', $23761 = 'md5', $23762 = '\xd3db5e8c542d7b2e68d52e14d8e2f688', $23763 = 'CVE-2018-3200', $23764 = 'alpine-main-v3.12-updater', $23765 = '', $23766 = '0001-01-01 00:00:00+00', $23767 = 'https://www.cve.org/CVERecord?id=CVE-2018-3200', $23768 = '', $23769 = 'Unknown', $23770 = 'mariadb', $23771 = '', $23772 = '', $23773 = '', $23774 = 'source', $23775 = 'alpine', $23776 = 'Alpine Linux', $23777 = '', $23778 = '', $23779 = '3.12', $23780 = '', $23781 = '', $23782 = 'Alpine Linux v3.12', $23783 = '', $23784 = '', $23785 = '', $23786 = '10.3.11-r0', $23787 = 'invalid', $23788 = NULL, $23789 = '{}', $23790 = '{}', $23791 = 'md5', $23792 = '\x7e9656e4e9c880c2ba5d423527f26e3e', $23793 = 'CVE-2018-3284', $23794 = 'alpine-main-v3.12-updater', $23795 = '', $23796 = '0001-01-01 00:00:00+00', $23797 = 'https://www.cve.org/CVERecord?id=CVE-2018-3284', $23798 = '', $23799 = 'Unknown', $23800 = 'mariadb', $23801 = '', $23802 = '', $23803 = '', $23804 = 'source', $23805 = 'alpine', $23806 = 'Alpine Linux', $23807 = '', $23808 = '', $23809 = '3.12', $23810 = '', $23811 = '', $23812 = 'Alpine Linux v3.12', $23813 = '', $23814 = '', $23815 = '', $23816 = '10.3.11-r0', $23817 = 'invalid', $23818 = NULL, $23819 = '{}', $23820 = '{}', $23821 = 'md5', $23822 = '\x3572fed79d2e757dee1253ea47a6434a', $23823 = 'CVE-2020-14765', $23824 = 'alpine-main-v3.12-updater', $23825 = '', $23826 = '0001-01-01 00:00:00+00', $23827 = 'https://www.cve.org/CVERecord?id=CVE-2020-14765', $23828 = '', $23829 = 'Unknown', $23830 = 'mariadb', $23831 = '', $23832 = '', $23833 = '', $23834 = 'source', $23835 = 'alpine', $23836 = 'Alpine Linux', $23837 = '', $23838 = '', $23839 = '3.12', $23840 = '', $23841 = '', $23842 = 'Alpine Linux v3.12', $23843 = '', $23844 = '', $23845 = '', $23846 = '10.4.17-r0', $23847 = 'invalid', $23848 = NULL, $23849 = '{}', $23850 = '{}', $23851 = 'md5', $23852 = '\x6257dcd8a814f5e23e8d8de19a1b9899', $23853 = 'CVE-2020-14776', $23854 = 'alpine-main-v3.12-updater', $23855 = '', $23856 = '0001-01-01 00:00:00+00', $23857 = 'https://www.cve.org/CVERecord?id=CVE-2020-14776', $23858 = '', $23859 = 'Unknown', $23860 = 'mariadb', $23861 = '', $23862 = '', $23863 = '', $23864 = 'source', $23865 = 'alpine', $23866 = 'Alpine Linux', $23867 = '', $23868 = '', $23869 = '3.12', $23870 = '', $23871 = '', $23872 = 'Alpine Linux v3.12', $23873 = '', $23874 = '', $23875 = '', $23876 = '10.4.17-r0', $23877 = 'invalid', $23878 = NULL, $23879 = '{}', $23880 = '{}', $23881 = 'md5', $23882 = '\xbf7c5c2a36b45fde9226a4600ff4db60', $23883 = 'CVE-2020-14789', $23884 = 'alpine-main-v3.12-updater', $23885 = '', $23886 = '0001-01-01 00:00:00+00', $23887 = 'https://www.cve.org/CVERecord?id=CVE-2020-14789', $23888 = '', $23889 = 'Unknown', $23890 = 'mariadb', $23891 = '', $23892 = '', $23893 = '', $23894 = 'source', $23895 = 'alpine', $23896 = 'Alpine Linux', $23897 = '', $23898 = '', $23899 = '3.12', $23900 = '', $23901 = '', $23902 = 'Alpine Linux v3.12', $23903 = '', $23904 = '', $23905 = '', $23906 = '10.4.17-r0', $23907 = 'invalid', $23908 = NULL, $23909 = '{}', $23910 = '{}', $23911 = 'md5', $23912 = '\x5ea25406d33de99676c52f224bbbfbab', $23913 = 'CVE-2020-14812', $23914 = 'alpine-main-v3.12-updater', $23915 = '', $23916 = '0001-01-01 00:00:00+00', $23917 = 'https://www.cve.org/CVERecord?id=CVE-2020-14812', $23918 = '', $23919 = 'Unknown', $23920 = 'mariadb', $23921 = '', $23922 = '', $23923 = '', $23924 = 'source', $23925 = 'alpine', $23926 = 'Alpine Linux', $23927 = '', $23928 = '', $23929 = '3.12', $23930 = '', $23931 = '', $23932 = 'Alpine Linux v3.12', $23933 = '', $23934 = '', $23935 = '', $23936 = '10.4.17-r0', $23937 = 'invalid', $23938 = NULL, $23939 = '{}', $23940 = '{}', $23941 = 'md5', $23942 = '\x8ea0d96cf840cea440dd997ec8df31e7', $23943 = 'CVE-2021-2372', $23944 = 'alpine-main-v3.12-updater', $23945 = '', $23946 = '0001-01-01 00:00:00+00', $23947 = 'https://www.cve.org/CVERecord?id=CVE-2021-2372', $23948 = '', $23949 = 'Unknown', $23950 = 'mariadb', $23951 = '', $23952 = '', $23953 = '', $23954 = 'source', $23955 = 'alpine', $23956 = 'Alpine Linux', $23957 = '', $23958 = '', $23959 = '3.12', $23960 = '', $23961 = '', $23962 = 'Alpine Linux v3.12', $23963 = '', $23964 = '', $23965 = '', $23966 = '10.4.21-r0', $23967 = 'invalid', $23968 = NULL, $23969 = '{}', $23970 = '{}', $23971 = 'md5', $23972 = '\x23be5262289e0896bcdbee927dbe4c7d', $23973 = 'CVE-2021-2389', $23974 = 'alpine-main-v3.12-updater', $23975 = '', $23976 = '0001-01-01 00:00:00+00', $23977 = 'https://www.cve.org/CVERecord?id=CVE-2021-2389', $23978 = '', $23979 = 'Unknown', $23980 = 'mariadb', $23981 = '', $23982 = '', $23983 = '', $23984 = 'source', $23985 = 'alpine', $23986 = 'Alpine Linux', $23987 = '', $23988 = '', $23989 = '3.12', $23990 = '', $23991 = '', $23992 = 'Alpine Linux v3.12', $23993 = '', $23994 = '', $23995 = '', $23996 = '10.4.21-r0', $23997 = 'invalid', $23998 = NULL, $23999 = '{}', $24000 = '{}', $24001 = 'md5', $24002 = '\xb1e91a0d412b18ac105be56b5663bf23', $24003 = 'CVE-2022-21427', $24004 = 'alpine-main-v3.12-updater', $24005 = '', $24006 = '0001-01-01 00:00:00+00', $24007 = 'https://www.cve.org/CVERecord?id=CVE-2022-21427', $24008 = '', $24009 = 'Unknown', $24010 = 'mariadb', $24011 = '', $24012 = '', $24013 = '', $24014 = 'source', $24015 = 'alpine', $24016 = 'Alpine Linux', $24017 = '', $24018 = '', $24019 = '3.12', $24020 = '', $24021 = '', $24022 = 'Alpine Linux v3.12', $24023 = '', $24024 = '', $24025 = '', $24026 = '10.4.25-r0', $24027 = 'invalid', $24028 = NULL, $24029 = '{}', $24030 = '{}', $24031 = 'md5', $24032 = '\xf18d075cb3b9277d4ed6236fd8aaf9b4', $24033 = 'CVE-2022-27376', $24034 = 'alpine-main-v3.12-updater', $24035 = '', $24036 = '0001-01-01 00:00:00+00', $24037 = 'https://www.cve.org/CVERecord?id=CVE-2022-27376', $24038 = '', $24039 = 'Unknown', $24040 = 'mariadb', $24041 = '', $24042 = '', $24043 = '', $24044 = 'source', $24045 = 'alpine', $24046 = 'Alpine Linux', $24047 = '', $24048 = '', $24049 = '3.12', $24050 = '', $24051 = '', $24052 = 'Alpine Linux v3.12', $24053 = '', $24054 = '', $24055 = '', $24056 = '10.4.25-r0', $24057 = 'invalid', $24058 = NULL, $24059 = '{}', $24060 = '{}', $24061 = 'md5', $24062 = '\xa79158d24047ddc9cc4f294cf171ad96', $24063 = 'CVE-2022-27377', $24064 = 'alpine-main-v3.12-updater', $24065 = '', $24066 = '0001-01-01 00:00:00+00', $24067 = 'https://www.cve.org/CVERecord?id=CVE-2022-27377', $24068 = '', $24069 = 'Unknown', $24070 = 'mariadb', $24071 = '', $24072 = '', $24073 = '', $24074 = 'source', $24075 = 'alpine', $24076 = 'Alpine Linux', $24077 = '', $24078 = '', $24079 = '3.12', $24080 = '', $24081 = '', $24082 = 'Alpine Linux v3.12', $24083 = '', $24084 = '', $24085 = '', $24086 = '10.4.25-r0', $24087 = 'invalid', $24088 = NULL, $24089 = '{}', $24090 = '{}', $24091 = 'md5', $24092 = '\xb16459d32940f0e5926a12af5dc4d80d', $24093 = 'CVE-2022-27378', $24094 = 'alpine-main-v3.12-updater', $24095 = '', $24096 = '0001-01-01 00:00:00+00', $24097 = 'https://www.cve.org/CVERecord?id=CVE-2022-27378', $24098 = '', $24099 = 'Unknown', $24100 = 'mariadb', $24101 = '', $24102 = '', $24103 = '', $24104 = 'source', $24105 = 'alpine', $24106 = 'Alpine Linux', $24107 = '', $24108 = '', $24109 = '3.12', $24110 = '', $24111 = '', $24112 = 'Alpine Linux v3.12', $24113 = '', $24114 = '', $24115 = '', $24116 = '10.4.25-r0', $24117 = 'invalid', $24118 = NULL, $24119 = '{}', $24120 = '{}', $24121 = 'md5', $24122 = '\xc34aa522bc563087a8dd11a97ba68414', $24123 = 'CVE-2022-27379', $24124 = 'alpine-main-v3.12-updater', $24125 = '', $24126 = '0001-01-01 00:00:00+00', $24127 = 'https://www.cve.org/CVERecord?id=CVE-2022-27379', $24128 = '', $24129 = 'Unknown', $24130 = 'mariadb', $24131 = '', $24132 = '', $24133 = '', $24134 = 'source', $24135 = 'alpine', $24136 = 'Alpine Linux', $24137 = '', $24138 = '', $24139 = '3.12', $24140 = '', $24141 = '', $24142 = 'Alpine Linux v3.12', $24143 = '', $24144 = '', $24145 = '', $24146 = '10.4.25-r0', $24147 = 'invalid', $24148 = NULL, $24149 = '{}', $24150 = '{}', $24151 = 'md5', $24152 = '\xca44d6e41b5585976305aaf799d3a92e', $24153 = 'CVE-2022-27380', $24154 = 'alpine-main-v3.12-updater', $24155 = '', $24156 = '0001-01-01 00:00:00+00', $24157 = 'https://www.cve.org/CVERecord?id=CVE-2022-27380', $24158 = '', $24159 = 'Unknown', $24160 = 'mariadb', $24161 = '', $24162 = '', $24163 = '', $24164 = 'source', $24165 = 'alpine', $24166 = 'Alpine Linux', $24167 = '', $24168 = '', $24169 = '3.12', $24170 = '', $24171 = '', $24172 = 'Alpine Linux v3.12', $24173 = '', $24174 = '', $24175 = '', $24176 = '10.4.25-r0', $24177 = 'invalid', $24178 = NULL, $24179 = '{}', $24180 = '{}', $24181 = 'md5', $24182 = '\x209d9702954fa5c4a0010b3c3f65e884', $24183 = 'CVE-2022-27381', $24184 = 'alpine-main-v3.12-updater', $24185 = '', $24186 = '0001-01-01 00:00:00+00', $24187 = 'https://www.cve.org/CVERecord?id=CVE-2022-27381', $24188 = '', $24189 = 'Unknown', $24190 = 'mariadb', $24191 = '', $24192 = '', $24193 = '', $24194 = 'source', $24195 = 'alpine', $24196 = 'Alpine Linux', $24197 = '', $24198 = '', $24199 = '3.12', $24200 = '', $24201 = '', $24202 = 'Alpine Linux v3.12', $24203 = '', $24204 = '', $24205 = '', $24206 = '10.4.25-r0', $24207 = 'invalid', $24208 = NULL, $24209 = '{}', $24210 = '{}', $24211 = 'md5', $24212 = '\x12b3374afc5cb8cf699ff3a756678ae5', $24213 = 'CVE-2022-27382', $24214 = 'alpine-main-v3.12-updater', $24215 = '', $24216 = '0001-01-01 00:00:00+00', $24217 = 'https://www.cve.org/CVERecord?id=CVE-2022-27382', $24218 = '', $24219 = 'Unknown', $24220 = 'mariadb', $24221 = '', $24222 = '', $24223 = '', $24224 = 'source', $24225 = 'alpine', $24226 = 'Alpine Linux', $24227 = '', $24228 = '', $24229 = '3.12', $24230 = '', $24231 = '', $24232 = 'Alpine Linux v3.12', $24233 = '', $24234 = '', $24235 = '', $24236 = '10.4.25-r0', $24237 = 'invalid', $24238 = NULL, $24239 = '{}', $24240 = '{}', $24241 = 'md5', $24242 = '\x8981217521a1ca9e1ce0857382bb2611', $24243 = 'CVE-2022-27383', $24244 = 'alpine-main-v3.12-updater', $24245 = '', $24246 = '0001-01-01 00:00:00+00', $24247 = 'https://www.cve.org/CVERecord?id=CVE-2022-27383', $24248 = '', $24249 = 'Unknown', $24250 = 'mariadb', $24251 = '', $24252 = '', $24253 = '', $24254 = 'source', $24255 = 'alpine', $24256 = 'Alpine Linux', $24257 = '', $24258 = '', $24259 = '3.12', $24260 = '', $24261 = '', $24262 = 'Alpine Linux v3.12', $24263 = '', $24264 = '', $24265 = '', $24266 = '10.4.25-r0', $24267 = 'invalid', $24268 = NULL, $24269 = '{}', $24270 = '{}', $24271 = 'md5', $24272 = '\x9d30750fc916baeaae84534aeadc2579', $24273 = 'CVE-2022-27384', $24274 = 'alpine-main-v3.12-updater', $24275 = '', $24276 = '0001-01-01 00:00:00+00', $24277 = 'https://www.cve.org/CVERecord?id=CVE-2022-27384', $24278 = '', $24279 = 'Unknown', $24280 = 'mariadb', $24281 = '', $24282 = '', $24283 = '', $24284 = 'source', $24285 = 'alpine', $24286 = 'Alpine Linux', $24287 = '', $24288 = '', $24289 = '3.12', $24290 = '', $24291 = '', $24292 = 'Alpine Linux v3.12', $24293 = '', $24294 = '', $24295 = '', $24296 = '10.4.25-r0', $24297 = 'invalid', $24298 = NULL, $24299 = '{}', $24300 = '{}', $24301 = 'md5', $24302 = '\xa3c60db575fa24ce8ce3c946086a758a', $24303 = 'CVE-2022-27386', $24304 = 'alpine-main-v3.12-updater', $24305 = '', $24306 = '0001-01-01 00:00:00+00', $24307 = 'https://www.cve.org/CVERecord?id=CVE-2022-27386', $24308 = '', $24309 = 'Unknown', $24310 = 'mariadb', $24311 = '', $24312 = '', $24313 = '', $24314 = 'source', $24315 = 'alpine', $24316 = 'Alpine Linux', $24317 = '', $24318 = '', $24319 = '3.12', $24320 = '', $24321 = '', $24322 = 'Alpine Linux v3.12', $24323 = '', $24324 = '', $24325 = '', $24326 = '10.4.25-r0', $24327 = 'invalid', $24328 = NULL, $24329 = '{}', $24330 = '{}', $24331 = 'md5', $24332 = '\x95df85511f84dbc507633f3d861b586b', $24333 = 'CVE-2022-27387', $24334 = 'alpine-main-v3.12-updater', $24335 = '', $24336 = '0001-01-01 00:00:00+00', $24337 = 'https://www.cve.org/CVERecord?id=CVE-2022-27387', $24338 = '', $24339 = 'Unknown', $24340 = 'mariadb', $24341 = '', $24342 = '', $24343 = '', $24344 = 'source', $24345 = 'alpine', $24346 = 'Alpine Linux', $24347 = '', $24348 = '', $24349 = '3.12', $24350 = '', $24351 = '', $24352 = 'Alpine Linux v3.12', $24353 = '', $24354 = '', $24355 = '', $24356 = '10.4.25-r0', $24357 = 'invalid', $24358 = NULL, $24359 = '{}', $24360 = '{}', $24361 = 'md5', $24362 = '\xac438b66c5531a9b04a5df32a6dd52cc', $24363 = 'CVE-2022-27444', $24364 = 'alpine-main-v3.12-updater', $24365 = '', $24366 = '0001-01-01 00:00:00+00', $24367 = 'https://www.cve.org/CVERecord?id=CVE-2022-27444', $24368 = '', $24369 = 'Unknown', $24370 = 'mariadb', $24371 = '', $24372 = '', $24373 = '', $24374 = 'source', $24375 = 'alpine', $24376 = 'Alpine Linux', $24377 = '', $24378 = '', $24379 = '3.12', $24380 = '', $24381 = '', $24382 = 'Alpine Linux v3.12', $24383 = '', $24384 = '', $24385 = '', $24386 = '10.4.25-r0', $24387 = 'invalid', $24388 = NULL, $24389 = '{}', $24390 = '{}', $24391 = 'md5', $24392 = '\x9e13d354acac0efa766665cc7cd8434c', $24393 = 'CVE-2022-27445', $24394 = 'alpine-main-v3.12-updater', $24395 = '', $24396 = '0001-01-01 00:00:00+00', $24397 = 'https://www.cve.org/CVERecord?id=CVE-2022-27445', $24398 = '', $24399 = 'Unknown', $24400 = 'mariadb', $24401 = '', $24402 = '', $24403 = '', $24404 = 'source', $24405 = 'alpine', $24406 = 'Alpine Linux', $24407 = '', $24408 = '', $24409 = '3.12', $24410 = '', $24411 = '', $24412 = 'Alpine Linux v3.12', $24413 = '', $24414 = '', $24415 = '', $24416 = '10.4.25-r0', $24417 = 'invalid', $24418 = NULL, $24419 = '{}', $24420 = '{}', $24421 = 'md5', $24422 = '\xbf4c9405409ae9b5517edf53f8d0e560', $24423 = 'CVE-2022-27446', $24424 = 'alpine-main-v3.12-updater', $24425 = '', $24426 = '0001-01-01 00:00:00+00', $24427 = 'https://www.cve.org/CVERecord?id=CVE-2022-27446', $24428 = '', $24429 = 'Unknown', $24430 = 'mariadb', $24431 = '', $24432 = '', $24433 = '', $24434 = 'source', $24435 = 'alpine', $24436 = 'Alpine Linux', $24437 = '', $24438 = '', $24439 = '3.12', $24440 = '', $24441 = '', $24442 = 'Alpine Linux v3.12', $24443 = '', $24444 = '', $24445 = '', $24446 = '10.4.25-r0', $24447 = 'invalid', $24448 = NULL, $24449 = '{}', $24450 = '{}', $24451 = 'md5', $24452 = '\xcba54e5b68979d1c37a3c428f68cb848', $24453 = 'CVE-2022-27447', $24454 = 'alpine-main-v3.12-updater', $24455 = '', $24456 = '0001-01-01 00:00:00+00', $24457 = 'https://www.cve.org/CVERecord?id=CVE-2022-27447', $24458 = '', $24459 = 'Unknown', $24460 = 'mariadb', $24461 = '', $24462 = '', $24463 = '', $24464 = 'source', $24465 = 'alpine', $24466 = 'Alpine Linux', $24467 = '', $24468 = '', $24469 = '3.12', $24470 = '', $24471 = '', $24472 = 'Alpine Linux v3.12', $24473 = '', $24474 = '', $24475 = '', $24476 = '10.4.25-r0', $24477 = 'invalid', $24478 = NULL, $24479 = '{}', $24480 = '{}', $24481 = 'md5', $24482 = '\x1ff5b7324112a8f59bba68fd2395db5a', $24483 = 'CVE-2022-27448', $24484 = 'alpine-main-v3.12-updater', $24485 = '', $24486 = '0001-01-01 00:00:00+00', $24487 = 'https://www.cve.org/CVERecord?id=CVE-2022-27448', $24488 = '', $24489 = 'Unknown', $24490 = 'mariadb', $24491 = '', $24492 = '', $24493 = '', $24494 = 'source', $24495 = 'alpine', $24496 = 'Alpine Linux', $24497 = '', $24498 = '', $24499 = '3.12', $24500 = '', $24501 = '', $24502 = 'Alpine Linux v3.12', $24503 = '', $24504 = '', $24505 = '', $24506 = '10.4.25-r0', $24507 = 'invalid', $24508 = NULL, $24509 = '{}', $24510 = '{}', $24511 = 'md5', $24512 = '\xe4f58666569a80b2a54acf33a856d06e', $24513 = 'CVE-2022-27449', $24514 = 'alpine-main-v3.12-updater', $24515 = '', $24516 = '0001-01-01 00:00:00+00', $24517 = 'https://www.cve.org/CVERecord?id=CVE-2022-27449', $24518 = '', $24519 = 'Unknown', $24520 = 'mariadb', $24521 = '', $24522 = '', $24523 = '', $24524 = 'source', $24525 = 'alpine', $24526 = 'Alpine Linux', $24527 = '', $24528 = '', $24529 = '3.12', $24530 = '', $24531 = '', $24532 = 'Alpine Linux v3.12', $24533 = '', $24534 = '', $24535 = '', $24536 = '10.4.25-r0', $24537 = 'invalid', $24538 = NULL, $24539 = '{}', $24540 = '{}', $24541 = 'md5', $24542 = '\x1b8289722a67dc18b29a9497a27aa843', $24543 = 'CVE-2022-27451', $24544 = 'alpine-main-v3.12-updater', $24545 = '', $24546 = '0001-01-01 00:00:00+00', $24547 = 'https://www.cve.org/CVERecord?id=CVE-2022-27451', $24548 = '', $24549 = 'Unknown', $24550 = 'mariadb', $24551 = '', $24552 = '', $24553 = '', $24554 = 'source', $24555 = 'alpine', $24556 = 'Alpine Linux', $24557 = '', $24558 = '', $24559 = '3.12', $24560 = '', $24561 = '', $24562 = 'Alpine Linux v3.12', $24563 = '', $24564 = '', $24565 = '', $24566 = '10.4.25-r0', $24567 = 'invalid', $24568 = NULL, $24569 = '{}', $24570 = '{}', $24571 = 'md5', $24572 = '\x15e5cbf4975bbb9a0c14cfee9cc21aea', $24573 = 'CVE-2022-27452', $24574 = 'alpine-main-v3.12-updater', $24575 = '', $24576 = '0001-01-01 00:00:00+00', $24577 = 'https://www.cve.org/CVERecord?id=CVE-2022-27452', $24578 = '', $24579 = 'Unknown', $24580 = 'mariadb', $24581 = '', $24582 = '', $24583 = '', $24584 = 'source', $24585 = 'alpine', $24586 = 'Alpine Linux', $24587 = '', $24588 = '', $24589 = '3.12', $24590 = '', $24591 = '', $24592 = 'Alpine Linux v3.12', $24593 = '', $24594 = '', $24595 = '', $24596 = '10.4.25-r0', $24597 = 'invalid', $24598 = NULL, $24599 = '{}', $24600 = '{}', $24601 = 'md5', $24602 = '\x59eb20f9b4ec0bf936e5fab217fe2242', $24603 = 'CVE-2022-27455', $24604 = 'alpine-main-v3.12-updater', $24605 = '', $24606 = '0001-01-01 00:00:00+00', $24607 = 'https://www.cve.org/CVERecord?id=CVE-2022-27455', $24608 = '', $24609 = 'Unknown', $24610 = 'mariadb', $24611 = '', $24612 = '', $24613 = '', $24614 = 'source', $24615 = 'alpine', $24616 = 'Alpine Linux', $24617 = '', $24618 = '', $24619 = '3.12', $24620 = '', $24621 = '', $24622 = 'Alpine Linux v3.12', $24623 = '', $24624 = '', $24625 = '', $24626 = '10.4.25-r0', $24627 = 'invalid', $24628 = NULL, $24629 = '{}', $24630 = '{}', $24631 = 'md5', $24632 = '\x30087c53863d558cfc56b722705a142f', $24633 = 'CVE-2022-27456', $24634 = 'alpine-main-v3.12-updater', $24635 = '', $24636 = '0001-01-01 00:00:00+00', $24637 = 'https://www.cve.org/CVERecord?id=CVE-2022-27456', $24638 = '', $24639 = 'Unknown', $24640 = 'mariadb', $24641 = '', $24642 = '', $24643 = '', $24644 = 'source', $24645 = 'alpine', $24646 = 'Alpine Linux', $24647 = '', $24648 = '', $24649 = '3.12', $24650 = '', $24651 = '', $24652 = 'Alpine Linux v3.12', $24653 = '', $24654 = '', $24655 = '', $24656 = '10.4.25-r0', $24657 = 'invalid', $24658 = NULL, $24659 = '{}', $24660 = '{}', $24661 = 'md5', $24662 = '\xab0e9eb06f125cb66c0fef6da999b4fc', $24663 = 'CVE-2022-27457', $24664 = 'alpine-main-v3.12-updater', $24665 = '', $24666 = '0001-01-01 00:00:00+00', $24667 = 'https://www.cve.org/CVERecord?id=CVE-2022-27457', $24668 = '', $24669 = 'Unknown', $24670 = 'mariadb', $24671 = '', $24672 = '', $24673 = '', $24674 = 'source', $24675 = 'alpine', $24676 = 'Alpine Linux', $24677 = '', $24678 = '', $24679 = '3.12', $24680 = '', $24681 = '', $24682 = 'Alpine Linux v3.12', $24683 = '', $24684 = '', $24685 = '', $24686 = '10.4.25-r0', $24687 = 'invalid', $24688 = NULL, $24689 = '{}', $24690 = '{}', $24691 = 'md5', $24692 = '\x038792a30c6f2fb9df0aa0b67dbe5047', $24693 = 'CVE-2022-27458', $24694 = 'alpine-main-v3.12-updater', $24695 = '', $24696 = '0001-01-01 00:00:00+00', $24697 = 'https://www.cve.org/CVERecord?id=CVE-2022-27458', $24698 = '', $24699 = 'Unknown', $24700 = 'mariadb', $24701 = '', $24702 = '', $24703 = '', $24704 = 'source', $24705 = 'alpine', $24706 = 'Alpine Linux', $24707 = '', $24708 = '', $24709 = '3.12', $24710 = '', $24711 = '', $24712 = 'Alpine Linux v3.12', $24713 = '', $24714 = '', $24715 = '', $24716 = '10.4.25-r0', $24717 = 'invalid', $24718 = NULL, $24719 = '{}', $24720 = '{}', $24721 = 'md5', $24722 = '\xa81cd04cd7ba89dcdf54edc902c3c1d8', $24723 = 'CVE-2018-0498', $24724 = 'alpine-main-v3.12-updater', $24725 = '', $24726 = '0001-01-01 00:00:00+00', $24727 = 'https://www.cve.org/CVERecord?id=CVE-2018-0498', $24728 = '', $24729 = 'Unknown', $24730 = 'mbedtls', $24731 = '', $24732 = '', $24733 = '', $24734 = 'source', $24735 = 'alpine', $24736 = 'Alpine Linux', $24737 = '', $24738 = '', $24739 = '3.12', $24740 = '', $24741 = '', $24742 = 'Alpine Linux v3.12', $24743 = '', $24744 = '', $24745 = '', $24746 = '2.12.0-r0', $24747 = 'invalid', $24748 = NULL, $24749 = '{}', $24750 = '{}', $24751 = 'md5', $24752 = '\x770bc561c8a2daa0bb225f48681ee17b', $24753 = 'CVE-2018-0497', $24754 = 'alpine-main-v3.12-updater', $24755 = '', $24756 = '0001-01-01 00:00:00+00', $24757 = 'https://www.cve.org/CVERecord?id=CVE-2018-0497', $24758 = '', $24759 = 'Unknown', $24760 = 'mbedtls', $24761 = '', $24762 = '', $24763 = '', $24764 = 'source', $24765 = 'alpine', $24766 = 'Alpine Linux', $24767 = '', $24768 = '', $24769 = '3.12', $24770 = '', $24771 = '', $24772 = 'Alpine Linux v3.12', $24773 = '', $24774 = '', $24775 = '', $24776 = '2.12.0-r0', $24777 = 'invalid', $24778 = NULL, $24779 = '{}', $24780 = '{}', $24781 = 'md5', $24782 = '\x7098e875db98c8f7c6f55ff91aeb0e96', $24783 = 'CVE-2018-19608', $24784 = 'alpine-main-v3.12-updater', $24785 = '', $24786 = '0001-01-01 00:00:00+00', $24787 = 'https://www.cve.org/CVERecord?id=CVE-2018-19608', $24788 = '', $24789 = 'Unknown', $24790 = 'mbedtls', $24791 = '', $24792 = '', $24793 = '', $24794 = 'source', $24795 = 'alpine', $24796 = 'Alpine Linux', $24797 = '', $24798 = '', $24799 = '3.12', $24800 = '', $24801 = '', $24802 = 'Alpine Linux v3.12', $24803 = '', $24804 = '', $24805 = '', $24806 = '2.14.1-r0', $24807 = 'invalid', $24808 = NULL, $24809 = '{}', $24810 = '{}', $24811 = 'md5', $24812 = '\x8f1e15271da5307c508940c871a38a69', $24813 = 'CVE-2021-44732', $24814 = 'alpine-main-v3.12-updater', $24815 = '', $24816 = '0001-01-01 00:00:00+00', $24817 = 'https://www.cve.org/CVERecord?id=CVE-2021-44732', $24818 = '', $24819 = 'Unknown', $24820 = 'mbedtls', $24821 = '', $24822 = '', $24823 = '', $24824 = 'source', $24825 = 'alpine', $24826 = 'Alpine Linux', $24827 = '', $24828 = '', $24829 = '3.12', $24830 = '', $24831 = '', $24832 = 'Alpine Linux v3.12', $24833 = '', $24834 = '', $24835 = '', $24836 = '2.16.12-r0', $24837 = 'invalid', $24838 = NULL, $24839 = '{}', $24840 = '{}', $24841 = 'md5', $24842 = '\x330024af01ca8c858e7adc26bd33c0d0', $24843 = 'CVE-2019-16910', $24844 = 'alpine-main-v3.12-updater', $24845 = '', $24846 = '0001-01-01 00:00:00+00', $24847 = 'https://www.cve.org/CVERecord?id=CVE-2019-16910', $24848 = '', $24849 = 'Unknown', $24850 = 'mbedtls', $24851 = '', $24852 = '', $24853 = '', $24854 = 'source', $24855 = 'alpine', $24856 = 'Alpine Linux', $24857 = '', $24858 = '', $24859 = '3.12', $24860 = '', $24861 = '', $24862 = 'Alpine Linux v3.12', $24863 = '', $24864 = '', $24865 = '', $24866 = '2.16.3-r0', $24867 = 'invalid', $24868 = NULL, $24869 = '{}', $24870 = '{}', $24871 = 'md5', $24872 = '\xf7676825fb0e58f61cffbd8260c644e8', $24873 = 'CVE-2020-10932', $24874 = 'alpine-main-v3.12-updater', $24875 = '', $24876 = '0001-01-01 00:00:00+00', $24877 = 'https://www.cve.org/CVERecord?id=CVE-2020-10932', $24878 = '', $24879 = 'Unknown', $24880 = 'mbedtls', $24881 = '', $24882 = '', $24883 = '', $24884 = 'source', $24885 = 'alpine', $24886 = 'Alpine Linux', $24887 = '', $24888 = '', $24889 = '3.12', $24890 = '', $24891 = '', $24892 = 'Alpine Linux v3.12', $24893 = '', $24894 = '', $24895 = '', $24896 = '2.16.6-r0', $24897 = 'invalid', $24898 = NULL, $24899 = '{}', $24900 = '{}', $24901 = 'md5', $24902 = '\x3705325769c5145b98f89751f0154ef0', $24903 = 'CVE-2017-2784', $24904 = 'alpine-main-v3.12-updater', $24905 = '', $24906 = '0001-01-01 00:00:00+00', $24907 = 'https://www.cve.org/CVERecord?id=CVE-2017-2784', $24908 = '', $24909 = 'Unknown', $24910 = 'mbedtls', $24911 = '', $24912 = '', $24913 = '', $24914 = 'source', $24915 = 'alpine', $24916 = 'Alpine Linux', $24917 = '', $24918 = '', $24919 = '3.12', $24920 = '', $24921 = '', $24922 = 'Alpine Linux v3.12', $24923 = '', $24924 = '', $24925 = '', $24926 = '2.4.2-r0', $24927 = 'invalid', $24928 = NULL, $24929 = '{}', $24930 = '{}', $24931 = 'md5', $24932 = '\x119ccdae3e455b496c55c484025c28f8', $24933 = 'CVE-2017-14032', $24934 = 'alpine-main-v3.12-updater', $24935 = '', $24936 = '0001-01-01 00:00:00+00', $24937 = 'https://www.cve.org/CVERecord?id=CVE-2017-14032', $24938 = '', $24939 = 'Unknown', $24940 = 'mbedtls', $24941 = '', $24942 = '', $24943 = '', $24944 = 'source', $24945 = 'alpine', $24946 = 'Alpine Linux', $24947 = '', $24948 = '', $24949 = '3.12', $24950 = '', $24951 = '', $24952 = 'Alpine Linux v3.12', $24953 = '', $24954 = '', $24955 = '', $24956 = '2.6.0-r0', $24957 = 'invalid', $24958 = NULL, $24959 = '{}', $24960 = '{}', $24961 = 'md5', $24962 = '\x1ee48e259a974ddd9cedecf904ff9f54', $24963 = 'CVE-2019-18222', $24964 = 'alpine-main-v3.12-updater', $24965 = '', $24966 = '0001-01-01 00:00:00+00', $24967 = 'https://www.cve.org/CVERecord?id=CVE-2019-18222', $24968 = '', $24969 = 'Unknown', $24970 = 'mbedtls', $24971 = '', $24972 = '', $24973 = '', $24974 = 'source', $24975 = 'alpine', $24976 = 'Alpine Linux', $24977 = '', $24978 = '', $24979 = '3.12', $24980 = '', $24981 = '', $24982 = 'Alpine Linux v3.12', $24983 = '', $24984 = '', $24985 = '', $24986 = '2.16.4-r0', $24987 = 'invalid', $24988 = NULL, $24989 = '{}', $24990 = '{}', $24991 = 'md5', $24992 = '\x94cd54d3a281ca227474b0c42b659af2', $24993 = 'CVE-2020-16150', $24994 = 'alpine-main-v3.12-updater', $24995 = '', $24996 = '0001-01-01 00:00:00+00', $24997 = 'https://www.cve.org/CVERecord?id=CVE-2020-16150', $24998 = '', $24999 = 'Unknown', $25000 = 'mbedtls', $25001 = '', $25002 = '', $25003 = '', $25004 = 'source', $25005 = 'alpine', $25006 = 'Alpine Linux', $25007 = '', $25008 = '', $25009 = '3.12', $25010 = '', $25011 = '', $25012 = 'Alpine Linux v3.12', $25013 = '', $25014 = '', $25015 = '', $25016 = '2.16.8-r0', $25017 = 'invalid', $25018 = NULL, $25019 = '{}', $25020 = '{}', $25021 = 'md5', $25022 = '\x56bcd1e52376c71e6a045f36f879a6e2', $25023 = 'CVE-2018-0488', $25024 = 'alpine-main-v3.12-updater', $25025 = '', $25026 = '0001-01-01 00:00:00+00', $25027 = 'https://www.cve.org/CVERecord?id=CVE-2018-0488', $25028 = '', $25029 = 'Unknown', $25030 = 'mbedtls', $25031 = '', $25032 = '', $25033 = '', $25034 = 'source', $25035 = 'alpine', $25036 = 'Alpine Linux', $25037 = '', $25038 = '', $25039 = '3.12', $25040 = '', $25041 = '', $25042 = 'Alpine Linux v3.12', $25043 = '', $25044 = '', $25045 = '', $25046 = '2.7.0-r0', $25047 = 'invalid', $25048 = NULL, $25049 = '{}', $25050 = '{}', $25051 = 'md5', $25052 = '\x90ef5c6bcf4e3ee3cbab302ec374e3ef', $25053 = 'CVE-2018-0487', $25054 = 'alpine-main-v3.12-updater', $25055 = '', $25056 = '0001-01-01 00:00:00+00', $25057 = 'https://www.cve.org/CVERecord?id=CVE-2018-0487', $25058 = '', $25059 = 'Unknown', $25060 = 'mbedtls', $25061 = '', $25062 = '', $25063 = '', $25064 = 'source', $25065 = 'alpine', $25066 = 'Alpine Linux', $25067 = '', $25068 = '', $25069 = '3.12', $25070 = '', $25071 = '', $25072 = 'Alpine Linux v3.12', $25073 = '', $25074 = '', $25075 = '', $25076 = '2.7.0-r0', $25077 = 'invalid', $25078 = NULL, $25079 = '{}', $25080 = '{}', $25081 = 'md5', $25082 = '\x23e7df18909d8d9161fe912ce4ce76f7', $25083 = 'CVE-2017-18187', $25084 = 'alpine-main-v3.12-updater', $25085 = '', $25086 = '0001-01-01 00:00:00+00', $25087 = 'https://www.cve.org/CVERecord?id=CVE-2017-18187', $25088 = '', $25089 = 'Unknown', $25090 = 'mbedtls', $25091 = '', $25092 = '', $25093 = '', $25094 = 'source', $25095 = 'alpine', $25096 = 'Alpine Linux', $25097 = '', $25098 = '', $25099 = '3.12', $25100 = '', $25101 = '', $25102 = 'Alpine Linux v3.12', $25103 = '', $25104 = '', $25105 = '', $25106 = '2.7.0-r0', $25107 = 'invalid', $25108 = NULL, $25109 = '{}', $25110 = '{}', $25111 = 'md5', $25112 = '\x783f7ee5add8f9bf26cfb116fd202a37', $25113 = 'CVE-2019-3902', $25114 = 'alpine-main-v3.12-updater', $25115 = '', $25116 = '0001-01-01 00:00:00+00', $25117 = 'https://www.cve.org/CVERecord?id=CVE-2019-3902', $25118 = '', $25119 = 'Unknown', $25120 = 'mercurial', $25121 = '', $25122 = '', $25123 = '', $25124 = 'source', $25125 = 'alpine', $25126 = 'Alpine Linux', $25127 = '', $25128 = '', $25129 = '3.12', $25130 = '', $25131 = '', $25132 = 'Alpine Linux v3.12', $25133 = '', $25134 = '', $25135 = '', $25136 = '4.9-r0', $25137 = 'invalid', $25138 = NULL, $25139 = '{}', $25140 = '{}', $25141 = 'md5', $25142 = '\x3f5ccb5aa47149835addada616ef440b', $25143 = 'CVE-2017-17663', $25144 = 'alpine-main-v3.12-updater', $25145 = '', $25146 = '0001-01-01 00:00:00+00', $25147 = 'https://www.cve.org/CVERecord?id=CVE-2017-17663', $25148 = '', $25149 = 'Unknown', $25150 = 'mini_httpd', $25151 = '', $25152 = '', $25153 = '', $25154 = 'source', $25155 = 'alpine', $25156 = 'Alpine Linux', $25157 = '', $25158 = '', $25159 = '3.12', $25160 = '', $25161 = '', $25162 = 'Alpine Linux v3.12', $25163 = '', $25164 = '', $25165 = '', $25166 = '1.29-r0', $25167 = 'invalid', $25168 = NULL, $25169 = '{}', $25170 = '{}', $25171 = 'md5', $25172 = '\x1e7f988f7388abcefaac28e26fae65cf', $25173 = 'CVE-2018-18778', $25174 = 'alpine-main-v3.12-updater', $25175 = '', $25176 = '0001-01-01 00:00:00+00', $25177 = 'https://www.cve.org/CVERecord?id=CVE-2018-18778', $25178 = '', $25179 = 'Unknown', $25180 = 'mini_httpd', $25181 = '', $25182 = '', $25183 = '', $25184 = 'source', $25185 = 'alpine', $25186 = 'Alpine Linux', $25187 = '', $25188 = '', $25189 = '3.12', $25190 = '', $25191 = '', $25192 = 'Alpine Linux v3.12', $25193 = '', $25194 = '', $25195 = '', $25196 = '1.30-r0', $25197 = 'invalid', $25198 = NULL, $25199 = '{}', $25200 = '{}', $25201 = 'md5', $25202 = '\xcf9540d0edeed2234a4f32bee6216be7', $25203 = 'CVE-2017-7650', $25204 = 'alpine-main-v3.12-updater', $25205 = '', $25206 = '0001-01-01 00:00:00+00', $25207 = 'https://www.cve.org/CVERecord?id=CVE-2017-7650', $25208 = '', $25209 = 'Unknown', $25210 = 'mosquitto', $25211 = '', $25212 = '', $25213 = '', $25214 = 'source', $25215 = 'alpine', $25216 = 'Alpine Linux', $25217 = '', $25218 = '', $25219 = '3.12', $25220 = '', $25221 = '', $25222 = 'Alpine Linux v3.12', $25223 = '', $25224 = '', $25225 = '', $25226 = '1.4.12-r0', $25227 = 'invalid', $25228 = NULL, $25229 = '{}', $25230 = '{}', $25231 = 'md5', $25232 = '\x60187672490a82e809b5fe7bca8712e0', $25233 = 'CVE-2017-9868', $25234 = 'alpine-main-v3.12-updater', $25235 = '', $25236 = '0001-01-01 00:00:00+00', $25237 = 'https://www.cve.org/CVERecord?id=CVE-2017-9868', $25238 = '', $25239 = 'Unknown', $25240 = 'mosquitto', $25241 = '', $25242 = '', $25243 = '', $25244 = 'source', $25245 = 'alpine', $25246 = 'Alpine Linux', $25247 = '', $25248 = '', $25249 = '3.12', $25250 = '', $25251 = '', $25252 = 'Alpine Linux v3.12', $25253 = '', $25254 = '', $25255 = '', $25256 = '1.4.13-r0', $25257 = 'invalid', $25258 = NULL, $25259 = '{}', $25260 = '{}', $25261 = 'md5', $25262 = '\x7b69a7142a6ad813f9773f5883fbc0b4', $25263 = 'CVE-2017-7652', $25264 = 'alpine-main-v3.12-updater', $25265 = '', $25266 = '0001-01-01 00:00:00+00', $25267 = 'https://www.cve.org/CVERecord?id=CVE-2017-7652', $25268 = '', $25269 = 'Unknown', $25270 = 'mosquitto', $25271 = '', $25272 = '', $25273 = '', $25274 = 'source', $25275 = 'alpine', $25276 = 'Alpine Linux', $25277 = '', $25278 = '', $25279 = '3.12', $25280 = '', $25281 = '', $25282 = 'Alpine Linux v3.12', $25283 = '', $25284 = '', $25285 = '', $25286 = '1.4.15-r0', $25287 = 'invalid', $25288 = NULL, $25289 = '{}', $25290 = '{}', $25291 = 'md5', $25292 = '\xc10376a23deabf207db0866d6f6278e3', $25293 = 'CVE-2017-7651', $25294 = 'alpine-main-v3.12-updater', $25295 = '', $25296 = '0001-01-01 00:00:00+00', $25297 = 'https://www.cve.org/CVERecord?id=CVE-2017-7651', $25298 = '', $25299 = 'Unknown', $25300 = 'mosquitto', $25301 = '', $25302 = '', $25303 = '', $25304 = 'source', $25305 = 'alpine', $25306 = 'Alpine Linux', $25307 = '', $25308 = '', $25309 = '3.12', $25310 = '', $25311 = '', $25312 = 'Alpine Linux v3.12', $25313 = '', $25314 = '', $25315 = '', $25316 = '1.4.15-r0', $25317 = 'invalid', $25318 = NULL, $25319 = '{}', $25320 = '{}', $25321 = 'md5', $25322 = '\xf410459067fefe0fe67293d55956a3aa', $25323 = 'CVE-2018-12543', $25324 = 'alpine-main-v3.12-updater', $25325 = '', $25326 = '0001-01-01 00:00:00+00', $25327 = 'https://www.cve.org/CVERecord?id=CVE-2018-12543', $25328 = '', $25329 = 'Unknown', $25330 = 'mosquitto', $25331 = '', $25332 = '', $25333 = '', $25334 = 'source', $25335 = 'alpine', $25336 = 'Alpine Linux', $25337 = '', $25338 = '', $25339 = '3.12', $25340 = '', $25341 = '', $25342 = 'Alpine Linux v3.12', $25343 = '', $25344 = '', $25345 = '', $25346 = '1.5.3-r0', $25347 = 'invalid', $25348 = NULL, $25349 = '{}', $25350 = '{}', $25351 = 'md5', $25352 = '\x0efc0d7f25ed6c948bb862fac317e6d6', $25353 = 'CVE-2018-12546', $25354 = 'alpine-main-v3.12-updater', $25355 = '', $25356 = '0001-01-01 00:00:00+00', $25357 = 'https://www.cve.org/CVERecord?id=CVE-2018-12546', $25358 = '', $25359 = 'Unknown', $25360 = 'mosquitto', $25361 = '', $25362 = '', $25363 = '', $25364 = 'source', $25365 = 'alpine', $25366 = 'Alpine Linux', $25367 = '', $25368 = '', $25369 = '3.12', $25370 = '', $25371 = '', $25372 = 'Alpine Linux v3.12', $25373 = '', $25374 = '', $25375 = '', $25376 = '1.5.6-r0', $25377 = 'invalid', $25378 = NULL, $25379 = '{}', $25380 = '{}', $25381 = 'md5', $25382 = '\xcc0f2708197c77ec179c387ab1e55e8b', $25383 = 'CVE-2018-12550', $25384 = 'alpine-main-v3.12-updater', $25385 = '', $25386 = '0001-01-01 00:00:00+00', $25387 = 'https://www.cve.org/CVERecord?id=CVE-2018-12550', $25388 = '', $25389 = 'Unknown', $25390 = 'mosquitto', $25391 = '', $25392 = '', $25393 = '', $25394 = 'source', $25395 = 'alpine', $25396 = 'Alpine Linux', $25397 = '', $25398 = '', $25399 = '3.12', $25400 = '', $25401 = '', $25402 = 'Alpine Linux v3.12', $25403 = '', $25404 = '', $25405 = '', $25406 = '1.5.6-r0', $25407 = 'invalid', $25408 = NULL, $25409 = '{}', $25410 = '{}', $25411 = 'md5', $25412 = '\x67501bcb09865c0af9e5f77d2f5c0d76', $25413 = 'CVE-2018-12551', $25414 = 'alpine-main-v3.12-updater', $25415 = '', $25416 = '0001-01-01 00:00:00+00', $25417 = 'https://www.cve.org/CVERecord?id=CVE-2018-12551', $25418 = '', $25419 = 'Unknown', $25420 = 'mosquitto', $25421 = '', $25422 = '', $25423 = '', $25424 = 'source', $25425 = 'alpine', $25426 = 'Alpine Linux', $25427 = '', $25428 = '', $25429 = '3.12', $25430 = '', $25431 = '', $25432 = 'Alpine Linux v3.12', $25433 = '', $25434 = '', $25435 = '', $25436 = '1.5.6-r0', $25437 = 'invalid', $25438 = NULL, $25439 = '{}', $25440 = '{}', $25441 = 'md5', $25442 = '\x791ab07fffbf34c8ddbabaa418af6c4e', $25443 = 'CVE-2019-11779', $25444 = 'alpine-main-v3.12-updater', $25445 = '', $25446 = '0001-01-01 00:00:00+00', $25447 = 'https://www.cve.org/CVERecord?id=CVE-2019-11779', $25448 = '', $25449 = 'Unknown', $25450 = 'mosquitto', $25451 = '', $25452 = '', $25453 = '', $25454 = 'source', $25455 = 'alpine', $25456 = 'Alpine Linux', $25457 = '', $25458 = '', $25459 = '3.12', $25460 = '', $25461 = '', $25462 = 'Alpine Linux v3.12', $25463 = '', $25464 = '', $25465 = '', $25466 = '1.6.7-r0', $25467 = 'invalid', $25468 = NULL, $25469 = '{}', $25470 = '{}', $25471 = 'md5', $25472 = '\xe26d48662397e37832ca725f5214f4ea', $25473 = 'CVE-2021-34432', $25474 = 'alpine-main-v3.12-updater', $25475 = '', $25476 = '0001-01-01 00:00:00+00', $25477 = 'https://www.cve.org/CVERecord?id=CVE-2021-34432', $25478 = '', $25479 = 'Unknown', $25480 = 'mosquitto', $25481 = '', $25482 = '', $25483 = '', $25484 = 'source', $25485 = 'alpine', $25486 = 'Alpine Linux', $25487 = '', $25488 = '', $25489 = '3.12', $25490 = '', $25491 = '', $25492 = 'Alpine Linux v3.12', $25493 = '', $25494 = '', $25495 = '', $25496 = '1.6.9-r1', $25497 = 'invalid', $25498 = NULL, $25499 = '{}', $25500 = '{}', $25501 = 'md5', $25502 = '\x758dd2ab61cb08123420b5d90a84962f', $25503 = 'CVE-2019-11708', $25504 = 'alpine-main-v3.12-updater', $25505 = '', $25506 = '0001-01-01 00:00:00+00', $25507 = 'https://www.cve.org/CVERecord?id=CVE-2019-11708', $25508 = '', $25509 = 'Unknown', $25510 = 'mozjs60', $25511 = '', $25512 = '', $25513 = '', $25514 = 'source', $25515 = 'alpine', $25516 = 'Alpine Linux', $25517 = '', $25518 = '', $25519 = '3.12', $25520 = '', $25521 = '', $25522 = 'Alpine Linux v3.12', $25523 = '', $25524 = '', $25525 = '', $25526 = '60.7.2-r0', $25527 = 'invalid', $25528 = NULL, $25529 = '{}', $25530 = '{}', $25531 = 'md5', $25532 = '\xe2b44d1885353288bb70433eba66b267', $25533 = 'CVE-2019-11707', $25534 = 'alpine-main-v3.12-updater', $25535 = '', $25536 = '0001-01-01 00:00:00+00', $25537 = 'https://www.cve.org/CVERecord?id=CVE-2019-11707', $25538 = '', $25539 = 'Unknown', $25540 = 'mozjs60', $25541 = '', $25542 = '', $25543 = '', $25544 = 'source', $25545 = 'alpine', $25546 = 'Alpine Linux', $25547 = '', $25548 = '', $25549 = '3.12', $25550 = '', $25551 = '', $25552 = 'Alpine Linux v3.12', $25553 = '', $25554 = '', $25555 = '', $25556 = '60.7.2-r0', $25557 = 'invalid', $25558 = NULL, $25559 = '{}', $25560 = '{}', $25561 = 'md5', $25562 = '\xa7ea37c8b97ae5efc76dff11bbc08ed4', $25563 = 'CVE-2016-8859', $25564 = 'alpine-main-v3.12-updater', $25565 = '', $25566 = '0001-01-01 00:00:00+00', $25567 = 'https://www.cve.org/CVERecord?id=CVE-2016-8859', $25568 = '', $25569 = 'Unknown', $25570 = 'musl', $25571 = '', $25572 = '', $25573 = '', $25574 = 'source', $25575 = 'alpine', $25576 = 'Alpine Linux', $25577 = '', $25578 = '', $25579 = '3.12', $25580 = '', $25581 = '', $25582 = 'Alpine Linux v3.12', $25583 = '', $25584 = '', $25585 = '', $25586 = '1.1.15-r4', $25587 = 'invalid', $25588 = NULL, $25589 = '{}', $25590 = '{}', $25591 = 'md5', $25592 = '\x5adc9e157003e4c0facf5834baa55ce5', $25593 = 'CVE-2019-14697', $25594 = 'alpine-main-v3.12-updater', $25595 = '', $25596 = '0001-01-01 00:00:00+00', $25597 = 'https://www.cve.org/CVERecord?id=CVE-2019-14697', $25598 = '', $25599 = 'Unknown', $25600 = 'musl', $25601 = '', $25602 = '', $25603 = '', $25604 = 'source', $25605 = 'alpine', $25606 = 'Alpine Linux', $25607 = '', $25608 = '', $25609 = '3.12', $25610 = '', $25611 = '', $25612 = 'Alpine Linux v3.12', $25613 = '', $25614 = '', $25615 = '', $25616 = '1.1.23-r2', $25617 = 'invalid', $25618 = NULL, $25619 = '{}', $25620 = '{}', $25621 = 'md5', $25622 = '\x5ed55ababfcd0089f33e32f75abe08fa', $25623 = 'CVE-2020-28928', $25624 = 'alpine-main-v3.12-updater', $25625 = '', $25626 = '0001-01-01 00:00:00+00', $25627 = 'https://www.cve.org/CVERecord?id=CVE-2020-28928', $25628 = '', $25629 = 'Unknown', $25630 = 'musl', $25631 = '', $25632 = '', $25633 = '', $25634 = 'source', $25635 = 'alpine', $25636 = 'Alpine Linux', $25637 = '', $25638 = '', $25639 = '3.12', $25640 = '', $25641 = '', $25642 = 'Alpine Linux v3.12', $25643 = '', $25644 = '', $25645 = '', $25646 = '1.1.24-r10', $25647 = 'invalid', $25648 = NULL, $25649 = '{}', $25650 = '{}', $25651 = 'md5', $25652 = '\x8e40e0b70ea4321acf9d0a4e824333ed', $25653 = 'CVE-2021-39537', $25654 = 'alpine-main-v3.12-updater', $25655 = '', $25656 = '0001-01-01 00:00:00+00', $25657 = 'https://www.cve.org/CVERecord?id=CVE-2021-39537', $25658 = '', $25659 = 'Unknown', $25660 = 'ncurses', $25661 = '', $25662 = '', $25663 = '', $25664 = 'source', $25665 = 'alpine', $25666 = 'Alpine Linux', $25667 = '', $25668 = '', $25669 = '3.12', $25670 = '', $25671 = '', $25672 = 'Alpine Linux v3.12', $25673 = '', $25674 = '', $25675 = '', $25676 = '6.2_p20200523-r1', $25677 = 'invalid', $25678 = NULL, $25679 = '{}', $25680 = '{}', $25681 = 'md5', $25682 = '\x477f634fcf84e29222cbd4c050b8e82b', $25683 = 'CVE-2017-10684', $25684 = 'alpine-main-v3.12-updater', $25685 = '', $25686 = '0001-01-01 00:00:00+00', $25687 = 'https://www.cve.org/CVERecord?id=CVE-2017-10684', $25688 = '', $25689 = 'Unknown', $25690 = 'ncurses', $25691 = '', $25692 = '', $25693 = '', $25694 = 'source', $25695 = 'alpine', $25696 = 'Alpine Linux', $25697 = '', $25698 = '', $25699 = '3.12', $25700 = '', $25701 = '', $25702 = 'Alpine Linux v3.12', $25703 = '', $25704 = '', $25705 = '', $25706 = '6.0_p20170701-r0', $25707 = 'invalid', $25708 = NULL, $25709 = '{}', $25710 = '{}', $25711 = 'md5', $25712 = '\xb26fd2422a67d5e727fcf55257eeaf04', $25713 = 'CVE-2017-16879', $25714 = 'alpine-main-v3.12-updater', $25715 = '', $25716 = '0001-01-01 00:00:00+00', $25717 = 'https://www.cve.org/CVERecord?id=CVE-2017-16879', $25718 = '', $25719 = 'Unknown', $25720 = 'ncurses', $25721 = '', $25722 = '', $25723 = '', $25724 = 'source', $25725 = 'alpine', $25726 = 'Alpine Linux', $25727 = '', $25728 = '', $25729 = '3.12', $25730 = '', $25731 = '', $25732 = 'Alpine Linux v3.12', $25733 = '', $25734 = '', $25735 = '', $25736 = '6.0_p20171125-r0', $25737 = 'invalid', $25738 = NULL, $25739 = '{}', $25740 = '{}', $25741 = 'md5', $25742 = '\x86dc04168156091a68b4f15940b4659e', $25743 = 'CVE-2018-10754', $25744 = 'alpine-main-v3.12-updater', $25745 = '', $25746 = '0001-01-01 00:00:00+00', $25747 = 'https://www.cve.org/CVERecord?id=CVE-2018-10754', $25748 = '', $25749 = 'Unknown', $25750 = 'ncurses', $25751 = '', $25752 = '', $25753 = '', $25754 = 'source', $25755 = 'alpine', $25756 = 'Alpine Linux', $25757 = '', $25758 = '', $25759 = '3.12', $25760 = '', $25761 = '', $25762 = 'Alpine Linux v3.12', $25763 = '', $25764 = '', $25765 = '', $25766 = '6.1_p20180414-r0', $25767 = 'invalid', $25768 = NULL, $25769 = '{}', $25770 = '{}', $25771 = 'md5', $25772 = '\xbd521614407a5989fe0a7c8d102e50b9', $25773 = 'CVE-2019-20892', $25774 = 'alpine-main-v3.12-updater', $25775 = '', $25776 = '0001-01-01 00:00:00+00', $25777 = 'https://www.cve.org/CVERecord?id=CVE-2019-20892', $25778 = '', $25779 = 'Unknown', $25780 = 'net-snmp', $25781 = '', $25782 = '', $25783 = '', $25784 = 'source', $25785 = 'alpine', $25786 = 'Alpine Linux', $25787 = '', $25788 = '', $25789 = '3.12', $25790 = '', $25791 = '', $25792 = 'Alpine Linux v3.12', $25793 = '', $25794 = '', $25795 = '', $25796 = '5.8-r0', $25797 = 'invalid', $25798 = NULL, $25799 = '{}', $25800 = '{}', $25801 = 'md5', $25802 = '\xc835a51dd109947e3f11301502aa8f57', $25803 = 'CVE-2021-3580', $25804 = 'alpine-main-v3.12-updater', $25805 = '', $25806 = '0001-01-01 00:00:00+00', $25807 = 'https://www.cve.org/CVERecord?id=CVE-2021-3580', $25808 = '', $25809 = 'Unknown', $25810 = 'nettle', $25811 = '', $25812 = '', $25813 = '', $25814 = 'source', $25815 = 'alpine', $25816 = 'Alpine Linux', $25817 = '', $25818 = '', $25819 = '3.12', $25820 = '', $25821 = '', $25822 = 'Alpine Linux v3.12', $25823 = '', $25824 = '', $25825 = '', $25826 = '3.5.1-r2', $25827 = 'invalid', $25828 = NULL, $25829 = '{}', $25830 = '{}', $25831 = 'md5', $25832 = '\x3d47883a8b31112a3cd578f6ce0d4ac9', $25833 = 'CVE-2019-14459', $25834 = 'alpine-main-v3.12-updater', $25835 = '', $25836 = '0001-01-01 00:00:00+00', $25837 = 'https://www.cve.org/CVERecord?id=CVE-2019-14459', $25838 = '', $25839 = 'Unknown', $25840 = 'nfdump', $25841 = '', $25842 = '', $25843 = '', $25844 = 'source', $25845 = 'alpine', $25846 = 'Alpine Linux', $25847 = '', $25848 = '', $25849 = '3.12', $25850 = '', $25851 = '', $25852 = 'Alpine Linux v3.12', $25853 = '', $25854 = '', $25855 = '', $25856 = '1.6.18-r0', $25857 = 'invalid', $25858 = NULL, $25859 = '{}', $25860 = '{}', $25861 = 'md5', $25862 = '\xabace6434a673d56bf15d40487858880', $25863 = 'CVE-2019-1010057', $25864 = 'alpine-main-v3.12-updater', $25865 = '', $25866 = '0001-01-01 00:00:00+00', $25867 = 'https://www.cve.org/CVERecord?id=CVE-2019-1010057', $25868 = '', $25869 = 'Unknown', $25870 = 'nfdump', $25871 = '', $25872 = '', $25873 = '', $25874 = 'source', $25875 = 'alpine', $25876 = 'Alpine Linux', $25877 = '', $25878 = '', $25879 = '3.12', $25880 = '', $25881 = '', $25882 = 'Alpine Linux v3.12', $25883 = '', $25884 = '', $25885 = '', $25886 = '1.6.18-r0', $25887 = 'invalid', $25888 = NULL, $25889 = '{}', $25890 = '{}', $25891 = 'md5', $25892 = '\xf62c272e5c072889a1631694d527f44f', $25893 = 'CVE-2019-9511', $25894 = 'alpine-main-v3.12-updater', $25895 = '', $25896 = '0001-01-01 00:00:00+00', $25897 = 'https://www.cve.org/CVERecord?id=CVE-2019-9511', $25898 = '', $25899 = 'Unknown', $25900 = 'nghttp2', $25901 = '', $25902 = '', $25903 = '', $25904 = 'source', $25905 = 'alpine', $25906 = 'Alpine Linux', $25907 = '', $25908 = '', $25909 = '3.12', $25910 = '', $25911 = '', $25912 = 'Alpine Linux v3.12', $25913 = '', $25914 = '', $25915 = '', $25916 = '1.39.2-r0', $25917 = 'invalid', $25918 = NULL, $25919 = '{}', $25920 = '{}', $25921 = 'md5', $25922 = '\xcdfd7b74b02abe41b1cc105afd6df013', $25923 = 'CVE-2019-9513', $25924 = 'alpine-main-v3.12-updater', $25925 = '', $25926 = '0001-01-01 00:00:00+00', $25927 = 'https://www.cve.org/CVERecord?id=CVE-2019-9513', $25928 = '', $25929 = 'Unknown', $25930 = 'nghttp2', $25931 = '', $25932 = '', $25933 = '', $25934 = 'source', $25935 = 'alpine', $25936 = 'Alpine Linux', $25937 = '', $25938 = '', $25939 = '3.12', $25940 = '', $25941 = '', $25942 = 'Alpine Linux v3.12', $25943 = '', $25944 = '', $25945 = '', $25946 = '1.39.2-r0', $25947 = 'invalid', $25948 = NULL, $25949 = '{}', $25950 = '{}', $25951 = 'md5', $25952 = '\xdbbf94f0423e9ece22e9bf475b905a5b', $25953 = 'CVE-2020-11080', $25954 = 'alpine-main-v3.12-updater', $25955 = '', $25956 = '0001-01-01 00:00:00+00', $25957 = 'https://www.cve.org/CVERecord?id=CVE-2020-11080', $25958 = '', $25959 = 'Unknown', $25960 = 'nghttp2', $25961 = '', $25962 = '', $25963 = '', $25964 = 'source', $25965 = 'alpine', $25966 = 'Alpine Linux', $25967 = '', $25968 = '', $25969 = '3.12', $25970 = '', $25971 = '', $25972 = 'Alpine Linux v3.12', $25973 = '', $25974 = '', $25975 = '', $25976 = '1.41.0-r0', $25977 = 'invalid', $25978 = NULL, $25979 = '{}', $25980 = '{}', $25981 = 'md5', $25982 = '\xd2a2cc66b78afb926708b969dff7f0ec', $25983 = 'CVE-2017-7529', $25984 = 'alpine-main-v3.12-updater', $25985 = '', $25986 = '0001-01-01 00:00:00+00', $25987 = 'https://www.cve.org/CVERecord?id=CVE-2017-7529', $25988 = '', $25989 = 'Unknown', $25990 = 'nginx', $25991 = '', $25992 = '', $25993 = '', $25994 = 'source', $25995 = 'alpine', $25996 = 'Alpine Linux', $25997 = '', $25998 = '', $25999 = '3.12', $26000 = '', $26001 = '', $26002 = 'Alpine Linux v3.12', $26003 = '', $26004 = '', $26005 = '', $26006 = '1.12.1-r0', $26007 = 'invalid', $26008 = NULL, $26009 = '{}', $26010 = '{}', $26011 = 'md5', $26012 = '\x1d568013f615b92b53889cf25d72a5c3', $26013 = 'CVE-2018-16843', $26014 = 'alpine-main-v3.12-updater', $26015 = '', $26016 = '0001-01-01 00:00:00+00', $26017 = 'https://www.cve.org/CVERecord?id=CVE-2018-16843', $26018 = '', $26019 = 'Unknown', $26020 = 'nginx', $26021 = '', $26022 = '', $26023 = '', $26024 = 'source', $26025 = 'alpine', $26026 = 'Alpine Linux', $26027 = '', $26028 = '', $26029 = '3.12', $26030 = '', $26031 = '', $26032 = 'Alpine Linux v3.12', $26033 = '', $26034 = '', $26035 = '', $26036 = '1.14.1-r0', $26037 = 'invalid', $26038 = NULL, $26039 = '{}', $26040 = '{}', $26041 = 'md5', $26042 = '\x946374f44df6253bfe409eb9466cc657', $26043 = 'CVE-2018-16844', $26044 = 'alpine-main-v3.12-updater', $26045 = '', $26046 = '0001-01-01 00:00:00+00', $26047 = 'https://www.cve.org/CVERecord?id=CVE-2018-16844', $26048 = '', $26049 = 'Unknown', $26050 = 'nginx', $26051 = '', $26052 = '', $26053 = '', $26054 = 'source', $26055 = 'alpine', $26056 = 'Alpine Linux', $26057 = '', $26058 = '', $26059 = '3.12', $26060 = '', $26061 = '', $26062 = 'Alpine Linux v3.12', $26063 = '', $26064 = '', $26065 = '', $26066 = '1.14.1-r0', $26067 = 'invalid', $26068 = NULL, $26069 = '{}', $26070 = '{}', $26071 = 'md5', $26072 = '\x7368a384ba378efd8abd2f65ed1e3da8', $26073 = 'CVE-2018-16845', $26074 = 'alpine-main-v3.12-updater', $26075 = '', $26076 = '0001-01-01 00:00:00+00', $26077 = 'https://www.cve.org/CVERecord?id=CVE-2018-16845', $26078 = '', $26079 = 'Unknown', $26080 = 'nginx', $26081 = '', $26082 = '', $26083 = '', $26084 = 'source', $26085 = 'alpine', $26086 = 'Alpine Linux', $26087 = '', $26088 = '', $26089 = '3.12', $26090 = '', $26091 = '', $26092 = 'Alpine Linux v3.12', $26093 = '', $26094 = '', $26095 = '', $26096 = '1.14.1-r0', $26097 = 'invalid', $26098 = NULL, $26099 = '{}', $26100 = '{}', $26101 = 'md5', $26102 = '\x41618b5f8299057d4feb10c5a513c6f9', $26103 = 'CVE-2019-9511', $26104 = 'alpine-main-v3.12-updater', $26105 = '', $26106 = '0001-01-01 00:00:00+00', $26107 = 'https://www.cve.org/CVERecord?id=CVE-2019-9511', $26108 = '', $26109 = 'Unknown', $26110 = 'nginx', $26111 = '', $26112 = '', $26113 = '', $26114 = 'source', $26115 = 'alpine', $26116 = 'Alpine Linux', $26117 = '', $26118 = '', $26119 = '3.12', $26120 = '', $26121 = '', $26122 = 'Alpine Linux v3.12', $26123 = '', $26124 = '', $26125 = '', $26126 = '1.16.1-r0', $26127 = 'invalid', $26128 = NULL, $26129 = '{}', $26130 = '{}', $26131 = 'md5', $26132 = '\xa4c596ce6e00af303529148843121cbe', $26133 = 'CVE-2019-9513', $26134 = 'alpine-main-v3.12-updater', $26135 = '', $26136 = '0001-01-01 00:00:00+00', $26137 = 'https://www.cve.org/CVERecord?id=CVE-2019-9513', $26138 = '', $26139 = 'Unknown', $26140 = 'nginx', $26141 = '', $26142 = '', $26143 = '', $26144 = 'source', $26145 = 'alpine', $26146 = 'Alpine Linux', $26147 = '', $26148 = '', $26149 = '3.12', $26150 = '', $26151 = '', $26152 = 'Alpine Linux v3.12', $26153 = '', $26154 = '', $26155 = '', $26156 = '1.16.1-r0', $26157 = 'invalid', $26158 = NULL, $26159 = '{}', $26160 = '{}', $26161 = 'md5', $26162 = '\xa58edcb3833091f87b5ef9ac07cb7c32', $26163 = 'CVE-2019-9516', $26164 = 'alpine-main-v3.12-updater', $26165 = '', $26166 = '0001-01-01 00:00:00+00', $26167 = 'https://www.cve.org/CVERecord?id=CVE-2019-9516', $26168 = '', $26169 = 'Unknown', $26170 = 'nginx', $26171 = '', $26172 = '', $26173 = '', $26174 = 'source', $26175 = 'alpine', $26176 = 'Alpine Linux', $26177 = '', $26178 = '', $26179 = '3.12', $26180 = '', $26181 = '', $26182 = 'Alpine Linux v3.12', $26183 = '', $26184 = '', $26185 = '', $26186 = '1.16.1-r0', $26187 = 'invalid', $26188 = NULL, $26189 = '{}', $26190 = '{}', $26191 = 'md5', $26192 = '\x98fd8a7788b434e4d7418fd3f2d6e377', $26193 = 'CVE-2019-20372', $26194 = 'alpine-main-v3.12-updater', $26195 = '', $26196 = '0001-01-01 00:00:00+00', $26197 = 'https://www.cve.org/CVERecord?id=CVE-2019-20372', $26198 = '', $26199 = 'Unknown', $26200 = 'nginx', $26201 = '', $26202 = '', $26203 = '', $26204 = 'source', $26205 = 'alpine', $26206 = 'Alpine Linux', $26207 = '', $26208 = '', $26209 = '3.12', $26210 = '', $26211 = '', $26212 = 'Alpine Linux v3.12', $26213 = '', $26214 = '', $26215 = '', $26216 = '1.16.1-r6', $26217 = 'invalid', $26218 = NULL, $26219 = '{}', $26220 = '{}', $26221 = 'md5', $26222 = '\xee0ac13d54ce9d1dc4eeebaa2354e8a5', $26223 = 'CVE-2021-23017', $26224 = 'alpine-main-v3.12-updater', $26225 = '', $26226 = '0001-01-01 00:00:00+00', $26227 = 'https://www.cve.org/CVERecord?id=CVE-2021-23017', $26228 = '', $26229 = 'Unknown', $26230 = 'nginx', $26231 = '', $26232 = '', $26233 = '', $26234 = 'source', $26235 = 'alpine', $26236 = 'Alpine Linux', $26237 = '', $26238 = '', $26239 = '3.12', $26240 = '', $26241 = '', $26242 = 'Alpine Linux v3.12', $26243 = '', $26244 = '', $26245 = '', $26246 = '1.18.0-r2', $26247 = 'invalid', $26248 = NULL, $26249 = '{}', $26250 = '{}', $26251 = 'md5', $26252 = '\x2d5aa2e3dbb1ca8ad60fcbb8770fa3ab', $26253 = 'CVE-2020-14148', $26254 = 'alpine-main-v3.12-updater', $26255 = '', $26256 = '0001-01-01 00:00:00+00', $26257 = 'https://www.cve.org/CVERecord?id=CVE-2020-14148', $26258 = '', $26259 = 'Unknown', $26260 = 'ngircd', $26261 = '', $26262 = '', $26263 = '', $26264 = 'source', $26265 = 'alpine', $26266 = 'Alpine Linux', $26267 = '', $26268 = '', $26269 = '3.12', $26270 = '', $26271 = '', $26272 = 'Alpine Linux v3.12', $26273 = '', $26274 = '', $26275 = '', $26276 = '25-r1', $26277 = 'invalid', $26278 = NULL, $26279 = '{}', $26280 = '{}', $26281 = 'md5', $26282 = '\x5d8eec0890db7e5780448bf9f4c383dc', $26283 = 'CVE-2018-11652', $26284 = 'alpine-main-v3.12-updater', $26285 = '', $26286 = '0001-01-01 00:00:00+00', $26287 = 'https://www.cve.org/CVERecord?id=CVE-2018-11652', $26288 = '', $26289 = 'Unknown', $26290 = 'nikto', $26291 = '', $26292 = '', $26293 = '', $26294 = 'source', $26295 = 'alpine', $26296 = 'Alpine Linux', $26297 = '', $26298 = '', $26299 = '3.12', $26300 = '', $26301 = '', $26302 = 'Alpine Linux v3.12', $26303 = '', $26304 = '', $26305 = '', $26306 = '2.1.6-r2', $26307 = 'invalid', $26308 = NULL, $26309 = '{}', $26310 = '{}', $26311 = 'md5', $26312 = '\xe171ca199e51c7462f02d00ba75e998b', $26313 = 'CVE-2017-18594', $26314 = 'alpine-main-v3.12-updater', $26315 = '', $26316 = '0001-01-01 00:00:00+00', $26317 = 'https://www.cve.org/CVERecord?id=CVE-2017-18594', $26318 = '', $26319 = 'Unknown', $26320 = 'nmap', $26321 = '', $26322 = '', $26323 = '', $26324 = 'source', $26325 = 'alpine', $26326 = 'Alpine Linux', $26327 = '', $26328 = '', $26329 = '3.12', $26330 = '', $26331 = '', $26332 = 'Alpine Linux v3.12', $26333 = '', $26334 = '', $26335 = '', $26336 = '7.80-r0', $26337 = 'invalid', $26338 = NULL, $26339 = '{}', $26340 = '{}', $26341 = 'md5', $26342 = '\x03c530f1ed4ea4cf0dd846c01c2b9834', $26343 = 'CVE-2018-15173', $26344 = 'alpine-main-v3.12-updater', $26345 = '', $26346 = '0001-01-01 00:00:00+00', $26347 = 'https://www.cve.org/CVERecord?id=CVE-2018-15173', $26348 = '', $26349 = 'Unknown', $26350 = 'nmap', $26351 = '', $26352 = '', $26353 = '', $26354 = 'source', $26355 = 'alpine', $26356 = 'Alpine Linux', $26357 = '', $26358 = '', $26359 = '3.12', $26360 = '', $26361 = '', $26362 = 'Alpine Linux v3.12', $26363 = '', $26364 = '', $26365 = '', $26366 = '7.80-r0', $26367 = 'invalid', $26368 = NULL, $26369 = '{}', $26370 = '{}', $26371 = 'md5', $26372 = '\x505b393719d9523afa7e2dd9dcb6cfeb', $26373 = 'CVE-2019-5737', $26374 = 'alpine-main-v3.12-updater', $26375 = '', $26376 = '0001-01-01 00:00:00+00', $26377 = 'https://www.cve.org/CVERecord?id=CVE-2019-5737', $26378 = '', $26379 = 'Unknown', $26380 = 'nodejs', $26381 = '', $26382 = '', $26383 = '', $26384 = 'source', $26385 = 'alpine', $26386 = 'Alpine Linux', $26387 = '', $26388 = '', $26389 = '3.12', $26390 = '', $26391 = '', $26392 = 'Alpine Linux v3.12', $26393 = '', $26394 = '', $26395 = '', $26396 = '10.15.3-r0', $26397 = 'invalid', $26398 = NULL, $26399 = '{}', $26400 = '{}', $26401 = 'md5', $26402 = '\x6e8834f3bcf5838ff4159c54752460c4', $26403 = 'CVE-2020-8277', $26404 = 'alpine-main-v3.12-updater', $26405 = '', $26406 = '0001-01-01 00:00:00+00', $26407 = 'https://www.cve.org/CVERecord?id=CVE-2020-8277', $26408 = '', $26409 = 'Unknown', $26410 = 'nodejs', $26411 = '', $26412 = '', $26413 = '', $26414 = 'source', $26415 = 'alpine', $26416 = 'Alpine Linux', $26417 = '', $26418 = '', $26419 = '3.12', $26420 = '', $26421 = '', $26422 = 'Alpine Linux v3.12', $26423 = '', $26424 = '', $26425 = '', $26426 = '12.20.1-r0', $26427 = 'invalid', $26428 = NULL, $26429 = '{}', $26430 = '{}', $26431 = 'md5', $26432 = '\x9db8acec42cf7dca4abf26d29a61d1e6', $26433 = 'CVE-2020-8265', $26434 = 'alpine-main-v3.12-updater', $26435 = '', $26436 = '0001-01-01 00:00:00+00', $26437 = 'https://www.cve.org/CVERecord?id=CVE-2020-8265', $26438 = '', $26439 = 'Unknown', $26440 = 'nodejs', $26441 = '', $26442 = '', $26443 = '', $26444 = 'source', $26445 = 'alpine', $26446 = 'Alpine Linux', $26447 = '', $26448 = '', $26449 = '3.12', $26450 = '', $26451 = '', $26452 = 'Alpine Linux v3.12', $26453 = '', $26454 = '', $26455 = '', $26456 = '12.20.1-r0', $26457 = 'invalid', $26458 = NULL, $26459 = '{}', $26460 = '{}', $26461 = 'md5', $26462 = '\x6978c57132578811500bfd02866c498a', $26463 = 'CVE-2020-8287', $26464 = 'alpine-main-v3.12-updater', $26465 = '', $26466 = '0001-01-01 00:00:00+00', $26467 = 'https://www.cve.org/CVERecord?id=CVE-2020-8287', $26468 = '', $26469 = 'Unknown', $26470 = 'nodejs', $26471 = '', $26472 = '', $26473 = '', $26474 = 'source', $26475 = 'alpine', $26476 = 'Alpine Linux', $26477 = '', $26478 = '', $26479 = '3.12', $26480 = '', $26481 = '', $26482 = 'Alpine Linux v3.12', $26483 = '', $26484 = '', $26485 = '', $26486 = '12.20.1-r0', $26487 = 'invalid', $26488 = NULL, $26489 = '{}', $26490 = '{}', $26491 = 'md5', $26492 = '\x656162f63c0362eb30962bc895f3ae25', $26493 = 'CVE-2021-22883', $26494 = 'alpine-main-v3.12-updater', $26495 = '', $26496 = '0001-01-01 00:00:00+00', $26497 = 'https://www.cve.org/CVERecord?id=CVE-2021-22883', $26498 = '', $26499 = 'Unknown', $26500 = 'nodejs', $26501 = '', $26502 = '', $26503 = '', $26504 = 'source', $26505 = 'alpine', $26506 = 'Alpine Linux', $26507 = '', $26508 = '', $26509 = '3.12', $26510 = '', $26511 = '', $26512 = 'Alpine Linux v3.12', $26513 = '', $26514 = '', $26515 = '', $26516 = '12.21.0-r0', $26517 = 'invalid', $26518 = NULL, $26519 = '{}', $26520 = '{}', $26521 = 'md5', $26522 = '\x0d5fe8a14d7ba279b9625745d5ca6a39', $26523 = 'CVE-2021-22884', $26524 = 'alpine-main-v3.12-updater', $26525 = '', $26526 = '0001-01-01 00:00:00+00', $26527 = 'https://www.cve.org/CVERecord?id=CVE-2021-22884', $26528 = '', $26529 = 'Unknown', $26530 = 'nodejs', $26531 = '', $26532 = '', $26533 = '', $26534 = 'source', $26535 = 'alpine', $26536 = 'Alpine Linux', $26537 = '', $26538 = '', $26539 = '3.12', $26540 = '', $26541 = '', $26542 = 'Alpine Linux v3.12', $26543 = '', $26544 = '', $26545 = '', $26546 = '12.21.0-r0', $26547 = 'invalid', $26548 = NULL, $26549 = '{}', $26550 = '{}', $26551 = 'md5', $26552 = '\x87a4cf1c9b922f008e769fb0a44411c1', $26553 = 'CVE-2021-22918', $26554 = 'alpine-main-v3.12-updater', $26555 = '', $26556 = '0001-01-01 00:00:00+00', $26557 = 'https://www.cve.org/CVERecord?id=CVE-2021-22918', $26558 = '', $26559 = 'Unknown', $26560 = 'nodejs', $26561 = '', $26562 = '', $26563 = '', $26564 = 'source', $26565 = 'alpine', $26566 = 'Alpine Linux', $26567 = '', $26568 = '', $26569 = '3.12', $26570 = '', $26571 = '', $26572 = 'Alpine Linux v3.12', $26573 = '', $26574 = '', $26575 = '', $26576 = '12.22.2-r0', $26577 = 'invalid', $26578 = NULL, $26579 = '{}', $26580 = '{}', $26581 = 'md5', $26582 = '\x62af84b47cc4c97d70afc0b03176765f', $26583 = 'CVE-2021-22959', $26584 = 'alpine-main-v3.12-updater', $26585 = '', $26586 = '0001-01-01 00:00:00+00', $26587 = 'https://www.cve.org/CVERecord?id=CVE-2021-22959', $26588 = '', $26589 = 'Unknown', $26590 = 'nodejs', $26591 = '', $26592 = '', $26593 = '', $26594 = 'source', $26595 = 'alpine', $26596 = 'Alpine Linux', $26597 = '', $26598 = '', $26599 = '3.12', $26600 = '', $26601 = '', $26602 = 'Alpine Linux v3.12', $26603 = '', $26604 = '', $26605 = '', $26606 = '12.22.10-r0', $26607 = 'invalid', $26608 = NULL, $26609 = '{}', $26610 = '{}', $26611 = 'md5', $26612 = '\xa0eb6c7a8648161e523507a03af5b3d4', $26613 = 'CVE-2021-22960', $26614 = 'alpine-main-v3.12-updater', $26615 = '', $26616 = '0001-01-01 00:00:00+00', $26617 = 'https://www.cve.org/CVERecord?id=CVE-2021-22960', $26618 = '', $26619 = 'Unknown', $26620 = 'nodejs', $26621 = '', $26622 = '', $26623 = '', $26624 = 'source', $26625 = 'alpine', $26626 = 'Alpine Linux', $26627 = '', $26628 = '', $26629 = '3.12', $26630 = '', $26631 = '', $26632 = 'Alpine Linux v3.12', $26633 = '', $26634 = '', $26635 = '', $26636 = '12.22.10-r0', $26637 = 'invalid', $26638 = NULL, $26639 = '{}', $26640 = '{}', $26641 = 'md5', $26642 = '\xa44bb4cc0fdb8c1284fe565183465b70', $26643 = 'CVE-2021-44531', $26644 = 'alpine-main-v3.12-updater', $26645 = '', $26646 = '0001-01-01 00:00:00+00', $26647 = 'https://www.cve.org/CVERecord?id=CVE-2021-44531', $26648 = '', $26649 = 'Unknown', $26650 = 'nodejs', $26651 = '', $26652 = '', $26653 = '', $26654 = 'source', $26655 = 'alpine', $26656 = 'Alpine Linux', $26657 = '', $26658 = '', $26659 = '3.12', $26660 = '', $26661 = '', $26662 = 'Alpine Linux v3.12', $26663 = '', $26664 = '', $26665 = '', $26666 = '12.22.10-r0', $26667 = 'invalid', $26668 = NULL, $26669 = '{}', $26670 = '{}', $26671 = 'md5', $26672 = '\x00ed2e409f6a3a7a93c892eedd3d1b9e', $26673 = 'CVE-2021-44532', $26674 = 'alpine-main-v3.12-updater', $26675 = '', $26676 = '0001-01-01 00:00:00+00', $26677 = 'https://www.cve.org/CVERecord?id=CVE-2021-44532', $26678 = '', $26679 = 'Unknown', $26680 = 'nodejs', $26681 = '', $26682 = '', $26683 = '', $26684 = 'source', $26685 = 'alpine', $26686 = 'Alpine Linux', $26687 = '', $26688 = '', $26689 = '3.12', $26690 = '', $26691 = '', $26692 = 'Alpine Linux v3.12', $26693 = '', $26694 = '', $26695 = '', $26696 = '12.22.10-r0', $26697 = 'invalid', $26698 = NULL, $26699 = '{}', $26700 = '{}', $26701 = 'md5', $26702 = '\x8dc58a1cc84e9c9e9143e093b4581b3e', $26703 = 'CVE-2021-44533', $26704 = 'alpine-main-v3.12-updater', $26705 = '', $26706 = '0001-01-01 00:00:00+00', $26707 = 'https://www.cve.org/CVERecord?id=CVE-2021-44533', $26708 = '', $26709 = 'Unknown', $26710 = 'nodejs', $26711 = '', $26712 = '', $26713 = '', $26714 = 'source', $26715 = 'alpine', $26716 = 'Alpine Linux', $26717 = '', $26718 = '', $26719 = '3.12', $26720 = '', $26721 = '', $26722 = 'Alpine Linux v3.12', $26723 = '', $26724 = '', $26725 = '', $26726 = '12.22.10-r0', $26727 = 'invalid', $26728 = NULL, $26729 = '{}', $26730 = '{}', $26731 = 'md5', $26732 = '\x9da79d1ff9f353bd09ef7f3ffd74985d', $26733 = 'CVE-2022-21824', $26734 = 'alpine-main-v3.12-updater', $26735 = '', $26736 = '0001-01-01 00:00:00+00', $26737 = 'https://www.cve.org/CVERecord?id=CVE-2022-21824', $26738 = '', $26739 = 'Unknown', $26740 = 'nodejs', $26741 = '', $26742 = '', $26743 = '', $26744 = 'source', $26745 = 'alpine', $26746 = 'Alpine Linux', $26747 = '', $26748 = '', $26749 = '3.12', $26750 = '', $26751 = '', $26752 = 'Alpine Linux v3.12', $26753 = '', $26754 = '', $26755 = '', $26756 = '12.22.10-r0', $26757 = 'invalid', $26758 = NULL, $26759 = '{}', $26760 = '{}', $26761 = 'md5', $26762 = '\xa16cdf6c293324aacf52820eff1d2081', $26763 = 'CVE-2021-22930', $26764 = 'alpine-main-v3.12-updater', $26765 = '', $26766 = '0001-01-01 00:00:00+00', $26767 = 'https://www.cve.org/CVERecord?id=CVE-2021-22930', $26768 = '', $26769 = 'Unknown', $26770 = 'nodejs', $26771 = '', $26772 = '', $26773 = '', $26774 = 'source', $26775 = 'alpine', $26776 = 'Alpine Linux', $26777 = '', $26778 = '', $26779 = '3.12', $26780 = '', $26781 = '', $26782 = 'Alpine Linux v3.12', $26783 = '', $26784 = '', $26785 = '', $26786 = '12.22.4-r0', $26787 = 'invalid', $26788 = NULL, $26789 = '{}', $26790 = '{}', $26791 = 'md5', $26792 = '\x70c0691d410564bdeaa18754625e314b', $26793 = 'CVE-2021-37701', $26794 = 'alpine-main-v3.12-updater', $26795 = '', $26796 = '0001-01-01 00:00:00+00', $26797 = 'https://www.cve.org/CVERecord?id=CVE-2021-37701', $26798 = '', $26799 = 'Unknown', $26800 = 'nodejs', $26801 = '', $26802 = '', $26803 = '', $26804 = 'source', $26805 = 'alpine', $26806 = 'Alpine Linux', $26807 = '', $26808 = '', $26809 = '3.12', $26810 = '', $26811 = '', $26812 = 'Alpine Linux v3.12', $26813 = '', $26814 = '', $26815 = '', $26816 = '12.22.6-r0', $26817 = 'invalid', $26818 = NULL, $26819 = '{}', $26820 = '{}', $26821 = 'md5', $26822 = '\x04b2f9d5bd604c1a5a60023e0eb65020', $26823 = 'CVE-2021-37712', $26824 = 'alpine-main-v3.12-updater', $26825 = '', $26826 = '0001-01-01 00:00:00+00', $26827 = 'https://www.cve.org/CVERecord?id=CVE-2021-37712', $26828 = '', $26829 = 'Unknown', $26830 = 'nodejs', $26831 = '', $26832 = '', $26833 = '', $26834 = 'source', $26835 = 'alpine', $26836 = 'Alpine Linux', $26837 = '', $26838 = '', $26839 = '3.12', $26840 = '', $26841 = '', $26842 = 'Alpine Linux v3.12', $26843 = '', $26844 = '', $26845 = '', $26846 = '12.22.6-r0', $26847 = 'invalid', $26848 = NULL, $26849 = '{}', $26850 = '{}', $26851 = 'md5', $26852 = '\x8cc9e128a443ac088404329cbf63d693', $26853 = 'CVE-2021-37713', $26854 = 'alpine-main-v3.12-updater', $26855 = '', $26856 = '0001-01-01 00:00:00+00', $26857 = 'https://www.cve.org/CVERecord?id=CVE-2021-37713', $26858 = '', $26859 = 'Unknown', $26860 = 'nodejs', $26861 = '', $26862 = '', $26863 = '', $26864 = 'source', $26865 = 'alpine', $26866 = 'Alpine Linux', $26867 = '', $26868 = '', $26869 = '3.12', $26870 = '', $26871 = '', $26872 = 'Alpine Linux v3.12', $26873 = '', $26874 = '', $26875 = '', $26876 = '12.22.6-r0', $26877 = 'invalid', $26878 = NULL, $26879 = '{}', $26880 = '{}', $26881 = 'md5', $26882 = '\x11421fd3fe045fb2ccc2cea8ffacd823', $26883 = 'CVE-2021-39134', $26884 = 'alpine-main-v3.12-updater', $26885 = '', $26886 = '0001-01-01 00:00:00+00', $26887 = 'https://www.cve.org/CVERecord?id=CVE-2021-39134', $26888 = '', $26889 = 'Unknown', $26890 = 'nodejs', $26891 = '', $26892 = '', $26893 = '', $26894 = 'source', $26895 = 'alpine', $26896 = 'Alpine Linux', $26897 = '', $26898 = '', $26899 = '3.12', $26900 = '', $26901 = '', $26902 = 'Alpine Linux v3.12', $26903 = '', $26904 = '', $26905 = '', $26906 = '12.22.6-r0', $26907 = 'invalid', $26908 = NULL, $26909 = '{}', $26910 = '{}', $26911 = 'md5', $26912 = '\x6670fc5dedac87e1402dd22a7fb232c4', $26913 = 'CVE-2021-39135', $26914 = 'alpine-main-v3.12-updater', $26915 = '', $26916 = '0001-01-01 00:00:00+00', $26917 = 'https://www.cve.org/CVERecord?id=CVE-2021-39135', $26918 = '', $26919 = 'Unknown', $26920 = 'nodejs', $26921 = '', $26922 = '', $26923 = '', $26924 = 'source', $26925 = 'alpine', $26926 = 'Alpine Linux', $26927 = '', $26928 = '', $26929 = '3.12', $26930 = '', $26931 = '', $26932 = 'Alpine Linux v3.12', $26933 = '', $26934 = '', $26935 = '', $26936 = '12.22.6-r0', $26937 = 'invalid', $26938 = NULL, $26939 = '{}', $26940 = '{}', $26941 = 'md5', $26942 = '\xe59bedfbbbb0c0aae163fa0e85fa5e6c', $26943 = 'CVE-2017-1000381', $26944 = 'alpine-main-v3.12-updater', $26945 = '', $26946 = '0001-01-01 00:00:00+00', $26947 = 'https://www.cve.org/CVERecord?id=CVE-2017-1000381', $26948 = '', $26949 = 'Unknown', $26950 = 'nodejs', $26951 = '', $26952 = '', $26953 = '', $26954 = 'source', $26955 = 'alpine', $26956 = 'Alpine Linux', $26957 = '', $26958 = '', $26959 = '3.12', $26960 = '', $26961 = '', $26962 = 'Alpine Linux v3.12', $26963 = '', $26964 = '', $26965 = '', $26966 = '6.11.1-r0', $26967 = 'invalid', $26968 = NULL, $26969 = '{}', $26970 = '{}', $26971 = 'md5', $26972 = '\x643a5bddfd5d4509f20c14f0c7e18518', $26973 = 'CVE-2018-12115', $26974 = 'alpine-main-v3.12-updater', $26975 = '', $26976 = '0001-01-01 00:00:00+00', $26977 = 'https://www.cve.org/CVERecord?id=CVE-2018-12115', $26978 = '', $26979 = 'Unknown', $26980 = 'nodejs', $26981 = '', $26982 = '', $26983 = '', $26984 = 'source', $26985 = 'alpine', $26986 = 'Alpine Linux', $26987 = '', $26988 = '', $26989 = '3.12', $26990 = '', $26991 = '', $26992 = 'Alpine Linux v3.12', $26993 = '', $26994 = '', $26995 = '', $26996 = '8.11.4-r0', $26997 = 'invalid', $26998 = NULL, $26999 = '{}', $27000 = '{}', $27001 = 'md5', $27002 = '\xe391514df328f54fd3714c63317d9303', $27003 = 'CVE-2021-3672', $27004 = 'alpine-main-v3.12-updater', $27005 = '', $27006 = '0001-01-01 00:00:00+00', $27007 = 'https://www.cve.org/CVERecord?id=CVE-2021-3672', $27008 = '', $27009 = 'Unknown', $27010 = 'nodejs', $27011 = '', $27012 = '', $27013 = '', $27014 = 'source', $27015 = 'alpine', $27016 = 'Alpine Linux', $27017 = '', $27018 = '', $27019 = '3.12', $27020 = '', $27021 = '', $27022 = 'Alpine Linux v3.12', $27023 = '', $27024 = '', $27025 = '', $27026 = '12.22.5-r0', $27027 = 'invalid', $27028 = NULL, $27029 = '{}', $27030 = '{}', $27031 = 'md5', $27032 = '\x98846428ed40e17a3c91c49b50f6268b', $27033 = 'CVE-2021-22931', $27034 = 'alpine-main-v3.12-updater', $27035 = '', $27036 = '0001-01-01 00:00:00+00', $27037 = 'https://www.cve.org/CVERecord?id=CVE-2021-22931', $27038 = '', $27039 = 'Unknown', $27040 = 'nodejs', $27041 = '', $27042 = '', $27043 = '', $27044 = 'source', $27045 = 'alpine', $27046 = 'Alpine Linux', $27047 = '', $27048 = '', $27049 = '3.12', $27050 = '', $27051 = '', $27052 = 'Alpine Linux v3.12', $27053 = '', $27054 = '', $27055 = '', $27056 = '12.22.5-r0', $27057 = 'invalid', $27058 = NULL, $27059 = '{}', $27060 = '{}', $27061 = 'md5', $27062 = '\x138a70b08baaa9975833d34816304d84', $27063 = 'CVE-2021-22939', $27064 = 'alpine-main-v3.12-updater', $27065 = '', $27066 = '0001-01-01 00:00:00+00', $27067 = 'https://www.cve.org/CVERecord?id=CVE-2021-22939', $27068 = '', $27069 = 'Unknown', $27070 = 'nodejs', $27071 = '', $27072 = '', $27073 = '', $27074 = 'source', $27075 = 'alpine', $27076 = 'Alpine Linux', $27077 = '', $27078 = '', $27079 = '3.12', $27080 = '', $27081 = '', $27082 = 'Alpine Linux v3.12', $27083 = '', $27084 = '', $27085 = '', $27086 = '12.22.5-r0', $27087 = 'invalid', $27088 = NULL, $27089 = '{}', $27090 = '{}', $27091 = 'md5', $27092 = '\x9517fd4f879719a3255e7dfa70920cd3', $27093 = 'CVE-2017-14919', $27094 = 'alpine-main-v3.12-updater', $27095 = '', $27096 = '0001-01-01 00:00:00+00', $27097 = 'https://www.cve.org/CVERecord?id=CVE-2017-14919', $27098 = '', $27099 = 'Unknown', $27100 = 'nodejs', $27101 = '', $27102 = '', $27103 = '', $27104 = 'source', $27105 = 'alpine', $27106 = 'Alpine Linux', $27107 = '', $27108 = '', $27109 = '3.12', $27110 = '', $27111 = '', $27112 = 'Alpine Linux v3.12', $27113 = '', $27114 = '', $27115 = '', $27116 = '6.11.5-r0', $27117 = 'invalid', $27118 = NULL, $27119 = '{}', $27120 = '{}', $27121 = 'md5', $27122 = '\x77e27f8e247390705b6b2e8bf0d11e15', $27123 = 'CVE-2018-7167', $27124 = 'alpine-main-v3.12-updater', $27125 = '', $27126 = '0001-01-01 00:00:00+00', $27127 = 'https://www.cve.org/CVERecord?id=CVE-2018-7167', $27128 = '', $27129 = 'Unknown', $27130 = 'nodejs', $27131 = '', $27132 = '', $27133 = '', $27134 = 'source', $27135 = 'alpine', $27136 = 'Alpine Linux', $27137 = '', $27138 = '', $27139 = '3.12', $27140 = '', $27141 = '', $27142 = 'Alpine Linux v3.12', $27143 = '', $27144 = '', $27145 = '', $27146 = '8.11.3-r0', $27147 = 'invalid', $27148 = NULL, $27149 = '{}', $27150 = '{}', $27151 = 'md5', $27152 = '\x819b9fa38fc7b6f0c2295d13200444ca', $27153 = 'CVE-2018-7161', $27154 = 'alpine-main-v3.12-updater', $27155 = '', $27156 = '0001-01-01 00:00:00+00', $27157 = 'https://www.cve.org/CVERecord?id=CVE-2018-7161', $27158 = '', $27159 = 'Unknown', $27160 = 'nodejs', $27161 = '', $27162 = '', $27163 = '', $27164 = 'source', $27165 = 'alpine', $27166 = 'Alpine Linux', $27167 = '', $27168 = '', $27169 = '3.12', $27170 = '', $27171 = '', $27172 = 'Alpine Linux v3.12', $27173 = '', $27174 = '', $27175 = '', $27176 = '8.11.3-r0', $27177 = 'invalid', $27178 = NULL, $27179 = '{}', $27180 = '{}', $27181 = 'md5', $27182 = '\xfe8f2c5e2747ee760acc271a902c452a', $27183 = 'CVE-2018-1000168', $27184 = 'alpine-main-v3.12-updater', $27185 = '', $27186 = '0001-01-01 00:00:00+00', $27187 = 'https://www.cve.org/CVERecord?id=CVE-2018-1000168', $27188 = '', $27189 = 'Unknown', $27190 = 'nodejs', $27191 = '', $27192 = '', $27193 = '', $27194 = 'source', $27195 = 'alpine', $27196 = 'Alpine Linux', $27197 = '', $27198 = '', $27199 = '3.12', $27200 = '', $27201 = '', $27202 = 'Alpine Linux v3.12', $27203 = '', $27204 = '', $27205 = '', $27206 = '8.11.3-r0', $27207 = 'invalid', $27208 = NULL, $27209 = '{}', $27210 = '{}', $27211 = 'md5', $27212 = '\x2aaac81a81824b1e969ed9f688704c71', $27213 = 'CVE-2017-15896', $27214 = 'alpine-main-v3.12-updater', $27215 = '', $27216 = '0001-01-01 00:00:00+00', $27217 = 'https://www.cve.org/CVERecord?id=CVE-2017-15896', $27218 = '', $27219 = 'Unknown', $27220 = 'nodejs', $27221 = '', $27222 = '', $27223 = '', $27224 = 'source', $27225 = 'alpine', $27226 = 'Alpine Linux', $27227 = '', $27228 = '', $27229 = '3.12', $27230 = '', $27231 = '', $27232 = 'Alpine Linux v3.12', $27233 = '', $27234 = '', $27235 = '', $27236 = '8.9.3-r0', $27237 = 'invalid', $27238 = NULL, $27239 = '{}', $27240 = '{}', $27241 = 'md5', $27242 = '\x2cd91f5ea59112e4ad9659455852287e', $27243 = 'CVE-2017-15897', $27244 = 'alpine-main-v3.12-updater', $27245 = '', $27246 = '0001-01-01 00:00:00+00', $27247 = 'https://www.cve.org/CVERecord?id=CVE-2017-15897', $27248 = '', $27249 = 'Unknown', $27250 = 'nodejs', $27251 = '', $27252 = '', $27253 = '', $27254 = 'source', $27255 = 'alpine', $27256 = 'Alpine Linux', $27257 = '', $27258 = '', $27259 = '3.12', $27260 = '', $27261 = '', $27262 = 'Alpine Linux v3.12', $27263 = '', $27264 = '', $27265 = '', $27266 = '8.9.3-r0', $27267 = 'invalid', $27268 = NULL, $27269 = '{}', $27270 = '{}', $27271 = 'md5', $27272 = '\x98b264553a188ca254409e3ce29f4e84', $27273 = 'CVE-2020-7774', $27274 = 'alpine-main-v3.12-updater', $27275 = '', $27276 = '0001-01-01 00:00:00+00', $27277 = 'https://www.cve.org/CVERecord?id=CVE-2020-7774', $27278 = '', $27279 = 'Unknown', $27280 = 'nodejs', $27281 = '', $27282 = '', $27283 = '', $27284 = 'source', $27285 = 'alpine', $27286 = 'Alpine Linux', $27287 = '', $27288 = '', $27289 = '3.12', $27290 = '', $27291 = '', $27292 = 'Alpine Linux v3.12', $27293 = '', $27294 = '', $27295 = '', $27296 = '12.22.1-r0', $27297 = 'invalid', $27298 = NULL, $27299 = '{}', $27300 = '{}', $27301 = 'md5', $27302 = '\xb97bd1ab55cb12a2520b2206e98e82b0', $27303 = 'CVE-2018-7158', $27304 = 'alpine-main-v3.12-updater', $27305 = '', $27306 = '0001-01-01 00:00:00+00', $27307 = 'https://www.cve.org/CVERecord?id=CVE-2018-7158', $27308 = '', $27309 = 'Unknown', $27310 = 'nodejs', $27311 = '', $27312 = '', $27313 = '', $27314 = 'source', $27315 = 'alpine', $27316 = 'Alpine Linux', $27317 = '', $27318 = '', $27319 = '3.12', $27320 = '', $27321 = '', $27322 = 'Alpine Linux v3.12', $27323 = '', $27324 = '', $27325 = '', $27326 = '8.11.0-r0', $27327 = 'invalid', $27328 = NULL, $27329 = '{}', $27330 = '{}', $27331 = 'md5', $27332 = '\x7b404de13d6bae8144ee18f457710c8e', $27333 = 'CVE-2018-7159', $27334 = 'alpine-main-v3.12-updater', $27335 = '', $27336 = '0001-01-01 00:00:00+00', $27337 = 'https://www.cve.org/CVERecord?id=CVE-2018-7159', $27338 = '', $27339 = 'Unknown', $27340 = 'nodejs', $27341 = '', $27342 = '', $27343 = '', $27344 = 'source', $27345 = 'alpine', $27346 = 'Alpine Linux', $27347 = '', $27348 = '', $27349 = '3.12', $27350 = '', $27351 = '', $27352 = 'Alpine Linux v3.12', $27353 = '', $27354 = '', $27355 = '', $27356 = '8.11.0-r0', $27357 = 'invalid', $27358 = NULL, $27359 = '{}', $27360 = '{}', $27361 = 'md5', $27362 = '\x98b9696684db85bab8e7f41152a21e84', $27363 = 'CVE-2018-7160', $27364 = 'alpine-main-v3.12-updater', $27365 = '', $27366 = '0001-01-01 00:00:00+00', $27367 = 'https://www.cve.org/CVERecord?id=CVE-2018-7160', $27368 = '', $27369 = 'Unknown', $27370 = 'nodejs', $27371 = '', $27372 = '', $27373 = '', $27374 = 'source', $27375 = 'alpine', $27376 = 'Alpine Linux', $27377 = '', $27378 = '', $27379 = '3.12', $27380 = '', $27381 = '', $27382 = 'Alpine Linux v3.12', $27383 = '', $27384 = '', $27385 = '', $27386 = '8.11.0-r0', $27387 = 'invalid', $27388 = NULL, $27389 = '{}', $27390 = '{}', $27391 = 'md5', $27392 = '\xf4998d72654b9bca94ccda6cf40c5983', $27393 = 'CVE-2018-12121', $27394 = 'alpine-main-v3.12-updater', $27395 = '', $27396 = '0001-01-01 00:00:00+00', $27397 = 'https://www.cve.org/CVERecord?id=CVE-2018-12121', $27398 = '', $27399 = 'Unknown', $27400 = 'nodejs', $27401 = '', $27402 = '', $27403 = '', $27404 = 'source', $27405 = 'alpine', $27406 = 'Alpine Linux', $27407 = '', $27408 = '', $27409 = '3.12', $27410 = '', $27411 = '', $27412 = 'Alpine Linux v3.12', $27413 = '', $27414 = '', $27415 = '', $27416 = '10.14.0-r0', $27417 = 'invalid', $27418 = NULL, $27419 = '{}', $27420 = '{}', $27421 = 'md5', $27422 = '\xd10eae5da3c9e1c2176c9d42f51b96f2', $27423 = 'CVE-2018-12122', $27424 = 'alpine-main-v3.12-updater', $27425 = '', $27426 = '0001-01-01 00:00:00+00', $27427 = 'https://www.cve.org/CVERecord?id=CVE-2018-12122', $27428 = '', $27429 = 'Unknown', $27430 = 'nodejs', $27431 = '', $27432 = '', $27433 = '', $27434 = 'source', $27435 = 'alpine', $27436 = 'Alpine Linux', $27437 = '', $27438 = '', $27439 = '3.12', $27440 = '', $27441 = '', $27442 = 'Alpine Linux v3.12', $27443 = '', $27444 = '', $27445 = '', $27446 = '10.14.0-r0', $27447 = 'invalid', $27448 = NULL, $27449 = '{}', $27450 = '{}', $27451 = 'md5', $27452 = '\x343c38a9da7549e2445d5e9dc4a818ef', $27453 = 'CVE-2018-12123', $27454 = 'alpine-main-v3.12-updater', $27455 = '', $27456 = '0001-01-01 00:00:00+00', $27457 = 'https://www.cve.org/CVERecord?id=CVE-2018-12123', $27458 = '', $27459 = 'Unknown', $27460 = 'nodejs', $27461 = '', $27462 = '', $27463 = '', $27464 = 'source', $27465 = 'alpine', $27466 = 'Alpine Linux', $27467 = '', $27468 = '', $27469 = '3.12', $27470 = '', $27471 = '', $27472 = 'Alpine Linux v3.12', $27473 = '', $27474 = '', $27475 = '', $27476 = '10.14.0-r0', $27477 = 'invalid', $27478 = NULL, $27479 = '{}', $27480 = '{}', $27481 = 'md5', $27482 = '\xbc9571d7c9be05826126cc2d1569bcbb', $27483 = 'CVE-2018-0735', $27484 = 'alpine-main-v3.12-updater', $27485 = '', $27486 = '0001-01-01 00:00:00+00', $27487 = 'https://www.cve.org/CVERecord?id=CVE-2018-0735', $27488 = '', $27489 = 'Unknown', $27490 = 'nodejs', $27491 = '', $27492 = '', $27493 = '', $27494 = 'source', $27495 = 'alpine', $27496 = 'Alpine Linux', $27497 = '', $27498 = '', $27499 = '3.12', $27500 = '', $27501 = '', $27502 = 'Alpine Linux v3.12', $27503 = '', $27504 = '', $27505 = '', $27506 = '10.14.0-r0', $27507 = 'invalid', $27508 = NULL, $27509 = '{}', $27510 = '{}', $27511 = 'md5', $27512 = '\x71c662f5335fa3400e7ca3942210697e', $27513 = 'CVE-2018-0734', $27514 = 'alpine-main-v3.12-updater', $27515 = '', $27516 = '0001-01-01 00:00:00+00', $27517 = 'https://www.cve.org/CVERecord?id=CVE-2018-0734', $27518 = '', $27519 = 'Unknown', $27520 = 'nodejs', $27521 = '', $27522 = '', $27523 = '', $27524 = 'source', $27525 = 'alpine', $27526 = 'Alpine Linux', $27527 = '', $27528 = '', $27529 = '3.12', $27530 = '', $27531 = '', $27532 = 'Alpine Linux v3.12', $27533 = '', $27534 = '', $27535 = '', $27536 = '10.14.0-r0', $27537 = 'invalid', $27538 = NULL, $27539 = '{}', $27540 = '{}', $27541 = 'md5', $27542 = '\x90f35bd4778fc938e7576bd7fd483b09', $27543 = 'CVE-2019-9511', $27544 = 'alpine-main-v3.12-updater', $27545 = '', $27546 = '0001-01-01 00:00:00+00', $27547 = 'https://www.cve.org/CVERecord?id=CVE-2019-9511', $27548 = '', $27549 = 'Unknown', $27550 = 'nodejs', $27551 = '', $27552 = '', $27553 = '', $27554 = 'source', $27555 = 'alpine', $27556 = 'Alpine Linux', $27557 = '', $27558 = '', $27559 = '3.12', $27560 = '', $27561 = '', $27562 = 'Alpine Linux v3.12', $27563 = '', $27564 = '', $27565 = '', $27566 = '10.16.3-r0', $27567 = 'invalid', $27568 = NULL, $27569 = '{}', $27570 = '{}', $27571 = 'md5', $27572 = '\xddbba1b12412a62cf66f8c98726c18a0', $27573 = 'CVE-2019-9512', $27574 = 'alpine-main-v3.12-updater', $27575 = '', $27576 = '0001-01-01 00:00:00+00', $27577 = 'https://www.cve.org/CVERecord?id=CVE-2019-9512', $27578 = '', $27579 = 'Unknown', $27580 = 'nodejs', $27581 = '', $27582 = '', $27583 = '', $27584 = 'source', $27585 = 'alpine', $27586 = 'Alpine Linux', $27587 = '', $27588 = '', $27589 = '3.12', $27590 = '', $27591 = '', $27592 = 'Alpine Linux v3.12', $27593 = '', $27594 = '', $27595 = '', $27596 = '10.16.3-r0', $27597 = 'invalid', $27598 = NULL, $27599 = '{}', $27600 = '{}', $27601 = 'md5', $27602 = '\x58f74b122a328bbe7ed37b0be85727e1', $27603 = 'CVE-2019-9513', $27604 = 'alpine-main-v3.12-updater', $27605 = '', $27606 = '0001-01-01 00:00:00+00', $27607 = 'https://www.cve.org/CVERecord?id=CVE-2019-9513', $27608 = '', $27609 = 'Unknown', $27610 = 'nodejs', $27611 = '', $27612 = '', $27613 = '', $27614 = 'source', $27615 = 'alpine', $27616 = 'Alpine Linux', $27617 = '', $27618 = '', $27619 = '3.12', $27620 = '', $27621 = '', $27622 = 'Alpine Linux v3.12', $27623 = '', $27624 = '', $27625 = '', $27626 = '10.16.3-r0', $27627 = 'invalid', $27628 = NULL, $27629 = '{}', $27630 = '{}', $27631 = 'md5', $27632 = '\x023227b9bc8e84b7f75afe671164ff95', $27633 = 'CVE-2019-9514', $27634 = 'alpine-main-v3.12-updater', $27635 = '', $27636 = '0001-01-01 00:00:00+00', $27637 = 'https://www.cve.org/CVERecord?id=CVE-2019-9514', $27638 = '', $27639 = 'Unknown', $27640 = 'nodejs', $27641 = '', $27642 = '', $27643 = '', $27644 = 'source', $27645 = 'alpine', $27646 = 'Alpine Linux', $27647 = '', $27648 = '', $27649 = '3.12', $27650 = '', $27651 = '', $27652 = 'Alpine Linux v3.12', $27653 = '', $27654 = '', $27655 = '', $27656 = '10.16.3-r0', $27657 = 'invalid', $27658 = NULL, $27659 = '{}', $27660 = '{}', $27661 = 'md5', $27662 = '\xbcf6af930b7accc2deab53caad53eb2d', $27663 = 'CVE-2019-9515', $27664 = 'alpine-main-v3.12-updater', $27665 = '', $27666 = '0001-01-01 00:00:00+00', $27667 = 'https://www.cve.org/CVERecord?id=CVE-2019-9515', $27668 = '', $27669 = 'Unknown', $27670 = 'nodejs', $27671 = '', $27672 = '', $27673 = '', $27674 = 'source', $27675 = 'alpine', $27676 = 'Alpine Linux', $27677 = '', $27678 = '', $27679 = '3.12', $27680 = '', $27681 = '', $27682 = 'Alpine Linux v3.12', $27683 = '', $27684 = '', $27685 = '', $27686 = '10.16.3-r0', $27687 = 'invalid', $27688 = NULL, $27689 = '{}', $27690 = '{}', $27691 = 'md5', $27692 = '\x37a3d1c9cc172bbe58802d6e818a650c', $27693 = 'CVE-2019-9516', $27694 = 'alpine-main-v3.12-updater', $27695 = '', $27696 = '0001-01-01 00:00:00+00', $27697 = 'https://www.cve.org/CVERecord?id=CVE-2019-9516', $27698 = '', $27699 = 'Unknown', $27700 = 'nodejs', $27701 = '', $27702 = '', $27703 = '', $27704 = 'source', $27705 = 'alpine', $27706 = 'Alpine Linux', $27707 = '', $27708 = '', $27709 = '3.12', $27710 = '', $27711 = '', $27712 = 'Alpine Linux v3.12', $27713 = '', $27714 = '', $27715 = '', $27716 = '10.16.3-r0', $27717 = 'invalid', $27718 = NULL, $27719 = '{}', $27720 = '{}', $27721 = 'md5', $27722 = '\x3b18bd1b43263146a4ff65a827746acb', $27723 = 'CVE-2019-9517', $27724 = 'alpine-main-v3.12-updater', $27725 = '', $27726 = '0001-01-01 00:00:00+00', $27727 = 'https://www.cve.org/CVERecord?id=CVE-2019-9517', $27728 = '', $27729 = 'Unknown', $27730 = 'nodejs', $27731 = '', $27732 = '', $27733 = '', $27734 = 'source', $27735 = 'alpine', $27736 = 'Alpine Linux', $27737 = '', $27738 = '', $27739 = '3.12', $27740 = '', $27741 = '', $27742 = 'Alpine Linux v3.12', $27743 = '', $27744 = '', $27745 = '', $27746 = '10.16.3-r0', $27747 = 'invalid', $27748 = NULL, $27749 = '{}', $27750 = '{}', $27751 = 'md5', $27752 = '\x7a0e630106ef1cee002e9d5869e3690b', $27753 = 'CVE-2019-9518', $27754 = 'alpine-main-v3.12-updater', $27755 = '', $27756 = '0001-01-01 00:00:00+00', $27757 = 'https://www.cve.org/CVERecord?id=CVE-2019-9518', $27758 = '', $27759 = 'Unknown', $27760 = 'nodejs', $27761 = '', $27762 = '', $27763 = '', $27764 = 'source', $27765 = 'alpine', $27766 = 'Alpine Linux', $27767 = '', $27768 = '', $27769 = '3.12', $27770 = '', $27771 = '', $27772 = 'Alpine Linux v3.12', $27773 = '', $27774 = '', $27775 = '', $27776 = '10.16.3-r0', $27777 = 'invalid', $27778 = NULL, $27779 = '{}', $27780 = '{}', $27781 = 'md5', $27782 = '\xc787add983f92ade9b72fa0a57c76024', $27783 = 'CVE-2019-15606', $27784 = 'alpine-main-v3.12-updater', $27785 = '', $27786 = '0001-01-01 00:00:00+00', $27787 = 'https://www.cve.org/CVERecord?id=CVE-2019-15606', $27788 = '', $27789 = 'Unknown', $27790 = 'nodejs', $27791 = '', $27792 = '', $27793 = '', $27794 = 'source', $27795 = 'alpine', $27796 = 'Alpine Linux', $27797 = '', $27798 = '', $27799 = '3.12', $27800 = '', $27801 = '', $27802 = 'Alpine Linux v3.12', $27803 = '', $27804 = '', $27805 = '', $27806 = '12.15.0-r0', $27807 = 'invalid', $27808 = NULL, $27809 = '{}', $27810 = '{}', $27811 = 'md5', $27812 = '\x7a0198ed6c17d2916bd1abce1407aec0', $27813 = 'CVE-2019-15605', $27814 = 'alpine-main-v3.12-updater', $27815 = '', $27816 = '0001-01-01 00:00:00+00', $27817 = 'https://www.cve.org/CVERecord?id=CVE-2019-15605', $27818 = '', $27819 = 'Unknown', $27820 = 'nodejs', $27821 = '', $27822 = '', $27823 = '', $27824 = 'source', $27825 = 'alpine', $27826 = 'Alpine Linux', $27827 = '', $27828 = '', $27829 = '3.12', $27830 = '', $27831 = '', $27832 = 'Alpine Linux v3.12', $27833 = '', $27834 = '', $27835 = '', $27836 = '12.15.0-r0', $27837 = 'invalid', $27838 = NULL, $27839 = '{}', $27840 = '{}', $27841 = 'md5', $27842 = '\xcec667f45a9799e16ab29103d3979d48', $27843 = 'CVE-2019-15604', $27844 = 'alpine-main-v3.12-updater', $27845 = '', $27846 = '0001-01-01 00:00:00+00', $27847 = 'https://www.cve.org/CVERecord?id=CVE-2019-15604', $27848 = '', $27849 = 'Unknown', $27850 = 'nodejs', $27851 = '', $27852 = '', $27853 = '', $27854 = 'source', $27855 = 'alpine', $27856 = 'Alpine Linux', $27857 = '', $27858 = '', $27859 = '3.12', $27860 = '', $27861 = '', $27862 = 'Alpine Linux v3.12', $27863 = '', $27864 = '', $27865 = '', $27866 = '12.15.0-r0', $27867 = 'invalid', $27868 = NULL, $27869 = '{}', $27870 = '{}', $27871 = 'md5', $27872 = '\x1df9dd5013bbce77ae7c6f35aa556431', $27873 = 'CVE-2020-8172', $27874 = 'alpine-main-v3.12-updater', $27875 = '', $27876 = '0001-01-01 00:00:00+00', $27877 = 'https://www.cve.org/CVERecord?id=CVE-2020-8172', $27878 = '', $27879 = 'Unknown', $27880 = 'nodejs', $27881 = '', $27882 = '', $27883 = '', $27884 = 'source', $27885 = 'alpine', $27886 = 'Alpine Linux', $27887 = '', $27888 = '', $27889 = '3.12', $27890 = '', $27891 = '', $27892 = 'Alpine Linux v3.12', $27893 = '', $27894 = '', $27895 = '', $27896 = '12.18.3-r0', $27897 = 'invalid', $27898 = NULL, $27899 = '{}', $27900 = '{}', $27901 = 'md5', $27902 = '\x6d27f0d39aeb53c0bdd42db5a82c553d', $27903 = 'CVE-2020-11080', $27904 = 'alpine-main-v3.12-updater', $27905 = '', $27906 = '0001-01-01 00:00:00+00', $27907 = 'https://www.cve.org/CVERecord?id=CVE-2020-11080', $27908 = '', $27909 = 'Unknown', $27910 = 'nodejs', $27911 = '', $27912 = '', $27913 = '', $27914 = 'source', $27915 = 'alpine', $27916 = 'Alpine Linux', $27917 = '', $27918 = '', $27919 = '3.12', $27920 = '', $27921 = '', $27922 = 'Alpine Linux v3.12', $27923 = '', $27924 = '', $27925 = '', $27926 = '12.18.3-r0', $27927 = 'invalid', $27928 = NULL, $27929 = '{}', $27930 = '{}', $27931 = 'md5', $27932 = '\xc82b5dda1b8cb6cfb91f5e000122ddf5', $27933 = 'CVE-2020-8174', $27934 = 'alpine-main-v3.12-updater', $27935 = '', $27936 = '0001-01-01 00:00:00+00', $27937 = 'https://www.cve.org/CVERecord?id=CVE-2020-8174', $27938 = '', $27939 = 'Unknown', $27940 = 'nodejs', $27941 = '', $27942 = '', $27943 = '', $27944 = 'source', $27945 = 'alpine', $27946 = 'Alpine Linux', $27947 = '', $27948 = '', $27949 = '3.12', $27950 = '', $27951 = '', $27952 = 'Alpine Linux v3.12', $27953 = '', $27954 = '', $27955 = '', $27956 = '12.18.3-r0', $27957 = 'invalid', $27958 = NULL, $27959 = '{}', $27960 = '{}', $27961 = 'md5', $27962 = '\x0c7adecf2452c34f0ce9d0217052a252', $27963 = 'CVE-2020-8201', $27964 = 'alpine-main-v3.12-updater', $27965 = '', $27966 = '0001-01-01 00:00:00+00', $27967 = 'https://www.cve.org/CVERecord?id=CVE-2020-8201', $27968 = '', $27969 = 'Unknown', $27970 = 'nodejs', $27971 = '', $27972 = '', $27973 = '', $27974 = 'source', $27975 = 'alpine', $27976 = 'Alpine Linux', $27977 = '', $27978 = '', $27979 = '3.12', $27980 = '', $27981 = '', $27982 = 'Alpine Linux v3.12', $27983 = '', $27984 = '', $27985 = '', $27986 = '12.18.4-r0', $27987 = 'invalid', $27988 = NULL, $27989 = '{}', $27990 = '{}', $27991 = 'md5', $27992 = '\x320ec7d972bd5fc309100c6397888c79', $27993 = 'CVE-2020-8252', $27994 = 'alpine-main-v3.12-updater', $27995 = '', $27996 = '0001-01-01 00:00:00+00', $27997 = 'https://www.cve.org/CVERecord?id=CVE-2020-8252', $27998 = '', $27999 = 'Unknown', $28000 = 'nodejs', $28001 = '', $28002 = '', $28003 = '', $28004 = 'source', $28005 = 'alpine', $28006 = 'Alpine Linux', $28007 = '', $28008 = '', $28009 = '3.12', $28010 = '', $28011 = '', $28012 = 'Alpine Linux v3.12', $28013 = '', $28014 = '', $28015 = '', $28016 = '12.18.4-r0', $28017 = 'invalid', $28018 = NULL, $28019 = '{}', $28020 = '{}', $28021 = 'md5', $28022 = '\x5a65d074051d8e6cb8e1730f22ed5d2f', $28023 = 'CVE-2020-28935', $28024 = 'alpine-main-v3.12-updater', $28025 = '', $28026 = '0001-01-01 00:00:00+00', $28027 = 'https://www.cve.org/CVERecord?id=CVE-2020-28935', $28028 = '', $28029 = 'Unknown', $28030 = 'nsd', $28031 = '', $28032 = '', $28033 = '', $28034 = 'source', $28035 = 'alpine', $28036 = 'Alpine Linux', $28037 = '', $28038 = '', $28039 = '3.12', $28040 = '', $28041 = '', $28042 = 'Alpine Linux v3.12', $28043 = '', $28044 = '', $28045 = '', $28046 = '4.3.4-r0', $28047 = 'invalid', $28048 = NULL, $28049 = '{}', $28050 = '{}', $28051 = 'md5', $28052 = '\xe09aa2a0142575a3bb92ce8dfbffa4a4', $28053 = 'CVE-2022-1097', $28054 = 'alpine-main-v3.12-updater', $28055 = '', $28056 = '0001-01-01 00:00:00+00', $28057 = 'https://www.cve.org/CVERecord?id=CVE-2022-1097', $28058 = '', $28059 = 'Unknown', $28060 = 'nss', $28061 = '', $28062 = '', $28063 = '', $28064 = 'source', $28065 = 'alpine', $28066 = 'Alpine Linux', $28067 = '', $28068 = '', $28069 = '3.12', $28070 = '', $28071 = '', $28072 = 'Alpine Linux v3.12', $28073 = '', $28074 = '', $28075 = '', $28076 = '3.68.3-r0', $28077 = 'invalid', $28078 = NULL, $28079 = '{}', $28080 = '{}', $28081 = 'md5', $28082 = '\xb74e86942de0813ffed80ff13ca31888', $28083 = 'CVE-2018-12404', $28084 = 'alpine-main-v3.12-updater', $28085 = '', $28086 = '0001-01-01 00:00:00+00', $28087 = 'https://www.cve.org/CVERecord?id=CVE-2018-12404', $28088 = '', $28089 = 'Unknown', $28090 = 'nss', $28091 = '', $28092 = '', $28093 = '', $28094 = 'source', $28095 = 'alpine', $28096 = 'Alpine Linux', $28097 = '', $28098 = '', $28099 = '3.12', $28100 = '', $28101 = '', $28102 = 'Alpine Linux v3.12', $28103 = '', $28104 = '', $28105 = '', $28106 = '3.41-r0', $28107 = 'invalid', $28108 = NULL, $28109 = '{}', $28110 = '{}', $28111 = 'md5', $28112 = '\x9c66a0df8373b1065241d855e1a39083', $28113 = 'CVE-2019-11745', $28114 = 'alpine-main-v3.12-updater', $28115 = '', $28116 = '0001-01-01 00:00:00+00', $28117 = 'https://www.cve.org/CVERecord?id=CVE-2019-11745', $28118 = '', $28119 = 'Unknown', $28120 = 'nss', $28121 = '', $28122 = '', $28123 = '', $28124 = 'source', $28125 = 'alpine', $28126 = 'Alpine Linux', $28127 = '', $28128 = '', $28129 = '3.12', $28130 = '', $28131 = '', $28132 = 'Alpine Linux v3.12', $28133 = '', $28134 = '', $28135 = '', $28136 = '3.47.1-r0', $28137 = 'invalid', $28138 = NULL, $28139 = '{}', $28140 = '{}', $28141 = 'md5', $28142 = '\x1fabf02301fbfbaa6dd7de7c2b8109e9', $28143 = 'CVE-2019-17023', $28144 = 'alpine-main-v3.12-updater', $28145 = '', $28146 = '0001-01-01 00:00:00+00', $28147 = 'https://www.cve.org/CVERecord?id=CVE-2019-17023', $28148 = '', $28149 = 'Unknown', $28150 = 'nss', $28151 = '', $28152 = '', $28153 = '', $28154 = 'source', $28155 = 'alpine', $28156 = 'Alpine Linux', $28157 = '', $28158 = '', $28159 = '3.12', $28160 = '', $28161 = '', $28162 = 'Alpine Linux v3.12', $28163 = '', $28164 = '', $28165 = '', $28166 = '3.49-r0', $28167 = 'invalid', $28168 = NULL, $28169 = '{}', $28170 = '{}', $28171 = 'md5', $28172 = '\x6a85c2c2f8fa939b6c14e0c97edf156e', $28173 = 'CVE-2020-25648', $28174 = 'alpine-main-v3.12-updater', $28175 = '', $28176 = '0001-01-01 00:00:00+00', $28177 = 'https://www.cve.org/CVERecord?id=CVE-2020-25648', $28178 = '', $28179 = 'Unknown', $28180 = 'nss', $28181 = '', $28182 = '', $28183 = '', $28184 = 'source', $28185 = 'alpine', $28186 = 'Alpine Linux', $28187 = '', $28188 = '', $28189 = '3.12', $28190 = '', $28191 = '', $28192 = 'Alpine Linux v3.12', $28193 = '', $28194 = '', $28195 = '', $28196 = '3.58-r0', $28197 = 'invalid', $28198 = NULL, $28199 = '{}', $28200 = '{}', $28201 = 'md5', $28202 = '\xf5f8cccef9027eb2d8f88f1cb2db8d72', $28203 = 'CVE-2021-43527', $28204 = 'alpine-main-v3.12-updater', $28205 = '', $28206 = '0001-01-01 00:00:00+00', $28207 = 'https://www.cve.org/CVERecord?id=CVE-2021-43527', $28208 = '', $28209 = 'Unknown', $28210 = 'nss', $28211 = '', $28212 = '', $28213 = '', $28214 = 'source', $28215 = 'alpine', $28216 = 'Alpine Linux', $28217 = '', $28218 = '', $28219 = '3.12', $28220 = '', $28221 = '', $28222 = 'Alpine Linux v3.12', $28223 = '', $28224 = '', $28225 = '', $28226 = '3.60-r2', $28227 = 'invalid', $28228 = NULL, $28229 = '{}', $28230 = '{}', $28231 = 'md5', $28232 = '\x2f0d1eb14cd20ad589b064544c891c6f', $28233 = 'CVE-2018-12384', $28234 = 'alpine-main-v3.12-updater', $28235 = '', $28236 = '0001-01-01 00:00:00+00', $28237 = 'https://www.cve.org/CVERecord?id=CVE-2018-12384', $28238 = '', $28239 = 'Unknown', $28240 = 'nss', $28241 = '', $28242 = '', $28243 = '', $28244 = 'source', $28245 = 'alpine', $28246 = 'Alpine Linux', $28247 = '', $28248 = '', $28249 = '3.12', $28250 = '', $28251 = '', $28252 = 'Alpine Linux v3.12', $28253 = '', $28254 = '', $28255 = '', $28256 = '3.39-r0', $28257 = 'invalid', $28258 = NULL, $28259 = '{}', $28260 = '{}', $28261 = 'md5', $28262 = '\xfda165198cb1f7cd0475b27530ea0b42', $28263 = 'CVE-2020-12402', $28264 = 'alpine-main-v3.12-updater', $28265 = '', $28266 = '0001-01-01 00:00:00+00', $28267 = 'https://www.cve.org/CVERecord?id=CVE-2020-12402', $28268 = '', $28269 = 'Unknown', $28270 = 'nss', $28271 = '', $28272 = '', $28273 = '', $28274 = 'source', $28275 = 'alpine', $28276 = 'Alpine Linux', $28277 = '', $28278 = '', $28279 = '3.12', $28280 = '', $28281 = '', $28282 = 'Alpine Linux v3.12', $28283 = '', $28284 = '', $28285 = '', $28286 = '3.53.1-r0', $28287 = 'invalid', $28288 = NULL, $28289 = '{}', $28290 = '{}', $28291 = 'md5', $28292 = '\x8ed9461803ea34a1f0a7005782390d4c', $28293 = 'CVE-2020-12400', $28294 = 'alpine-main-v3.12-updater', $28295 = '', $28296 = '0001-01-01 00:00:00+00', $28297 = 'https://www.cve.org/CVERecord?id=CVE-2020-12400', $28298 = '', $28299 = 'Unknown', $28300 = 'nss', $28301 = '', $28302 = '', $28303 = '', $28304 = 'source', $28305 = 'alpine', $28306 = 'Alpine Linux', $28307 = '', $28308 = '', $28309 = '3.12', $28310 = '', $28311 = '', $28312 = 'Alpine Linux v3.12', $28313 = '', $28314 = '', $28315 = '', $28316 = '3.55-r0', $28317 = 'invalid', $28318 = NULL, $28319 = '{}', $28320 = '{}', $28321 = 'md5', $28322 = '\xc1941167e17fc29cae4dcc625c008961', $28323 = 'CVE-2020-12401', $28324 = 'alpine-main-v3.12-updater', $28325 = '', $28326 = '0001-01-01 00:00:00+00', $28327 = 'https://www.cve.org/CVERecord?id=CVE-2020-12401', $28328 = '', $28329 = 'Unknown', $28330 = 'nss', $28331 = '', $28332 = '', $28333 = '', $28334 = 'source', $28335 = 'alpine', $28336 = 'Alpine Linux', $28337 = '', $28338 = '', $28339 = '3.12', $28340 = '', $28341 = '', $28342 = 'Alpine Linux v3.12', $28343 = '', $28344 = '', $28345 = '', $28346 = '3.55-r0', $28347 = 'invalid', $28348 = NULL, $28349 = '{}', $28350 = '{}', $28351 = 'md5', $28352 = '\xdfeb6a77c513b4c694ba5c157d80a6c2', $28353 = 'CVE-2020-12403', $28354 = 'alpine-main-v3.12-updater', $28355 = '', $28356 = '0001-01-01 00:00:00+00', $28357 = 'https://www.cve.org/CVERecord?id=CVE-2020-12403', $28358 = '', $28359 = 'Unknown', $28360 = 'nss', $28361 = '', $28362 = '', $28363 = '', $28364 = 'source', $28365 = 'alpine', $28366 = 'Alpine Linux', $28367 = '', $28368 = '', $28369 = '3.12', $28370 = '', $28371 = '', $28372 = 'Alpine Linux v3.12', $28373 = '', $28374 = '', $28375 = '', $28376 = '3.55-r0', $28377 = 'invalid', $28378 = NULL, $28379 = '{}', $28380 = '{}', $28381 = 'md5', $28382 = '\xd5d16f806913d570ff0d88906090ac65', $28383 = 'CVE-2020-6829', $28384 = 'alpine-main-v3.12-updater', $28385 = '', $28386 = '0001-01-01 00:00:00+00', $28387 = 'https://www.cve.org/CVERecord?id=CVE-2020-6829', $28388 = '', $28389 = 'Unknown', $28390 = 'nss', $28391 = '', $28392 = '', $28393 = '', $28394 = 'source', $28395 = 'alpine', $28396 = 'Alpine Linux', $28397 = '', $28398 = '', $28399 = '3.12', $28400 = '', $28401 = '', $28402 = 'Alpine Linux v3.12', $28403 = '', $28404 = '', $28405 = '', $28406 = '3.55-r0', $28407 = 'invalid', $28408 = NULL, $28409 = '{}', $28410 = '{}', $28411 = 'md5', $28412 = '\x7c3a04137267a3c7e16dc6abe293d29d', $28413 = 'CVE-2019-9755', $28414 = 'alpine-main-v3.12-updater', $28415 = '', $28416 = '0001-01-01 00:00:00+00', $28417 = 'https://www.cve.org/CVERecord?id=CVE-2019-9755', $28418 = '', $28419 = 'Unknown', $28420 = 'ntfs-3g', $28421 = '', $28422 = '', $28423 = '', $28424 = 'source', $28425 = 'alpine', $28426 = 'Alpine Linux', $28427 = '', $28428 = '', $28429 = '3.12', $28430 = '', $28431 = '', $28432 = 'Alpine Linux v3.12', $28433 = '', $28434 = '', $28435 = '', $28436 = '2017.3.23-r2', $28437 = 'invalid', $28438 = NULL, $28439 = '{}', $28440 = '{}', $28441 = 'md5', $28442 = '\x6844eadf3ec586b93ea8516e968c8685', $28443 = 'CVE-2020-26159', $28444 = 'alpine-main-v3.12-updater', $28445 = '', $28446 = '0001-01-01 00:00:00+00', $28447 = 'https://www.cve.org/CVERecord?id=CVE-2020-26159', $28448 = '', $28449 = 'Unknown', $28450 = 'oniguruma', $28451 = '', $28452 = '', $28453 = '', $28454 = 'source', $28455 = 'alpine', $28456 = 'Alpine Linux', $28457 = '', $28458 = '', $28459 = '3.12', $28460 = '', $28461 = '', $28462 = 'Alpine Linux v3.12', $28463 = '', $28464 = '', $28465 = '', $28466 = '6.9.5-r2', $28467 = 'invalid', $28468 = NULL, $28469 = '{}', $28470 = '{}', $28471 = 'md5', $28472 = '\xea35faf6bef1a3def7a8f31924ae8948', $28473 = 'CVE-2017-17480', $28474 = 'alpine-main-v3.12-updater', $28475 = '', $28476 = '0001-01-01 00:00:00+00', $28477 = 'https://www.cve.org/CVERecord?id=CVE-2017-17480', $28478 = '', $28479 = 'Unknown', $28480 = 'openjpeg', $28481 = '', $28482 = '', $28483 = '', $28484 = 'source', $28485 = 'alpine', $28486 = 'Alpine Linux', $28487 = '', $28488 = '', $28489 = '3.12', $28490 = '', $28491 = '', $28492 = 'Alpine Linux v3.12', $28493 = '', $28494 = '', $28495 = '', $28496 = '2.3.0-r1', $28497 = 'invalid', $28498 = NULL, $28499 = '{}', $28500 = '{}', $28501 = 'md5', $28502 = '\x55be756ad49882b5f8ce8e3cf632b077', $28503 = 'CVE-2018-18088', $28504 = 'alpine-main-v3.12-updater', $28505 = '', $28506 = '0001-01-01 00:00:00+00', $28507 = 'https://www.cve.org/CVERecord?id=CVE-2018-18088', $28508 = '', $28509 = 'Unknown', $28510 = 'openjpeg', $28511 = '', $28512 = '', $28513 = '', $28514 = 'source', $28515 = 'alpine', $28516 = 'Alpine Linux', $28517 = '', $28518 = '', $28519 = '3.12', $28520 = '', $28521 = '', $28522 = 'Alpine Linux v3.12', $28523 = '', $28524 = '', $28525 = '', $28526 = '2.3.0-r1', $28527 = 'invalid', $28528 = NULL, $28529 = '{}', $28530 = '{}', $28531 = 'md5', $28532 = '\x10325764a159d4a5728707610ce3cadb', $28533 = 'CVE-2020-6851', $28534 = 'alpine-main-v3.12-updater', $28535 = '', $28536 = '0001-01-01 00:00:00+00', $28537 = 'https://www.cve.org/CVERecord?id=CVE-2020-6851', $28538 = '', $28539 = 'Unknown', $28540 = 'openjpeg', $28541 = '', $28542 = '', $28543 = '', $28544 = 'source', $28545 = 'alpine', $28546 = 'Alpine Linux', $28547 = '', $28548 = '', $28549 = '3.12', $28550 = '', $28551 = '', $28552 = 'Alpine Linux v3.12', $28553 = '', $28554 = '', $28555 = '', $28556 = '2.3.1-r3', $28557 = 'invalid', $28558 = NULL, $28559 = '{}', $28560 = '{}', $28561 = 'md5', $28562 = '\x5f167ea279461740e358fb3232b5e38b', $28563 = 'CVE-2020-8112', $28564 = 'alpine-main-v3.12-updater', $28565 = '', $28566 = '0001-01-01 00:00:00+00', $28567 = 'https://www.cve.org/CVERecord?id=CVE-2020-8112', $28568 = '', $28569 = 'Unknown', $28570 = 'openjpeg', $28571 = '', $28572 = '', $28573 = '', $28574 = 'source', $28575 = 'alpine', $28576 = 'Alpine Linux', $28577 = '', $28578 = '', $28579 = '3.12', $28580 = '', $28581 = '', $28582 = 'Alpine Linux v3.12', $28583 = '', $28584 = '', $28585 = '', $28586 = '2.3.1-r3', $28587 = 'invalid', $28588 = NULL, $28589 = '{}', $28590 = '{}', $28591 = 'md5', $28592 = '\x67376ac4d6b65cfd1f494c1aa3485000', $28593 = 'CVE-2019-12973', $28594 = 'alpine-main-v3.12-updater', $28595 = '', $28596 = '0001-01-01 00:00:00+00', $28597 = 'https://www.cve.org/CVERecord?id=CVE-2019-12973', $28598 = '', $28599 = 'Unknown', $28600 = 'openjpeg', $28601 = '', $28602 = '', $28603 = '', $28604 = 'source', $28605 = 'alpine', $28606 = 'Alpine Linux', $28607 = '', $28608 = '', $28609 = '3.12', $28610 = '', $28611 = '', $28612 = 'Alpine Linux v3.12', $28613 = '', $28614 = '', $28615 = '', $28616 = '2.3.1-r5', $28617 = 'invalid', $28618 = NULL, $28619 = '{}', $28620 = '{}', $28621 = 'md5', $28622 = '\x6f5926956cf38fba1c15450a9f487fa4', $28623 = 'CVE-2020-15389', $28624 = 'alpine-main-v3.12-updater', $28625 = '', $28626 = '0001-01-01 00:00:00+00', $28627 = 'https://www.cve.org/CVERecord?id=CVE-2020-15389', $28628 = '', $28629 = 'Unknown', $28630 = 'openjpeg', $28631 = '', $28632 = '', $28633 = '', $28634 = 'source', $28635 = 'alpine', $28636 = 'Alpine Linux', $28637 = '', $28638 = '', $28639 = '3.12', $28640 = '', $28641 = '', $28642 = 'Alpine Linux v3.12', $28643 = '', $28644 = '', $28645 = '', $28646 = '2.3.1-r5', $28647 = 'invalid', $28648 = NULL, $28649 = '{}', $28650 = '{}', $28651 = 'md5', $28652 = '\x80e28b2fb0a2979b819a4fe774240fc0', $28653 = 'CVE-2021-29338', $28654 = 'alpine-main-v3.12-updater', $28655 = '', $28656 = '0001-01-01 00:00:00+00', $28657 = 'https://www.cve.org/CVERecord?id=CVE-2021-29338', $28658 = '', $28659 = 'Unknown', $28660 = 'openjpeg', $28661 = '', $28662 = '', $28663 = '', $28664 = 'source', $28665 = 'alpine', $28666 = 'Alpine Linux', $28667 = '', $28668 = '', $28669 = '3.12', $28670 = '', $28671 = '', $28672 = 'Alpine Linux v3.12', $28673 = '', $28674 = '', $28675 = '', $28676 = '2.4.0-r1', $28677 = 'invalid', $28678 = NULL, $28679 = '{}', $28680 = '{}', $28681 = 'md5', $28682 = '\x711c7062b7322345bf91ab86e30c8187', $28683 = 'CVE-2018-14423', $28684 = 'alpine-main-v3.12-updater', $28685 = '', $28686 = '0001-01-01 00:00:00+00', $28687 = 'https://www.cve.org/CVERecord?id=CVE-2018-14423', $28688 = '', $28689 = 'Unknown', $28690 = 'openjpeg', $28691 = '', $28692 = '', $28693 = '', $28694 = 'source', $28695 = 'alpine', $28696 = 'Alpine Linux', $28697 = '', $28698 = '', $28699 = '3.12', $28700 = '', $28701 = '', $28702 = 'Alpine Linux v3.12', $28703 = '', $28704 = '', $28705 = '', $28706 = '2.3.0-r2', $28707 = 'invalid', $28708 = NULL, $28709 = '{}', $28710 = '{}', $28711 = 'md5', $28712 = '\xc359868043a2ed10a0b9e27a83508545', $28713 = 'CVE-2018-6616', $28714 = 'alpine-main-v3.12-updater', $28715 = '', $28716 = '0001-01-01 00:00:00+00', $28717 = 'https://www.cve.org/CVERecord?id=CVE-2018-6616', $28718 = '', $28719 = 'Unknown', $28720 = 'openjpeg', $28721 = '', $28722 = '', $28723 = '', $28724 = 'source', $28725 = 'alpine', $28726 = 'Alpine Linux', $28727 = '', $28728 = '', $28729 = '3.12', $28730 = '', $28731 = '', $28732 = 'Alpine Linux v3.12', $28733 = '', $28734 = '', $28735 = '', $28736 = '2.3.0-r2', $28737 = 'invalid', $28738 = NULL, $28739 = '{}', $28740 = '{}', $28741 = 'md5', $28742 = '\x68a01353f4ee76fbf2c683df9d013b65', $28743 = 'CVE-2018-5785', $28744 = 'alpine-main-v3.12-updater', $28745 = '', $28746 = '0001-01-01 00:00:00+00', $28747 = 'https://www.cve.org/CVERecord?id=CVE-2018-5785', $28748 = '', $28749 = 'Unknown', $28750 = 'openjpeg', $28751 = '', $28752 = '', $28753 = '', $28754 = 'source', $28755 = 'alpine', $28756 = 'Alpine Linux', $28757 = '', $28758 = '', $28759 = '3.12', $28760 = '', $28761 = '', $28762 = 'Alpine Linux v3.12', $28763 = '', $28764 = '', $28765 = '', $28766 = '2.3.0-r3', $28767 = 'invalid', $28768 = NULL, $28769 = '{}', $28770 = '{}', $28771 = 'md5', $28772 = '\x9fe46cf338e63524957ce8310308486c', $28773 = 'CVE-2020-27814', $28774 = 'alpine-main-v3.12-updater', $28775 = '', $28776 = '0001-01-01 00:00:00+00', $28777 = 'https://www.cve.org/CVERecord?id=CVE-2020-27814', $28778 = '', $28779 = 'Unknown', $28780 = 'openjpeg', $28781 = '', $28782 = '', $28783 = '', $28784 = 'source', $28785 = 'alpine', $28786 = 'Alpine Linux', $28787 = '', $28788 = '', $28789 = '3.12', $28790 = '', $28791 = '', $28792 = 'Alpine Linux v3.12', $28793 = '', $28794 = '', $28795 = '', $28796 = '2.3.1-r6', $28797 = 'invalid', $28798 = NULL, $28799 = '{}', $28800 = '{}', $28801 = 'md5', $28802 = '\x312ee37b7fcc19847fecc8ce44b800da', $28803 = 'CVE-2020-27823', $28804 = 'alpine-main-v3.12-updater', $28805 = '', $28806 = '0001-01-01 00:00:00+00', $28807 = 'https://www.cve.org/CVERecord?id=CVE-2020-27823', $28808 = '', $28809 = 'Unknown', $28810 = 'openjpeg', $28811 = '', $28812 = '', $28813 = '', $28814 = 'source', $28815 = 'alpine', $28816 = 'Alpine Linux', $28817 = '', $28818 = '', $28819 = '3.12', $28820 = '', $28821 = '', $28822 = 'Alpine Linux v3.12', $28823 = '', $28824 = '', $28825 = '', $28826 = '2.3.1-r6', $28827 = 'invalid', $28828 = NULL, $28829 = '{}', $28830 = '{}', $28831 = 'md5', $28832 = '\xa4816c5bd23dff65f3e8ffb566156592', $28833 = 'CVE-2020-27824', $28834 = 'alpine-main-v3.12-updater', $28835 = '', $28836 = '0001-01-01 00:00:00+00', $28837 = 'https://www.cve.org/CVERecord?id=CVE-2020-27824', $28838 = '', $28839 = 'Unknown', $28840 = 'openjpeg', $28841 = '', $28842 = '', $28843 = '', $28844 = 'source', $28845 = 'alpine', $28846 = 'Alpine Linux', $28847 = '', $28848 = '', $28849 = '3.12', $28850 = '', $28851 = '', $28852 = 'Alpine Linux v3.12', $28853 = '', $28854 = '', $28855 = '', $28856 = '2.3.1-r6', $28857 = 'invalid', $28858 = NULL, $28859 = '{}', $28860 = '{}', $28861 = 'md5', $28862 = '\xba88118a89d48db341c07f8ecd98b640', $28863 = 'CVE-2020-27844', $28864 = 'alpine-main-v3.12-updater', $28865 = '', $28866 = '0001-01-01 00:00:00+00', $28867 = 'https://www.cve.org/CVERecord?id=CVE-2020-27844', $28868 = '', $28869 = 'Unknown', $28870 = 'openjpeg', $28871 = '', $28872 = '', $28873 = '', $28874 = 'source', $28875 = 'alpine', $28876 = 'Alpine Linux', $28877 = '', $28878 = '', $28879 = '3.12', $28880 = '', $28881 = '', $28882 = 'Alpine Linux v3.12', $28883 = '', $28884 = '', $28885 = '', $28886 = '2.4.0-r0', $28887 = 'invalid', $28888 = NULL, $28889 = '{}', $28890 = '{}', $28891 = 'md5', $28892 = '\x5a11c47d85018ebd6d4cf5df2d95fa32', $28893 = 'CVE-2016-9580', $28894 = 'alpine-main-v3.12-updater', $28895 = '', $28896 = '0001-01-01 00:00:00+00', $28897 = 'https://www.cve.org/CVERecord?id=CVE-2016-9580', $28898 = '', $28899 = 'Unknown', $28900 = 'openjpeg', $28901 = '', $28902 = '', $28903 = '', $28904 = 'source', $28905 = 'alpine', $28906 = 'Alpine Linux', $28907 = '', $28908 = '', $28909 = '3.12', $28910 = '', $28911 = '', $28912 = 'Alpine Linux v3.12', $28913 = '', $28914 = '', $28915 = '', $28916 = '2.1.2-r1', $28917 = 'invalid', $28918 = NULL, $28919 = '{}', $28920 = '{}', $28921 = 'md5', $28922 = '\x36dcbc6c29160e69036bf94264ac3e2d', $28923 = 'CVE-2016-9581', $28924 = 'alpine-main-v3.12-updater', $28925 = '', $28926 = '0001-01-01 00:00:00+00', $28927 = 'https://www.cve.org/CVERecord?id=CVE-2016-9581', $28928 = '', $28929 = 'Unknown', $28930 = 'openjpeg', $28931 = '', $28932 = '', $28933 = '', $28934 = 'source', $28935 = 'alpine', $28936 = 'Alpine Linux', $28937 = '', $28938 = '', $28939 = '3.12', $28940 = '', $28941 = '', $28942 = 'Alpine Linux v3.12', $28943 = '', $28944 = '', $28945 = '', $28946 = '2.1.2-r1', $28947 = 'invalid', $28948 = NULL, $28949 = '{}', $28950 = '{}', $28951 = 'md5', $28952 = '\x480d64ebc460630dd053fb41f161903b', $28953 = 'CVE-2017-12982', $28954 = 'alpine-main-v3.12-updater', $28955 = '', $28956 = '0001-01-01 00:00:00+00', $28957 = 'https://www.cve.org/CVERecord?id=CVE-2017-12982', $28958 = '', $28959 = 'Unknown', $28960 = 'openjpeg', $28961 = '', $28962 = '', $28963 = '', $28964 = 'source', $28965 = 'alpine', $28966 = 'Alpine Linux', $28967 = '', $28968 = '', $28969 = '3.12', $28970 = '', $28971 = '', $28972 = 'Alpine Linux v3.12', $28973 = '', $28974 = '', $28975 = '', $28976 = '2.2.0-r1', $28977 = 'invalid', $28978 = NULL, $28979 = '{}', $28980 = '{}', $28981 = 'md5', $28982 = '\x2f3f4c9d633fdb96a5a0a4758f575330', $28983 = 'CVE-2017-14040', $28984 = 'alpine-main-v3.12-updater', $28985 = '', $28986 = '0001-01-01 00:00:00+00', $28987 = 'https://www.cve.org/CVERecord?id=CVE-2017-14040', $28988 = '', $28989 = 'Unknown', $28990 = 'openjpeg', $28991 = '', $28992 = '', $28993 = '', $28994 = 'source', $28995 = 'alpine', $28996 = 'Alpine Linux', $28997 = '', $28998 = '', $28999 = '3.12', $29000 = '', $29001 = '', $29002 = 'Alpine Linux v3.12', $29003 = '', $29004 = '', $29005 = '', $29006 = '2.2.0-r2', $29007 = 'invalid', $29008 = NULL, $29009 = '{}', $29010 = '{}', $29011 = 'md5', $29012 = '\x5f7e8f5a5a968137a3032580d38fd366', $29013 = 'CVE-2017-14041', $29014 = 'alpine-main-v3.12-updater', $29015 = '', $29016 = '0001-01-01 00:00:00+00', $29017 = 'https://www.cve.org/CVERecord?id=CVE-2017-14041', $29018 = '', $29019 = 'Unknown', $29020 = 'openjpeg', $29021 = '', $29022 = '', $29023 = '', $29024 = 'source', $29025 = 'alpine', $29026 = 'Alpine Linux', $29027 = '', $29028 = '', $29029 = '3.12', $29030 = '', $29031 = '', $29032 = 'Alpine Linux v3.12', $29033 = '', $29034 = '', $29035 = '', $29036 = '2.2.0-r2', $29037 = 'invalid', $29038 = NULL, $29039 = '{}', $29040 = '{}', $29041 = 'md5', $29042 = '\xa68375b492a0d9efb6a3064ebc3a7c7c', $29043 = 'CVE-2017-14151', $29044 = 'alpine-main-v3.12-updater', $29045 = '', $29046 = '0001-01-01 00:00:00+00', $29047 = 'https://www.cve.org/CVERecord?id=CVE-2017-14151', $29048 = '', $29049 = 'Unknown', $29050 = 'openjpeg', $29051 = '', $29052 = '', $29053 = '', $29054 = 'source', $29055 = 'alpine', $29056 = 'Alpine Linux', $29057 = '', $29058 = '', $29059 = '3.12', $29060 = '', $29061 = '', $29062 = 'Alpine Linux v3.12', $29063 = '', $29064 = '', $29065 = '', $29066 = '2.2.0-r2', $29067 = 'invalid', $29068 = NULL, $29069 = '{}', $29070 = '{}', $29071 = 'md5', $29072 = '\x02491b180f22f41b1a755fa10eb11688', $29073 = 'CVE-2017-14152', $29074 = 'alpine-main-v3.12-updater', $29075 = '', $29076 = '0001-01-01 00:00:00+00', $29077 = 'https://www.cve.org/CVERecord?id=CVE-2017-14152', $29078 = '', $29079 = 'Unknown', $29080 = 'openjpeg', $29081 = '', $29082 = '', $29083 = '', $29084 = 'source', $29085 = 'alpine', $29086 = 'Alpine Linux', $29087 = '', $29088 = '', $29089 = '3.12', $29090 = '', $29091 = '', $29092 = 'Alpine Linux v3.12', $29093 = '', $29094 = '', $29095 = '', $29096 = '2.2.0-r2', $29097 = 'invalid', $29098 = NULL, $29099 = '{}', $29100 = '{}', $29101 = 'md5', $29102 = '\xd150239c5764c0a286ba80acc46a9bbd', $29103 = 'CVE-2017-14164', $29104 = 'alpine-main-v3.12-updater', $29105 = '', $29106 = '0001-01-01 00:00:00+00', $29107 = 'https://www.cve.org/CVERecord?id=CVE-2017-14164', $29108 = '', $29109 = 'Unknown', $29110 = 'openjpeg', $29111 = '', $29112 = '', $29113 = '', $29114 = 'source', $29115 = 'alpine', $29116 = 'Alpine Linux', $29117 = '', $29118 = '', $29119 = '3.12', $29120 = '', $29121 = '', $29122 = 'Alpine Linux v3.12', $29123 = '', $29124 = '', $29125 = '', $29126 = '2.2.0-r2', $29127 = 'invalid', $29128 = NULL, $29129 = '{}', $29130 = '{}', $29131 = 'md5', $29132 = '\xd8c420436d147808ab5f4f4eff3d8f5d', $29133 = 'CVE-2017-14039', $29134 = 'alpine-main-v3.12-updater', $29135 = '', $29136 = '0001-01-01 00:00:00+00', $29137 = 'https://www.cve.org/CVERecord?id=CVE-2017-14039', $29138 = '', $29139 = 'Unknown', $29140 = 'openjpeg', $29141 = '', $29142 = '', $29143 = '', $29144 = 'source', $29145 = 'alpine', $29146 = 'Alpine Linux', $29147 = '', $29148 = '', $29149 = '3.12', $29150 = '', $29151 = '', $29152 = 'Alpine Linux v3.12', $29153 = '', $29154 = '', $29155 = '', $29156 = '2.3.0-r0', $29157 = 'invalid', $29158 = NULL, $29159 = '{}', $29160 = '{}', $29161 = 'md5', $29162 = '\x1e2ebc462cd3cfc1353f9f80d958cf0b', $29163 = 'CVE-2017-9287', $29164 = 'alpine-main-v3.12-updater', $29165 = '', $29166 = '0001-01-01 00:00:00+00', $29167 = 'https://www.cve.org/CVERecord?id=CVE-2017-9287', $29168 = '', $29169 = 'Unknown', $29170 = 'openldap', $29171 = '', $29172 = '', $29173 = '', $29174 = 'source', $29175 = 'alpine', $29176 = 'Alpine Linux', $29177 = '', $29178 = '', $29179 = '3.12', $29180 = '', $29181 = '', $29182 = 'Alpine Linux v3.12', $29183 = '', $29184 = '', $29185 = '', $29186 = '2.4.44-r5', $29187 = 'invalid', $29188 = NULL, $29189 = '{}', $29190 = '{}', $29191 = 'md5', $29192 = '\x4d28c9f494be8e849e9d2c546c67f515', $29193 = 'CVE-2017-14159', $29194 = 'alpine-main-v3.12-updater', $29195 = '', $29196 = '0001-01-01 00:00:00+00', $29197 = 'https://www.cve.org/CVERecord?id=CVE-2017-14159', $29198 = '', $29199 = 'Unknown', $29200 = 'openldap', $29201 = '', $29202 = '', $29203 = '', $29204 = 'source', $29205 = 'alpine', $29206 = 'Alpine Linux', $29207 = '', $29208 = '', $29209 = '3.12', $29210 = '', $29211 = '', $29212 = 'Alpine Linux v3.12', $29213 = '', $29214 = '', $29215 = '', $29216 = '2.4.46-r0', $29217 = 'invalid', $29218 = NULL, $29219 = '{}', $29220 = '{}', $29221 = 'md5', $29222 = '\x806e72c3a5e06f730e7ab6e5d3124609', $29223 = 'CVE-2017-17740', $29224 = 'alpine-main-v3.12-updater', $29225 = '', $29226 = '0001-01-01 00:00:00+00', $29227 = 'https://www.cve.org/CVERecord?id=CVE-2017-17740', $29228 = '', $29229 = 'Unknown', $29230 = 'openldap', $29231 = '', $29232 = '', $29233 = '', $29234 = 'source', $29235 = 'alpine', $29236 = 'Alpine Linux', $29237 = '', $29238 = '', $29239 = '3.12', $29240 = '', $29241 = '', $29242 = 'Alpine Linux v3.12', $29243 = '', $29244 = '', $29245 = '', $29246 = '2.4.46-r0', $29247 = 'invalid', $29248 = NULL, $29249 = '{}', $29250 = '{}', $29251 = 'md5', $29252 = '\x021da3a236d16c812ad0a4f74c62668b', $29253 = 'CVE-2019-13565', $29254 = 'alpine-main-v3.12-updater', $29255 = '', $29256 = '0001-01-01 00:00:00+00', $29257 = 'https://www.cve.org/CVERecord?id=CVE-2019-13565', $29258 = '', $29259 = 'Unknown', $29260 = 'openldap', $29261 = '', $29262 = '', $29263 = '', $29264 = 'source', $29265 = 'alpine', $29266 = 'Alpine Linux', $29267 = '', $29268 = '', $29269 = '3.12', $29270 = '', $29271 = '', $29272 = 'Alpine Linux v3.12', $29273 = '', $29274 = '', $29275 = '', $29276 = '2.4.48-r0', $29277 = 'invalid', $29278 = NULL, $29279 = '{}', $29280 = '{}', $29281 = 'md5', $29282 = '\xc2d3d0e0eaaeb81f126ef656c729d67d', $29283 = 'CVE-2019-13057', $29284 = 'alpine-main-v3.12-updater', $29285 = '', $29286 = '0001-01-01 00:00:00+00', $29287 = 'https://www.cve.org/CVERecord?id=CVE-2019-13057', $29288 = '', $29289 = 'Unknown', $29290 = 'openldap', $29291 = '', $29292 = '', $29293 = '', $29294 = 'source', $29295 = 'alpine', $29296 = 'Alpine Linux', $29297 = '', $29298 = '', $29299 = '3.12', $29300 = '', $29301 = '', $29302 = 'Alpine Linux v3.12', $29303 = '', $29304 = '', $29305 = '', $29306 = '2.4.48-r0', $29307 = 'invalid', $29308 = NULL, $29309 = '{}', $29310 = '{}', $29311 = 'md5', $29312 = '\xdc4c4a6d6c287e67c152971d30b0d536', $29313 = 'CVE-2020-12243', $29314 = 'alpine-main-v3.12-updater', $29315 = '', $29316 = '0001-01-01 00:00:00+00', $29317 = 'https://www.cve.org/CVERecord?id=CVE-2020-12243', $29318 = '', $29319 = 'Unknown', $29320 = 'openldap', $29321 = '', $29322 = '', $29323 = '', $29324 = 'source', $29325 = 'alpine', $29326 = 'Alpine Linux', $29327 = '', $29328 = '', $29329 = '3.12', $29330 = '', $29331 = '', $29332 = 'Alpine Linux v3.12', $29333 = '', $29334 = '', $29335 = '', $29336 = '2.4.50-r0', $29337 = 'invalid', $29338 = NULL, $29339 = '{}', $29340 = '{}', $29341 = 'md5', $29342 = '\x673d64e83f59d68a01be78db02325c14', $29343 = 'CVE-2020-25709', $29344 = 'alpine-main-v3.12-updater', $29345 = '', $29346 = '0001-01-01 00:00:00+00', $29347 = 'https://www.cve.org/CVERecord?id=CVE-2020-25709', $29348 = '', $29349 = 'Unknown', $29350 = 'openldap', $29351 = '', $29352 = '', $29353 = '', $29354 = 'source', $29355 = 'alpine', $29356 = 'Alpine Linux', $29357 = '', $29358 = '', $29359 = '3.12', $29360 = '', $29361 = '', $29362 = 'Alpine Linux v3.12', $29363 = '', $29364 = '', $29365 = '', $29366 = '2.4.50-r1', $29367 = 'invalid', $29368 = NULL, $29369 = '{}', $29370 = '{}', $29371 = 'md5', $29372 = '\x8a1f99fd4261bdc653386b54cd7e8d3c', $29373 = 'CVE-2020-25710', $29374 = 'alpine-main-v3.12-updater', $29375 = '', $29376 = '0001-01-01 00:00:00+00', $29377 = 'https://www.cve.org/CVERecord?id=CVE-2020-25710', $29378 = '', $29379 = 'Unknown', $29380 = 'openldap', $29381 = '', $29382 = '', $29383 = '', $29384 = 'source', $29385 = 'alpine', $29386 = 'Alpine Linux', $29387 = '', $29388 = '', $29389 = '3.12', $29390 = '', $29391 = '', $29392 = 'Alpine Linux v3.12', $29393 = '', $29394 = '', $29395 = '', $29396 = '2.4.50-r1', $29397 = 'invalid', $29398 = NULL, $29399 = '{}', $29400 = '{}', $29401 = 'md5', $29402 = '\x452b90e6ebb7cd1fea663792b402fe6e', $29403 = 'CVE-2020-25692', $29404 = 'alpine-main-v3.12-updater', $29405 = '', $29406 = '0001-01-01 00:00:00+00', $29407 = 'https://www.cve.org/CVERecord?id=CVE-2020-25692', $29408 = '', $29409 = 'Unknown', $29410 = 'openldap', $29411 = '', $29412 = '', $29413 = '', $29414 = 'source', $29415 = 'alpine', $29416 = 'Alpine Linux', $29417 = '', $29418 = '', $29419 = '3.12', $29420 = '', $29421 = '', $29422 = 'Alpine Linux v3.12', $29423 = '', $29424 = '', $29425 = '', $29426 = '2.4.50-r1', $29427 = 'invalid', $29428 = NULL, $29429 = '{}', $29430 = '{}', $29431 = 'md5', $29432 = '\x2dfb656286ff782d1d0ec5c2d7db276f', $29433 = 'CVE-2021-27212', $29434 = 'alpine-main-v3.12-updater', $29435 = '', $29436 = '0001-01-01 00:00:00+00', $29437 = 'https://www.cve.org/CVERecord?id=CVE-2021-27212', $29438 = '', $29439 = 'Unknown', $29440 = 'openldap', $29441 = '', $29442 = '', $29443 = '', $29444 = 'source', $29445 = 'alpine', $29446 = 'Alpine Linux', $29447 = '', $29448 = '', $29449 = '3.12', $29450 = '', $29451 = '', $29452 = 'Alpine Linux v3.12', $29453 = '', $29454 = '', $29455 = '', $29456 = '2.4.50-r2', $29457 = 'invalid', $29458 = NULL, $29459 = '{}', $29460 = '{}', $29461 = 'md5', $29462 = '\x5eec0c842627be102ac21985b15c1f5f', $29463 = 'CVE-2018-21269', $29464 = 'alpine-main-v3.12-updater', $29465 = '', $29466 = '0001-01-01 00:00:00+00', $29467 = 'https://www.cve.org/CVERecord?id=CVE-2018-21269', $29468 = '', $29469 = 'Unknown', $29470 = 'openrc', $29471 = '', $29472 = '', $29473 = '', $29474 = 'source', $29475 = 'alpine', $29476 = 'Alpine Linux', $29477 = '', $29478 = '', $29479 = '3.12', $29480 = '', $29481 = '', $29482 = 'Alpine Linux v3.12', $29483 = '', $29484 = '', $29485 = '', $29486 = '0.42.1-r12', $29487 = 'invalid', $29488 = NULL, $29489 = '{}', $29490 = '{}', $29491 = 'md5', $29492 = '\x598b10754580b3f4eac5ce94fec31624', $29493 = 'CVE-2020-7247', $29494 = 'alpine-main-v3.12-updater', $29495 = '', $29496 = '0001-01-01 00:00:00+00', $29497 = 'https://www.cve.org/CVERecord?id=CVE-2020-7247', $29498 = '', $29499 = 'Unknown', $29500 = 'opensmtpd', $29501 = '', $29502 = '', $29503 = '', $29504 = 'source', $29505 = 'alpine', $29506 = 'Alpine Linux', $29507 = '', $29508 = '', $29509 = '3.12', $29510 = '', $29511 = '', $29512 = 'Alpine Linux v3.12', $29513 = '', $29514 = '', $29515 = '', $29516 = '6.6.2p1-r0', $29517 = 'invalid', $29518 = NULL, $29519 = '{}', $29520 = '{}', $29521 = 'md5', $29522 = '\x7dfba7d6b68b1362c77ce2b4a030fdc6', $29523 = 'CVE-2020-35679', $29524 = 'alpine-main-v3.12-updater', $29525 = '', $29526 = '0001-01-01 00:00:00+00', $29527 = 'https://www.cve.org/CVERecord?id=CVE-2020-35679', $29528 = '', $29529 = 'Unknown', $29530 = 'opensmtpd', $29531 = '', $29532 = '', $29533 = '', $29534 = 'source', $29535 = 'alpine', $29536 = 'Alpine Linux', $29537 = '', $29538 = '', $29539 = '3.12', $29540 = '', $29541 = '', $29542 = 'Alpine Linux v3.12', $29543 = '', $29544 = '', $29545 = '', $29546 = '6.6.4p1-r2', $29547 = 'invalid', $29548 = NULL, $29549 = '{}', $29550 = '{}', $29551 = 'md5', $29552 = '\x49a603847e6a63d5e2468e1be143c6a9', $29553 = 'CVE-2020-35680', $29554 = 'alpine-main-v3.12-updater', $29555 = '', $29556 = '0001-01-01 00:00:00+00', $29557 = 'https://www.cve.org/CVERecord?id=CVE-2020-35680', $29558 = '', $29559 = 'Unknown', $29560 = 'opensmtpd', $29561 = '', $29562 = '', $29563 = '', $29564 = 'source', $29565 = 'alpine', $29566 = 'Alpine Linux', $29567 = '', $29568 = '', $29569 = '3.12', $29570 = '', $29571 = '', $29572 = 'Alpine Linux v3.12', $29573 = '', $29574 = '', $29575 = '', $29576 = '6.6.4p1-r2', $29577 = 'invalid', $29578 = NULL, $29579 = '{}', $29580 = '{}', $29581 = 'md5', $29582 = '\x3fa24f1748b3d924598d528e7976fa42', $29583 = 'CVE-2017-15906', $29584 = 'alpine-main-v3.12-updater', $29585 = '', $29586 = '0001-01-01 00:00:00+00', $29587 = 'https://www.cve.org/CVERecord?id=CVE-2017-15906', $29588 = '', $29589 = 'Unknown', $29590 = 'openssh', $29591 = '', $29592 = '', $29593 = '', $29594 = 'source', $29595 = 'alpine', $29596 = 'Alpine Linux', $29597 = '', $29598 = '', $29599 = '3.12', $29600 = '', $29601 = '', $29602 = 'Alpine Linux v3.12', $29603 = '', $29604 = '', $29605 = '', $29606 = '7.5_p1-r8', $29607 = 'invalid', $29608 = NULL, $29609 = '{}', $29610 = '{}', $29611 = 'md5', $29612 = '\xb3cd5fd7e235c21b17c11fa40f4fa6c9', $29613 = 'CVE-2018-15473', $29614 = 'alpine-main-v3.12-updater', $29615 = '', $29616 = '0001-01-01 00:00:00+00', $29617 = 'https://www.cve.org/CVERecord?id=CVE-2018-15473', $29618 = '', $29619 = 'Unknown', $29620 = 'openssh', $29621 = '', $29622 = '', $29623 = '', $29624 = 'source', $29625 = 'alpine', $29626 = 'Alpine Linux', $29627 = '', $29628 = '', $29629 = '3.12', $29630 = '', $29631 = '', $29632 = 'Alpine Linux v3.12', $29633 = '', $29634 = '', $29635 = '', $29636 = '7.7_p1-r4', $29637 = 'invalid', $29638 = NULL, $29639 = '{}', $29640 = '{}', $29641 = 'md5', $29642 = '\x4f308845dceeb146e46717c1c55a1e20', $29643 = 'CVE-2018-20685', $29644 = 'alpine-main-v3.12-updater', $29645 = '', $29646 = '0001-01-01 00:00:00+00', $29647 = 'https://www.cve.org/CVERecord?id=CVE-2018-20685', $29648 = '', $29649 = 'Unknown', $29650 = 'openssh', $29651 = '', $29652 = '', $29653 = '', $29654 = 'source', $29655 = 'alpine', $29656 = 'Alpine Linux', $29657 = '', $29658 = '', $29659 = '3.12', $29660 = '', $29661 = '', $29662 = 'Alpine Linux v3.12', $29663 = '', $29664 = '', $29665 = '', $29666 = '7.9_p1-r3', $29667 = 'invalid', $29668 = NULL, $29669 = '{}', $29670 = '{}', $29671 = 'md5', $29672 = '\xbaa3e28fd09701aa2e0baa543a2a4ea1', $29673 = 'CVE-2019-6109', $29674 = 'alpine-main-v3.12-updater', $29675 = '', $29676 = '0001-01-01 00:00:00+00', $29677 = 'https://www.cve.org/CVERecord?id=CVE-2019-6109', $29678 = '', $29679 = 'Unknown', $29680 = 'openssh', $29681 = '', $29682 = '', $29683 = '', $29684 = 'source', $29685 = 'alpine', $29686 = 'Alpine Linux', $29687 = '', $29688 = '', $29689 = '3.12', $29690 = '', $29691 = '', $29692 = 'Alpine Linux v3.12', $29693 = '', $29694 = '', $29695 = '', $29696 = '7.9_p1-r3', $29697 = 'invalid', $29698 = NULL, $29699 = '{}', $29700 = '{}', $29701 = 'md5', $29702 = '\x291cc8aabbf163b1b45a41d90e6b0118', $29703 = 'CVE-2019-6111', $29704 = 'alpine-main-v3.12-updater', $29705 = '', $29706 = '0001-01-01 00:00:00+00', $29707 = 'https://www.cve.org/CVERecord?id=CVE-2019-6111', $29708 = '', $29709 = 'Unknown', $29710 = 'openssh', $29711 = '', $29712 = '', $29713 = '', $29714 = 'source', $29715 = 'alpine', $29716 = 'Alpine Linux', $29717 = '', $29718 = '', $29719 = '3.12', $29720 = '', $29721 = '', $29722 = 'Alpine Linux v3.12', $29723 = '', $29724 = '', $29725 = '', $29726 = '7.9_p1-r3', $29727 = 'invalid', $29728 = NULL, $29729 = '{}', $29730 = '{}', $29731 = 'md5', $29732 = '\x5576a620a528888385d55170a6907935', $29733 = 'CVE-2020-14145', $29734 = 'alpine-main-v3.12-updater', $29735 = '', $29736 = '0001-01-01 00:00:00+00', $29737 = 'https://www.cve.org/CVERecord?id=CVE-2020-14145', $29738 = '', $29739 = 'Unknown', $29740 = 'openssh', $29741 = '', $29742 = '', $29743 = '', $29744 = 'source', $29745 = 'alpine', $29746 = 'Alpine Linux', $29747 = '', $29748 = '', $29749 = '3.12', $29750 = '', $29751 = '', $29752 = 'Alpine Linux v3.12', $29753 = '', $29754 = '', $29755 = '', $29756 = '8.3_p1-r1', $29757 = 'invalid', $29758 = NULL, $29759 = '{}', $29760 = '{}', $29761 = 'md5', $29762 = '\x95ab423b5e353d276ae4eb08912752aa', $29763 = 'CVE-2021-28041', $29764 = 'alpine-main-v3.12-updater', $29765 = '', $29766 = '0001-01-01 00:00:00+00', $29767 = 'https://www.cve.org/CVERecord?id=CVE-2021-28041', $29768 = '', $29769 = 'Unknown', $29770 = 'openssh', $29771 = '', $29772 = '', $29773 = '', $29774 = 'source', $29775 = 'alpine', $29776 = 'Alpine Linux', $29777 = '', $29778 = '', $29779 = '3.12', $29780 = '', $29781 = '', $29782 = 'Alpine Linux v3.12', $29783 = '', $29784 = '', $29785 = '', $29786 = '8.3_p1-r2', $29787 = 'invalid', $29788 = NULL, $29789 = '{}', $29790 = '{}', $29791 = 'md5', $29792 = '\xbe38b8cfce5f1c0d8f2c5a723e31ad21', $29793 = 'CVE-2021-41617', $29794 = 'alpine-main-v3.12-updater', $29795 = '', $29796 = '0001-01-01 00:00:00+00', $29797 = 'https://www.cve.org/CVERecord?id=CVE-2021-41617', $29798 = '', $29799 = 'Unknown', $29800 = 'openssh', $29801 = '', $29802 = '', $29803 = '', $29804 = 'source', $29805 = 'alpine', $29806 = 'Alpine Linux', $29807 = '', $29808 = '', $29809 = '3.12', $29810 = '', $29811 = '', $29812 = 'Alpine Linux v3.12', $29813 = '', $29814 = '', $29815 = '', $29816 = '8.3_p1-r3', $29817 = 'invalid', $29818 = NULL, $29819 = '{}', $29820 = '{}', $29821 = 'md5', $29822 = '\x3b2e1990d00d88581e5876ac3a74f667', $29823 = 'CVE-2016-10009', $29824 = 'alpine-main-v3.12-updater', $29825 = '', $29826 = '0001-01-01 00:00:00+00', $29827 = 'https://www.cve.org/CVERecord?id=CVE-2016-10009', $29828 = '', $29829 = 'Unknown', $29830 = 'openssh', $29831 = '', $29832 = '', $29833 = '', $29834 = 'source', $29835 = 'alpine', $29836 = 'Alpine Linux', $29837 = '', $29838 = '', $29839 = '3.12', $29840 = '', $29841 = '', $29842 = 'Alpine Linux v3.12', $29843 = '', $29844 = '', $29845 = '', $29846 = '7.4_p1-r0', $29847 = 'invalid', $29848 = NULL, $29849 = '{}', $29850 = '{}', $29851 = 'md5', $29852 = '\xc1557c127b9c331eec7d8b572a22b811', $29853 = 'CVE-2016-10010', $29854 = 'alpine-main-v3.12-updater', $29855 = '', $29856 = '0001-01-01 00:00:00+00', $29857 = 'https://www.cve.org/CVERecord?id=CVE-2016-10010', $29858 = '', $29859 = 'Unknown', $29860 = 'openssh', $29861 = '', $29862 = '', $29863 = '', $29864 = 'source', $29865 = 'alpine', $29866 = 'Alpine Linux', $29867 = '', $29868 = '', $29869 = '3.12', $29870 = '', $29871 = '', $29872 = 'Alpine Linux v3.12', $29873 = '', $29874 = '', $29875 = '', $29876 = '7.4_p1-r0', $29877 = 'invalid', $29878 = NULL, $29879 = '{}', $29880 = '{}', $29881 = 'md5', $29882 = '\x16243bbd8b5c3a3a8bad51eb57e51397', $29883 = 'CVE-2016-10011', $29884 = 'alpine-main-v3.12-updater', $29885 = '', $29886 = '0001-01-01 00:00:00+00', $29887 = 'https://www.cve.org/CVERecord?id=CVE-2016-10011', $29888 = '', $29889 = 'Unknown', $29890 = 'openssh', $29891 = '', $29892 = '', $29893 = '', $29894 = 'source', $29895 = 'alpine', $29896 = 'Alpine Linux', $29897 = '', $29898 = '', $29899 = '3.12', $29900 = '', $29901 = '', $29902 = 'Alpine Linux v3.12', $29903 = '', $29904 = '', $29905 = '', $29906 = '7.4_p1-r0', $29907 = 'invalid', $29908 = NULL, $29909 = '{}', $29910 = '{}', $29911 = 'md5', $29912 = '\x1723574b530257c77fd714121e7eb94b', $29913 = 'CVE-2016-10012', $29914 = 'alpine-main-v3.12-updater', $29915 = '', $29916 = '0001-01-01 00:00:00+00', $29917 = 'https://www.cve.org/CVERecord?id=CVE-2016-10012', $29918 = '', $29919 = 'Unknown', $29920 = 'openssh', $29921 = '', $29922 = '', $29923 = '', $29924 = 'source', $29925 = 'alpine', $29926 = 'Alpine Linux', $29927 = '', $29928 = '', $29929 = '3.12', $29930 = '', $29931 = '', $29932 = 'Alpine Linux v3.12', $29933 = '', $29934 = '', $29935 = '', $29936 = '7.4_p1-r0', $29937 = 'invalid', $29938 = NULL, $29939 = '{}', $29940 = '{}', $29941 = 'md5', $29942 = '\x19d480648fb1ca17c546f38ef3266856', $29943 = 'CVE-2022-1292', $29944 = 'alpine-main-v3.12-updater', $29945 = '', $29946 = '0001-01-01 00:00:00+00', $29947 = 'https://www.cve.org/CVERecord?id=CVE-2022-1292', $29948 = '', $29949 = 'Unknown', $29950 = 'openssl', $29951 = '', $29952 = '', $29953 = '', $29954 = 'source', $29955 = 'alpine', $29956 = 'Alpine Linux', $29957 = '', $29958 = '', $29959 = '3.12', $29960 = '', $29961 = '', $29962 = 'Alpine Linux v3.12', $29963 = '', $29964 = '', $29965 = '', $29966 = '0', $29967 = 'invalid', $29968 = NULL, $29969 = '{}', $29970 = '{}', $29971 = 'md5', $29972 = '\x586eee7a30eee2d9cbbb3d98cdbf629b', $29973 = 'CVE-2019-1543', $29974 = 'alpine-main-v3.12-updater', $29975 = '', $29976 = '0001-01-01 00:00:00+00', $29977 = 'https://www.cve.org/CVERecord?id=CVE-2019-1543', $29978 = '', $29979 = 'Unknown', $29980 = 'openssl', $29981 = '', $29982 = '', $29983 = '', $29984 = 'source', $29985 = 'alpine', $29986 = 'Alpine Linux', $29987 = '', $29988 = '', $29989 = '3.12', $29990 = '', $29991 = '', $29992 = 'Alpine Linux v3.12', $29993 = '', $29994 = '', $29995 = '', $29996 = '1.1.1b-r1', $29997 = 'invalid', $29998 = NULL, $29999 = '{}', $30000 = '{}'
-
;
Date: 2023-07-04 18:35:13 Duration: 75ms Database: postgres parameters: $1 = 'md5', $2 = '\x4dc903355f27fc40457205138148a1d1', $3 = '
-
;
Date: 2023-07-04 18:38:46 Duration: 73ms Database: postgres parameters: $1 = 'md5', $2 = '\x34a8ffeee4f1f2148a339bc04e7ac517', $3 = 'CVE-2022-42260 on Ubuntu 20.04 LTS (focal) - medium.', $4 = 'ubuntu/updater/focal', $5 = 'NVIDIA vGPU Display Driver for Linux guest contains a vulnerability in a D-Bus configuration file, where an unauthorized user in the guest VM can impact protected D-Bus endpoints, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.
2 389ms 1,711 0ms 25ms 0ms SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'vulnerability' ORDER BY id DESC;Times Reported Time consuming bind #2
Day Hour Count Duration Avg duration 13 1,711 389ms 0ms -
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'vulnerability' ORDER BY id DESC;
Date: 2023-07-04 18:40:46 Duration: 25ms Database: postgres parameters: $1 = '{RHEL8-ansible-2.9}'
-
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'vulnerability' ORDER BY id DESC;
Date: 2023-07-04 18:38:06 Duration: 15ms Database: postgres parameters: $1 = '{RHEL7-rhel-7.6-e4s}'
-
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'vulnerability' ORDER BY id DESC;
Date: 2023-07-04 18:40:06 Duration: 10ms Database: postgres parameters: $1 = '{RHEL9-jboss-cs}'
3 161ms 1,683 0ms 20ms 0ms INSERT INTO updater_status (;Times Reported Time consuming bind #3
Day Hour Count Duration Avg duration 13 1,683 161ms 0ms -
INSERT INTO updater_status (;
Date: 2023-07-04 18:47:04 Duration: 20ms Database: postgres parameters: $1 = 'RHEL6-rhel-6', $2 = '2023-07-04 18:39:07.336677+00', $3 = '{"Etag":"\"e1e3abd5c6f422e5fbdf04bc2646cc1e\"","Date":"Sat, 01 Jul 2023 07:33:31 GMT"}'
-
INSERT INTO updater_status (;
Date: 2023-07-04 18:40:26 Duration: 19ms Database: postgres parameters: $1 = 'RHEL8-rhel-8.0-e4s', $2 = '2023-07-04 18:39:20.780938+00', $3 = '{"Etag":"\"31d118cc68c6d2e428689bc874562982\"","Date":"Sat, 01 Jul 2023 07:34:20 GMT"}'
-
INSERT INTO updater_status (;
Date: 2023-07-04 18:42:33 Duration: 15ms Database: postgres parameters: $1 = 'osv/pypi', $2 = '2023-07-04 18:41:43.30526+00', $3 = '"a5833c8d043708f3f9c2fda65760b839"'
4 83ms 2,042 0ms 1ms 0ms SELECT lock FROM pg_advisory_unlock($1) lock WHERE lock = true;Times Reported Time consuming bind #4
Day Hour Count Duration Avg duration 13 2,042 83ms 0ms -
SELECT lock FROM pg_advisory_unlock($1) lock WHERE lock = true;
Date: 2023-07-04 18:40:16 Duration: 1ms Database: postgres parameters: $1 = '8495280265101967714'
-
SELECT lock FROM pg_advisory_unlock($1) lock WHERE lock = true;
Date: 2023-07-04 18:41:15 Duration: 0ms Database: postgres parameters: $1 = '-4419915665882388497'
-
SELECT lock FROM pg_advisory_unlock($1) lock WHERE lock = true;
Date: 2023-07-04 18:41:04 Duration: 0ms Database: postgres parameters: $1 = '5723125914997021734'
5 66ms 2,223 0ms 0ms 0ms SELECT lock FROM pg_try_advisory_lock($1) lock WHERE lock = true;Times Reported Time consuming bind #5
Day Hour Count Duration Avg duration 13 2,223 66ms 0ms -
SELECT lock FROM pg_try_advisory_lock($1) lock WHERE lock = true;
Date: 2023-07-04 18:40:16 Duration: 0ms Database: postgres parameters: $1 = '-3981631176954848900'
-
SELECT lock FROM pg_try_advisory_lock($1) lock WHERE lock = true;
Date: 2023-07-04 18:40:59 Duration: 0ms Database: postgres parameters: $1 = '-8209295069323800705'
-
SELECT lock FROM pg_try_advisory_lock($1) lock WHERE lock = true;
Date: 2023-07-04 18:35:43 Duration: 0ms Database: postgres parameters: $1 = '-4741969651619598549'
6 43ms 353 0ms 9ms 0ms INSERT INTO update_operation (updater, fingerprint, kind) VALUES ($1, $2, 'vulnerability') RETURNING id, ref;Times Reported Time consuming bind #6
Day Hour Count Duration Avg duration 13 353 43ms 0ms -
INSERT INTO update_operation (updater, fingerprint, kind) VALUES ($1, $2, 'vulnerability') RETURNING id, ref;
Date: 2023-07-04 18:41:23 Duration: 9ms Database: postgres parameters: $1 = 'osv/nuget', $2 = '"40ab8ef8dce127b52cc3552fea231920"'
-
INSERT INTO update_operation (updater, fingerprint, kind) VALUES ($1, $2, 'vulnerability') RETURNING id, ref;
Date: 2023-07-04 18:39:06 Duration: 5ms Database: postgres parameters: $1 = 'alpine-community-v3.15-updater', $2 = '"645e504a-13fdb"'
-
INSERT INTO update_operation (updater, fingerprint, kind) VALUES ($1, $2, 'vulnerability') RETURNING id, ref;
Date: 2023-07-04 18:39:47 Duration: 0ms Database: postgres parameters: $1 = 'RHEL7-rhel-7-including-unpatched', $2 = '{"Etag":"\"f8dc3517c89d3be88e6bcff03d2e405b\"","Date":"Tue, 04 Jul 2023 18:34:03 GMT"}'
7 1ms 3 0ms 0ms 0ms SELECT version FROM libindex_migrations WHERE version = 1;Times Reported Time consuming bind #7
Day Hour Count Duration Avg duration 13 3 1ms 0ms -
SELECT version FROM libindex_migrations WHERE version = 1;
Date: 2023-07-04 18:41:02 Duration: 0ms Database: postgres
-
SELECT version FROM libindex_migrations WHERE version = 1;
Date: 2023-07-04 18:37:46 Duration: 0ms Database: postgres
-
SELECT version FROM libindex_migrations WHERE version = 1;
Date: 2023-07-04 18:38:46 Duration: 0ms Database: postgres
8 1ms 3 0ms 0ms 0ms SELECT version FROM libvuln_migrations WHERE version = 1;Times Reported Time consuming bind #8
Day Hour Count Duration Avg duration 13 3 1ms 0ms -
SELECT version FROM libvuln_migrations WHERE version = 1;
Date: 2023-07-04 18:41:02 Duration: 0ms Database: postgres
-
SELECT version FROM libvuln_migrations WHERE version = 1;
Date: 2023-07-04 18:37:47 Duration: 0ms Database: postgres
-
SELECT version FROM libvuln_migrations WHERE version = 1;
Date: 2023-07-04 18:38:47 Duration: 0ms Database: postgres
9 1ms 3 0ms 0ms 0ms SELECT version FROM notifier_migrations WHERE version = 1;Times Reported Time consuming bind #9
Day Hour Count Duration Avg duration 13 3 1ms 0ms -
SELECT version FROM notifier_migrations WHERE version = 1;
Date: 2023-07-04 18:37:47 Duration: 0ms Database: postgres
-
SELECT version FROM notifier_migrations WHERE version = 1;
Date: 2023-07-04 18:41:03 Duration: 0ms Database: postgres
-
SELECT version FROM notifier_migrations WHERE version = 1;
Date: 2023-07-04 18:38:47 Duration: 0ms Database: postgres
10 0ms 4 0ms 0ms 0ms SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'enrichment' ORDER BY id DESC;Times Reported Time consuming bind #10
Day Hour Count Duration Avg duration 13 4 0ms 0ms -
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'enrichment' ORDER BY id DESC;
Date: 2023-07-04 18:41:23 Duration: 0ms Database: postgres parameters: $1 = '{clair.cvss}'
-
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'enrichment' ORDER BY id DESC;
Date: 2023-07-04 18:35:15 Duration: 0ms Database: postgres parameters: $1 = '{clair.cvss}'
-
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'enrichment' ORDER BY id DESC;
Date: 2023-07-04 18:41:10 Duration: 0ms Database: postgres parameters: $1 = '{clair.cvss}'
11 0ms 3 0ms 0ms 0ms SELECT version FROM libindex_migrations WHERE version = 2;Times Reported Time consuming bind #11
Day Hour Count Duration Avg duration 13 3 0ms 0ms -
SELECT version FROM libindex_migrations WHERE version = 2;
Date: 2023-07-04 18:41:02 Duration: 0ms Database: postgres
-
SELECT version FROM libindex_migrations WHERE version = 2;
Date: 2023-07-04 18:37:46 Duration: 0ms Database: postgres
-
SELECT version FROM libindex_migrations WHERE version = 2;
Date: 2023-07-04 18:38:46 Duration: 0ms Database: postgres
12 0ms 3 0ms 0ms 0ms SELECT version FROM libvuln_migrations WHERE version = 7;Times Reported Time consuming bind #12
Day Hour Count Duration Avg duration 13 3 0ms 0ms -
SELECT version FROM libvuln_migrations WHERE version = 7;
Date: 2023-07-04 18:41:03 Duration: 0ms Database: postgres
-
SELECT version FROM libvuln_migrations WHERE version = 7;
Date: 2023-07-04 18:38:47 Duration: 0ms Database: postgres
-
SELECT version FROM libvuln_migrations WHERE version = 7;
Date: 2023-07-04 18:37:47 Duration: 0ms Database: postgres
13 0ms 3 0ms 0ms 0ms SELECT version FROM libindex_migrations WHERE version = 7;Times Reported Time consuming bind #13
Day Hour Count Duration Avg duration 13 3 0ms 0ms -
SELECT version FROM libindex_migrations WHERE version = 7;
Date: 2023-07-04 18:41:02 Duration: 0ms Database: postgres
-
SELECT version FROM libindex_migrations WHERE version = 7;
Date: 2023-07-04 18:37:46 Duration: 0ms Database: postgres
-
SELECT version FROM libindex_migrations WHERE version = 7;
Date: 2023-07-04 18:38:46 Duration: 0ms Database: postgres
14 0ms 3 0ms 0ms 0ms SELECT version FROM notifier_migrations WHERE version = 2;Times Reported Time consuming bind #14
Day Hour Count Duration Avg duration 13 3 0ms 0ms -
SELECT version FROM notifier_migrations WHERE version = 2;
Date: 2023-07-04 18:37:47 Duration: 0ms Database: postgres
-
SELECT version FROM notifier_migrations WHERE version = 2;
Date: 2023-07-04 18:41:03 Duration: 0ms Database: postgres
-
SELECT version FROM notifier_migrations WHERE version = 2;
Date: 2023-07-04 18:38:47 Duration: 0ms Database: postgres
15 0ms 3 0ms 0ms 0ms SELECT version FROM libindex_migrations WHERE version = 3;Times Reported Time consuming bind #15
Day Hour Count Duration Avg duration 13 3 0ms 0ms -
SELECT version FROM libindex_migrations WHERE version = 3;
Date: 2023-07-04 18:41:02 Duration: 0ms Database: postgres
-
SELECT version FROM libindex_migrations WHERE version = 3;
Date: 2023-07-04 18:37:46 Duration: 0ms Database: postgres
-
SELECT version FROM libindex_migrations WHERE version = 3;
Date: 2023-07-04 18:38:46 Duration: 0ms Database: postgres
16 0ms 3 0ms 0ms 0ms SELECT version FROM libvuln_migrations WHERE version = 8;Times Reported Time consuming bind #16
Day Hour Count Duration Avg duration 13 3 0ms 0ms -
SELECT version FROM libvuln_migrations WHERE version = 8;
Date: 2023-07-04 18:37:47 Duration: 0ms Database: postgres
-
SELECT version FROM libvuln_migrations WHERE version = 8;
Date: 2023-07-04 18:41:03 Duration: 0ms Database: postgres
-
SELECT version FROM libvuln_migrations WHERE version = 8;
Date: 2023-07-04 18:38:47 Duration: 0ms Database: postgres
17 0ms 3 0ms 0ms 0ms SELECT version FROM libvuln_migrations WHERE version = 10;Times Reported Time consuming bind #17
Day Hour Count Duration Avg duration 13 3 0ms 0ms -
SELECT version FROM libvuln_migrations WHERE version = 10;
Date: 2023-07-04 18:37:47 Duration: 0ms Database: postgres
-
SELECT version FROM libvuln_migrations WHERE version = 10;
Date: 2023-07-04 18:41:03 Duration: 0ms Database: postgres
-
SELECT version FROM libvuln_migrations WHERE version = 10;
Date: 2023-07-04 18:38:47 Duration: 0ms Database: postgres
18 0ms 3 0ms 0ms 0ms SELECT version FROM libindex_migrations WHERE version = 5;Times Reported Time consuming bind #18
Day Hour Count Duration Avg duration 13 3 0ms 0ms -
SELECT version FROM libindex_migrations WHERE version = 5;
Date: 2023-07-04 18:41:02 Duration: 0ms Database: postgres
-
SELECT version FROM libindex_migrations WHERE version = 5;
Date: 2023-07-04 18:38:46 Duration: 0ms Database: postgres
-
SELECT version FROM libindex_migrations WHERE version = 5;
Date: 2023-07-04 18:37:46 Duration: 0ms Database: postgres
19 0ms 3 0ms 0ms 0ms SELECT version FROM libvuln_migrations WHERE version = 9;Times Reported Time consuming bind #19
Day Hour Count Duration Avg duration 13 3 0ms 0ms -
SELECT version FROM libvuln_migrations WHERE version = 9;
Date: 2023-07-04 18:37:47 Duration: 0ms Database: postgres
-
SELECT version FROM libvuln_migrations WHERE version = 9;
Date: 2023-07-04 18:41:03 Duration: 0ms Database: postgres
-
SELECT version FROM libvuln_migrations WHERE version = 9;
Date: 2023-07-04 18:38:47 Duration: 0ms Database: postgres
20 0ms 3 0ms 0ms 0ms SELECT version FROM libvuln_migrations WHERE version = 6;Times Reported Time consuming bind #20
Day Hour Count Duration Avg duration 13 3 0ms 0ms -
SELECT version FROM libvuln_migrations WHERE version = 6;
Date: 2023-07-04 18:38:47 Duration: 0ms Database: postgres
-
SELECT version FROM libvuln_migrations WHERE version = 6;
Date: 2023-07-04 18:41:02 Duration: 0ms Database: postgres
-
SELECT version FROM libvuln_migrations WHERE version = 6;
Date: 2023-07-04 18:37:47 Duration: 0ms Database: postgres
-
Events
Log levels
Key values
- 22,709,950 Log entries
Events distribution
Key values
- 0 PANIC entries
- 1125 FATAL entries
- 74 ERROR entries
- 0 WARNING entries
Most Frequent Errors/Events
Key values
- 1,124 Max number of times the same event was reported
- 1,199 Total events found
Rank Times reported Error 1 1,124 FATAL: sorry, too many clients already
Times Reported Most Frequent Error / Event #1
Day Hour Count Jul 04 14 1,124 - FATAL: sorry, too many clients already
Date: 2023-07-04 18:41:14
2 73 LOG: process ... still waiting for ShareLock on transaction ... after ... ms
Times Reported Most Frequent Error / Event #2
Day Hour Count Jul 04 14 73 - LOG: process 1137 still waiting for ShareLock on transaction 5225 after 1000.049 ms
- LOG: process 1126 still waiting for ShareLock on transaction 5280 after 1000.044 ms
- LOG: process 1142 still waiting for ShareLock on transaction 5324 after 1000.048 ms
Detail: Process holding the lock: 1163. Wait queue: 1137.
Context: while inserting index tuple (399545,1) in relation "vuln"
Statement: INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30)), ($31, $32, $33, $34, $35, $36, $37, $38, $39, $40, $41, $42, $43, $44, $45, $46, $47, $48, $49, $50, $51, $52, $53, $54, $55, $56, $57, $58, VersionRange($59, $60)), ($61, $62, $63, $64, $65, $66, $67, $68, $69, $70, $71, $72, $73, $74, $75, $76, $77, $78, $79, $80, $81, $82, $83, $84, $85, $86, $87, $88, VersionRange($89, $90)), ($91, $92, $93, $94, $95, $96, $97, $98, $99, $100, $101, $102, $103, $104, $105, $106, $107, $108, $109, $110, $111, $112, $113, $114, $115, $116, $117, $118, VersionRange($119, $120)), ($121, $122, $123, $124, $125, $126, $127, $128, $129, $130, $131, $132, $133, $134, $135, $136, $137, $138, $139, $140, $141, $142, $143, $144, $145, $146, $147, $148, VersionRange($149, $150)), ($151, $152, $153, $154, $155, $156, $157, $158, $159, $160, $161, $162, $163, $164, $165, $166, $167, $168, $169, $170, $171, $172, $173, $174, $175, $176, $177, $178, VersionRange($179, $180)), ($181, $182, $183, $184, $185, $186, $187, $188, $189, $190, $191, $192, $193, $194, $195, $196, $197, $198, $199, $200, $201, $202, $203, $204, $205, $206, $207, $208, VersionRange($209, $210)), ($211, $212, $213, $214, $215, $216, $217, $218, $219, $220, $221, $222, $223, $224, $225, $226, $227, $228, $229, $230, $231, $232, $233, $234, $235, $236, $237, $238, VersionRange($239, $240)), ($241, $242, $243, $244, $245, $246, $247, $248, $249, $250, $251, $252, $253, $254, $255, $256, $257, $258, $259, $260, $261, $262, $263, $264, $265, $266, $267, $268, VersionRange($269, $270)), ($271, $272, $273, $274, $275, $276, $277, $278, $279, $280, $281, $282, $283, $284, $285, $286, $287, $288, $289, $290, $291, $292, $293, $294, $295, $296, $297, $298, VersionRange($299, $300)), ($301, $302, $303, $304, $305, $306, $307, $308, $309, $310, $311, $312, $313, $314, $315, $316, $317, $318, $319, $320, $321, $322, $323, $324, $325, $326, $327, $328, VersionRange($329, $330)), ($331, $332, $333, $334, $335, $336, $337, $338, $339, $340, $341, $342, $343, $344, $345, $346, $347, $348, $349, $350, $351, $352, $353, $354, $355, $356, $357, $358, VersionRange($359, $360)), ($361, $362, $363, $364, $365, $366, $367, $368, $369, $370, $371, $372, $373, $374, $375, $376, $377, $378, $379, $380, $381, $382, $383, $384, $385, $386, $387, $388, VersionRange($389, $390)), ($391, $392, $393, $394, $395, $396, $397, $398, $399, $400, $401, $402, $403, $404, $405, $406, $407, $408, $409, $410, $411, $412, $413, $414, $415, $416, $417, $418, VersionRange($419, $420)), ($421, $422, $423, $424, $425, $426, $427, $428, $429, $430, $431, $432, $433, $434, $435, $436, $437, $438, $439, $440, $441, $442, $443, $444, $445, $446, $447, $448, VersionRange($449, $450)), ($451, $452, $453, $454, $455, $456, $457, $458, $459, $460, $461, $462, $463, $464, $465, $466, $467, $468, $469, $470, $471, $472, $473, $474, $475, $476, $477, $478, VersionRange($479, $480)), ($481, $482, $483, $484, $485, $486, $487, $488, $489, $490, $491, $492, $493, $494, $495, $496, $497, $498, $499, $500, $501, $502, $503, $504, $505, $506, $507, $508, VersionRange($509, $510)), ($511, $512, $513, $514, $515, $516, $517, $518, $519, $520, $521, $522, $523, $524, $525, $526, $527, $528, $529, $530, $531, $532, $533, $534, $535, $536, $537, $538, VersionRange($539, $540)), ($541, $542, $543, $544, $545, $546, $547, $548, $549, $550, $551, $552, $553, $554, $555, $556, $557, $558, $559, $560, $561, $562, $563, $564, $565, $566, $567, $568, VersionRange($569, $570)), ($571, $572, $573, $574, $575, $576, $577, $578, $579, $580, $581, $582, $583, $584, $585, $586, $587, $588, $589, $590, $591, $592, $593, $594, $595, $596, $597, $598, VersionRange($599, $600)), ($601, $602, $603, $604, $605, $606, $607, $608, $609, $610, $611, $612, $613, $614, $615, $616, $617, $618, $619, $620, $621, $622, $623, $624, $625, $626, $627, $628, VersionRange($629, $630)), ($631, $632, $633, $634, $635, $636, $637, $638, $639, $640, $641, $642, $643, $644, $645, $646, $647, $648, $649, $650, $651, $652, $653, $654, $655, $656, $657, $658, VersionRange($659, $660)), ($661, $662, $663, $664, $665, $666, $667, $668, $669, $670, $671, $672, $673, $674, $675, $676, $677, $678, $679, $680, $681, $682, $683, $684, $685, $686, $687, $688, VersionRange($689, $690)), ($691, $692, $693, $694, $695, $696, $697, $698, $699, $700, $701, $702, $703, $704, $705, $706, $707, $708, $709, $710, $711, $712, $713, $714, $715, $716, $717, $718, VersionRange($719, $720)), ($721, $722, $723, $724, $725, $726, $727, $728, $729, $730, $731, $732, $733, $734, $735, $736, $737, $738, $739, $740, $741, $742, $743, $744, $745, $746, $747, $748, VersionRange($749, $750)), ($751, $752, $753, $754, $755, $756, $757, $758, $759, $760, $761, $762, $763, $764, $765, $766, $767, $768, $769, $770, $771, $772, $773, $774, $775, $776, $777, $778, VersionRange($779, $780)), ($781, $782, $783, $784, $785, $786, $787, $788, $789, $790, $791, $792, $793, $794, $795, $796, $797, $798, $799, $800, $801, $802, $803, $804, $805, $806, $807, $808, VersionRange($809, $810)), ($811, $812, $813, $814, $815, $816, $817, $818, $819, $820, $821, $822, $823, $824, $825, $826, $827, $828, $829, $830, $831, $832, $833, $834, $835, $836, $837, $838, VersionRange($839, $840)), ($841, $842, $843, $844, $845, $846, $847, $848, $849, $850, $851, $852, $853, $854, $855, $856, $857, $858, $859, $860, $861, $862, $863, $864, $865, $866, $867, $868, VersionRange($869, $870)), ($871, $872, $873, $874, $875, $876, $877, $878, $879, $880, $881, $882, $883, $884, $885, $886, $887, $888, $889, $890, $891, $892, $893, $894, $895, $896, $897, $898, VersionRange($899, $900)), ($901, $902, $903, $904, $905, $906, $907, $908, $909, $910, $911, $912, $913, $914, $915, $916, $917, $918, $919, $920, $921, $922, $923, $924, $925, $926, $927, $928, VersionRange($929, $930)), ($931, $932, $933, $934, $935, $936, $937, $938, $939, $940, $941, $942, $943, $944, $945, $946, $947, $948, $949, $950, $951, $952, $953, $954, $955, $956, $957, $958, VersionRange($959, $960)), ($961, $962, $963, $964, $965, $966, $967, $968, $969, $970, $971, $972, $973, $974, $975, $976, $977, $978, $979, $980, $981, $982, $983, $984, $985, $986, $987, $988, VersionRange($989, $990)), ($991, $992, $993, $994, $995, $996, $997, $998, $999, $1000, $1001, $1002, $1003, $1004, $1005, $1006, $1007, $1008, $1009, $1010, $1011, $1012, $1013, $1014, $1015, $1016, $1017, $1018, VersionRange($1019, $1020)), ($1021, $1022, $1023, $1024, $1025, $1026, $1027, $1028, $1029, $1030, $1031, $1032, $1033, $1034, $1035, $1036, $1037, $1038, $1039, $1040, $1041, $1042, $1043, $1044, $1045, $1046, $1047, $1048, VersionRange($1049, $1050)), ($1051, $1052, $1053, $1054, $1055, $1056, $1057, $1058, $1059, $1060, $1061, $1062, $1063, $1064, $1065, $1066, $1067, $1068, $1069, $1070, $1071, $1072, $1073, $1074, $1075, $1076, $1077, $1078, VersionRange($1079, $1080)), ($1081, $1082, $1083, $1084, $1085, $1086, $1087, $1088, $1089, $1090, $1091, $1092, $1093, $1094, $1095, $1096, $1097, $1098, $1099, $1100, $1101, $1102, $1103, $1104, $1105, $1106, $1107, $1108, VersionRange($1109, $1110)), ($1111, $1112, $1113, $1114, $1115, $1116, $1117, $1118, $1119, $1120, $1121, $1122, $1123, $1124, $1125, $1126, $1127, $1128, $1129, $1130, $1131, $1132, $1133, $1134, $1135, $1136, $1137, $1138, VersionRange($1139, $1140)), ($1141, $1142, $1143, $1144, $1145, $1146, $1147, $1148, $1149, $1150, $1151, $1152, $1153, $1154, $1155, $1156, $1157, $1158, $1159, $1160, $1161, $1162, $1163, $1164, $1165, $1166, $1167, $1168, VersionRange($1169, $1170)), ($1171, $1172, $1173, $1174, $1175, $1176, $1177, $1178, $1179, $1180, $1181, $1182, $1183, $1184, $1185, $1186, $1187, $1188, $1189, $1190, $1191, $1192, $1193, $1194, $1195, $1196, $1197, $1198, VersionRange($1199, $1200)), ($1201, $1202, $1203, $1204, $1205, $1206, $1207, $1208, $1209, $1210, $1211, $1212, $1213, $1214, $1215, $1216, $1217, $1218, $1219, $1220, $1221, $1222, $1223, $1224, $1225, $1226, $1227, $1228, VersionRange($1229, $1230)), ($1231, $1232, $1233, $1234, $1235, $1236, $1237, $1238, $1239, $1240, $1241, $1242, $1243, $1244, $1245, $1246, $1247, $1248, $1249, $1250, $1251, $1252, $1253, $1254, $1255, $1256, $1257, $1258, VersionRange($1259, $1260)), ($1261, $1262, $1263, $1264, $1265, $1266, $1267, $1268, $1269, $1270, $1271, $1272, $1273, $1274, $1275, $1276, $1277, $1278, $1279, $1280, $1281, $1282, $1283, $1284, $1285, $1286, $1287, $1288, VersionRange($1289, $1290)), ($1291, $1292, $1293, $1294, $1295, $1296, $1297, $1298, $1299, $1300, $1301, $1302, $1303, $1304, $1305, $1306, $1307, $1308, $1309, $1310, $1311, $1312, $1313, $1314, $1315, $1316, $1317, $1318, VersionRange($1319, $1320)), ($1321, $1322, $1323, $1324, $1325, $1326, $1327, $1328, $1329, $1330, $1331, $1332, $1333, $1334, $1335, $1336, $1337, $1338, $1339, $1340, $1341, $1342, $1343, $1344, $1345, $1346, $1347, $1348, VersionRange($1349, $1350)), ($1351, $1352, $1353, $1354, $1355, $1356, $1357, $1358, $1359, $1360, $1361, $1362, $1363, $1364, $1365, $1366, $1367, $1368, $1369, $1370, $1371, $1372, $1373, $1374, $1375, $1376, $1377, $1378, VersionRange($1379, $1380)), ($1381, $1382, $1383, $1384, $1385, $1386, $1387, $1388, $1389, $1390, $1391, $1392, $1393, $1394, $1395, $1396, $1397, $1398, $1399, $1400, $1401, $1402, $1403, $1404, $1405, $1406, $1407, $1408, VersionRange($1409, $1410)), ($1411, $1412, $1413, $1414, $1415, $1416, $1417, $1418, $1419, $1420, $1421, $1422, $1423, $1424, $1425, $1426, $1427, $1428, $1429, $1430, $1431, $1432, $1433, $1434, $1435, $1436, $1437, $1438, VersionRange($1439, $1440)), ($1441, $1442, $1443, $1444, $1445, $1446, $1447, $1448, $1449, $1450, $1451, $1452, $1453, $1454, $1455, $1456, $1457, $1458, $1459, $1460, $1461, $1462, $1463, $1464, $1465, $1466, $1467, $1468, VersionRange($1469, $1470)), ($1471, $1472, $1473, $1474, $1475, $1476, $1477, $1478, $1479, $1480, $1481, $1482, $1483, $1484, $1485, $1486, $1487, $1488, $1489, $1490, $1491, $1492, $1493, $1494, $1495, $1496, $1497, $1498, VersionRange($1499, $1500)), ($1501, $1502, $1503, $1504, $1505, $1506, $1507, $1508, $1509, $1510, $1511, $1512, $1513, $1514, $1515, $1516, $1517, $1518, $1519, $1520, $1521, $1522, $1523, $1524, $1525, $1526, $1527, $1528, VersionRange($1529, $1530)), ($1531, $1532, $1533, $1534, $1535, $1536, $1537, $1538, $1539, $1540, $1541, $1542, $1543, $1544, $1545, $1546, $1547, $1548, $1549, $1550, $1551, $1552, $1553, $1554, $1555, $1556, $1557, $1558, VersionRange($1559, $1560)), ($1561, $1562, $1563, $1564, $1565, $1566, $1567, $1568, $1569, $1570, $1571, $1572, $1573, $1574, $1575, $1576, $1577, $1578, $1579, $1580, $1581, $1582, $1583, $1584, $1585, $1586, $1587, $1588, VersionRange($1589, $1590)), ($1591, $1592, $1593, $1594, $1595, $1596, $1597, $1598, $1599, $1600, $1601, $1602, $1603, $1604, $1605, $1606, $1607, $1608, $1609, $1610, $1611, $1612, $1613, $1614, $1615, $1616, $1617, $1618, VersionRange($1619, $1620)), ($1621, $1622, $1623, $1624, $1625, $1626, $1627, $1628, $1629, $1630, $1631, $1632, $1633, $1634, $1635, $1636, $1637, $1638, $1639, $1640, $1641, $1642, $1643, $1644, $1645, $1646, $1647, $1648, VersionRange($1649, $1650)), ($1651, $1652, $1653, $1654, $1655, $1656, $1657, $1658, $1659, $1660, $1661, $1662, $1663, $1664, $1665, $1666, $1667, $1668, $1669, $1670, $1671, $1672, $1673, $1674, $1675, $1676, $1677, $1678, VersionRange($1679, $1680)), ($1681, $1682, $1683, $1684, $1685, $1686, $1687, $1688, $1689, $1690, $1691, $1692, $1693, $1694, $1695, $1696, $1697, $1698, $1699, $1700, $1701, $1702, $1703, $1704, $1705, $1706, $1707, $1708, VersionRange($1709, $1710)), ($1711, $1712, $1713, $1714, $1715, $1716, $1717, $1718, $1719, $1720, $1721, $1722, $1723, $1724, $1725, $1726, $1727, $1728, $1729, $1730, $1731, $1732, $1733, $1734, $1735, $1736, $1737, $1738, VersionRange($1739, $1740)), ($1741, $1742, $1743, $1744, $1745, $1746, $1747, $1748, $1749, $1750, $1751, $1752, $1753, $1754, $1755, $1756, $1757, $1758, $1759, $1760, $1761, $1762, $1763, $1764, $1765, $1766, $1767, $1768, VersionRange($1769, $1770)), ($1771, $1772, $1773, $1774, $1775, $1776, $1777, $1778, $1779, $1780, $1781, $1782, $1783, $1784, $1785, $1786, $1787, $1788, $1789, $1790, $1791, $1792, $1793, $1794, $1795, $1796, $1797, $1798, VersionRange($1799, $1800)), ($1801, $1802, $1803, $1804, $1805, $1806, $1807, $1808, $1809, $1810, $1811, $1812, $1813, $1814, $1815, $1816, $1817, $1818, $1819, $1820, $1821, $1822, $1823, $1824, $1825, $1826, $1827, $1828, VersionRange($1829, $1830)), ($1831, $1832, $1833, $1834, $1835, $1836, $1837, $1838, $1839, $1840, $1841, $1842, $1843, $1844, $1845, $1846, $1847, $1848, $1849, $1850, $1851, $1852, $1853, $1854, $1855, $1856, $1857, $1858, VersionRange($1859, $1860)), ($1861, $1862, $1863, $1864, $1865, $1866, $1867, $1868, $1869, $1870, $1871, $1872, $1873, $1874, $1875, $1876, $1877, $1878, $1879, $1880, $1881, $1882, $1883, $1884, $1885, $1886, $1887, $1888, VersionRange($1889, $1890)), ($1891, $1892, $1893, $1894, $1895, $1896, $1897, $1898, $1899, $1900, $1901, $1902, $1903, $1904, $1905, $1906, $1907, $1908, $1909, $1910, $1911, $1912, $1913, $1914, $1915, $1916, $1917, $1918, VersionRange($1919, $1920)), ($1921, $1922, $1923, $1924, $1925, $1926, $1927, $1928, $1929, $1930, $1931, $1932, $1933, $1934, $1935, $1936, $1937, $1938, $1939, $1940, $1941, $1942, $1943, $1944, $1945, $1946, $1947, $1948, VersionRange($1949, $1950)), ($1951, $1952, $1953, $1954, $1955, $1956, $1957, $1958, $1959, $1960, $1961, $1962, $1963, $1964, $1965, $1966, $1967, $1968, $1969, $1970, $1971, $1972, $1973, $1974, $1975, $1976, $1977, $1978, VersionRange($1979, $1980)), ($1981, $1982, $1983, $1984, $1985, $1986, $1987, $1988, $1989, $1990, $1991, $1992, $1993, $1994, $1995, $1996, $1997, $1998, $1999, $2000, $2001, $2002, $2003, $2004, $2005, $2006, $2007, $2008, VersionRange($2009, $2010)), ($2011, $2012, $2013, $2014, $2015, $2016, $2017, $2018, $2019, $2020, $2021, $2022, $2023, $2024, $2025, $2026, $2027, $2028, $2029, $2030, $2031, $2032, $2033, $2034, $2035, $2036, $2037, $2038, VersionRange($2039, $2040)), ($2041, $2042, $2043, $2044, $2045, $2046, $2047, $2048, $2049, $2050, $2051, $2052, $2053, $2054, $2055, $2056, $2057, $2058, $2059, $2060, $2061, $2062, $2063, $2064, $2065, $2066, $2067, $2068, VersionRange($2069, $2070)), ($2071, $2072, $2073, $2074, $2075, $2076, $2077, $2078, $2079, $2080, $2081, $2082, $2083, $2084, $2085, $2086, $2087, $2088, $2089, $2090, $2091, $2092, $2093, $2094, $2095, $2096, $2097, $2098, VersionRange($2099, $2100)), ($2101, $2102, $2103, $2104, $2105, $2106, $2107, $2108, $2109, $2110, $2111, $2112, $2113, $2114, $2115, $2116, $2117, $2118, $2119, $2120, $2121, $2122, $2123, $2124, $2125, $2126, $2127, $2128, VersionRange($2129, $2130)), ($2131, $2132, $2133, $2134, $2135, $2136, $2137, $2138, $2139, $2140, $2141, $2142, $2143, $2144, $2145, $2146, $2147, $2148, $2149, $2150, $2151, $2152, $2153, $2154, $2155, $2156, $2157, $2158, VersionRange($2159, $2160)), ($2161, $2162, $2163, $2164, $2165, $2166, $2167, $2168, $2169, $2170, $2171, $2172, $2173, $2174, $2175, $2176, $2177, $2178, $2179, $2180, $2181, $2182, $2183, $2184, $2185, $2186, $2187, $2188, VersionRange($2189, $2190)), ($2191, $2192, $2193, $2194, $2195, $2196, $2197, $2198, $2199, $2200, $2201, $2202, $2203, $2204, $2205, $2206, $2207, $2208, $2209, $2210, $2211, $2212, $2213, $2214, $2215, $2216, $2217, $2218, VersionRange($2219, $2220)), ($2221, $2222, $2223, $2224, $2225, $2226, $2227, $2228, $2229, $2230, $2231, $2232, $2233, $2234, $2235, $2236, $2237, $2238, $2239, $2240, $2241, $2242, $2243, $2244, $2245, $2246, $2247, $2248, VersionRange($2249, $2250)), ($2251, $2252, $2253, $2254, $2255, $2256, $2257, $2258, $2259, $2260, $2261, $2262, $2263, $2264, $2265, $2266, $2267, $2268, $2269, $2270, $2271, $2272, $2273, $2274, $2275, $2276, $2277, $2278, VersionRange($2279, $2280)), ($2281, $2282, $2283, $2284, $2285, $2286, $2287, $2288, $2289, $2290, $2291, $2292, $2293, $2294, $2295, $2296, $2297, $2298, $2299, $2300, $2301, $2302, $2303, $2304, $2305, $2306, $2307, $2308, VersionRange($2309, $2310)), ($2311, $2312, $2313, $2314, $2315, $2316, $2317, $2318, $2319, $2320, $2321, $2322, $2323, $2324, $2325, $2326, $2327, $2328, $2329, $2330, $2331, $2332, $2333, $2334, $2335, $2336, $2337, $2338, VersionRange($2339, $2340)), ($2341, $2342, $2343, $2344, $2345, $2346, $2347, $2348, $2349, $2350, $2351, $2352, $2353, $2354, $2355, $2356, $2357, $2358, $2359, $2360, $2361, $2362, $2363, $2364, $2365, $2366, $2367, $2368, VersionRange($2369, $2370)), ($2371, $2372, $2373, $2374, $2375, $2376, $2377, $2378, $2379, $2380, $2381, $2382, $2383, $2384, $2385, $2386, $2387, $2388, $2389, $2390, $2391, $2392, $2393, $2394, $2395, $2396, $2397, $2398, VersionRange($2399, $2400)), ($2401, $2402, $2403, $2404, $2405, $2406, $2407, $2408, $2409, $2410, $2411, $2412, $2413, $2414, $2415, $2416, $2417, $2418, $2419, $2420, $2421, $2422, $2423, $2424, $2425, $2426, $2427, $2428, VersionRange($2429, $2430)), ($2431, $2432, $2433, $2434, $2435, $2436, $2437, $2438, $2439, $2440, $2441, $2442, $2443, $2444, $2445, $2446, $2447, $2448, $2449, $2450, $2451, $2452, $2453, $2454, $2455, $2456, $2457, $2458, VersionRange($2459, $2460)), ($2461, $2462, $2463, $2464, $2465, $2466, $2467, $2468, $2469, $2470, $2471, $2472, $2473, $2474, $2475, $2476, $2477, $2478, $2479, $2480, $2481, $2482, $2483, $2484, $2485, $2486, $2487, $2488, VersionRange($2489, $2490)), ($2491, $2492, $2493, $2494, $2495, $2496, $2497, $2498, $2499, $2500, $2501, $2502, $2503, $2504, $2505, $2506, $2507, $2508, $2509, $2510, $2511, $2512, $2513, $2514, $2515, $2516, $2517, $2518, VersionRange($2519, $2520)), ($2521, $2522, $2523, $2524, $2525, $2526, $2527, $2528, $2529, $2530, $2531, $2532, $2533, $2534, $2535, $2536, $2537, $2538, $2539, $2540, $2541, $2542, $2543, $2544, $2545, $2546, $2547, $2548, VersionRange($2549, $2550)), ($2551, $2552, $2553, $2554, $2555, $2556, $2557, $2558, $2559, $2560, $2561, $2562, $2563, $2564, $2565, $2566, $2567, $2568, $2569, $2570, $2571, $2572, $2573, $2574, $2575, $2576, $2577, $2578, VersionRange($2579, $2580)), ($2581, $2582, $2583, $2584, $2585, $2586, $2587, $2588, $2589, $2590, $2591, $2592, $2593, $2594, $2595, $2596, $2597, $2598, $2599, $2600, $2601, $2602, $2603, $2604, $2605, $2606, $2607, $2608, VersionRange($2609, $2610)), ($2611, $2612, $2613, $2614, $2615, $2616, $2617, $2618, $2619, $2620, $2621, $2622, $2623, $2624, $2625, $2626, $2627, $2628, $2629, $2630, $2631, $2632, $2633, $2634, $2635, $2636, $2637, $2638, VersionRange($2639, $2640)), ($2641, $2642, $2643, $2644, $2645, $2646, $2647, $2648, $2649, $2650, $2651, $2652, $2653, $2654, $2655, $2656, $2657, $2658, $2659, $2660, $2661, $2662, $2663, $2664, $2665, $2666, $2667, $2668, VersionRange($2669, $2670)), ($2671, $2672, $2673, $2674, $2675, $2676, $2677, $2678, $2679, $2680, $2681, $2682, $2683, $2684, $2685, $2686, $2687, $2688, $2689, $2690, $2691, $2692, $2693, $2694, $2695, $2696, $2697, $2698, VersionRange($2699, $2700)), ($2701, $2702, $2703, $2704, $2705, $2706, $2707, $2708, $2709, $2710, $2711, $2712, $2713, $2714, $2715, $2716, $2717, $2718, $2719, $2720, $2721, $2722, $2723, $2724, $2725, $2726, $2727, $2728, VersionRange($2729, $2730)), ($2731, $2732, $2733, $2734, $2735, $2736, $2737, $2738, $2739, $2740, $2741, $2742, $2743, $2744, $2745, $2746, $2747, $2748, $2749, $2750, $2751, $2752, $2753, $2754, $2755, $2756, $2757, $2758, VersionRange($2759, $2760)), ($2761, $2762, $2763, $2764, $2765, $2766, $2767, $2768, $2769, $2770, $2771, $2772, $2773, $2774, $2775, $2776, $2777, $2778, $2779, $2780, $2781, $2782, $2783, $2784, $2785, $2786, $2787, $2788, VersionRange($2789, $2790)), ($2791, $2792, $2793, $2794, $2795, $2796, $2797, $2798, $2799, $2800, $2801, $2802, $2803, $2804, $2805, $2806, $2807, $2808, $2809, $2810, $2811, $2812, $2813, $2814, $2815, $2816, $2817, $2818, VersionRange($2819, $2820)), ($2821, $2822, $2823, $2824, $2825, $2826, $2827, $2828, $2829, $2830, $2831, $2832, $2833, $2834, $2835, $2836, $2837, $2838, $2839, $2840, $2841, $2842, $2843, $2844, $2845, $2846, $2847, $2848, VersionRange($2849, $2850)), ($2851, $2852, $2853, $2854, $2855, $2856, $2857, $2858, $2859, $2860, $2861, $2862, $2863, $2864, $2865, $2866, $2867, $2868, $2869, $2870, $2871, $2872, $2873, $2874, $2875, $2876, $2877, $2878, VersionRange($2879, $2880)), ($2881, $2882, $2883, $2884, $2885, $2886, $2887, $2888, $2889, $2890, $2891, $2892, $2893, $2894, $2895, $2896, $2897, $2898, $2899, $2900, $2901, $2902, $2903, $2904, $2905, $2906, $2907, $2908, VersionRange($2909, $2910)), ($2911, $2912, $2913, $2914, $2915, $2916, $2917, $2918, $2919, $2920, $2921, $2922, $2923, $2924, $2925, $2926, $2927, $2928, $2929, $2930, $2931, $2932, $2933, $2934, $2935, $2936, $2937, $2938, VersionRange($2939, $2940)), ($2941, $2942, $2943, $2944, $2945, $2946, $2947, $2948, $2949, $2950, $2951, $2952, $2953, $2954, $2955, $2956, $2957, $2958, $2959, $2960, $2961, $2962, $2963, $2964, $2965, $2966, $2967, $2968, VersionRange($2969, $2970)), ($2971, $2972, $2973, $2974, $2975, $2976, $2977, $2978, $2979, $2980, $2981, $2982, $2983, $2984, $2985, $2986, $2987, $2988, $2989, $2990, $2991, $2992, $2993, $2994, $2995, $2996, $2997, $2998, VersionRange($2999, $3000)), ($3001, $3002, $3003, $3004, $3005, $3006, $3007, $3008, $3009, $3010, $3011, $3012, $3013, $3014, $3015, $3016, $3017, $3018, $3019, $3020, $3021, $3022, $3023, $3024, $3025, $3026, $3027, $3028, VersionRange($3029, $3030)), ($3031, $3032, $3033, $3034, $3035, $3036, $3037, $3038, $3039, $3040, $3041, $3042, $3043, $3044, $3045, $3046, $3047, $3048, $3049, $3050, $3051, $3052, $3053, $3054, $3055, $3056, $3057, $3058, VersionRange($3059, $3060)), ($3061, $3062, $3063, $3064, $3065, $3066, $3067, $3068, $3069, $3070, $3071, $3072, $3073, $3074, $3075, $3076, $3077, $3078, $3079, $3080, $3081, $3082, $3083, $3084, $3085, $3086, $3087, $3088, VersionRange($3089, $3090)), ($3091, $3092, $3093, $3094, $3095, $3096, $3097, $3098, $3099, $3100, $3101, $3102, $3103, $3104, $3105, $3106, $3107, $3108, $3109, $3110, $3111, $3112, $3113, $3114, $3115, $3116, $3117, $3118, VersionRange($3119, $3120)), ($3121, $3122, $3123, $3124, $3125, $3126, $3127, $3128, $3129, $3130, $3131, $3132, $3133, $3134, $3135, $3136, $3137, $3138, $3139, $3140, $3141, $3142, $3143, $3144, $3145, $3146, $3147, $3148, VersionRange($3149, $3150)), ($3151, $3152, $3153, $3154, $3155, $3156, $3157, $3158, $3159, $3160, $3161, $3162, $3163, $3164, $3165, $3166, $3167, $3168, $3169, $3170, $3171, $3172, $3173, $3174, $3175, $3176, $3177, $3178, VersionRange($3179, $3180)), ($3181, $3182, $3183, $3184, $3185, $3186, $3187, $3188, $3189, $3190, $3191, $3192, $3193, $3194, $3195, $3196, $3197, $3198, $3199, $3200, $3201, $3202, $3203, $3204, $3205, $3206, $3207, $3208, VersionRange($3209, $3210)), ($3211, $3212, $3213, $3214, $3215, $3216, $3217, $3218, $3219, $3220, $3221, $3222, $3223, $3224, $3225, $3226, $3227, $3228, $3229, $3230, $3231, $3232, $3233, $3234, $3235, $3236, $3237, $3238, VersionRange($3239, $3240)), ($3241, $3242, $3243, $3244, $3245, $3246, $3247, $3248, $3249, $3250, $3251, $3252, $3253, $3254, $3255, $3256, $3257, $3258, $3259, $3260, $3261, $3262, $3263, $3264, $3265, $3266, $3267, $3268, VersionRange($3269, $3270)), ($3271, $3272, $3273, $3274, $3275, $3276, $3277, $3278, $3279, $3280, $3281, $3282, $3283, $3284, $3285, $3286, $3287, $3288, $3289, $3290, $3291, $3292, $3293, $3294, $3295, $3296, $3297, $3298, VersionRange($3299, $3300)), ($3301, $3302, $3303, $3304, $3305, $3306, $3307, $3308, $3309, $3310, $3311, $3312, $3313, $3314, $3315, $3316, $3317, $3318, $3319, $3320, $3321, $3322, $3323, $3324, $3325, $3326, $3327, $3328, VersionRange($3329, $3330)), ($3331, $3332, $3333, $3334, $3335, $3336, $3337, $3338, $3339, $3340, $3341, $3342, $3343, $3344, $3345, $3346, $3347, $3348, $3349, $3350, $3351, $3352, $3353, $3354, $3355, $3356, $3357, $3358, VersionRange($3359, $3360)), ($3361, $3362, $3363, $3364, $3365, $3366, $3367, $3368, $3369, $3370, $3371, $3372, $3373, $3374, $3375, $3376, $3377, $3378, $3379, $3380, $3381, $3382, $3383, $3384, $3385, $3386, $3387, $3388, VersionRange($3389, $3390)), ($3391, $3392, $3393, $3394, $3395, $3396, $3397, $3398, $3399, $3400, $3401, $3402, $3403, $3404, $3405, $3406, $3407, $3408, $3409, $3410, $3411, $3412, $3413, $3414, $3415, $3416, $3417, $3418, VersionRange($3419, $3420)), ($3421, $3422, $3423, $3424, $3425, $3426, $3427, $3428, $3429, $3430, $3431, $3432, $3433, $3434, $3435, $3436, $3437, $3438, $3439, $3440, $3441, $3442, $3443, $3444, $3445, $3446, $3447, $3448, VersionRange($3449, $3450)), ($3451, $3452, $3453, $3454, $3455, $3456, $3457, $3458, $3459, $3460, $3461, $3462, $3463, $3464, $3465, $3466, $3467, $3468, $3469, $3470, $3471, $3472, $3473, $3474, $3475, $3476, $3477, $3478, VersionRange($3479, $3480)), ($3481, $3482, $3483, $3484, $3485, $3486, $3487, $3488, $3489, $3490, $3491, $3492, $3493, $3494, $3495, $3496, $3497, $3498, $3499, $3500, $3501, $3502, $3503, $3504, $3505, $3506, $3507, $3508, VersionRange($3509, $3510)), ($3511, $3512, $3513, $3514, $3515, $3516, $3517, $3518, $3519, $3520, $3521, $3522, $3523, $3524, $3525, $3526, $3527, $3528, $3529, $3530, $3531, $3532, $3533, $3534, $3535, $3536, $3537, $3538, VersionRange($3539, $3540)), ($3541, $3542, $3543, $3544, $3545, $3546, $3547, $3548, $3549, $3550, $3551, $3552, $3553, $3554, $3555, $3556, $3557, $3558, $3559, $3560, $3561, $3562, $3563, $3564, $3565, $3566, $3567, $3568, VersionRange($3569, $3570)), ($3571, $3572, $3573, $3574, $3575, $3576, $3577, $3578, $3579, $3580, $3581, $3582, $3583, $3584, $3585, $3586, $3587, $3588, $3589, $3590, $3591, $3592, $3593, $3594, $3595, $3596, $3597, $3598, VersionRange($3599, $3600)), ($3601, $3602, $3603, $3604, $3605, $3606, $3607, $3608, $3609, $3610, $3611, $3612, $3613, $3614, $3615, $3616, $3617, $3618, $3619, $3620, $3621, $3622, $3623, $3624, $3625, $3626, $3627, $3628, VersionRange($3629, $3630)), ($3631, $3632, $3633, $3634, $3635, $3636, $3637, $3638, $3639, $3640, $3641, $3642, $3643, $3644, $3645, $3646, $3647, $3648, $3649, $3650, $3651, $3652, $3653, $3654, $3655, $3656, $3657, $3658, VersionRange($3659, $3660)), ($3661, $3662, $3663, $3664, $3665, $3666, $3667, $3668, $3669, $3670, $3671, $3672, $3673, $3674, $3675, $3676, $3677, $3678, $3679, $3680, $3681, $3682, $3683, $3684, $3685, $3686, $3687, $3688, VersionRange($3689, $3690)), ($3691, $3692, $3693, $3694, $3695, $3696, $3697, $3698, $3699, $3700, $3701, $3702, $3703, $3704, $3705, $3706, $3707, $3708, $3709, $3710, $3711, $3712, $3713, $3714, $3715, $3716, $3717, $3718, VersionRange($3719, $3720)), ($3721, $3722, $3723, $3724, $3725, $3726, $3727, $3728, $3729, $3730, $3731, $3732, $3733, $3734, $3735, $3736, $3737, $3738, $3739, $3740, $3741, $3742, $3743, $3744, $3745, $3746, $3747, $3748, VersionRange($3749, $3750)), ($3751, $3752, $3753, $3754, $3755, $3756, $3757, $3758, $3759, $3760, $3761, $3762, $3763, $3764, $3765, $3766, $3767, $3768, $3769, $3770, $3771, $3772, $3773, $3774, $3775, $3776, $3777, $3778, VersionRange($3779, $3780)), ($3781, $3782, $3783, $3784, $3785, $3786, $3787, $3788, $3789, $3790, $3791, $3792, $3793, $3794, $3795, $3796, $3797, $3798, $3799, $3800, $3801, $3802, $3803, $3804, $3805, $3806, $3807, $3808, VersionRange($3809, $3810)), ($3811, $3812, $3813, $3814, $3815, $3816, $3817, $3818, $3819, $3820, $3821, $3822, $3823, $3824, $3825, $3826, $3827, $3828, $3829, $3830, $3831, $3832, $3833, $3834, $3835, $3836, $3837, $3838, VersionRange($3839, $3840)), ($3841, $3842, $3843, $3844, $3845, $3846, $3847, $3848, $3849, $3850, $3851, $3852, $3853, $3854, $3855, $3856, $3857, $3858, $3859, $3860, $3861, $3862, $3863, $3864, $3865, $3866, $3867, $3868, VersionRange($3869, $3870)), ($3871, $3872, $3873, $3874, $3875, $3876, $3877, $3878, $3879, $3880, $3881, $3882, $3883, $3884, $3885, $3886, $3887, $3888, $3889, $3890, $3891, $3892, $3893, $3894, $3895, $3896, $3897, $3898, VersionRange($3899, $3900)), ($3901, $3902, $3903, $3904, $3905, $3906, $3907, $3908, $3909, $3910, $3911, $3912, $3913, $3914, $3915, $3916, $3917, $3918, $3919, $3920, $3921, $3922, $3923, $3924, $3925, $3926, $3927, $3928, VersionRange($3929, $3930)), ($3931, $3932, $3933, $3934, $3935, $3936, $3937, $3938, $3939, $3940, $3941, $3942, $3943, $3944, $3945, $3946, $3947, $3948, $3949, $3950, $3951, $3952, $3953, $3954, $3955, $3956, $3957, $3958, VersionRange($3959, $3960)), ($3961, $3962, $3963, $3964, $3965, $3966, $3967, $3968, $3969, $3970, $3971, $3972, $3973, $3974, $3975, $3976, $3977, $3978, $3979, $3980, $3981, $3982, $3983, $3984, $3985, $3986, $3987, $3988, VersionRange($3989, $3990)), ($3991, $3992, $3993, $3994, $3995, $3996, $3997, $3998, $3999, $4000, $4001, $4002, $4003, $4004, $4005, $4006, $4007, $4008, $4009, $4010, $4011, $4012, $4013, $4014, $4015, $4016, $4017, $4018, VersionRange($4019, $4020)), ($4021, $4022, $4023, $4024, $4025, $4026, $4027, $4028, $4029, $4030, $4031, $4032, $4033, $4034, $4035, $4036, $4037, $4038, $4039, $4040, $4041, $4042, $4043, $4044, $4045, $4046, $4047, $4048, VersionRange($4049, $4050)), ($4051, $4052, $4053, $4054, $4055, $4056, $4057, $4058, $4059, $4060, $4061, $4062, $4063, $4064, $4065, $4066, $4067, $4068, $4069, $4070, $4071, $4072, $4073, $4074, $4075, $4076, $4077, $4078, VersionRange($4079, $4080)), ($4081, $4082, $4083, $4084, $4085, $4086, $4087, $4088, $4089, $4090, $4091, $4092, $4093, $4094, $4095, $4096, $4097, $4098, $4099, $4100, $4101, $4102, $4103, $4104, $4105, $4106, $4107, $4108, VersionRange($4109, $4110)), ($4111, $4112, $4113, $4114, $4115, $4116, $4117, $4118, $4119, $4120, $4121, $4122, $4123, $4124, $4125, $4126, $4127, $4128, $4129, $4130, $4131, $4132, $4133, $4134, $4135, $4136, $4137, $4138, VersionRange($4139, $4140)), ($4141, $4142, $4143, $4144, $4145, $4146, $4147, $4148, $4149, $4150, $4151, $4152, $4153, $4154, $4155, $4156, $4157, $4158, $4159, $4160, $4161, $4162, $4163, $4164, $4165, $4166, $4167, $4168, VersionRange($4169, $4170)), ($4171, $4172, $4173, $4174, $4175, $4176, $4177, $4178, $4179, $4180, $4181, $4182, $4183, $4184, $4185, $4186, $4187, $4188, $4189, $4190, $4191, $4192, $4193, $4194, $4195, $4196, $4197, $4198, VersionRange($4199, $4200)), ($4201, $4202, $4203, $4204, $4205, $4206, $4207, $4208, $4209, $4210, $4211, $4212, $4213, $4214, $4215, $4216, $4217, $4218, $4219, $4220, $4221, $4222, $4223, $4224, $4225, $4226, $4227, $4228, VersionRange($4229, $4230)), ($4231, $4232, $4233, $4234, $4235, $4236, $4237, $4238, $4239, $4240, $4241, $4242, $4243, $4244, $4245, $4246, $4247, $4248, $4249, $4250, $4251, $4252, $4253, $4254, $4255, $4256, $4257, $4258, VersionRange($4259, $4260)), ($4261, $4262, $4263, $4264, $4265, $4266, $4267, $4268, $4269, $4270, $4271, $4272, $4273, $4274, $4275, $4276, $4277, $4278, $4279, $4280, $4281, $4282, $4283, $4284, $4285, $4286, $4287, $4288, VersionRange($4289, $4290)), ($4291, $4292, $4293, $4294, $4295, $4296, $4297, $4298, $4299, $4300, $4301, $4302, $4303, $4304, $4305, $4306, $4307, $4308, $4309, $4310, $4311, $4312, $4313, $4314, $4315, $4316, $4317, $4318, VersionRange($4319, $4320)), ($4321, $4322, $4323, $4324, $4325, $4326, $4327, $4328, $4329, $4330, $4331, $4332, $4333, $4334, $4335, $4336, $4337, $4338, $4339, $4340, $4341, $4342, $4343, $4344, $4345, $4346, $4347, $4348, VersionRange($4349, $4350)), ($4351, $4352, $4353, $4354, $4355, $4356, $4357, $4358, $4359, $4360, $4361, $4362, $4363, $4364, $4365, $4366, $4367, $4368, $4369, $4370, $4371, $4372, $4373, $4374, $4375, $4376, $4377, $4378, VersionRange($4379, $4380)), ($4381, $4382, $4383, $4384, $4385, $4386, $4387, $4388, $4389, $4390, $4391, $4392, $4393, $4394, $4395, $4396, $4397, $4398, $4399, $4400, $4401, $4402, $4403, $4404, $4405, $4406, $4407, $4408, VersionRange($4409, $4410)), ($4411, $4412, $4413, $4414, $4415, $4416, $4417, $4418, $4419, $4420, $4421, $4422, $4423, $4424, $4425, $4426, $4427, $4428, $4429, $4430, $4431, $4432, $4433, $4434, $4435, $4436, $4437, $4438, VersionRange($4439, $4440)), ($4441, $4442, $4443, $4444, $4445, $4446, $4447, $4448, $4449, $4450, $4451, $4452, $4453, $4454, $4455, $4456, $4457, $4458, $4459, $4460, $4461, $4462, $4463, $4464, $4465, $4466, $4467, $4468, VersionRange($4469, $4470)), ($4471, $4472, $4473, $4474, $4475, $4476, $4477, $4478, $4479, $4480, $4481, $4482, $4483, $4484, $4485, $4486, $4487, $4488, $4489, $4490, $4491, $4492, $4493, $4494, $4495, $4496, $4497, $4498, VersionRange($4499, $4500)), ($4501, $4502, $4503, $4504, $4505, $4506, $4507, $4508, $4509, $4510, $4511, $4512, $4513, $4514, $4515, $4516, $4517, $4518, $4519, $4520, $4521, $4522, $4523, $4524, $4525, $4526, $4527, $4528, VersionRange($4529, $4530)), ($4531, $4532, $4533, $4534, $4535, $4536, $4537, $4538, $4539, $4540, $4541, $4542, $4543, $4544, $4545, $4546, $4547, $4548, $4549, $4550, $4551, $4552, $4553, $4554, $4555, $4556, $4557, $4558, VersionRange($4559, $4560)), ($4561, $4562, $4563, $4564, $4565, $4566, $4567, $4568, $4569, $4570, $4571, $4572, $4573, $4574, $4575, $4576, $4577, $4578, $4579, $4580, $4581, $4582, $4583, $4584, $4585, $4586, $4587, $4588, VersionRange($4589, $4590)), ($4591, $4592, $4593, $4594, $4595, $4596, $4597, $4598, $4599, $4600, $4601, $4602, $4603, $4604, $4605, $4606, $4607, $4608, $4609, $4610, $4611, $4612, $4613, $4614, $4615, $4616, $4617, $4618, VersionRange($4619, $4620)), ($4621, $4622, $4623, $4624, $4625, $4626, $4627, $4628, $4629, $4630, $4631, $4632, $4633, $4634, $4635, $4636, $4637, $4638, $4639, $4640, $4641, $4642, $4643, $4644, $4645, $4646, $4647, $4648, VersionRange($4649, $4650)), ($4651, $4652, $4653, $4654, $4655, $4656, $4657, $4658, $4659, $4660, $4661, $4662, $4663, $4664, $4665, $4666, $4667, $4668, $4669, $4670, $4671, $4672, $4673, $4674, $4675, $4676, $4677, $4678, VersionRange($4679, $4680)), ($4681, $4682, $4683, $4684, $4685, $4686, $4687, $4688, $4689, $4690, $4691, $4692, $4693, $4694, $4695, $4696, $4697, $4698, $4699, $4700, $4701, $4702, $4703, $4704, $4705, $4706, $4707, $4708, VersionRange($4709, $4710)), ($4711, $4712, $4713, $4714, $4715, $4716, $4717, $4718, $4719, $4720, $4721, $4722, $4723, $4724, $4725, $4726, $4727, $4728, $4729, $4730, $4731, $4732, $4733, $4734, $4735, $4736, $4737, $4738, VersionRange($4739, $4740)), ($4741, $4742, $4743, $4744, $4745, $4746, $4747, $4748, $4749, $4750, $4751, $4752, $4753, $4754, $4755, $4756, $4757, $4758, $4759, $4760, $4761, $4762, $4763, $4764, $4765, $4766, $4767, $4768, VersionRange($4769, $4770)), ($4771, $4772, $4773, $4774, $4775, $4776, $4777, $4778, $4779, $4780, $4781, $4782, $4783, $4784, $4785, $4786, $4787, $4788, $4789, $4790, $4791, $4792, $4793, $4794, $4795, $4796, $4797, $4798, VersionRange($4799, $4800)), ($4801, $4802, $4803, $4804, $4805, $4806, $4807, $4808, $4809, $4810, $4811, $4812, $4813, $4814, $4815, $4816, $4817, $4818, $4819, $4820, $4821, $4822, $4823, $4824, $4825, $4826, $4827, $4828, VersionRange($4829, $4830)), ($4831, $4832, $4833, $4834, $4835, $4836, $4837, $4838, $4839, $4840, $4841, $4842, $4843, $4844, $4845, $4846, $4847, $4848, $4849, $4850, $4851, $4852, $4853, $4854, $4855, $4856, $4857, $4858, VersionRange($4859, $4860)), ($4861, $4862, $4863, $4864, $4865, $4866, $4867, $4868, $4869, $4870, $4871, $4872, $4873, $4874, $4875, $4876, $4877, $4878, $4879, $4880, $4881, $4882, $4883, $4884, $4885, $4886, $4887, $4888, VersionRange($4889, $4890)), ($4891, $4892, $4893, $4894, $4895, $4896, $4897, $4898, $4899, $4900, $4901, $4902, $4903, $4904, $4905, $4906, $4907, $4908, $4909, $4910, $4911, $4912, $4913, $4914, $4915, $4916, $4917, $4918, VersionRange($4919, $4920)), ($4921, $4922, $4923, $4924, $4925, $4926, $4927, $4928, $4929, $4930, $4931, $4932, $4933, $4934, $4935, $4936, $4937, $4938, $4939, $4940, $4941, $4942, $4943, $4944, $4945, $4946, $4947, $4948, VersionRange($4949, $4950)), ($4951, $4952, $4953, $4954, $4955, $4956, $4957, $4958, $4959, $4960, $4961, $4962, $4963, $4964, $4965, $4966, $4967, $4968, $4969, $4970, $4971, $4972, $4973, $4974, $4975, $4976, $4977, $4978, VersionRange($4979, $4980)), ($4981, $4982, $4983, $4984, $4985, $4986, $4987, $4988, $4989, $4990, $4991, $4992, $4993, $4994, $4995, $4996, $4997, $4998, $4999, $5000, $5001, $5002, $5003, $5004, $5005, $5006, $5007, $5008, VersionRange($5009, $5010)), ($5011, $5012, $5013, $5014, $5015, $5016, $5017, $5018, $5019, $5020, $5021, $5022, $5023, $5024, $5025, $5026, $5027, $5028, $5029, $5030, $5031, $5032, $5033, $5034, $5035, $5036, $5037, $5038, VersionRange($5039, $5040)), ($5041, $5042, $5043, $5044, $5045, $5046, $5047, $5048, $5049, $5050, $5051, $5052, $5053, $5054, $5055, $5056, $5057, $5058, $5059, $5060, $5061, $5062, $5063, $5064, $5065, $5066, $5067, $5068, VersionRange($5069, $5070)), ($5071, $5072, $5073, $5074, $5075, $5076, $5077, $5078, $5079, $5080, $5081, $5082, $5083, $5084, $5085, $5086, $5087, $5088, $5089, $5090, $5091, $5092, $5093, $5094, $5095, $5096, $5097, $5098, VersionRange($5099, $5100)), ($5101, $5102, $5103, $5104, $5105, $5106, $5107, $5108, $5109, $5110, $5111, $5112, $5113, $5114, $5115, $5116, $5117, $5118, $5119, $5120, $5121, $5122, $5123, $5124, $5125, $5126, $5127, $5128, VersionRange($5129, $5130)), ($5131, $5132, $5133, $5134, $5135, $5136, $5137, $5138, $5139, $5140, $5141, $5142, $5143, $5144, $5145, $5146, $5147, $5148, $5149, $5150, $5151, $5152, $5153, $5154, $5155, $5156, $5157, $5158, VersionRange($5159, $5160)), ($5161, $5162, $5163, $5164, $5165, $5166, $5167, $5168, $5169, $5170, $5171, $5172, $5173, $5174, $5175, $5176, $5177, $5178, $5179, $5180, $5181, $5182, $5183, $5184, $5185, $5186, $5187, $5188, VersionRange($5189, $5190)), ($5191, $5192, $5193, $5194, $5195, $5196, $5197, $5198, $5199, $5200, $5201, $5202, $5203, $5204, $5205, $5206, $5207, $5208, $5209, $5210, $5211, $5212, $5213, $5214, $5215, $5216, $5217, $5218, VersionRange($5219, $5220)), ($5221, $5222, $5223, $5224, $5225, $5226, $5227, $5228, $5229, $5230, $5231, $5232, $5233, $5234, $5235, $5236, $5237, $5238, $5239, $5240, $5241, $5242, $5243, $5244, $5245, $5246, $5247, $5248, VersionRange($5249, $5250)), ($5251, $5252, $5253, $5254, $5255, $5256, $5257, $5258, $5259, $5260, $5261, $5262, $5263, $5264, $5265, $5266, $5267, $5268, $5269, $5270, $5271, $5272, $5273, $5274, $5275, $5276, $5277, $5278, VersionRange($5279, $5280)), ($5281, $5282, $5283, $5284, $5285, $5286, $5287, $5288, $5289, $5290, $5291, $5292, $5293, $5294, $5295, $5296, $5297, $5298, $5299, $5300, $5301, $5302, $5303, $5304, $5305, $5306, $5307, $5308, VersionRange($5309, $5310)), ($5311, $5312, $5313, $5314, $5315, $5316, $5317, $5318, $5319, $5320, $5321, $5322, $5323, $5324, $5325, $5326, $5327, $5328, $5329, $5330, $5331, $5332, $5333, $5334, $5335, $5336, $5337, $5338, VersionRange($5339, $5340)), ($5341, $5342, $5343, $5344, $5345, $5346, $5347, $5348, $5349, $5350, $5351, $5352, $5353, $5354, $5355, $5356, $5357, $5358, $5359, $5360, $5361, $5362, $5363, $5364, $5365, $5366, $5367, $5368, VersionRange($5369, $5370)), ($5371, $5372, $5373, $5374, $5375, $5376, $5377, $5378, $5379, $5380, $5381, $5382, $5383, $5384, $5385, $5386, $5387, $5388, $5389, $5390, $5391, $5392, $5393, $5394, $5395, $5396, $5397, $5398, VersionRange($5399, $5400)), ($5401, $5402, $5403, $5404, $5405, $5406, $5407, $5408, $5409, $5410, $5411, $5412, $5413, $5414, $5415, $5416, $5417, $5418, $5419, $5420, $5421, $5422, $5423, $5424, $5425, $5426, $5427, $5428, VersionRange($5429, $5430)), ($5431, $5432, $5433, $5434, $5435, $5436, $5437, $5438, $5439, $5440, $5441, $5442, $5443, $5444, $5445, $5446, $5447, $5448, $5449, $5450, $5451, $5452, $5453, $5454, $5455, $5456, $5457, $5458, VersionRange($5459, $5460)), ($5461, $5462, $5463, $5464, $5465, $5466, $5467, $5468, $5469, $5470, $5471, $5472, $5473, $5474, $5475, $5476, $5477, $5478, $5479, $5480, $5481, $5482, $5483, $5484, $5485, $5486, $5487, $5488, VersionRange($5489, $5490)), ($5491, $5492, $5493, $5494, $5495, $5496, $5497, $5498, $5499, $5500, $5501, $5502, $5503, $5504, $5505, $5506, $5507, $5508, $5509, $5510, $5511, $5512, $5513, $5514, $5515, $5516, $5517, $5518, VersionRange($5519, $5520)), ($5521, $5522, $5523, $5524, $5525, $5526, $5527, $5528, $5529, $5530, $5531, $5532, $5533, $5534, $5535, $5536, $5537, $5538, $5539, $5540, $5541, $5542, $5543, $5544, $5545, $5546, $5547, $5548, VersionRange($5549, $5550)), ($5551, $5552, $5553, $5554, $5555, $5556, $5557, $5558, $5559, $5560, $5561, $5562, $5563, $5564, $5565, $5566, $5567, $5568, $5569, $5570, $5571, $5572, $5573, $5574, $5575, $5576, $5577, $5578, VersionRange($5579, $5580)), ($5581, $5582, $5583, $5584, $5585, $5586, $5587, $5588, $5589, $5590, $5591, $5592, $5593, $5594, $5595, $5596, $5597, $5598, $5599, $5600, $5601, $5602, $5603, $5604, $5605, $5606, $5607, $5608, VersionRange($5609, $5610)), ($5611, $5612, $5613, $5614, $5615, $5616, $5617, $5618, $5619, $5620, $5621, $5622, $5623, $5624, $5625, $5626, $5627, $5628, $5629, $5630, $5631, $5632, $5633, $5634, $5635, $5636, $5637, $5638, VersionRange($5639, $5640)), ($5641, $5642, $5643, $5644, $5645, $5646, $5647, $5648, $5649, $5650, $5651, $5652, $5653, $5654, $5655, $5656, $5657, $5658, $5659, $5660, $5661, $5662, $5663, $5664, $5665, $5666, $5667, $5668, VersionRange($5669, $5670)), ($5671, $5672, $5673, $5674, $5675, $5676, $5677, $5678, $5679, $5680, $5681, $5682, $5683, $5684, $5685, $5686, $5687, $5688, $5689, $5690, $5691, $5692, $5693, $5694, $5695, $5696, $5697, $5698, VersionRange($5699, $5700)), ($5701, $5702, $5703, $5704, $5705, $5706, $5707, $5708, $5709, $5710, $5711, $5712, $5713, $5714, $5715, $5716, $5717, $5718, $5719, $5720, $5721, $5722, $5723, $5724, $5725, $5726, $5727, $5728, VersionRange($5729, $5730)), ($5731, $5732, $5733, $5734, $5735, $5736, $5737, $5738, $5739, $5740, $5741, $5742, $5743, $5744, $5745, $5746, $5747, $5748, $5749, $5750, $5751, $5752, $5753, $5754, $5755, $5756, $5757, $5758, VersionRange($5759, $5760)), ($5761, $5762, $5763, $5764, $5765, $5766, $5767, $5768, $5769, $5770, $5771, $5772, $5773, $5774, $5775, $5776, $5777, $5778, $5779, $5780, $5781, $5782, $5783, $5784, $5785, $5786, $5787, $5788, VersionRange($5789, $5790)), ($5791, $5792, $5793, $5794, $5795, $5796, $5797, $5798, $5799, $5800, $5801, $5802, $5803, $5804, $5805, $5806, $5807, $5808, $5809, $5810, $5811, $5812, $5813, $5814, $5815, $5816, $5817, $5818, VersionRange($5819, $5820)), ($5821, $5822, $5823, $5824, $5825, $5826, $5827, $5828, $5829, $5830, $5831, $5832, $5833, $5834, $5835, $5836, $5837, $5838, $5839, $5840, $5841, $5842, $5843, $5844, $5845, $5846, $5847, $5848, VersionRange($5849, $5850)), ($5851, $5852, $5853, $5854, $5855, $5856, $5857, $5858, $5859, $5860, $5861, $5862, $5863, $5864, $5865, $5866, $5867, $5868, $5869, $5870, $5871, $5872, $5873, $5874, $5875, $5876, $5877, $5878, VersionRange($5879, $5880)), ($5881, $5882, $5883, $5884, $5885, $5886, $5887, $5888, $5889, $5890, $5891, $5892, $5893, $5894, $5895, $5896, $5897, $5898, $5899, $5900, $5901, $5902, $5903, $5904, $5905, $5906, $5907, $5908, VersionRange($5909, $5910)), ($5911, $5912, $5913, $5914, $5915, $5916, $5917, $5918, $5919, $5920, $5921, $5922, $5923, $5924, $5925, $5926, $5927, $5928, $5929, $5930, $5931, $5932, $5933, $5934, $5935, $5936, $5937, $5938, VersionRange($5939, $5940)), ($5941, $5942, $5943, $5944, $5945, $5946, $5947, $5948, $5949, $5950, $5951, $5952, $5953, $5954, $5955, $5956, $5957, $5958, $5959, $5960, $5961, $5962, $5963, $5964, $5965, $5966, $5967, $5968, VersionRange($5969, $5970)), ($5971, $5972, $5973, $5974, $5975, $5976, $5977, $5978, $5979, $5980, $5981, $5982, $5983, $5984, $5985, $5986, $5987, $5988, $5989, $5990, $5991, $5992, $5993, $5994, $5995, $5996, $5997, $5998, VersionRange($5999, $6000)), ($6001, $6002, $6003, $6004, $6005, $6006, $6007, $6008, $6009, $6010, $6011, $6012, $6013, $6014, $6015, $6016, $6017, $6018, $6019, $6020, $6021, $6022, $6023, $6024, $6025, $6026, $6027, $6028, VersionRange($6029, $6030)), ($6031, $6032, $6033, $6034, $6035, $6036, $6037, $6038, $6039, $6040, $6041, $6042, $6043, $6044, $6045, $6046, $6047, $6048, $6049, $6050, $6051, $6052, $6053, $6054, $6055, $6056, $6057, $6058, VersionRange($6059, $6060)), ($6061, $6062, $6063, $6064, $6065, $6066, $6067, $6068, $6069, $6070, $6071, $6072, $6073, $6074, $6075, $6076, $6077, $6078, $6079, $6080, $6081, $6082, $6083, $6084, $6085, $6086, $6087, $6088, VersionRange($6089, $6090)), ($6091, $6092, $6093, $6094, $6095, $6096, $6097, $6098, $6099, $6100, $6101, $6102, $6103, $6104, $6105, $6106, $6107, $6108, $6109, $6110, $6111, $6112, $6113, $6114, $6115, $6116, $6117, $6118, VersionRange($6119, $6120)), ($6121, $6122, $6123, $6124, $6125, $6126, $6127, $6128, $6129, $6130, $6131, $6132, $6133, $6134, $6135, $6136, $6137, $6138, $6139, $6140, $6141, $6142, $6143, $6144, $6145, $6146, $6147, $6148, VersionRange($6149, $6150)), ($6151, $6152, $6153, $6154, $6155, $6156, $6157, $6158, $6159, $6160, $6161, $6162, $6163, $6164, $6165, $6166, $6167, $6168, $6169, $6170, $6171, $6172, $6173, $6174, $6175, $6176, $6177, $6178, VersionRange($6179, $6180)), ($6181, $6182, $6183, $6184, $6185, $6186, $6187, $6188, $6189, $6190, $6191, $6192, $6193, $6194, $6195, $6196, $6197, $6198, $6199, $6200, $6201, $6202, $6203, $6204, $6205, $6206, $6207, $6208, VersionRange($6209, $6210)), ($6211, $6212, $6213, $6214, $6215, $6216, $6217, $6218, $6219, $6220, $6221, $6222, $6223, $6224, $6225, $6226, $6227, $6228, $6229, $6230, $6231, $6232, $6233, $6234, $6235, $6236, $6237, $6238, VersionRange($6239, $6240)), ($6241, $6242, $6243, $6244, $6245, $6246, $6247, $6248, $6249, $6250, $6251, $6252, $6253, $6254, $6255, $6256, $6257, $6258, $6259, $6260, $6261, $6262, $6263, $6264, $6265, $6266, $6267, $6268, VersionRange($6269, $6270)), ($6271, $6272, $6273, $6274, $6275, $6276, $6277, $6278, $6279, $6280, $6281, $6282, $6283, $6284, $6285, $6286, $6287, $6288, $6289, $6290, $6291, $6292, $6293, $6294, $6295, $6296, $6297, $6298, VersionRange($6299, $6300)), ($6301, $6302, $6303, $6304, $6305, $6306, $6307, $6308, $6309, $6310, $6311, $6312, $6313, $6314, $6315, $6316, $6317, $6318, $6319, $6320, $6321, $6322, $6323, $6324, $6325, $6326, $6327, $6328, VersionRange($6329, $6330)), ($6331, $6332, $6333, $6334, $6335, $6336, $6337, $6338, $6339, $6340, $6341, $6342, $6343, $6344, $6345, $6346, $6347, $6348, $6349, $6350, $6351, $6352, $6353, $6354, $6355, $6356, $6357, $6358, VersionRange($6359, $6360)), ($6361, $6362, $6363, $6364, $6365, $6366, $6367, $6368, $6369, $6370, $6371, $6372, $6373, $6374, $6375, $6376, $6377, $6378, $6379, $6380, $6381, $6382, $6383, $6384, $6385, $6386, $6387, $6388, VersionRange($6389, $6390)), ($6391, $6392, $6393, $6394, $6395, $6396, $6397, $6398, $6399, $6400, $6401, $6402, $6403, $6404, $6405, $6406, $6407, $6408, $6409, $6410, $6411, $6412, $6413, $6414, $6415, $6416, $6417, $6418, VersionRange($6419, $6420)), ($6421, $6422, $6423, $6424, $6425, $6426, $6427, $6428, $6429, $6430, $6431, $6432, $6433, $6434, $6435, $6436, $6437, $6438, $6439, $6440, $6441, $6442, $6443, $6444, $6445, $6446, $6447, $6448, VersionRange($6449, $6450)), ($6451, $6452, $6453, $6454, $6455, $6456, $6457, $6458, $6459, $6460, $6461, $6462, $6463, $6464, $6465, $6466, $6467, $6468, $6469, $6470, $6471, $6472, $6473, $6474, $6475, $6476, $6477, $6478, VersionRange($6479, $6480)), ($6481, $6482, $6483, $6484, $6485, $6486, $6487, $6488, $6489, $6490, $6491, $6492, $6493, $6494, $6495, $6496, $6497, $6498, $6499, $6500, $6501, $6502, $6503, $6504, $6505, $6506, $6507, $6508, VersionRange($6509, $6510)), ($6511, $6512, $6513, $6514, $6515, $6516, $6517, $6518, $6519, $6520, $6521, $6522, $6523, $6524, $6525, $6526, $6527, $6528, $6529, $6530, $6531, $6532, $6533, $6534, $6535, $6536, $6537, $6538, VersionRange($6539, $6540)), ($6541, $6542, $6543, $6544, $6545, $6546, $6547, $6548, $6549, $6550, $6551, $6552, $6553, $6554, $6555, $6556, $6557, $6558, $6559, $6560, $6561, $6562, $6563, $6564, $6565, $6566, $6567, $6568, VersionRange($6569, $6570)), ($6571, $6572, $6573, $6574, $6575, $6576, $6577, $6578, $6579, $6580, $6581, $6582, $6583, $6584, $6585, $6586, $6587, $6588, $6589, $6590, $6591, $6592, $6593, $6594, $6595, $6596, $6597, $6598, VersionRange($6599, $6600)), ($6601, $6602, $6603, $6604, $6605, $6606, $6607, $6608, $6609, $6610, $6611, $6612, $6613, $6614, $6615, $6616, $6617, $6618, $6619, $6620, $6621, $6622, $6623, $6624, $6625, $6626, $6627, $6628, VersionRange($6629, $6630)), ($6631, $6632, $6633, $6634, $6635, $6636, $6637, $6638, $6639, $6640, $6641, $6642, $6643, $6644, $6645, $6646, $6647, $6648, $6649, $6650, $6651, $6652, $6653, $6654, $6655, $6656, $6657, $6658, VersionRange($6659, $6660)), ($6661, $6662, $6663, $6664, $6665, $6666, $6667, $6668, $6669, $6670, $6671, $6672, $6673, $6674, $6675, $6676, $6677, $6678, $6679, $6680, $6681, $6682, $6683, $6684, $6685, $6686, $6687, $6688, VersionRange($6689, $6690)), ($6691, $6692, $6693, $6694, $6695, $6696, $6697, $6698, $6699, $6700, $6701, $6702, $6703, $6704, $6705, $6706, $6707, $6708, $6709, $6710, $6711, $6712, $6713, $6714, $6715, $6716, $6717, $6718, VersionRange($6719, $6720)), ($6721, $6722, $6723, $6724, $6725, $6726, $6727, $6728, $6729, $6730, $6731, $6732, $6733, $6734, $6735, $6736, $6737, $6738, $6739, $6740, $6741, $6742, $6743, $6744, $6745, $6746, $6747, $6748, VersionRange($6749, $6750)), ($6751, $6752, $6753, $6754, $6755, $6756, $6757, $6758, $6759, $6760, $6761, $6762, $6763, $6764, $6765, $6766, $6767, $6768, $6769, $6770, $6771, $6772, $6773, $6774, $6775, $6776, $6777, $6778, VersionRange($6779, $6780)), ($6781, $6782, $6783, $6784, $6785, $6786, $6787, $6788, $6789, $6790, $6791, $6792, $6793, $6794, $6795, $6796, $6797, $6798, $6799, $6800, $6801, $6802, $6803, $6804, $6805, $6806, $6807, $6808, VersionRange($6809, $6810)), ($6811, $6812, $6813, $6814, $6815, $6816, $6817, $6818, $6819, $6820, $6821, $6822, $6823, $6824, $6825, $6826, $6827, $6828, $6829, $6830, $6831, $6832, $6833, $6834, $6835, $6836, $6837, $6838, VersionRange($6839, $6840)), ($6841, $6842, $6843, $6844, $6845, $6846, $6847, $6848, $6849, $6850, $6851, $6852, $6853, $6854, $6855, $6856, $6857, $6858, $6859, $6860, $6861, $6862, $6863, $6864, $6865, $6866, $6867, $6868, VersionRange($6869, $6870)), ($6871, $6872, $6873, $6874, $6875, $6876, $6877, $6878, $6879, $6880, $6881, $6882, $6883, $6884, $6885, $6886, $6887, $6888, $6889, $6890, $6891, $6892, $6893, $6894, $6895, $6896, $6897, $6898, VersionRange($6899, $6900)), ($6901, $6902, $6903, $6904, $6905, $6906, $6907, $6908, $6909, $6910, $6911, $6912, $6913, $6914, $6915, $6916, $6917, $6918, $6919, $6920, $6921, $6922, $6923, $6924, $6925, $6926, $6927, $6928, VersionRange($6929, $6930)), ($6931, $6932, $6933, $6934, $6935, $6936, $6937, $6938, $6939, $6940, $6941, $6942, $6943, $6944, $6945, $6946, $6947, $6948, $6949, $6950, $6951, $6952, $6953, $6954, $6955, $6956, $6957, $6958, VersionRange($6959, $6960)), ($6961, $6962, $6963, $6964, $6965, $6966, $6967, $6968, $6969, $6970, $6971, $6972, $6973, $6974, $6975, $6976, $6977, $6978, $6979, $6980, $6981, $6982, $6983, $6984, $6985, $6986, $6987, $6988, VersionRange($6989, $6990)), ($6991, $6992, $6993, $6994, $6995, $6996, $6997, $6998, $6999, $7000, $7001, $7002, $7003, $7004, $7005, $7006, $7007, $7008, $7009, $7010, $7011, $7012, $7013, $7014, $7015, $7016, $7017, $7018, VersionRange($7019, $7020)), ($7021, $7022, $7023, $7024, $7025, $7026, $7027, $7028, $7029, $7030, $7031, $7032, $7033, $7034, $7035, $7036, $7037, $7038, $7039, $7040, $7041, $7042, $7043, $7044, $7045, $7046, $7047, $7048, VersionRange($7049, $7050)), ($7051, $7052, $7053, $7054, $7055, $7056, $7057, $7058, $7059, $7060, $7061, $7062, $7063, $7064, $7065, $7066, $7067, $7068, $7069, $7070, $7071, $7072, $7073, $7074, $7075, $7076, $7077, $7078, VersionRange($7079, $7080)), ($7081, $7082, $7083, $7084, $7085, $7086, $7087, $7088, $7089, $7090, $7091, $7092, $7093, $7094, $7095, $7096, $7097, $7098, $7099, $7100, $7101, $7102, $7103, $7104, $7105, $7106, $7107, $7108, VersionRange($7109, $7110)), ($7111, $7112, $7113, $7114, $7115, $7116, $7117, $7118, $7119, $7120, $7121, $7122, $7123, $7124, $7125, $7126, $7127, $7128, $7129, $7130, $7131, $7132, $7133, $7134, $7135, $7136, $7137, $7138, VersionRange($7139, $7140)), ($7141, $7142, $7143, $7144, $7145, $7146, $7147, $7148, $7149, $7150, $7151, $7152, $7153, $7154, $7155, $7156, $7157, $7158, $7159, $7160, $7161, $7162, $7163, $7164, $7165, $7166, $7167, $7168, VersionRange($7169, $7170)), ($7171, $7172, $7173, $7174, $7175, $7176, $7177, $7178, $7179, $7180, $7181, $7182, $7183, $7184, $7185, $7186, $7187, $7188, $7189, $7190, $7191, $7192, $7193, $7194, $7195, $7196, $7197, $7198, VersionRange($7199, $7200)), ($7201, $7202, $7203, $7204, $7205, $7206, $7207, $7208, $7209, $7210, $7211, $7212, $7213, $7214, $7215, $7216, $7217, $7218, $7219, $7220, $7221, $7222, $7223, $7224, $7225, $7226, $7227, $7228, VersionRange($7229, $7230)), ($7231, $7232, $7233, $7234, $7235, $7236, $7237, $7238, $7239, $7240, $7241, $7242, $7243, $7244, $7245, $7246, $7247, $7248, $7249, $7250, $7251, $7252, $7253, $7254, $7255, $7256, $7257, $7258, VersionRange($7259, $7260)), ($7261, $7262, $7263, $7264, $7265, $7266, $7267, $7268, $7269, $7270, $7271, $7272, $7273, $7274, $7275, $7276, $7277, $7278, $7279, $7280, $7281, $7282, $7283, $7284, $7285, $7286, $7287, $7288, VersionRange($7289, $7290)), ($7291, $7292, $7293, $7294, $7295, $7296, $7297, $7298, $7299, $7300, $7301, $7302, $7303, $7304, $7305, $7306, $7307, $7308, $7309, $7310, $7311, $7312, $7313, $7314, $7315, $7316, $7317, $7318, VersionRange($7319, $7320)), ($7321, $7322, $7323, $7324, $7325, $7326, $7327, $7328, $7329, $7330, $7331, $7332, $7333, $7334, $7335, $7336, $7337, $7338, $7339, $7340, $7341, $7342, $7343, $7344, $7345, $7346, $7347, $7348, VersionRange($7349, $7350)), ($7351, $7352, $7353, $7354, $7355, $7356, $7357, $7358, $7359, $7360, $7361, $7362, $7363, $7364, $7365, $7366, $7367, $7368, $7369, $7370, $7371, $7372, $7373, $7374, $7375, $7376, $7377, $7378, VersionRange($7379, $7380)), ($7381, $7382, $7383, $7384, $7385, $7386, $7387, $7388, $7389, $7390, $7391, $7392, $7393, $7394, $7395, $7396, $7397, $7398, $7399, $7400, $7401, $7402, $7403, $7404, $7405, $7406, $7407, $7408, VersionRange($7409, $7410)), ($7411, $7412, $7413, $7414, $7415, $7416, $7417, $7418, $7419, $7420, $7421, $7422, $7423, $7424, $7425, $7426, $7427, $7428, $7429, $7430, $7431, $7432, $7433, $7434, $7435, $7436, $7437, $7438, VersionRange($7439, $7440)), ($7441, $7442, $7443, $7444, $7445, $7446, $7447, $7448, $7449, $7450, $7451, $7452, $7453, $7454, $7455, $7456, $7457, $7458, $7459, $7460, $7461, $7462, $7463, $7464, $7465, $7466, $7467, $7468, VersionRange($7469, $7470)), ($7471, $7472, $7473, $7474, $7475, $7476, $7477, $7478, $7479, $7480, $7481, $7482, $7483, $7484, $7485, $7486, $7487, $7488, $7489, $7490, $7491, $7492, $7493, $7494, $7495, $7496, $7497, $7498, VersionRange($7499, $7500)), ($7501, $7502, $7503, $7504, $7505, $7506, $7507, $7508, $7509, $7510, $7511, $7512, $7513, $7514, $7515, $7516, $7517, $7518, $7519, $7520, $7521, $7522, $7523, $7524, $7525, $7526, $7527, $7528, VersionRange($7529, $7530)), ($7531, $7532, $7533, $7534, $7535, $7536, $7537, $7538, $7539, $7540, $7541, $7542, $7543, $7544, $7545, $7546, $7547, $7548, $7549, $7550, $7551, $7552, $7553, $7554, $7555, $7556, $7557, $7558, VersionRange($7559, $7560)), ($7561, $7562, $7563, $7564, $7565, $7566, $7567, $7568, $7569, $7570, $7571, $7572, $7573, $7574, $7575, $7576, $7577, $7578, $7579, $7580, $7581, $7582, $7583, $7584, $7585, $7586, $7587, $7588, VersionRange($7589, $7590)), ($7591, $7592, $7593, $7594, $7595, $7596, $7597, $7598, $7599, $7600, $7601, $7602, $7603, $7604, $7605, $7606, $7607, $7608, $7609, $7610, $7611, $7612, $7613, $7614, $7615, $7616, $7617, $7618, VersionRange($7619, $7620)), ($7621, $7622, $7623, $7624, $7625, $7626, $7627, $7628, $7629, $7630, $7631, $7632, $7633, $7634, $7635, $7636, $7637, $7638, $7639, $7640, $7641, $7642, $7643, $7644, $7645, $7646, $7647, $7648, VersionRange($7649, $7650)), ($7651, $7652, $7653, $7654, $7655, $7656, $7657, $7658, $7659, $7660, $7661, $7662, $7663, $7664, $7665, $7666, $7667, $7668, $7669, $7670, $7671, $7672, $7673, $7674, $7675, $7676, $7677, $7678, VersionRange($7679, $7680)), ($7681, $7682, $7683, $7684, $7685, $7686, $7687, $7688, $7689, $7690, $7691, $7692, $7693, $7694, $7695, $7696, $7697, $7698, $7699, $7700, $7701, $7702, $7703, $7704, $7705, $7706, $7707, $7708, VersionRange($7709, $7710)), ($7711, $7712, $7713, $7714, $7715, $7716, $7717, $7718, $7719, $7720, $7721, $7722, $7723, $7724, $7725, $7726, $7727, $7728, $7729, $7730, $7731, $7732, $7733, $7734, $7735, $7736, $7737, $7738, VersionRange($7739, $7740)), ($7741, $7742, $7743, $7744, $7745, $7746, $7747, $7748, $7749, $7750, $7751, $7752, $7753, $7754, $7755, $7756, $7757, $7758, $7759, $7760, $7761, $7762, $7763, $7764, $7765, $7766, $7767, $7768, VersionRange($7769, $7770)), ($7771, $7772, $7773, $7774, $7775, $7776, $7777, $7778, $7779, $7780, $7781, $7782, $7783, $7784, $7785, $7786, $7787, $7788, $7789, $7790, $7791, $7792, $7793, $7794, $7795, $7796, $7797, $7798, VersionRange($7799, $7800)), ($7801, $7802, $7803, $7804, $7805, $7806, $7807, $7808, $7809, $7810, $7811, $7812, $7813, $7814, $7815, $7816, $7817, $7818, $7819, $7820, $7821, $7822, $7823, $7824, $7825, $7826, $7827, $7828, VersionRange($7829, $7830)), ($7831, $7832, $7833, $7834, $7835, $7836, $7837, $7838, $7839, $7840, $7841, $7842, $7843, $7844, $7845, $7846, $7847, $7848, $7849, $7850, $7851, $7852, $7853, $7854, $7855, $7856, $7857, $7858, VersionRange($7859, $7860)), ($7861, $7862, $7863, $7864, $7865, $7866, $7867, $7868, $7869, $7870, $7871, $7872, $7873, $7874, $7875, $7876, $7877, $7878, $7879, $7880, $7881, $7882, $7883, $7884, $7885, $7886, $7887, $7888, VersionRange($7889, $7890)), ($7891, $7892, $7893, $7894, $7895, $7896, $7897, $7898, $7899, $7900, $7901, $7902, $7903, $7904, $7905, $7906, $7907, $7908, $7909, $7910, $7911, $7912, $7913, $7914, $7915, $7916, $7917, $7918, VersionRange($7919, $7920)), ($7921, $7922, $7923, $7924, $7925, $7926, $7927, $7928, $7929, $7930, $7931, $7932, $7933, $7934, $7935, $7936, $7937, $7938, $7939, $7940, $7941, $7942, $7943, $7944, $7945, $7946, $7947, $7948, VersionRange($7949, $7950)), ($7951, $7952, $7953, $7954, $7955, $7956, $7957, $7958, $7959, $7960, $7961, $7962, $7963, $7964, $7965, $7966, $7967, $7968, $7969, $7970, $7971, $7972, $7973, $7974, $7975, $7976, $7977, $7978, VersionRange($7979, $7980)), ($7981, $7982, $7983, $7984, $7985, $7986, $7987, $7988, $7989, $7990, $7991, $7992, $7993, $7994, $7995, $7996, $7997, $7998, $7999, $8000, $8001, $8002, $8003, $8004, $8005, $8006, $8007, $8008, VersionRange($8009, $8010)), ($8011, $8012, $8013, $8014, $8015, $8016, $8017, $8018, $8019, $8020, $8021, $8022, $8023, $8024, $8025, $8026, $8027, $8028, $8029, $8030, $8031, $8032, $8033, $8034, $8035, $8036, $8037, $8038, VersionRange($8039, $8040)), ($8041, $8042, $8043, $8044, $8045, $8046, $8047, $8048, $8049, $8050, $8051, $8052, $8053, $8054, $8055, $8056, $8057, $8058, $8059, $8060, $8061, $8062, $8063, $8064, $8065, $8066, $8067, $8068, VersionRange($8069, $8070)), ($8071, $8072, $8073, $8074, $8075, $8076, $8077, $8078, $8079, $8080, $8081, $8082, $8083, $8084, $8085, $8086, $8087, $8088, $8089, $8090, $8091, $8092, $8093, $8094, $8095, $8096, $8097, $8098, VersionRange($8099, $8100)), ($8101, $8102, $8103, $8104, $8105, $8106, $8107, $8108, $8109, $8110, $8111, $8112, $8113, $8114, $8115, $8116, $8117, $8118, $8119, $8120, $8121, $8122, $8123, $8124, $8125, $8126, $8127, $8128, VersionRange($8129, $8130)), ($8131, $8132, $8133, $8134, $8135, $8136, $8137, $8138, $8139, $8140, $8141, $8142, $8143, $8144, $8145, $8146, $8147, $8148, $8149, $8150, $8151, $8152, $8153, $8154, $8155, $8156, $8157, $8158, VersionRange($8159, $8160)), ($8161, $8162, $8163, $8164, $8165, $8166, $8167, $8168, $8169, $8170, $8171, $8172, $8173, $8174, $8175, $8176, $8177, $8178, $8179, $8180, $8181, $8182, $8183, $8184, $8185, $8186, $8187, $8188, VersionRange($8189, $8190)), ($8191, $8192, $8193, $8194, $8195, $8196, $8197, $8198, $8199, $8200, $8201, $8202, $8203, $8204, $8205, $8206, $8207, $8208, $8209, $8210, $8211, $8212, $8213, $8214, $8215, $8216, $8217, $8218, VersionRange($8219, $8220)), ($8221, $8222, $8223, $8224, $8225, $8226, $8227, $8228, $8229, $8230, $8231, $8232, $8233, $8234, $8235, $8236, $8237, $8238, $8239, $8240, $8241, $8242, $8243, $8244, $8245, $8246, $8247, $8248, VersionRange($8249, $8250)), ($8251, $8252, $8253, $8254, $8255, $8256, $8257, $8258, $8259, $8260, $8261, $8262, $8263, $8264, $8265, $8266, $8267, $8268, $8269, $8270, $8271, $8272, $8273, $8274, $8275, $8276, $8277, $8278, VersionRange($8279, $8280)), ($8281, $8282, $8283, $8284, $8285, $8286, $8287, $8288, $8289, $8290, $8291, $8292, $8293, $8294, $8295, $8296, $8297, $8298, $8299, $8300, $8301, $8302, $8303, $8304, $8305, $8306, $8307, $8308, VersionRange($8309, $8310)), ($8311, $8312, $8313, $8314, $8315, $8316, $8317, $8318, $8319, $8320, $8321, $8322, $8323, $8324, $8325, $8326, $8327, $8328, $8329, $8330, $8331, $8332, $8333, $8334, $8335, $8336, $8337, $8338, VersionRange($8339, $8340)), ($8341, $8342, $8343, $8344, $8345, $8346, $8347, $8348, $8349, $8350, $8351, $8352, $8353, $8354, $8355, $8356, $8357, $8358, $8359, $8360, $8361, $8362, $8363, $8364, $8365, $8366, $8367, $8368, VersionRange($8369, $8370)), ($8371, $8372, $8373, $8374, $8375, $8376, $8377, $8378, $8379, $8380, $8381, $8382, $8383, $8384, $8385, $8386, $8387, $8388, $8389, $8390, $8391, $8392, $8393, $8394, $8395, $8396, $8397, $8398, VersionRange($8399, $8400)), ($8401, $8402, $8403, $8404, $8405, $8406, $8407, $8408, $8409, $8410, $8411, $8412, $8413, $8414, $8415, $8416, $8417, $8418, $8419, $8420, $8421, $8422, $8423, $8424, $8425, $8426, $8427, $8428, VersionRange($8429, $8430)), ($8431, $8432, $8433, $8434, $8435, $8436, $8437, $8438, $8439, $8440, $8441, $8442, $8443, $8444, $8445, $8446, $8447, $8448, $8449, $8450, $8451, $8452, $8453, $8454, $8455, $8456, $8457, $8458, VersionRange($8459, $8460)), ($8461, $8462, $8463, $8464, $8465, $8466, $8467, $8468, $8469, $8470, $8471, $8472, $8473, $8474, $8475, $8476, $8477, $8478, $8479, $8480, $8481, $8482, $8483, $8484, $8485, $8486, $8487, $8488, VersionRange($8489, $8490)), ($8491, $8492, $8493, $8494, $8495, $8496, $8497, $8498, $8499, $8500, $8501, $8502, $8503, $8504, $8505, $8506, $8507, $8508, $8509, $8510, $8511, $8512, $8513, $8514, $8515, $8516, $8517, $8518, VersionRange($8519, $8520)), ($8521, $8522, $8523, $8524, $8525, $8526, $8527, $8528, $8529, $8530, $8531, $8532, $8533, $8534, $8535, $8536, $8537, $8538, $8539, $8540, $8541, $8542, $8543, $8544, $8545, $8546, $8547, $8548, VersionRange($8549, $8550)), ($8551, $8552, $8553, $8554, $8555, $8556, $8557, $8558, $8559, $8560, $8561, $8562, $8563, $8564, $8565, $8566, $8567, $8568, $8569, $8570, $8571, $8572, $8573, $8574, $8575, $8576, $8577, $8578, VersionRange($8579, $8580)), ($8581, $8582, $8583, $8584, $8585, $8586, $8587, $8588, $8589, $8590, $8591, $8592, $8593, $8594, $8595, $8596, $8597, $8598, $8599, $8600, $8601, $8602, $8603, $8604, $8605, $8606, $8607, $8608, VersionRange($8609, $8610)), ($8611, $8612, $8613, $8614, $8615, $8616, $8617, $8618, $8619, $8620, $8621, $8622, $8623, $8624, $8625, $8626, $8627, $8628, $8629, $8630, $8631, $8632, $8633, $8634, $8635, $8636, $8637, $8638, VersionRange($8639, $8640)), ($8641, $8642, $8643, $8644, $8645, $8646, $8647, $8648, $8649, $8650, $8651, $8652, $8653, $8654, $8655, $8656, $8657, $8658, $8659, $8660, $8661, $8662, $8663, $8664, $8665, $8666, $8667, $8668, VersionRange($8669, $8670)), ($8671, $8672, $8673, $8674, $8675, $8676, $8677, $8678, $8679, $8680, $8681, $8682, $8683, $8684, $8685, $8686, $8687, $8688, $8689, $8690, $8691, $8692, $8693, $8694, $8695, $8696, $8697, $8698, VersionRange($8699, $8700)), ($8701, $8702, $8703, $8704, $8705, $8706, $8707, $8708, $8709, $8710, $8711, $8712, $8713, $8714, $8715, $8716, $8717, $8718, $8719, $8720, $8721, $8722, $8723, $8724, $8725, $8726, $8727, $8728, VersionRange($8729, $8730)), ($8731, $8732, $8733, $8734, $8735, $8736, $8737, $8738, $8739, $8740, $8741, $8742, $8743, $8744, $8745, $8746, $8747, $8748, $8749, $8750, $8751, $8752, $8753, $8754, $8755, $8756, $8757, $8758, VersionRange($8759, $8760)), ($8761, $8762, $8763, $8764, $8765, $8766, $8767, $8768, $8769, $8770, $8771, $8772, $8773, $8774, $8775, $8776, $8777, $8778, $8779, $8780, $8781, $8782, $8783, $8784, $8785, $8786, $8787, $8788, VersionRange($8789, $8790)), ($8791, $8792, $8793, $8794, $8795, $8796, $8797, $8798, $8799, $8800, $8801, $8802, $8803, $8804, $8805, $8806, $8807, $8808, $8809, $8810, $8811, $8812, $8813, $8814, $8815, $8816, $8817, $8818, VersionRange($8819, $8820)), ($8821, $8822, $8823, $8824, $8825, $8826, $8827, $8828, $8829, $8830, $8831, $8832, $8833, $8834, $8835, $8836, $8837, $8838, $8839, $8840, $8841, $8842, $8843, $8844, $8845, $8846, $8847, $8848, VersionRange($8849, $8850)), ($8851, $8852, $8853, $8854, $8855, $8856, $8857, $8858, $8859, $8860, $8861, $8862, $8863, $8864, $8865, $8866, $8867, $8868, $8869, $8870, $8871, $8872, $8873, $8874, $8875, $8876, $8877, $8878, VersionRange($8879, $8880)), ($8881, $8882, $8883, $8884, $8885, $8886, $8887, $8888, $8889, $8890, $8891, $8892, $8893, $8894, $8895, $8896, $8897, $8898, $8899, $8900, $8901, $8902, $8903, $8904, $8905, $8906, $8907, $8908, VersionRange($8909, $8910)), ($8911, $8912, $8913, $8914, $8915, $8916, $8917, $8918, $8919, $8920, $8921, $8922, $8923, $8924, $8925, $8926, $8927, $8928, $8929, $8930, $8931, $8932, $8933, $8934, $8935, $8936, $8937, $8938, VersionRange($8939, $8940)), ($8941, $8942, $8943, $8944, $8945, $8946, $8947, $8948, $8949, $8950, $8951, $8952, $8953, $8954, $8955, $8956, $8957, $8958, $8959, $8960, $8961, $8962, $8963, $8964, $8965, $8966, $8967, $8968, VersionRange($8969, $8970)), ($8971, $8972, $8973, $8974, $8975, $8976, $8977, $8978, $8979, $8980, $8981, $8982, $8983, $8984, $8985, $8986, $8987, $8988, $8989, $8990, $8991, $8992, $8993, $8994, $8995, $8996, $8997, $8998, VersionRange($8999, $9000)), ($9001, $9002, $9003, $9004, $9005, $9006, $9007, $9008, $9009, $9010, $9011, $9012, $9013, $9014, $9015, $9016, $9017, $9018, $9019, $9020, $9021, $9022, $9023, $9024, $9025, $9026, $9027, $9028, VersionRange($9029, $9030)), ($9031, $9032, $9033, $9034, $9035, $9036, $9037, $9038, $9039, $9040, $9041, $9042, $9043, $9044, $9045, $9046, $9047, $9048, $9049, $9050, $9051, $9052, $9053, $9054, $9055, $9056, $9057, $9058, VersionRange($9059, $9060)), ($9061, $9062, $9063, $9064, $9065, $9066, $9067, $9068, $9069, $9070, $9071, $9072, $9073, $9074, $9075, $9076, $9077, $9078, $9079, $9080, $9081, $9082, $9083, $9084, $9085, $9086, $9087, $9088, VersionRange($9089, $9090)), ($9091, $9092, $9093, $9094, $9095, $9096, $9097, $9098, $9099, $9100, $9101, $9102, $9103, $9104, $9105, $9106, $9107, $9108, $9109, $9110, $9111, $9112, $9113, $9114, $9115, $9116, $9117, $9118, VersionRange($9119, $9120)), ($9121, $9122, $9123, $9124, $9125, $9126, $9127, $9128, $9129, $9130, $9131, $9132, $9133, $9134, $9135, $9136, $9137, $9138, $9139, $9140, $9141, $9142, $9143, $9144, $9145, $9146, $9147, $9148, VersionRange($9149, $9150)), ($9151, $9152, $9153, $9154, $9155, $9156, $9157, $9158, $9159, $9160, $9161, $9162, $9163, $9164, $9165, $9166, $9167, $9168, $9169, $9170, $9171, $9172, $9173, $9174, $9175, $9176, $9177, $9178, VersionRange($9179, $9180)), ($9181, $9182, $9183, $9184, $9185, $9186, $9187, $9188, $9189, $9190, $9191, $9192, $9193, $9194, $9195, $9196, $9197, $9198, $9199, $9200, $9201, $9202, $9203, $9204, $9205, $9206, $9207, $9208, VersionRange($9209, $9210)), ($9211, $9212, $9213, $9214, $9215, $9216, $9217, $9218, $9219, $9220, $9221, $9222, $9223, $9224, $9225, $9226, $9227, $9228, $9229, $9230, $9231, $9232, $9233, $9234, $9235, $9236, $9237, $9238, VersionRange($9239, $9240)), ($9241, $9242, $9243, $9244, $9245, $9246, $9247, $9248, $9249, $9250, $9251, $9252, $9253, $9254, $9255, $9256, $9257, $9258, $9259, $9260, $9261, $9262, $9263, $9264, $9265, $9266, $9267, $9268, VersionRange($9269, $9270)), ($9271, $9272, $9273, $9274, $9275, $9276, $9277, $9278, $9279, $9280, $9281, $9282, $9283, $9284, $9285, $9286, $9287, $9288, $9289, $9290, $9291, $9292, $9293, $9294, $9295, $9296, $9297, $9298, VersionRange($9299, $9300)), ($9301, $9302, $9303, $9304, $9305, $9306, $9307, $9308, $9309, $9310, $9311, $9312, $9313, $9314, $9315, $9316, $9317, $9318, $9319, $9320, $9321, $9322, $9323, $9324, $9325, $9326, $9327, $9328, VersionRange($9329, $9330)), ($9331, $9332, $9333, $9334, $9335, $9336, $9337, $9338, $9339, $9340, $9341, $9342, $9343, $9344, $9345, $9346, $9347, $9348, $9349, $9350, $9351, $9352, $9353, $9354, $9355, $9356, $9357, $9358, VersionRange($9359, $9360)), ($9361, $9362, $9363, $9364, $9365, $9366, $9367, $9368, $9369, $9370, $9371, $9372, $9373, $9374, $9375, $9376, $9377, $9378, $9379, $9380, $9381, $9382, $9383, $9384, $9385, $9386, $9387, $9388, VersionRange($9389, $9390)), ($9391, $9392, $9393, $9394, $9395, $9396, $9397, $9398, $9399, $9400, $9401, $9402, $9403, $9404, $9405, $9406, $9407, $9408, $9409, $9410, $9411, $9412, $9413, $9414, $9415, $9416, $9417, $9418, VersionRange($9419, $9420)), ($9421, $9422, $9423, $9424, $9425, $9426, $9427, $9428, $9429, $9430, $9431, $9432, $9433, $9434, $9435, $9436, $9437, $9438, $9439, $9440, $9441, $9442, $9443, $9444, $9445, $9446, $9447, $9448, VersionRange($9449, $9450)), ($9451, $9452, $9453, $9454, $9455, $9456, $9457, $9458, $9459, $9460, $9461, $9462, $9463, $9464, $9465, $9466, $9467, $9468, $9469, $9470, $9471, $9472, $9473, $9474, $9475, $9476, $9477, $9478, VersionRange($9479, $9480)), ($9481, $9482, $9483, $9484, $9485, $9486, $9487, $9488, $9489, $9490, $9491, $9492, $9493, $9494, $9495, $9496, $9497, $9498, $9499, $9500, $9501, $9502, $9503, $9504, $9505, $9506, $9507, $9508, VersionRange($9509, $9510)), ($9511, $9512, $9513, $9514, $9515, $9516, $9517, $9518, $9519, $9520, $9521, $9522, $9523, $9524, $9525, $9526, $9527, $9528, $9529, $9530, $9531, $9532, $9533, $9534, $9535, $9536, $9537, $9538, VersionRange($9539, $9540)), ($9541, $9542, $9543, $9544, $9545, $9546, $9547, $9548, $9549, $9550, $9551, $9552, $9553, $9554, $9555, $9556, $9557, $9558, $9559, $9560, $9561, $9562, $9563, $9564, $9565, $9566, $9567, $9568, VersionRange($9569, $9570)), ($9571, $9572, $9573, $9574, $9575, $9576, $9577, $9578, $9579, $9580, $9581, $9582, $9583, $9584, $9585, $9586, $9587, $9588, $9589, $9590, $9591, $9592, $9593, $9594, $9595, $9596, $9597, $9598, VersionRange($9599, $9600)), ($9601, $9602, $9603, $9604, $9605, $9606, $9607, $9608, $9609, $9610, $9611, $9612, $9613, $9614, $9615, $9616, $9617, $9618, $9619, $9620, $9621, $9622, $9623, $9624, $9625, $9626, $9627, $9628, VersionRange($9629, $9630)), ($9631, $9632, $9633, $9634, $9635, $9636, $9637, $9638, $9639, $9640, $9641, $9642, $9643, $9644, $9645, $9646, $9647, $9648, $9649, $9650, $9651, $9652, $9653, $9654, $9655, $9656, $9657, $9658, VersionRange($9659, $9660)), ($9661, $9662, $9663, $9664, $9665, $9666, $9667, $9668, $9669, $9670, $9671, $9672, $9673, $9674, $9675, $9676, $9677, $9678, $9679, $9680, $9681, $9682, $9683, $9684, $9685, $9686, $9687, $9688, VersionRange($9689, $9690)), ($9691, $9692, $9693, $9694, $9695, $9696, $9697, $9698, $9699, $9700, $9701, $9702, $9703, $9704, $9705, $9706, $9707, $9708, $9709, $9710, $9711, $9712, $9713, $9714, $9715, $9716, $9717, $9718, VersionRange($9719, $9720)), ($9721, $9722, $9723, $9724, $9725, $9726, $9727, $9728, $9729, $9730, $9731, $9732, $9733, $9734, $9735, $9736, $9737, $9738, $9739, $9740, $9741, $9742, $9743, $9744, $9745, $9746, $9747, $9748, VersionRange($9749, $9750)), ($9751, $9752, $9753, $9754, $9755, $9756, $9757, $9758, $9759, $9760, $9761, $9762, $9763, $9764, $9765, $9766, $9767, $9768, $9769, $9770, $9771, $9772, $9773, $9774, $9775, $9776, $9777, $9778, VersionRange($9779, $9780)), ($9781, $9782, $9783, $9784, $9785, $9786, $9787, $9788, $9789, $9790, $9791, $9792, $9793, $9794, $9795, $9796, $9797, $9798, $9799, $9800, $9801, $9802, $9803, $9804, $9805, $9806, $9807, $9808, VersionRange($9809, $9810)), ($9811, $9812, $9813, $9814, $9815, $9816, $9817, $9818, $9819, $9820, $9821, $9822, $9823, $9824, $9825, $9826, $9827, $9828, $9829, $9830, $9831, $9832, $9833, $9834, $9835, $9836, $9837, $9838, VersionRange($9839, $9840)), ($9841, $9842, $9843, $9844, $9845, $9846, $9847, $9848, $9849, $9850, $9851, $9852, $9853, $9854, $9855, $9856, $9857, $9858, $9859, $9860, $9861, $9862, $9863, $9864, $9865, $9866, $9867, $9868, VersionRange($9869, $9870)), ($9871, $9872, $9873, $9874, $9875, $9876, $9877, $9878, $9879, $9880, $9881, $9882, $9883, $9884, $9885, $9886, $9887, $9888, $9889, $9890, $9891, $9892, $9893, $9894, $9895, $9896, $9897, $9898, VersionRange($9899, $9900)), ($9901, $9902, $9903, $9904, $9905, $9906, $9907, $9908, $9909, $9910, $9911, $9912, $9913, $9914, $9915, $9916, $9917, $9918, $9919, $9920, $9921, $9922, $9923, $9924, $9925, $9926, $9927, $9928, VersionRange($9929, $9930)), ($9931, $9932, $9933, $9934, $9935, $9936, $9937, $9938, $9939, $9940, $9941, $9942, $9943, $9944, $9945, $9946, $9947, $9948, $9949, $9950, $9951, $9952, $9953, $9954, $9955, $9956, $9957, $9958, VersionRange($9959, $9960)), ($9961, $9962, $9963, $9964, $9965, $9966, $9967, $9968, $9969, $9970, $9971, $9972, $9973, $9974, $9975, $9976, $9977, $9978, $9979, $9980, $9981, $9982, $9983, $9984, $9985, $9986, $9987, $9988, VersionRange($9989, $9990)), ($9991, $9992, $9993, $9994, $9995, $9996, $9997, $9998, $9999, $10000, $10001, $10002, $10003, $10004, $10005, $10006, $10007, $10008, $10009, $10010, $10011, $10012, $10013, $10014, $10015, $10016, $10017, $10018, VersionRange($10019, $10020)), ($10021, $10022, $10023, $10024, $10025, $10026, $10027, $10028, $10029, $10030, $10031, $10032, $10033, $10034, $10035, $10036, $10037, $10038, $10039, $10040, $10041, $10042, $10043, $10044, $10045, $10046, $10047, $10048, VersionRange($10049, $10050)), ($10051, $10052, $10053, $10054, $10055, $10056, $10057, $10058, $10059, $10060, $10061, $10062, $10063, $10064, $10065, $10066, $10067, $10068, $10069, $10070, $10071, $10072, $10073, $10074, $10075, $10076, $10077, $10078, VersionRange($10079, $10080)), ($10081, $10082, $10083, $10084, $10085, $10086, $10087, $10088, $10089, $10090, $10091, $10092, $10093, $10094, $10095, $10096, $10097, $10098, $10099, $10100, $10101, $10102, $10103, $10104, $10105, $10106, $10107, $10108, VersionRange($10109, $10110)), ($10111, $10112, $10113, $10114, $10115, $10116, $10117, $10118, $10119, $10120, $10121, $10122, $10123, $10124, $10125, $10126, $10127, $10128, $10129, $10130, $10131, $10132, $10133, $10134, $10135, $10136, $10137, $10138, VersionRange($10139, $10140)), ($10141, $10142, $10143, $10144, $10145, $10146, $10147, $10148, $10149, $10150, $10151, $10152, $10153, $10154, $10155, $10156, $10157, $10158, $10159, $10160, $10161, $10162, $10163, $10164, $10165, $10166, $10167, $10168, VersionRange($10169, $10170)), ($10171, $10172, $10173, $10174, $10175, $10176, $10177, $10178, $10179, $10180, $10181, $10182, $10183, $10184, $10185, $10186, $10187, $10188, $10189, $10190, $10191, $10192, $10193, $10194, $10195, $10196, $10197, $10198, VersionRange($10199, $10200)), ($10201, $10202, $10203, $10204, $10205, $10206, $10207, $10208, $10209, $10210, $10211, $10212, $10213, $10214, $10215, $10216, $10217, $10218, $10219, $10220, $10221, $10222, $10223, $10224, $10225, $10226, $10227, $10228, VersionRange($10229, $10230)), ($10231, $10232, $10233, $10234, $10235, $10236, $10237, $10238, $10239, $10240, $10241, $10242, $10243, $10244, $10245, $10246, $10247, $10248, $10249, $10250, $10251, $10252, $10253, $10254, $10255, $10256, $10257, $10258, VersionRange($10259, $10260)), ($10261, $10262, $10263, $10264, $10265, $10266, $10267, $10268, $10269, $10270, $10271, $10272, $10273, $10274, $10275, $10276, $10277, $10278, $10279, $10280, $10281, $10282, $10283, $10284, $10285, $10286, $10287, $10288, VersionRange($10289, $10290)), ($10291, $10292, $10293, $10294, $10295, $10296, $10297, $10298, $10299, $10300, $10301, $10302, $10303, $10304, $10305, $10306, $10307, $10308, $10309, $10310, $10311, $10312, $10313, $10314, $10315, $10316, $10317, $10318, VersionRange($10319, $10320)), ($10321, $10322, $10323, $10324, $10325, $10326, $10327, $10328, $10329, $10330, $10331, $10332, $10333, $10334, $10335, $10336, $10337, $10338, $10339, $10340, $10341, $10342, $10343, $10344, $10345, $10346, $10347, $10348, VersionRange($10349, $10350)), ($10351, $10352, $10353, $10354, $10355, $10356, $10357, $10358, $10359, $10360, $10361, $10362, $10363, $10364, $10365, $10366, $10367, $10368, $10369, $10370, $10371, $10372, $10373, $10374, $10375, $10376, $10377, $10378, VersionRange($10379, $10380)), ($10381, $10382, $10383, $10384, $10385, $10386, $10387, $10388, $10389, $10390, $10391, $10392, $10393, $10394, $10395, $10396, $10397, $10398, $10399, $10400, $10401, $10402, $10403, $10404, $10405, $10406, $10407, $10408, VersionRange($10409, $10410)), ($10411, $10412, $10413, $10414, $10415, $10416, $10417, $10418, $10419, $10420, $10421, $10422, $10423, $10424, $10425, $10426, $10427, $10428, $10429, $10430, $10431, $10432, $10433, $10434, $10435, $10436, $10437, $10438, VersionRange($10439, $10440)), ($10441, $10442, $10443, $10444, $10445, $10446, $10447, $10448, $10449, $10450, $10451, $10452, $10453, $10454, $10455, $10456, $10457, $10458, $10459, $10460, $10461, $10462, $10463, $10464, $10465, $10466, $10467, $10468, VersionRange($10469, $10470)), ($10471, $10472, $10473, $10474, $10475, $10476, $10477, $10478, $10479, $10480, $10481, $10482, $10483, $10484, $10485, $10486, $10487, $10488, $10489, $10490, $10491, $10492, $10493, $10494, $10495, $10496, $10497, $10498, VersionRange($10499, $10500)), ($10501, $10502, $10503, $10504, $10505, $10506, $10507, $10508, $10509, $10510, $10511, $10512, $10513, $10514, $10515, $10516, $10517, $10518, $10519, $10520, $10521, $10522, $10523, $10524, $10525, $10526, $10527, $10528, VersionRange($10529, $10530)), ($10531, $10532, $10533, $10534, $10535, $10536, $10537, $10538, $10539, $10540, $10541, $10542, $10543, $10544, $10545, $10546, $10547, $10548, $10549, $10550, $10551, $10552, $10553, $10554, $10555, $10556, $10557, $10558, VersionRange($10559, $10560)), ($10561, $10562, $10563, $10564, $10565, $10566, $10567, $10568, $10569, $10570, $10571, $10572, $10573, $10574, $10575, $10576, $10577, $10578, $10579, $10580, $10581, $10582, $10583, $10584, $10585, $10586, $10587, $10588, VersionRange($10589, $10590)), ($10591, $10592, $10593, $10594, $10595, $10596, $10597, $10598, $10599, $10600, $10601, $10602, $10603, $10604, $10605, $10606, $10607, $10608, $10609, $10610, $10611, $10612, $10613, $10614, $10615, $10616, $10617, $10618, VersionRange($10619, $10620)), ($10621, $10622, $10623, $10624, $10625, $10626, $10627, $10628, $10629, $10630, $10631, $10632, $10633, $10634, $10635, $10636, $10637, $10638, $10639, $10640, $10641, $10642, $10643, $10644, $10645, $10646, $10647, $10648, VersionRange($10649, $10650)), ($10651, $10652, $10653, $10654, $10655, $10656, $10657, $10658, $10659, $10660, $10661, $10662, $10663, $10664, $10665, $10666, $10667, $10668, $10669, $10670, $10671, $10672, $10673, $10674, $10675, $10676, $10677, $10678, VersionRange($10679, $10680)), ($10681, $10682, $10683, $10684, $10685, $10686, $10687, $10688, $10689, $10690, $10691, $10692, $10693, $10694, $10695, $10696, $10697, $10698, $10699, $10700, $10701, $10702, $10703, $10704, $10705, $10706, $10707, $10708, VersionRange($10709, $10710)), ($10711, $10712, $10713, $10714, $10715, $10716, $10717, $10718, $10719, $10720, $10721, $10722, $10723, $10724, $10725, $10726, $10727, $10728, $10729, $10730, $10731, $10732, $10733, $10734, $10735, $10736, $10737, $10738, VersionRange($10739, $10740)), ($10741, $10742, $10743, $10744, $10745, $10746, $10747, $10748, $10749, $10750, $10751, $10752, $10753, $10754, $10755, $10756, $10757, $10758, $10759, $10760, $10761, $10762, $10763, $10764, $10765, $10766, $10767, $10768, VersionRange($10769, $10770)), ($10771, $10772, $10773, $10774, $10775, $10776, $10777, $10778, $10779, $10780, $10781, $10782, $10783, $10784, $10785, $10786, $10787, $10788, $10789, $10790, $10791, $10792, $10793, $10794, $10795, $10796, $10797, $10798, VersionRange($10799, $10800)), ($10801, $10802, $10803, $10804, $10805, $10806, $10807, $10808, $10809, $10810, $10811, $10812, $10813, $10814, $10815, $10816, $10817, $10818, $10819, $10820, $10821, $10822, $10823, $10824, $10825, $10826, $10827, $10828, VersionRange($10829, $10830)), ($10831, $10832, $10833, $10834, $10835, $10836, $10837, $10838, $10839, $10840, $10841, $10842, $10843, $10844, $10845, $10846, $10847, $10848, $10849, $10850, $10851, $10852, $10853, $10854, $10855, $10856, $10857, $10858, VersionRange($10859, $10860)), ($10861, $10862, $10863, $10864, $10865, $10866, $10867, $10868, $10869, $10870, $10871, $10872, $10873, $10874, $10875, $10876, $10877, $10878, $10879, $10880, $10881, $10882, $10883, $10884, $10885, $10886, $10887, $10888, VersionRange($10889, $10890)), ($10891, $10892, $10893, $10894, $10895, $10896, $10897, $10898, $10899, $10900, $10901, $10902, $10903, $10904, $10905, $10906, $10907, $10908, $10909, $10910, $10911, $10912, $10913, $10914, $10915, $10916, $10917, $10918, VersionRange($10919, $10920)), ($10921, $10922, $10923, $10924, $10925, $10926, $10927, $10928, $10929, $10930, $10931, $10932, $10933, $10934, $10935, $10936, $10937, $10938, $10939, $10940, $10941, $10942, $10943, $10944, $10945, $10946, $10947, $10948, VersionRange($10949, $10950)), ($10951, $10952, $10953, $10954, $10955, $10956, $10957, $10958, $10959, $10960, $10961, $10962, $10963, $10964, $10965, $10966, $10967, $10968, $10969, $10970, $10971, $10972, $10973, $10974, $10975, $10976, $10977, $10978, VersionRange($10979, $10980)), ($10981, $10982, $10983, $10984, $10985, $10986, $10987, $10988, $10989, $10990, $10991, $10992, $10993, $10994, $10995, $10996, $10997, $10998, $10999, $11000, $11001, $11002, $11003, $11004, $11005, $11006, $11007, $11008, VersionRange($11009, $11010)), ($11011, $11012, $11013, $11014, $11015, $11016, $11017, $11018, $11019, $11020, $11021, $11022, $11023, $11024, $11025, $11026, $11027, $11028, $11029, $11030, $11031, $11032, $11033, $11034, $11035, $11036, $11037, $11038, VersionRange($11039, $11040)), ($11041, $11042, $11043, $11044, $11045, $11046, $11047, $11048, $11049, $11050, $11051, $11052, $11053, $11054, $11055, $11056, $11057, $11058, $11059, $11060, $11061, $11062, $11063, $11064, $11065, $11066, $11067, $11068, VersionRange($11069, $11070)), ($11071, $11072, $11073, $11074, $11075, $11076, $11077, $11078, $11079, $11080, $11081, $11082, $11083, $11084, $11085, $11086, $11087, $11088, $11089, $11090, $11091, $11092, $11093, $11094, $11095, $11096, $11097, $11098, VersionRange($11099, $11100)), ($11101, $11102, $11103, $11104, $11105, $11106, $11107, $11108, $11109, $11110, $11111, $11112, $11113, $11114, $11115, $11116, $11117, $11118, $11119, $11120, $11121, $11122, $11123, $11124, $11125, $11126, $11127, $11128, VersionRange($11129, $11130)), ($11131, $11132, $11133, $11134, $11135, $11136, $11137, $11138, $11139, $11140, $11141, $11142, $11143, $11144, $11145, $11146, $11147, $11148, $11149, $11150, $11151, $11152, $11153, $11154, $11155, $11156, $11157, $11158, VersionRange($11159, $11160)), ($11161, $11162, $11163, $11164, $11165, $11166, $11167, $11168, $11169, $11170, $11171, $11172, $11173, $11174, $11175, $11176, $11177, $11178, $11179, $11180, $11181, $11182, $11183, $11184, $11185, $11186, $11187, $11188, VersionRange($11189, $11190)), ($11191, $11192, $11193, $11194, $11195, $11196, $11197, $11198, $11199, $11200, $11201, $11202, $11203, $11204, $11205, $11206, $11207, $11208, $11209, $11210, $11211, $11212, $11213, $11214, $11215, $11216, $11217, $11218, VersionRange($11219, $11220)), ($11221, $11222, $11223, $11224, $11225, $11226, $11227, $11228, $11229, $11230, $11231, $11232, $11233, $11234, $11235, $11236, $11237, $11238, $11239, $11240, $11241, $11242, $11243, $11244, $11245, $11246, $11247, $11248, VersionRange($11249, $11250)), ($11251, $11252, $11253, $11254, $11255, $11256, $11257, $11258, $11259, $11260, $11261, $11262, $11263, $11264, $11265, $11266, $11267, $11268, $11269, $11270, $11271, $11272, $11273, $11274, $11275, $11276, $11277, $11278, VersionRange($11279, $11280)), ($11281, $11282, $11283, $11284, $11285, $11286, $11287, $11288, $11289, $11290, $11291, $11292, $11293, $11294, $11295, $11296, $11297, $11298, $11299, $11300, $11301, $11302, $11303, $11304, $11305, $11306, $11307, $11308, VersionRange($11309, $11310)), ($11311, $11312, $11313, $11314, $11315, $11316, $11317, $11318, $11319, $11320, $11321, $11322, $11323, $11324, $11325, $11326, $11327, $11328, $11329, $11330, $11331, $11332, $11333, $11334, $11335, $11336, $11337, $11338, VersionRange($11339, $11340)), ($11341, $11342, $11343, $11344, $11345, $11346, $11347, $11348, $11349, $11350, $11351, $11352, $11353, $11354, $11355, $11356, $11357, $11358, $11359, $11360, $11361, $11362, $11363, $11364, $11365, $11366, $11367, $11368, VersionRange($11369, $11370)), ($11371, $11372, $11373, $11374, $11375, $11376, $11377, $11378, $11379, $11380, $11381, $11382, $11383, $11384, $11385, $11386, $11387, $11388, $11389, $11390, $11391, $11392, $11393, $11394, $11395, $11396, $11397, $11398, VersionRange($11399, $11400)), ($11401, $11402, $11403, $11404, $11405, $11406, $11407, $11408, $11409, $11410, $11411, $11412, $11413, $11414, $11415, $11416, $11417, $11418, $11419, $11420, $11421, $11422, $11423, $11424, $11425, $11426, $11427, $11428, VersionRange($11429, $11430)), ($11431, $11432, $11433, $11434, $11435, $11436, $11437, $11438, $11439, $11440, $11441, $11442, $11443, $11444, $11445, $11446, $11447, $11448, $11449, $11450, $11451, $11452, $11453, $11454, $11455, $11456, $11457, $11458, VersionRange($11459, $11460)), ($11461, $11462, $11463, $11464, $11465, $11466, $11467, $11468, $11469, $11470, $11471, $11472, $11473, $11474, $11475, $11476, $11477, $11478, $11479, $11480, $11481, $11482, $11483, $11484, $11485, $11486, $11487, $11488, VersionRange($11489, $11490)), ($11491, $11492, $11493, $11494, $11495, $11496, $11497, $11498, $11499, $11500, $11501, $11502, $11503, $11504, $11505, $11506, $11507, $11508, $11509, $11510, $11511, $11512, $11513, $11514, $11515, $11516, $11517, $11518, VersionRange($11519, $11520)), ($11521, $11522, $11523, $11524, $11525, $11526, $11527, $11528, $11529, $11530, $11531, $11532, $11533, $11534, $11535, $11536, $11537, $11538, $11539, $11540, $11541, $11542, $11543, $11544, $11545, $11546, $11547, $11548, VersionRange($11549, $11550)), ($11551, $11552, $11553, $11554, $11555, $11556, $11557, $11558, $11559, $11560, $11561, $11562, $11563, $11564, $11565, $11566, $11567, $11568, $11569, $11570, $11571, $11572, $11573, $11574, $11575, $11576, $11577, $11578, VersionRange($11579, $11580)), ($11581, $11582, $11583, $11584, $11585, $11586, $11587, $11588, $11589, $11590, $11591, $11592, $11593, $11594, $11595, $11596, $11597, $11598, $11599, $11600, $11601, $11602, $11603, $11604, $11605, $11606, $11607, $11608, VersionRange($11609, $11610)), ($11611, $11612, $11613, $11614, $11615, $11616, $11617, $11618, $11619, $11620, $11621, $11622, $11623, $11624, $11625, $11626, $11627, $11628, $11629, $11630, $11631, $11632, $11633, $11634, $11635, $11636, $11637, $11638, VersionRange($11639, $11640)), ($11641, $11642, $11643, $11644, $11645, $11646, $11647, $11648, $11649, $11650, $11651, $11652, $11653, $11654, $11655, $11656, $11657, $11658, $11659, $11660, $11661, $11662, $11663, $11664, $11665, $11666, $11667, $11668, VersionRange($11669, $11670)), ($11671, $11672, $11673, $11674, $11675, $11676, $11677, $11678, $11679, $11680, $11681, $11682, $11683, $11684, $11685, $11686, $11687, $11688, $11689, $11690, $11691, $11692, $11693, $11694, $11695, $11696, $11697, $11698, VersionRange($11699, $11700)), ($11701, $11702, $11703, $11704, $11705, $11706, $11707, $11708, $11709, $11710, $11711, $11712, $11713, $11714, $11715, $11716, $11717, $11718, $11719, $11720, $11721, $11722, $11723, $11724, $11725, $11726, $11727, $11728, VersionRange($11729, $11730)), ($11731, $11732, $11733, $11734, $11735, $11736, $11737, $11738, $11739, $11740, $11741, $11742, $11743, $11744, $11745, $11746, $11747, $11748, $11749, $11750, $11751, $11752, $11753, $11754, $11755, $11756, $11757, $11758, VersionRange($11759, $11760)), ($11761, $11762, $11763, $11764, $11765, $11766, $11767, $11768, $11769, $11770, $11771, $11772, $11773, $11774, $11775, $11776, $11777, $11778, $11779, $11780, $11781, $11782, $11783, $11784, $11785, $11786, $11787, $11788, VersionRange($11789, $11790)), ($11791, $11792, $11793, $11794, $11795, $11796, $11797, $11798, $11799, $11800, $11801, $11802, $11803, $11804, $11805, $11806, $11807, $11808, $11809, $11810, $11811, $11812, $11813, $11814, $11815, $11816, $11817, $11818, VersionRange($11819, $11820)), ($11821, $11822, $11823, $11824, $11825, $11826, $11827, $11828, $11829, $11830, $11831, $11832, $11833, $11834, $11835, $11836, $11837, $11838, $11839, $11840, $11841, $11842, $11843, $11844, $11845, $11846, $11847, $11848, VersionRange($11849, $11850)), ($11851, $11852, $11853, $11854, $11855, $11856, $11857, $11858, $11859, $11860, $11861, $11862, $11863, $11864, $11865, $11866, $11867, $11868, $11869, $11870, $11871, $11872, $11873, $11874, $11875, $11876, $11877, $11878, VersionRange($11879, $11880)), ($11881, $11882, $11883, $11884, $11885, $11886, $11887, $11888, $11889, $11890, $11891, $11892, $11893, $11894, $11895, $11896, $11897, $11898, $11899, $11900, $11901, $11902, $11903, $11904, $11905, $11906, $11907, $11908, VersionRange($11909, $11910)), ($11911, $11912, $11913, $11914, $11915, $11916, $11917, $11918, $11919, $11920, $11921, $11922, $11923, $11924, $11925, $11926, $11927, $11928, $11929, $11930, $11931, $11932, $11933, $11934, $11935, $11936, $11937, $11938, VersionRange($11939, $11940)), ($11941, $11942, $11943, $11944, $11945, $11946, $11947, $11948, $11949, $11950, $11951, $11952, $11953, $11954, $11955, $11956, $11957, $11958, $11959, $11960, $11961, $11962, $11963, $11964, $11965, $11966, $11967, $11968, VersionRange($11969, $11970)), ($11971, $11972, $11973, $11974, $11975, $11976, $11977, $11978, $11979, $11980, $11981, $11982, $11983, $11984, $11985, $11986, $11987, $11988, $11989, $11990, $11991, $11992, $11993, $11994, $11995, $11996, $11997, $11998, VersionRange($11999, $12000)), ($12001, $12002, $12003, $12004, $12005, $12006, $12007, $12008, $12009, $12010, $12011, $12012, $12013, $12014, $12015, $12016, $12017, $12018, $12019, $12020, $12021, $12022, $12023, $12024, $12025, $12026, $12027, $12028, VersionRange($12029, $12030)), ($12031, $12032, $12033, $12034, $12035, $12036, $12037, $12038, $12039, $12040, $12041, $12042, $12043, $12044, $12045, $12046, $12047, $12048, $12049, $12050, $12051, $12052, $12053, $12054, $12055, $12056, $12057, $12058, VersionRange($12059, $12060)), ($12061, $12062, $12063, $12064, $12065, $12066, $12067, $12068, $12069, $12070, $12071, $12072, $12073, $12074, $12075, $12076, $12077, $12078, $12079, $12080, $12081, $12082, $12083, $12084, $12085, $12086, $12087, $12088, VersionRange($12089, $12090)), ($12091, $12092, $12093, $12094, $12095, $12096, $12097, $12098, $12099, $12100, $12101, $12102, $12103, $12104, $12105, $12106, $12107, $12108, $12109, $12110, $12111, $12112, $12113, $12114, $12115, $12116, $12117, $12118, VersionRange($12119, $12120)), ($12121, $12122, $12123, $12124, $12125, $12126, $12127, $12128, $12129, $12130, $12131, $12132, $12133, $12134, $12135, $12136, $12137, $12138, $12139, $12140, $12141, $12142, $12143, $12144, $12145, $12146, $12147, $12148, VersionRange($12149, $12150)), ($12151, $12152, $12153, $12154, $12155, $12156, $12157, $12158, $12159, $12160, $12161, $12162, $12163, $12164, $12165, $12166, $12167, $12168, $12169, $12170, $12171, $12172, $12173, $12174, $12175, $12176, $12177, $12178, VersionRange($12179, $12180)), ($12181, $12182, $12183, $12184, $12185, $12186, $12187, $12188, $12189, $12190, $12191, $12192, $12193, $12194, $12195, $12196, $12197, $12198, $12199, $12200, $12201, $12202, $12203, $12204, $12205, $12206, $12207, $12208, VersionRange($12209, $12210)), ($12211, $12212, $12213, $12214, $12215, $12216, $12217, $12218, $12219, $12220, $12221, $12222, $12223, $12224, $12225, $12226, $12227, $12228, $12229, $12230, $12231, $12232, $12233, $12234, $12235, $12236, $12237, $12238, VersionRange($12239, $12240)), ($12241, $12242, $12243, $12244, $12245, $12246, $12247, $12248, $12249, $12250, $12251, $12252, $12253, $12254, $12255, $12256, $12257, $12258, $12259, $12260, $12261, $12262, $12263, $12264, $12265, $12266, $12267, $12268, VersionRange($12269, $12270)), ($12271, $12272, $12273, $12274, $12275, $12276, $12277, $12278, $12279, $12280, $12281, $12282, $12283, $12284, $12285, $12286, $12287, $12288, $12289, $12290, $12291, $12292, $12293, $12294, $12295, $12296, $12297, $12298, VersionRange($12299, $12300)), ($12301, $12302, $12303, $12304, $12305, $12306, $12307, $12308, $12309, $12310, $12311, $12312, $12313, $12314, $12315, $12316, $12317, $12318, $12319, $12320, $12321, $12322, $12323, $12324, $12325, $12326, $12327, $12328, VersionRange($12329, $12330)), ($12331, $12332, $12333, $12334, $12335, $12336, $12337, $12338, $12339, $12340, $12341, $12342, $12343, $12344, $12345, $12346, $12347, $12348, $12349, $12350, $12351, $12352, $12353, $12354, $12355, $12356, $12357, $12358, VersionRange($12359, $12360)), ($12361, $12362, $12363, $12364, $12365, $12366, $12367, $12368, $12369, $12370, $12371, $12372, $12373, $12374, $12375, $12376, $12377, $12378, $12379, $12380, $12381, $12382, $12383, $12384, $12385, $12386, $12387, $12388, VersionRange($12389, $12390)), ($12391, $12392, $12393, $12394, $12395, $12396, $12397, $12398, $12399, $12400, $12401, $12402, $12403, $12404, $12405, $12406, $12407, $12408, $12409, $12410, $12411, $12412, $12413, $12414, $12415, $12416, $12417, $12418, VersionRange($12419, $12420)), ($12421, $12422, $12423, $12424, $12425, $12426, $12427, $12428, $12429, $12430, $12431, $12432, $12433, $12434, $12435, $12436, $12437, $12438, $12439, $12440, $12441, $12442, $12443, $12444, $12445, $12446, $12447, $12448, VersionRange($12449, $12450)), ($12451, $12452, $12453, $12454, $12455, $12456, $12457, $12458, $12459, $12460, $12461, $12462, $12463, $12464, $12465, $12466, $12467, $12468, $12469, $12470, $12471, $12472, $12473, $12474, $12475, $12476, $12477, $12478, VersionRange($12479, $12480)), ($12481, $12482, $12483, $12484, $12485, $12486, $12487, $12488, $12489, $12490, $12491, $12492, $12493, $12494, $12495, $12496, $12497, $12498, $12499, $12500, $12501, $12502, $12503, $12504, $12505, $12506, $12507, $12508, VersionRange($12509, $12510)), ($12511, $12512, $12513, $12514, $12515, $12516, $12517, $12518, $12519, $12520, $12521, $12522, $12523, $12524, $12525, $12526, $12527, $12528, $12529, $12530, $12531, $12532, $12533, $12534, $12535, $12536, $12537, $12538, VersionRange($12539, $12540)), ($12541, $12542, $12543, $12544, $12545, $12546, $12547, $12548, $12549, $12550, $12551, $12552, $12553, $12554, $12555, $12556, $12557, $12558, $12559, $12560, $12561, $12562, $12563, $12564, $12565, $12566, $12567, $12568, VersionRange($12569, $12570)), ($12571, $12572, $12573, $12574, $12575, $12576, $12577, $12578, $12579, $12580, $12581, $12582, $12583, $12584, $12585, $12586, $12587, $12588, $12589, $12590, $12591, $12592, $12593, $12594, $12595, $12596, $12597, $12598, VersionRange($12599, $12600)), ($12601, $12602, $12603, $12604, $12605, $12606, $12607, $12608, $12609, $12610, $12611, $12612, $12613, $12614, $12615, $12616, $12617, $12618, $12619, $12620, $12621, $12622, $12623, $12624, $12625, $12626, $12627, $12628, VersionRange($12629, $12630)), ($12631, $12632, $12633, $12634, $12635, $12636, $12637, $12638, $12639, $12640, $12641, $12642, $12643, $12644, $12645, $12646, $12647, $12648, $12649, $12650, $12651, $12652, $12653, $12654, $12655, $12656, $12657, $12658, VersionRange($12659, $12660)), ($12661, $12662, $12663, $12664, $12665, $12666, $12667, $12668, $12669, $12670, $12671, $12672, $12673, $12674, $12675, $12676, $12677, $12678, $12679, $12680, $12681, $12682, $12683, $12684, $12685, $12686, $12687, $12688, VersionRange($12689, $12690)), ($12691, $12692, $12693, $12694, $12695, $12696, $12697, $12698, $12699, $12700, $12701, $12702, $12703, $12704, $12705, $12706, $12707, $12708, $12709, $12710, $12711, $12712, $12713, $12714, $12715, $12716, $12717, $12718, VersionRange($12719, $12720)), ($12721, $12722, $12723, $12724, $12725, $12726, $12727, $12728, $12729, $12730, $12731, $12732, $12733, $12734, $12735, $12736, $12737, $12738, $12739, $12740, $12741, $12742, $12743, $12744, $12745, $12746, $12747, $12748, VersionRange($12749, $12750)), ($12751, $12752, $12753, $12754, $12755, $12756, $12757, $12758, $12759, $12760, $12761, $12762, $12763, $12764, $12765, $12766, $12767, $12768, $12769, $12770, $12771, $12772, $12773, $12774, $12775, $12776, $12777, $12778, VersionRange($12779, $12780)), ($12781, $12782, $12783, $12784, $12785, $12786, $12787, $12788, $12789, $12790, $12791, $12792, $12793, $12794, $12795, $12796, $12797, $12798, $12799, $12800, $12801, $12802, $12803, $12804, $12805, $12806, $12807, $12808, VersionRange($12809, $12810)), ($12811, $12812, $12813, $12814, $12815, $12816, $12817, $12818, $12819, $12820, $12821, $12822, $12823, $12824, $12825, $12826, $12827, $12828, $12829, $12830, $12831, $12832, $12833, $12834, $12835, $12836, $12837, $12838, VersionRange($12839, $12840)), ($12841, $12842, $12843, $12844, $12845, $12846, $12847, $12848, $12849, $12850, $12851, $12852, $12853, $12854, $12855, $12856, $12857, $12858, $12859, $12860, $12861, $12862, $12863, $12864, $12865, $12866, $12867, $12868, VersionRange($12869, $12870)), ($12871, $12872, $12873, $12874, $12875, $12876, $12877, $12878, $12879, $12880, $12881, $12882, $12883, $12884, $12885, $12886, $12887, $12888, $12889, $12890, $12891, $12892, $12893, $12894, $12895, $12896, $12897, $12898, VersionRange($12899, $12900)), ($12901, $12902, $12903, $12904, $12905, $12906, $12907, $12908, $12909, $12910, $12911, $12912, $12913, $12914, $12915, $12916, $12917, $12918, $12919, $12920, $12921, $12922, $12923, $12924, $12925, $12926, $12927, $12928, VersionRange($12929, $12930)), ($12931, $12932, $12933, $12934, $12935, $12936, $12937, $12938, $12939, $12940, $12941, $12942, $12943, $12944, $12945, $12946, $12947, $12948, $12949, $12950, $12951, $12952, $12953, $12954, $12955, $12956, $12957, $12958, VersionRange($12959, $12960)), ($12961, $12962, $12963, $12964, $12965, $12966, $12967, $12968, $12969, $12970[...]Date: 2023-07-04 18:38:47
Detail: Process holding the lock: 1175. Wait queue: 1126.
Context: while inserting index tuple (402752,1) in relation "vuln"
Statement: INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30)), ($31, $32, $33, $34, $35, $36, $37, $38, $39, $40, $41, $42, $43, $44, $45, $46, $47, $48, $49, $50, $51, $52, $53, $54, $55, $56, $57, $58, VersionRange($59, $60)), ($61, $62, $63, $64, $65, $66, $67, $68, $69, $70, $71, $72, $73, $74, $75, $76, $77, $78, $79, $80, $81, $82, $83, $84, $85, $86, $87, $88, VersionRange($89, $90)), ($91, $92, $93, $94, $95, $96, $97, $98, $99, $100, $101, $102, $103, $104, $105, $106, $107, $108, $109, $110, $111, $112, $113, $114, $115, $116, $117, $118, VersionRange($119, $120)), ($121, $122, $123, $124, $125, $126, $127, $128, $129, $130, $131, $132, $133, $134, $135, $136, $137, $138, $139, $140, $141, $142, $143, $144, $145, $146, $147, $148, VersionRange($149, $150)), ($151, $152, $153, $154, $155, $156, $157, $158, $159, $160, $161, $162, $163, $164, $165, $166, $167, $168, $169, $170, $171, $172, $173, $174, $175, $176, $177, $178, VersionRange($179, $180)), ($181, $182, $183, $184, $185, $186, $187, $188, $189, $190, $191, $192, $193, $194, $195, $196, $197, $198, $199, $200, $201, $202, $203, $204, $205, $206, $207, $208, VersionRange($209, $210)), ($211, $212, $213, $214, $215, $216, $217, $218, $219, $220, $221, $222, $223, $224, $225, $226, $227, $228, $229, $230, $231, $232, $233, $234, $235, $236, $237, $238, VersionRange($239, $240)), ($241, $242, $243, $244, $245, $246, $247, $248, $249, $250, $251, $252, $253, $254, $255, $256, $257, $258, $259, $260, $261, $262, $263, $264, $265, $266, $267, $268, VersionRange($269, $270)), ($271, $272, $273, $274, $275, $276, $277, $278, $279, $280, $281, $282, $283, $284, $285, $286, $287, $288, $289, $290, $291, $292, $293, $294, $295, $296, $297, $298, VersionRange($299, $300)), ($301, $302, $303, $304, $305, $306, $307, $308, $309, $310, $311, $312, $313, $314, $315, $316, $317, $318, $319, $320, $321, $322, $323, $324, $325, $326, $327, $328, VersionRange($329, $330)), ($331, $332, $333, $334, $335, $336, $337, $338, $339, $340, $341, $342, $343, $344, $345, $346, $347, $348, $349, $350, $351, $352, $353, $354, $355, $356, $357, $358, VersionRange($359, $360)), ($361, $362, $363, $364, $365, $366, $367, $368, $369, $370, $371, $372, $373, $374, $375, $376, $377, $378, $379, $380, $381, $382, $383, $384, $385, $386, $387, $388, VersionRange($389, $390)), ($391, $392, $393, $394, $395, $396, $397, $398, $399, $400, $401, $402, $403, $404, $405, $406, $407, $408, $409, $410, $411, $412, $413, $414, $415, $416, $417, $418, VersionRange($419, $420)), ($421, $422, $423, $424, $425, $426, $427, $428, $429, $430, $431, $432, $433, $434, $435, $436, $437, $438, $439, $440, $441, $442, $443, $444, $445, $446, $447, $448, VersionRange($449, $450)), ($451, $452, $453, $454, $455, $456, $457, $458, $459, $460, $461, $462, $463, $464, $465, $466, $467, $468, $469, $470, $471, $472, $473, $474, $475, $476, $477, $478, VersionRange($479, $480)), ($481, $482, $483, $484, $485, $486, $487, $488, $489, $490, $491, $492, $493, $494, $495, $496, $497, $498, $499, $500, $501, $502, $503, $504, $505, $506, $507, $508, VersionRange($509, $510)), ($511, $512, $513, $514, $515, $516, $517, $518, $519, $520, $521, $522, $523, $524, $525, $526, $527, $528, $529, $530, $531, $532, $533, $534, $535, $536, $537, $538, VersionRange($539, $540)), ($541, $542, $543, $544, $545, $546, $547, $548, $549, $550, $551, $552, $553, $554, $555, $556, $557, $558, $559, $560, $561, $562, $563, $564, $565, $566, $567, $568, VersionRange($569, $570)), ($571, $572, $573, $574, $575, $576, $577, $578, $579, $580, $581, $582, $583, $584, $585, $586, $587, $588, $589, $590, $591, $592, $593, $594, $595, $596, $597, $598, VersionRange($599, $600)), ($601, $602, $603, $604, $605, $606, $607, $608, $609, $610, $611, $612, $613, $614, $615, $616, $617, $618, $619, $620, $621, $622, $623, $624, $625, $626, $627, $628, VersionRange($629, $630)), ($631, $632, $633, $634, $635, $636, $637, $638, $639, $640, $641, $642, $643, $644, $645, $646, $647, $648, $649, $650, $651, $652, $653, $654, $655, $656, $657, $658, VersionRange($659, $660)), ($661, $662, $663, $664, $665, $666, $667, $668, $669, $670, $671, $672, $673, $674, $675, $676, $677, $678, $679, $680, $681, $682, $683, $684, $685, $686, $687, $688, VersionRange($689, $690)), ($691, $692, $693, $694, $695, $696, $697, $698, $699, $700, $701, $702, $703, $704, $705, $706, $707, $708, $709, $710, $711, $712, $713, $714, $715, $716, $717, $718, VersionRange($719, $720)), ($721, $722, $723, $724, $725, $726, $727, $728, $729, $730, $731, $732, $733, $734, $735, $736, $737, $738, $739, $740, $741, $742, $743, $744, $745, $746, $747, $748, VersionRange($749, $750)), ($751, $752, $753, $754, $755, $756, $757, $758, $759, $760, $761, $762, $763, $764, $765, $766, $767, $768, $769, $770, $771, $772, $773, $774, $775, $776, $777, $778, VersionRange($779, $780)), ($781, $782, $783, $784, $785, $786, $787, $788, $789, $790, $791, $792, $793, $794, $795, $796, $797, $798, $799, $800, $801, $802, $803, $804, $805, $806, $807, $808, VersionRange($809, $810)), ($811, $812, $813, $814, $815, $816, $817, $818, $819, $820, $821, $822, $823, $824, $825, $826, $827, $828, $829, $830, $831, $832, $833, $834, $835, $836, $837, $838, VersionRange($839, $840)), ($841, $842, $843, $844, $845, $846, $847, $848, $849, $850, $851, $852, $853, $854, $855, $856, $857, $858, $859, $860, $861, $862, $863, $864, $865, $866, $867, $868, VersionRange($869, $870)), ($871, $872, $873, $874, $875, $876, $877, $878, $879, $880, $881, $882, $883, $884, $885, $886, $887, $888, $889, $890, $891, $892, $893, $894, $895, $896, $897, $898, VersionRange($899, $900)), ($901, $902, $903, $904, $905, $906, $907, $908, $909, $910, $911, $912, $913, $914, $915, $916, $917, $918, $919, $920, $921, $922, $923, $924, $925, $926, $927, $928, VersionRange($929, $930)), ($931, $932, $933, $934, $935, $936, $937, $938, $939, $940, $941, $942, $943, $944, $945, $946, $947, $948, $949, $950, $951, $952, $953, $954, $955, $956, $957, $958, VersionRange($959, $960)), ($961, $962, $963, $964, $965, $966, $967, $968, $969, $970, $971, $972, $973, $974, $975, $976, $977, $978, $979, $980, $981, $982, $983, $984, $985, $986, $987, $988, VersionRange($989, $990)), ($991, $992, $993, $994, $995, $996, $997, $998, $999, $1000, $1001, $1002, $1003, $1004, $1005, $1006, $1007, $1008, $1009, $1010, $1011, $1012, $1013, $1014, $1015, $1016, $1017, $1018, VersionRange($1019, $1020)), ($1021, $1022, $1023, $1024, $1025, $1026, $1027, $1028, $1029, $1030, $1031, $1032, $1033, $1034, $1035, $1036, $1037, $1038, $1039, $1040, $1041, $1042, $1043, $1044, $1045, $1046, $1047, $1048, VersionRange($1049, $1050)), ($1051, $1052, $1053, $1054, $1055, $1056, $1057, $1058, $1059, $1060, $1061, $1062, $1063, $1064, $1065, $1066, $1067, $1068, $1069, $1070, $1071, $1072, $1073, $1074, $1075, $1076, $1077, $1078, VersionRange($1079, $1080)), ($1081, $1082, $1083, $1084, $1085, $1086, $1087, $1088, $1089, $1090, $1091, $1092, $1093, $1094, $1095, $1096, $1097, $1098, $1099, $1100, $1101, $1102, $1103, $1104, $1105, $1106, $1107, $1108, VersionRange($1109, $1110)), ($1111, $1112, $1113, $1114, $1115, $1116, $1117, $1118, $1119, $1120, $1121, $1122, $1123, $1124, $1125, $1126, $1127, $1128, $1129, $1130, $1131, $1132, $1133, $1134, $1135, $1136, $1137, $1138, VersionRange($1139, $1140)), ($1141, $1142, $1143, $1144, $1145, $1146, $1147, $1148, $1149, $1150, $1151, $1152, $1153, $1154, $1155, $1156, $1157, $1158, $1159, $1160, $1161, $1162, $1163, $1164, $1165, $1166, $1167, $1168, VersionRange($1169, $1170)), ($1171, $1172, $1173, $1174, $1175, $1176, $1177, $1178, $1179, $1180, $1181, $1182, $1183, $1184, $1185, $1186, $1187, $1188, $1189, $1190, $1191, $1192, $1193, $1194, $1195, $1196, $1197, $1198, VersionRange($1199, $1200)), ($1201, $1202, $1203, $1204, $1205, $1206, $1207, $1208, $1209, $1210, $1211, $1212, $1213, $1214, $1215, $1216, $1217, $1218, $1219, $1220, $1221, $1222, $1223, $1224, $1225, $1226, $1227, $1228, VersionRange($1229, $1230)), ($1231, $1232, $1233, $1234, $1235, $1236, $1237, $1238, $1239, $1240, $1241, $1242, $1243, $1244, $1245, $1246, $1247, $1248, $1249, $1250, $1251, $1252, $1253, $1254, $1255, $1256, $1257, $1258, VersionRange($1259, $1260)), ($1261, $1262, $1263, $1264, $1265, $1266, $1267, $1268, $1269, $1270, $1271, $1272, $1273, $1274, $1275, $1276, $1277, $1278, $1279, $1280, $1281, $1282, $1283, $1284, $1285, $1286, $1287, $1288, VersionRange($1289, $1290)), ($1291, $1292, $1293, $1294, $1295, $1296, $1297, $1298, $1299, $1300, $1301, $1302, $1303, $1304, $1305, $1306, $1307, $1308, $1309, $1310, $1311, $1312, $1313, $1314, $1315, $1316, $1317, $1318, VersionRange($1319, $1320)), ($1321, $1322, $1323, $1324, $1325, $1326, $1327, $1328, $1329, $1330, $1331, $1332, $1333, $1334, $1335, $1336, $1337, $1338, $1339, $1340, $1341, $1342, $1343, $1344, $1345, $1346, $1347, $1348, VersionRange($1349, $1350)), ($1351, $1352, $1353, $1354, $1355, $1356, $1357, $1358, $1359, $1360, $1361, $1362, $1363, $1364, $1365, $1366, $1367, $1368, $1369, $1370, $1371, $1372, $1373, $1374, $1375, $1376, $1377, $1378, VersionRange($1379, $1380)), ($1381, $1382, $1383, $1384, $1385, $1386, $1387, $1388, $1389, $1390, $1391, $1392, $1393, $1394, $1395, $1396, $1397, $1398, $1399, $1400, $1401, $1402, $1403, $1404, $1405, $1406, $1407, $1408, VersionRange($1409, $1410)), ($1411, $1412, $1413, $1414, $1415, $1416, $1417, $1418, $1419, $1420, $1421, $1422, $1423, $1424, $1425, $1426, $1427, $1428, $1429, $1430, $1431, $1432, $1433, $1434, $1435, $1436, $1437, $1438, VersionRange($1439, $1440)), ($1441, $1442, $1443, $1444, $1445, $1446, $1447, $1448, $1449, $1450, $1451, $1452, $1453, $1454, $1455, $1456, $1457, $1458, $1459, $1460, $1461, $1462, $1463, $1464, $1465, $1466, $1467, $1468, VersionRange($1469, $1470)), ($1471, $1472, $1473, $1474, $1475, $1476, $1477, $1478, $1479, $1480, $1481, $1482, $1483, $1484, $1485, $1486, $1487, $1488, $1489, $1490, $1491, $1492, $1493, $1494, $1495, $1496, $1497, $1498, VersionRange($1499, $1500)), ($1501, $1502, $1503, $1504, $1505, $1506, $1507, $1508, $1509, $1510, $1511, $1512, $1513, $1514, $1515, $1516, $1517, $1518, $1519, $1520, $1521, $1522, $1523, $1524, $1525, $1526, $1527, $1528, VersionRange($1529, $1530)), ($1531, $1532, $1533, $1534, $1535, $1536, $1537, $1538, $1539, $1540, $1541, $1542, $1543, $1544, $1545, $1546, $1547, $1548, $1549, $1550, $1551, $1552, $1553, $1554, $1555, $1556, $1557, $1558, VersionRange($1559, $1560)), ($1561, $1562, $1563, $1564, $1565, $1566, $1567, $1568, $1569, $1570, $1571, $1572, $1573, $1574, $1575, $1576, $1577, $1578, $1579, $1580, $1581, $1582, $1583, $1584, $1585, $1586, $1587, $1588, VersionRange($1589, $1590)), ($1591, $1592, $1593, $1594, $1595, $1596, $1597, $1598, $1599, $1600, $1601, $1602, $1603, $1604, $1605, $1606, $1607, $1608, $1609, $1610, $1611, $1612, $1613, $1614, $1615, $1616, $1617, $1618, VersionRange($1619, $1620)), ($1621, $1622, $1623, $1624, $1625, $1626, $1627, $1628, $1629, $1630, $1631, $1632, $1633, $1634, $1635, $1636, $1637, $1638, $1639, $1640, $1641, $1642, $1643, $1644, $1645, $1646, $1647, $1648, VersionRange($1649, $1650)), ($1651, $1652, $1653, $1654, $1655, $1656, $1657, $1658, $1659, $1660, $1661, $1662, $1663, $1664, $1665, $1666, $1667, $1668, $1669, $1670, $1671, $1672, $1673, $1674, $1675, $1676, $1677, $1678, VersionRange($1679, $1680)), ($1681, $1682, $1683, $1684, $1685, $1686, $1687, $1688, $1689, $1690, $1691, $1692, $1693, $1694, $1695, $1696, $1697, $1698, $1699, $1700, $1701, $1702, $1703, $1704, $1705, $1706, $1707, $1708, VersionRange($1709, $1710)), ($1711, $1712, $1713, $1714, $1715, $1716, $1717, $1718, $1719, $1720, $1721, $1722, $1723, $1724, $1725, $1726, $1727, $1728, $1729, $1730, $1731, $1732, $1733, $1734, $1735, $1736, $1737, $1738, VersionRange($1739, $1740)), ($1741, $1742, $1743, $1744, $1745, $1746, $1747, $1748, $1749, $1750, $1751, $1752, $1753, $1754, $1755, $1756, $1757, $1758, $1759, $1760, $1761, $1762, $1763, $1764, $1765, $1766, $1767, $1768, VersionRange($1769, $1770)), ($1771, $1772, $1773, $1774, $1775, $1776, $1777, $1778, $1779, $1780, $1781, $1782, $1783, $1784, $1785, $1786, $1787, $1788, $1789, $1790, $1791, $1792, $1793, $1794, $1795, $1796, $1797, $1798, VersionRange($1799, $1800)), ($1801, $1802, $1803, $1804, $1805, $1806, $1807, $1808, $1809, $1810, $1811, $1812, $1813, $1814, $1815, $1816, $1817, $1818, $1819, $1820, $1821, $1822, $1823, $1824, $1825, $1826, $1827, $1828, VersionRange($1829, $1830)), ($1831, $1832, $1833, $1834, $1835, $1836, $1837, $1838, $1839, $1840, $1841, $1842, $1843, $1844, $1845, $1846, $1847, $1848, $1849, $1850, $1851, $1852, $1853, $1854, $1855, $1856, $1857, $1858, VersionRange($1859, $1860)), ($1861, $1862, $1863, $1864, $1865, $1866, $1867, $1868, $1869, $1870, $1871, $1872, $1873, $1874, $1875, $1876, $1877, $1878, $1879, $1880, $1881, $1882, $1883, $1884, $1885, $1886, $1887, $1888, VersionRange($1889, $1890)), ($1891, $1892, $1893, $1894, $1895, $1896, $1897, $1898, $1899, $1900, $1901, $1902, $1903, $1904, $1905, $1906, $1907, $1908, $1909, $1910, $1911, $1912, $1913, $1914, $1915, $1916, $1917, $1918, VersionRange($1919, $1920)), ($1921, $1922, $1923, $1924, $1925, $1926, $1927, $1928, $1929, $1930, $1931, $1932, $1933, $1934, $1935, $1936, $1937, $1938, $1939, $1940, $1941, $1942, $1943, $1944, $1945, $1946, $1947, $1948, VersionRange($1949, $1950)), ($1951, $1952, $1953, $1954, $1955, $1956, $1957, $1958, $1959, $1960, $1961, $1962, $1963, $1964, $1965, $1966, $1967, $1968, $1969, $1970, $1971, $1972, $1973, $1974, $1975, $1976, $1977, $1978, VersionRange($1979, $1980)), ($1981, $1982, $1983, $1984, $1985, $1986, $1987, $1988, $1989, $1990, $1991, $1992, $1993, $1994, $1995, $1996, $1997, $1998, $1999, $2000, $2001, $2002, $2003, $2004, $2005, $2006, $2007, $2008, VersionRange($2009, $2010)), ($2011, $2012, $2013, $2014, $2015, $2016, $2017, $2018, $2019, $2020, $2021, $2022, $2023, $2024, $2025, $2026, $2027, $2028, $2029, $2030, $2031, $2032, $2033, $2034, $2035, $2036, $2037, $2038, VersionRange($2039, $2040)), ($2041, $2042, $2043, $2044, $2045, $2046, $2047, $2048, $2049, $2050, $2051, $2052, $2053, $2054, $2055, $2056, $2057, $2058, $2059, $2060, $2061, $2062, $2063, $2064, $2065, $2066, $2067, $2068, VersionRange($2069, $2070)), ($2071, $2072, $2073, $2074, $2075, $2076, $2077, $2078, $2079, $2080, $2081, $2082, $2083, $2084, $2085, $2086, $2087, $2088, $2089, $2090, $2091, $2092, $2093, $2094, $2095, $2096, $2097, $2098, VersionRange($2099, $2100)), ($2101, $2102, $2103, $2104, $2105, $2106, $2107, $2108, $2109, $2110, $2111, $2112, $2113, $2114, $2115, $2116, $2117, $2118, $2119, $2120, $2121, $2122, $2123, $2124, $2125, $2126, $2127, $2128, VersionRange($2129, $2130)), ($2131, $2132, $2133, $2134, $2135, $2136, $2137, $2138, $2139, $2140, $2141, $2142, $2143, $2144, $2145, $2146, $2147, $2148, $2149, $2150, $2151, $2152, $2153, $2154, $2155, $2156, $2157, $2158, VersionRange($2159, $2160)), ($2161, $2162, $2163, $2164, $2165, $2166, $2167, $2168, $2169, $2170, $2171, $2172, $2173, $2174, $2175, $2176, $2177, $2178, $2179, $2180, $2181, $2182, $2183, $2184, $2185, $2186, $2187, $2188, VersionRange($2189, $2190)), ($2191, $2192, $2193, $2194, $2195, $2196, $2197, $2198, $2199, $2200, $2201, $2202, $2203, $2204, $2205, $2206, $2207, $2208, $2209, $2210, $2211, $2212, $2213, $2214, $2215, $2216, $2217, $2218, VersionRange($2219, $2220)), ($2221, $2222, $2223, $2224, $2225, $2226, $2227, $2228, $2229, $2230, $2231, $2232, $2233, $2234, $2235, $2236, $2237, $2238, $2239, $2240, $2241, $2242, $2243, $2244, $2245, $2246, $2247, $2248, VersionRange($2249, $2250)), ($2251, $2252, $2253, $2254, $2255, $2256, $2257, $2258, $2259, $2260, $2261, $2262, $2263, $2264, $2265, $2266, $2267, $2268, $2269, $2270, $2271, $2272, $2273, $2274, $2275, $2276, $2277, $2278, VersionRange($2279, $2280)), ($2281, $2282, $2283, $2284, $2285, $2286, $2287, $2288, $2289, $2290, $2291, $2292, $2293, $2294, $2295, $2296, $2297, $2298, $2299, $2300, $2301, $2302, $2303, $2304, $2305, $2306, $2307, $2308, VersionRange($2309, $2310)), ($2311, $2312, $2313, $2314, $2315, $2316, $2317, $2318, $2319, $2320, $2321, $2322, $2323, $2324, $2325, $2326, $2327, $2328, $2329, $2330, $2331, $2332, $2333, $2334, $2335, $2336, $2337, $2338, VersionRange($2339, $2340)), ($2341, $2342, $2343, $2344, $2345, $2346, $2347, $2348, $2349, $2350, $2351, $2352, $2353, $2354, $2355, $2356, $2357, $2358, $2359, $2360, $2361, $2362, $2363, $2364, $2365, $2366, $2367, $2368, VersionRange($2369, $2370)), ($2371, $2372, $2373, $2374, $2375, $2376, $2377, $2378, $2379, $2380, $2381, $2382, $2383, $2384, $2385, $2386, $2387, $2388, $2389, $2390, $2391, $2392, $2393, $2394, $2395, $2396, $2397, $2398, VersionRange($2399, $2400)), ($2401, $2402, $2403, $2404, $2405, $2406, $2407, $2408, $2409, $2410, $2411, $2412, $2413, $2414, $2415, $2416, $2417, $2418, $2419, $2420, $2421, $2422, $2423, $2424, $2425, $2426, $2427, $2428, VersionRange($2429, $2430)), ($2431, $2432, $2433, $2434, $2435, $2436, $2437, $2438, $2439, $2440, $2441, $2442, $2443, $2444, $2445, $2446, $2447, $2448, $2449, $2450, $2451, $2452, $2453, $2454, $2455, $2456, $2457, $2458, VersionRange($2459, $2460)), ($2461, $2462, $2463, $2464, $2465, $2466, $2467, $2468, $2469, $2470, $2471, $2472, $2473, $2474, $2475, $2476, $2477, $2478, $2479, $2480, $2481, $2482, $2483, $2484, $2485, $2486, $2487, $2488, VersionRange($2489, $2490)), ($2491, $2492, $2493, $2494, $2495, $2496, $2497, $2498, $2499, $2500, $2501, $2502, $2503, $2504, $2505, $2506, $2507, $2508, $2509, $2510, $2511, $2512, $2513, $2514, $2515, $2516, $2517, $2518, VersionRange($2519, $2520)), ($2521, $2522, $2523, $2524, $2525, $2526, $2527, $2528, $2529, $2530, $2531, $2532, $2533, $2534, $2535, $2536, $2537, $2538, $2539, $2540, $2541, $2542, $2543, $2544, $2545, $2546, $2547, $2548, VersionRange($2549, $2550)), ($2551, $2552, $2553, $2554, $2555, $2556, $2557, $2558, $2559, $2560, $2561, $2562, $2563, $2564, $2565, $2566, $2567, $2568, $2569, $2570, $2571, $2572, $2573, $2574, $2575, $2576, $2577, $2578, VersionRange($2579, $2580)), ($2581, $2582, $2583, $2584, $2585, $2586, $2587, $2588, $2589, $2590, $2591, $2592, $2593, $2594, $2595, $2596, $2597, $2598, $2599, $2600, $2601, $2602, $2603, $2604, $2605, $2606, $2607, $2608, VersionRange($2609, $2610)), ($2611, $2612, $2613, $2614, $2615, $2616, $2617, $2618, $2619, $2620, $2621, $2622, $2623, $2624, $2625, $2626, $2627, $2628, $2629, $2630, $2631, $2632, $2633, $2634, $2635, $2636, $2637, $2638, VersionRange($2639, $2640)), ($2641, $2642, $2643, $2644, $2645, $2646, $2647, $2648, $2649, $2650, $2651, $2652, $2653, $2654, $2655, $2656, $2657, $2658, $2659, $2660, $2661, $2662, $2663, $2664, $2665, $2666, $2667, $2668, VersionRange($2669, $2670)), ($2671, $2672, $2673, $2674, $2675, $2676, $2677, $2678, $2679, $2680, $2681, $2682, $2683, $2684, $2685, $2686, $2687, $2688, $2689, $2690, $2691, $2692, $2693, $2694, $2695, $2696, $2697, $2698, VersionRange($2699, $2700)), ($2701, $2702, $2703, $2704, $2705, $2706, $2707, $2708, $2709, $2710, $2711, $2712, $2713, $2714, $2715, $2716, $2717, $2718, $2719, $2720, $2721, $2722, $2723, $2724, $2725, $2726, $2727, $2728, VersionRange($2729, $2730)), ($2731, $2732, $2733, $2734, $2735, $2736, $2737, $2738, $2739, $2740, $2741, $2742, $2743, $2744, $2745, $2746, $2747, $2748, $2749, $2750, $2751, $2752, $2753, $2754, $2755, $2756, $2757, $2758, VersionRange($2759, $2760)), ($2761, $2762, $2763, $2764, $2765, $2766, $2767, $2768, $2769, $2770, $2771, $2772, $2773, $2774, $2775, $2776, $2777, $2778, $2779, $2780, $2781, $2782, $2783, $2784, $2785, $2786, $2787, $2788, VersionRange($2789, $2790)), ($2791, $2792, $2793, $2794, $2795, $2796, $2797, $2798, $2799, $2800, $2801, $2802, $2803, $2804, $2805, $2806, $2807, $2808, $2809, $2810, $2811, $2812, $2813, $2814, $2815, $2816, $2817, $2818, VersionRange($2819, $2820)), ($2821, $2822, $2823, $2824, $2825, $2826, $2827, $2828, $2829, $2830, $2831, $2832, $2833, $2834, $2835, $2836, $2837, $2838, $2839, $2840, $2841, $2842, $2843, $2844, $2845, $2846, $2847, $2848, VersionRange($2849, $2850)), ($2851, $2852, $2853, $2854, $2855, $2856, $2857, $2858, $2859, $2860, $2861, $2862, $2863, $2864, $2865, $2866, $2867, $2868, $2869, $2870, $2871, $2872, $2873, $2874, $2875, $2876, $2877, $2878, VersionRange($2879, $2880)), ($2881, $2882, $2883, $2884, $2885, $2886, $2887, $2888, $2889, $2890, $2891, $2892, $2893, $2894, $2895, $2896, $2897, $2898, $2899, $2900, $2901, $2902, $2903, $2904, $2905, $2906, $2907, $2908, VersionRange($2909, $2910)), ($2911, $2912, $2913, $2914, $2915, $2916, $2917, $2918, $2919, $2920, $2921, $2922, $2923, $2924, $2925, $2926, $2927, $2928, $2929, $2930, $2931, $2932, $2933, $2934, $2935, $2936, $2937, $2938, VersionRange($2939, $2940)), ($2941, $2942, $2943, $2944, $2945, $2946, $2947, $2948, $2949, $2950, $2951, $2952, $2953, $2954, $2955, $2956, $2957, $2958, $2959, $2960, $2961, $2962, $2963, $2964, $2965, $2966, $2967, $2968, VersionRange($2969, $2970)), ($2971, $2972, $2973, $2974, $2975, $2976, $2977, $2978, $2979, $2980, $2981, $2982, $2983, $2984, $2985, $2986, $2987, $2988, $2989, $2990, $2991, $2992, $2993, $2994, $2995, $2996, $2997, $2998, VersionRange($2999, $3000)), ($3001, $3002, $3003, $3004, $3005, $3006, $3007, $3008, $3009, $3010, $3011, $3012, $3013, $3014, $3015, $3016, $3017, $3018, $3019, $3020, $3021, $3022, $3023, $3024, $3025, $3026, $3027, $3028, VersionRange($3029, $3030)), ($3031, $3032, $3033, $3034, $3035, $3036, $3037, $3038, $3039, $3040, $3041, $3042, $3043, $3044, $3045, $3046, $3047, $3048, $3049, $3050, $3051, $3052, $3053, $3054, $3055, $3056, $3057, $3058, VersionRange($3059, $3060)), ($3061, $3062, $3063, $3064, $3065, $3066, $3067, $3068, $3069, $3070, $3071, $3072, $3073, $3074, $3075, $3076, $3077, $3078, $3079, $3080, $3081, $3082, $3083, $3084, $3085, $3086, $3087, $3088, VersionRange($3089, $3090)), ($3091, $3092, $3093, $3094, $3095, $3096, $3097, $3098, $3099, $3100, $3101, $3102, $3103, $3104, $3105, $3106, $3107, $3108, $3109, $3110, $3111, $3112, $3113, $3114, $3115, $3116, $3117, $3118, VersionRange($3119, $3120)), ($3121, $3122, $3123, $3124, $3125, $3126, $3127, $3128, $3129, $3130, $3131, $3132, $3133, $3134, $3135, $3136, $3137, $3138, $3139, $3140, $3141, $3142, $3143, $3144, $3145, $3146, $3147, $3148, VersionRange($3149, $3150)), ($3151, $3152, $3153, $3154, $3155, $3156, $3157, $3158, $3159, $3160, $3161, $3162, $3163, $3164, $3165, $3166, $3167, $3168, $3169, $3170, $3171, $3172, $3173, $3174, $3175, $3176, $3177, $3178, VersionRange($3179, $3180)), ($3181, $3182, $3183, $3184, $3185, $3186, $3187, $3188, $3189, $3190, $3191, $3192, $3193, $3194, $3195, $3196, $3197, $3198, $3199, $3200, $3201, $3202, $3203, $3204, $3205, $3206, $3207, $3208, VersionRange($3209, $3210)), ($3211, $3212, $3213, $3214, $3215, $3216, $3217, $3218, $3219, $3220, $3221, $3222, $3223, $3224, $3225, $3226, $3227, $3228, $3229, $3230, $3231, $3232, $3233, $3234, $3235, $3236, $3237, $3238, VersionRange($3239, $3240)), ($3241, $3242, $3243, $3244, $3245, $3246, $3247, $3248, $3249, $3250, $3251, $3252, $3253, $3254, $3255, $3256, $3257, $3258, $3259, $3260, $3261, $3262, $3263, $3264, $3265, $3266, $3267, $3268, VersionRange($3269, $3270)), ($3271, $3272, $3273, $3274, $3275, $3276, $3277, $3278, $3279, $3280, $3281, $3282, $3283, $3284, $3285, $3286, $3287, $3288, $3289, $3290, $3291, $3292, $3293, $3294, $3295, $3296, $3297, $3298, VersionRange($3299, $3300)), ($3301, $3302, $3303, $3304, $3305, $3306, $3307, $3308, $3309, $3310, $3311, $3312, $3313, $3314, $3315, $3316, $3317, $3318, $3319, $3320, $3321, $3322, $3323, $3324, $3325, $3326, $3327, $3328, VersionRange($3329, $3330)), ($3331, $3332, $3333, $3334, $3335, $3336, $3337, $3338, $3339, $3340, $3341, $3342, $3343, $3344, $3345, $3346, $3347, $3348, $3349, $3350, $3351, $3352, $3353, $3354, $3355, $3356, $3357, $3358, VersionRange($3359, $3360)), ($3361, $3362, $3363, $3364, $3365, $3366, $3367, $3368, $3369, $3370, $3371, $3372, $3373, $3374, $3375, $3376, $3377, $3378, $3379, $3380, $3381, $3382, $3383, $3384, $3385, $3386, $3387, $3388, VersionRange($3389, $3390)), ($3391, $3392, $3393, $3394, $3395, $3396, $3397, $3398, $3399, $3400, $3401, $3402, $3403, $3404, $3405, $3406, $3407, $3408, $3409, $3410, $3411, $3412, $3413, $3414, $3415, $3416, $3417, $3418, VersionRange($3419, $3420)), ($3421, $3422, $3423, $3424, $3425, $3426, $3427, $3428, $3429, $3430, $3431, $3432, $3433, $3434, $3435, $3436, $3437, $3438, $3439, $3440, $3441, $3442, $3443, $3444, $3445, $3446, $3447, $3448, VersionRange($3449, $3450)), ($3451, $3452, $3453, $3454, $3455, $3456, $3457, $3458, $3459, $3460, $3461, $3462, $3463, $3464, $3465, $3466, $3467, $3468, $3469, $3470, $3471, $3472, $3473, $3474, $3475, $3476, $3477, $3478, VersionRange($3479, $3480)), ($3481, $3482, $3483, $3484, $3485, $3486, $3487, $3488, $3489, $3490, $3491, $3492, $3493, $3494, $3495, $3496, $3497, $3498, $3499, $3500, $3501, $3502, $3503, $3504, $3505, $3506, $3507, $3508, VersionRange($3509, $3510)), ($3511, $3512, $3513, $3514, $3515, $3516, $3517, $3518, $3519, $3520, $3521, $3522, $3523, $3524, $3525, $3526, $3527, $3528, $3529, $3530, $3531, $3532, $3533, $3534, $3535, $3536, $3537, $3538, VersionRange($3539, $3540)), ($3541, $3542, $3543, $3544, $3545, $3546, $3547, $3548, $3549, $3550, $3551, $3552, $3553, $3554, $3555, $3556, $3557, $3558, $3559, $3560, $3561, $3562, $3563, $3564, $3565, $3566, $3567, $3568, VersionRange($3569, $3570)), ($3571, $3572, $3573, $3574, $3575, $3576, $3577, $3578, $3579, $3580, $3581, $3582, $3583, $3584, $3585, $3586, $3587, $3588, $3589, $3590, $3591, $3592, $3593, $3594, $3595, $3596, $3597, $3598, VersionRange($3599, $3600)), ($3601, $3602, $3603, $3604, $3605, $3606, $3607, $3608, $3609, $3610, $3611, $3612, $3613, $3614, $3615, $3616, $3617, $3618, $3619, $3620, $3621, $3622, $3623, $3624, $3625, $3626, $3627, $3628, VersionRange($3629, $3630)), ($3631, $3632, $3633, $3634, $3635, $3636, $3637, $3638, $3639, $3640, $3641, $3642, $3643, $3644, $3645, $3646, $3647, $3648, $3649, $3650, $3651, $3652, $3653, $3654, $3655, $3656, $3657, $3658, VersionRange($3659, $3660)), ($3661, $3662, $3663, $3664, $3665, $3666, $3667, $3668, $3669, $3670, $3671, $3672, $3673, $3674, $3675, $3676, $3677, $3678, $3679, $3680, $3681, $3682, $3683, $3684, $3685, $3686, $3687, $3688, VersionRange($3689, $3690)), ($3691, $3692, $3693, $3694, $3695, $3696, $3697, $3698, $3699, $3700, $3701, $3702, $3703, $3704, $3705, $3706, $3707, $3708, $3709, $3710, $3711, $3712, $3713, $3714, $3715, $3716, $3717, $3718, VersionRange($3719, $3720)), ($3721, $3722, $3723, $3724, $3725, $3726, $3727, $3728, $3729, $3730, $3731, $3732, $3733, $3734, $3735, $3736, $3737, $3738, $3739, $3740, $3741, $3742, $3743, $3744, $3745, $3746, $3747, $3748, VersionRange($3749, $3750)), ($3751, $3752, $3753, $3754, $3755, $3756, $3757, $3758, $3759, $3760, $3761, $3762, $3763, $3764, $3765, $3766, $3767, $3768, $3769, $3770, $3771, $3772, $3773, $3774, $3775, $3776, $3777, $3778, VersionRange($3779, $3780)), ($3781, $3782, $3783, $3784, $3785, $3786, $3787, $3788, $3789, $3790, $3791, $3792, $3793, $3794, $3795, $3796, $3797, $3798, $3799, $3800, $3801, $3802, $3803, $3804, $3805, $3806, $3807, $3808, VersionRange($3809, $3810)), ($3811, $3812, $3813, $3814, $3815, $3816, $3817, $3818, $3819, $3820, $3821, $3822, $3823, $3824, $3825, $3826, $3827, $3828, $3829, $3830, $3831, $3832, $3833, $3834, $3835, $3836, $3837, $3838, VersionRange($3839, $3840)), ($3841, $3842, $3843, $3844, $3845, $3846, $3847, $3848, $3849, $3850, $3851, $3852, $3853, $3854, $3855, $3856, $3857, $3858, $3859, $3860, $3861, $3862, $3863, $3864, $3865, $3866, $3867, $3868, VersionRange($3869, $3870)), ($3871, $3872, $3873, $3874, $3875, $3876, $3877, $3878, $3879, $3880, $3881, $3882, $3883, $3884, $3885, $3886, $3887, $3888, $3889, $3890, $3891, $3892, $3893, $3894, $3895, $3896, $3897, $3898, VersionRange($3899, $3900)), ($3901, $3902, $3903, $3904, $3905, $3906, $3907, $3908, $3909, $3910, $3911, $3912, $3913, $3914, $3915, $3916, $3917, $3918, $3919, $3920, $3921, $3922, $3923, $3924, $3925, $3926, $3927, $3928, VersionRange($3929, $3930)), ($3931, $3932, $3933, $3934, $3935, $3936, $3937, $3938, $3939, $3940, $3941, $3942, $3943, $3944, $3945, $3946, $3947, $3948, $3949, $3950, $3951, $3952, $3953, $3954, $3955, $3956, $3957, $3958, VersionRange($3959, $3960)), ($3961, $3962, $3963, $3964, $3965, $3966, $3967, $3968, $3969, $3970, $3971, $3972, $3973, $3974, $3975, $3976, $3977, $3978, $3979, $3980, $3981, $3982, $3983, $3984, $3985, $3986, $3987, $3988, VersionRange($3989, $3990)), ($3991, $3992, $3993, $3994, $3995, $3996, $3997, $3998, $3999, $4000, $4001, $4002, $4003, $4004, $4005, $4006, $4007, $4008, $4009, $4010, $4011, $4012, $4013, $4014, $4015, $4016, $4017, $4018, VersionRange($4019, $4020)), ($4021, $4022, $4023, $4024, $4025, $4026, $4027, $4028, $4029, $4030, $4031, $4032, $4033, $4034, $4035, $4036, $4037, $4038, $4039, $4040, $4041, $4042, $4043, $4044, $4045, $4046, $4047, $4048, VersionRange($4049, $4050)), ($4051, $4052, $4053, $4054, $4055, $4056, $4057, $4058, $4059, $4060, $4061, $4062, $4063, $4064, $4065, $4066, $4067, $4068, $4069, $4070, $4071, $4072, $4073, $4074, $4075, $4076, $4077, $4078, VersionRange($4079, $4080)), ($4081, $4082, $4083, $4084, $4085, $4086, $4087, $4088, $4089, $4090, $4091, $4092, $4093, $4094, $4095, $4096, $4097, $4098, $4099, $4100, $4101, $4102, $4103, $4104, $4105, $4106, $4107, $4108, VersionRange($4109, $4110)), ($4111, $4112, $4113, $4114, $4115, $4116, $4117, $4118, $4119, $4120, $4121, $4122, $4123, $4124, $4125, $4126, $4127, $4128, $4129, $4130, $4131, $4132, $4133, $4134, $4135, $4136, $4137, $4138, VersionRange($4139, $4140)), ($4141, $4142, $4143, $4144, $4145, $4146, $4147, $4148, $4149, $4150, $4151, $4152, $4153, $4154, $4155, $4156, $4157, $4158, $4159, $4160, $4161, $4162, $4163, $4164, $4165, $4166, $4167, $4168, VersionRange($4169, $4170)), ($4171, $4172, $4173, $4174, $4175, $4176, $4177, $4178, $4179, $4180, $4181, $4182, $4183, $4184, $4185, $4186, $4187, $4188, $4189, $4190, $4191, $4192, $4193, $4194, $4195, $4196, $4197, $4198, VersionRange($4199, $4200)), ($4201, $4202, $4203, $4204, $4205, $4206, $4207, $4208, $4209, $4210, $4211, $4212, $4213, $4214, $4215, $4216, $4217, $4218, $4219, $4220, $4221, $4222, $4223, $4224, $4225, $4226, $4227, $4228, VersionRange($4229, $4230)), ($4231, $4232, $4233, $4234, $4235, $4236, $4237, $4238, $4239, $4240, $4241, $4242, $4243, $4244, $4245, $4246, $4247, $4248, $4249, $4250, $4251, $4252, $4253, $4254, $4255, $4256, $4257, $4258, VersionRange($4259, $4260)), ($4261, $4262, $4263, $4264, $4265, $4266, $4267, $4268, $4269, $4270, $4271, $4272, $4273, $4274, $4275, $4276, $4277, $4278, $4279, $4280, $4281, $4282, $4283, $4284, $4285, $4286, $4287, $4288, VersionRange($4289, $4290)), ($4291, $4292, $4293, $4294, $4295, $4296, $4297, $4298, $4299, $4300, $4301, $4302, $4303, $4304, $4305, $4306, $4307, $4308, $4309, $4310, $4311, $4312, $4313, $4314, $4315, $4316, $4317, $4318, VersionRange($4319, $4320)), ($4321, $4322, $4323, $4324, $4325, $4326, $4327, $4328, $4329, $4330, $4331, $4332, $4333, $4334, $4335, $4336, $4337, $4338, $4339, $4340, $4341, $4342, $4343, $4344, $4345, $4346, $4347, $4348, VersionRange($4349, $4350)), ($4351, $4352, $4353, $4354, $4355, $4356, $4357, $4358, $4359, $4360, $4361, $4362, $4363, $4364, $4365, $4366, $4367, $4368, $4369, $4370, $4371, $4372, $4373, $4374, $4375, $4376, $4377, $4378, VersionRange($4379, $4380)), ($4381, $4382, $4383, $4384, $4385, $4386, $4387, $4388, $4389, $4390, $4391, $4392, $4393, $4394, $4395, $4396, $4397, $4398, $4399, $4400, $4401, $4402, $4403, $4404, $4405, $4406, $4407, $4408, VersionRange($4409, $4410)), ($4411, $4412, $4413, $4414, $4415, $4416, $4417, $4418, $4419, $4420, $4421, $4422, $4423, $4424, $4425, $4426, $4427, $4428, $4429, $4430, $4431, $4432, $4433, $4434, $4435, $4436, $4437, $4438, VersionRange($4439, $4440)), ($4441, $4442, $4443, $4444, $4445, $4446, $4447, $4448, $4449, $4450, $4451, $4452, $4453, $4454, $4455, $4456, $4457, $4458, $4459, $4460, $4461, $4462, $4463, $4464, $4465, $4466, $4467, $4468, VersionRange($4469, $4470)), ($4471, $4472, $4473, $4474, $4475, $4476, $4477, $4478, $4479, $4480, $4481, $4482, $4483, $4484, $4485, $4486, $4487, $4488, $4489, $4490, $4491, $4492, $4493, $4494, $4495, $4496, $4497, $4498, VersionRange($4499, $4500)), ($4501, $4502, $4503, $4504, $4505, $4506, $4507, $4508, $4509, $4510, $4511, $4512, $4513, $4514, $4515, $4516, $4517, $4518, $4519, $4520, $4521, $4522, $4523, $4524, $4525, $4526, $4527, $4528, VersionRange($4529, $4530)), ($4531, $4532, $4533, $4534, $4535, $4536, $4537, $4538, $4539, $4540, $4541, $4542, $4543, $4544, $4545, $4546, $4547, $4548, $4549, $4550, $4551, $4552, $4553, $4554, $4555, $4556, $4557, $4558, VersionRange($4559, $4560)), ($4561, $4562, $4563, $4564, $4565, $4566, $4567, $4568, $4569, $4570, $4571, $4572, $4573, $4574, $4575, $4576, $4577, $4578, $4579, $4580, $4581, $4582, $4583, $4584, $4585, $4586, $4587, $4588, VersionRange($4589, $4590)), ($4591, $4592, $4593, $4594, $4595, $4596, $4597, $4598, $4599, $4600, $4601, $4602, $4603, $4604, $4605, $4606, $4607, $4608, $4609, $4610, $4611, $4612, $4613, $4614, $4615, $4616, $4617, $4618, VersionRange($4619, $4620)), ($4621, $4622, $4623, $4624, $4625, $4626, $4627, $4628, $4629, $4630, $4631, $4632, $4633, $4634, $4635, $4636, $4637, $4638, $4639, $4640, $4641, $4642, $4643, $4644, $4645, $4646, $4647, $4648, VersionRange($4649, $4650)), ($4651, $4652, $4653, $4654, $4655, $4656, $4657, $4658, $4659, $4660, $4661, $4662, $4663, $4664, $4665, $4666, $4667, $4668, $4669, $4670, $4671, $4672, $4673, $4674, $4675, $4676, $4677, $4678, VersionRange($4679, $4680)), ($4681, $4682, $4683, $4684, $4685, $4686, $4687, $4688, $4689, $4690, $4691, $4692, $4693, $4694, $4695, $4696, $4697, $4698, $4699, $4700, $4701, $4702, $4703, $4704, $4705, $4706, $4707, $4708, VersionRange($4709, $4710)), ($4711, $4712, $4713, $4714, $4715, $4716, $4717, $4718, $4719, $4720, $4721, $4722, $4723, $4724, $4725, $4726, $4727, $4728, $4729, $4730, $4731, $4732, $4733, $4734, $4735, $4736, $4737, $4738, VersionRange($4739, $4740)), ($4741, $4742, $4743, $4744, $4745, $4746, $4747, $4748, $4749, $4750, $4751, $4752, $4753, $4754, $4755, $4756, $4757, $4758, $4759, $4760, $4761, $4762, $4763, $4764, $4765, $4766, $4767, $4768, VersionRange($4769, $4770)), ($4771, $4772, $4773, $4774, $4775, $4776, $4777, $4778, $4779, $4780, $4781, $4782, $4783, $4784, $4785, $4786, $4787, $4788, $4789, $4790, $4791, $4792, $4793, $4794, $4795, $4796, $4797, $4798, VersionRange($4799, $4800)), ($4801, $4802, $4803, $4804, $4805, $4806, $4807, $4808, $4809, $4810, $4811, $4812, $4813, $4814, $4815, $4816, $4817, $4818, $4819, $4820, $4821, $4822, $4823, $4824, $4825, $4826, $4827, $4828, VersionRange($4829, $4830)), ($4831, $4832, $4833, $4834, $4835, $4836, $4837, $4838, $4839, $4840, $4841, $4842, $4843, $4844, $4845, $4846, $4847, $4848, $4849, $4850, $4851, $4852, $4853, $4854, $4855, $4856, $4857, $4858, VersionRange($4859, $4860)), ($4861, $4862, $4863, $4864, $4865, $4866, $4867, $4868, $4869, $4870, $4871, $4872, $4873, $4874, $4875, $4876, $4877, $4878, $4879, $4880, $4881, $4882, $4883, $4884, $4885, $4886, $4887, $4888, VersionRange($4889, $4890)), ($4891, $4892, $4893, $4894, $4895, $4896, $4897, $4898, $4899, $4900, $4901, $4902, $4903, $4904, $4905, $4906, $4907, $4908, $4909, $4910, $4911, $4912, $4913, $4914, $4915, $4916, $4917, $4918, VersionRange($4919, $4920)), ($4921, $4922, $4923, $4924, $4925, $4926, $4927, $4928, $4929, $4930, $4931, $4932, $4933, $4934, $4935, $4936, $4937, $4938, $4939, $4940, $4941, $4942, $4943, $4944, $4945, $4946, $4947, $4948, VersionRange($4949, $4950)), ($4951, $4952, $4953, $4954, $4955, $4956, $4957, $4958, $4959, $4960, $4961, $4962, $4963, $4964, $4965, $4966, $4967, $4968, $4969, $4970, $4971, $4972, $4973, $4974, $4975, $4976, $4977, $4978, VersionRange($4979, $4980)), ($4981, $4982, $4983, $4984, $4985, $4986, $4987, $4988, $4989, $4990, $4991, $4992, $4993, $4994, $4995, $4996, $4997, $4998, $4999, $5000, $5001, $5002, $5003, $5004, $5005, $5006, $5007, $5008, VersionRange($5009, $5010)), ($5011, $5012, $5013, $5014, $5015, $5016, $5017, $5018, $5019, $5020, $5021, $5022, $5023, $5024, $5025, $5026, $5027, $5028, $5029, $5030, $5031, $5032, $5033, $5034, $5035, $5036, $5037, $5038, VersionRange($5039, $5040)), ($5041, $5042, $5043, $5044, $5045, $5046, $5047, $5048, $5049, $5050, $5051, $5052, $5053, $5054, $5055, $5056, $5057, $5058, $5059, $5060, $5061, $5062, $5063, $5064, $5065, $5066, $5067, $5068, VersionRange($5069, $5070)), ($5071, $5072, $5073, $5074, $5075, $5076, $5077, $5078, $5079, $5080, $5081, $5082, $5083, $5084, $5085, $5086, $5087, $5088, $5089, $5090, $5091, $5092, $5093, $5094, $5095, $5096, $5097, $5098, VersionRange($5099, $5100)), ($5101, $5102, $5103, $5104, $5105, $5106, $5107, $5108, $5109, $5110, $5111, $5112, $5113, $5114, $5115, $5116, $5117, $5118, $5119, $5120, $5121, $5122, $5123, $5124, $5125, $5126, $5127, $5128, VersionRange($5129, $5130)), ($5131, $5132, $5133, $5134, $5135, $5136, $5137, $5138, $5139, $5140, $5141, $5142, $5143, $5144, $5145, $5146, $5147, $5148, $5149, $5150, $5151, $5152, $5153, $5154, $5155, $5156, $5157, $5158, VersionRange($5159, $5160)), ($5161, $5162, $5163, $5164, $5165, $5166, $5167, $5168, $5169, $5170, $5171, $5172, $5173, $5174, $5175, $5176, $5177, $5178, $5179, $5180, $5181, $5182, $5183, $5184, $5185, $5186, $5187, $5188, VersionRange($5189, $5190)), ($5191, $5192, $5193, $5194, $5195, $5196, $5197, $5198, $5199, $5200, $5201, $5202, $5203, $5204, $5205, $5206, $5207, $5208, $5209, $5210, $5211, $5212, $5213, $5214, $5215, $5216, $5217, $5218, VersionRange($5219, $5220)), ($5221, $5222, $5223, $5224, $5225, $5226, $5227, $5228, $5229, $5230, $5231, $5232, $5233, $5234, $5235, $5236, $5237, $5238, $5239, $5240, $5241, $5242, $5243, $5244, $5245, $5246, $5247, $5248, VersionRange($5249, $5250)), ($5251, $5252, $5253, $5254, $5255, $5256, $5257, $5258, $5259, $5260, $5261, $5262, $5263, $5264, $5265, $5266, $5267, $5268, $5269, $5270, $5271, $5272, $5273, $5274, $5275, $5276, $5277, $5278, VersionRange($5279, $5280)), ($5281, $5282, $5283, $5284, $5285, $5286, $5287, $5288, $5289, $5290, $5291, $5292, $5293, $5294, $5295, $5296, $5297, $5298, $5299, $5300, $5301, $5302, $5303, $5304, $5305, $5306, $5307, $5308, VersionRange($5309, $5310)), ($5311, $5312, $5313, $5314, $5315, $5316, $5317, $5318, $5319, $5320, $5321, $5322, $5323, $5324, $5325, $5326, $5327, $5328, $5329, $5330, $5331, $5332, $5333, $5334, $5335, $5336, $5337, $5338, VersionRange($5339, $5340)), ($5341, $5342, $5343, $5344, $5345, $5346, $5347, $5348, $5349, $5350, $5351, $5352, $5353, $5354, $5355, $5356, $5357, $5358, $5359, $5360, $5361, $5362, $5363, $5364, $5365, $5366, $5367, $5368, VersionRange($5369, $5370)), ($5371, $5372, $5373, $5374, $5375, $5376, $5377, $5378, $5379, $5380, $5381, $5382, $5383, $5384, $5385, $5386, $5387, $5388, $5389, $5390, $5391, $5392, $5393, $5394, $5395, $5396, $5397, $5398, VersionRange($5399, $5400)), ($5401, $5402, $5403, $5404, $5405, $5406, $5407, $5408, $5409, $5410, $5411, $5412, $5413, $5414, $5415, $5416, $5417, $5418, $5419, $5420, $5421, $5422, $5423, $5424, $5425, $5426, $5427, $5428, VersionRange($5429, $5430)), ($5431, $5432, $5433, $5434, $5435, $5436, $5437, $5438, $5439, $5440, $5441, $5442, $5443, $5444, $5445, $5446, $5447, $5448, $5449, $5450, $5451, $5452, $5453, $5454, $5455, $5456, $5457, $5458, VersionRange($5459, $5460)), ($5461, $5462, $5463, $5464, $5465, $5466, $5467, $5468, $5469, $5470, $5471, $5472, $5473, $5474, $5475, $5476, $5477, $5478, $5479, $5480, $5481, $5482, $5483, $5484, $5485, $5486, $5487, $5488, VersionRange($5489, $5490)), ($5491, $5492, $5493, $5494, $5495, $5496, $5497, $5498, $5499, $5500, $5501, $5502, $5503, $5504, $5505, $5506, $5507, $5508, $5509, $5510, $5511, $5512, $5513, $5514, $5515, $5516, $5517, $5518, VersionRange($5519, $5520)), ($5521, $5522, $5523, $5524, $5525, $5526, $5527, $5528, $5529, $5530, $5531, $5532, $5533, $5534, $5535, $5536, $5537, $5538, $5539, $5540, $5541, $5542, $5543, $5544, $5545, $5546, $5547, $5548, VersionRange($5549, $5550)), ($5551, $5552, $5553, $5554, $5555, $5556, $5557, $5558, $5559, $5560, $5561, $5562, $5563, $5564, $5565, $5566, $5567, $5568, $5569, $5570, $5571, $5572, $5573, $5574, $5575, $5576, $5577, $5578, VersionRange($5579, $5580)), ($5581, $5582, $5583, $5584, $5585, $5586, $5587, $5588, $5589, $5590, $5591, $5592, $5593, $5594, $5595, $5596, $5597, $5598, $5599, $5600, $5601, $5602, $5603, $5604, $5605, $5606, $5607, $5608, VersionRange($5609, $5610)), ($5611, $5612, $5613, $5614, $5615, $5616, $5617, $5618, $5619, $5620, $5621, $5622, $5623, $5624, $5625, $5626, $5627, $5628, $5629, $5630, $5631, $5632, $5633, $5634, $5635, $5636, $5637, $5638, VersionRange($5639, $5640)), ($5641, $5642, $5643, $5644, $5645, $5646, $5647, $5648, $5649, $5650, $5651, $5652, $5653, $5654, $5655, $5656, $5657, $5658, $5659, $5660, $5661, $5662, $5663, $5664, $5665, $5666, $5667, $5668, VersionRange($5669, $5670)), ($5671, $5672, $5673, $5674, $5675, $5676, $5677, $5678, $5679, $5680, $5681, $5682, $5683, $5684, $5685, $5686, $5687, $5688, $5689, $5690, $5691, $5692, $5693, $5694, $5695, $5696, $5697, $5698, VersionRange($5699, $5700)), ($5701, $5702, $5703, $5704, $5705, $5706, $5707, $5708, $5709, $5710, $5711, $5712, $5713, $5714, $5715, $5716, $5717, $5718, $5719, $5720, $5721, $5722, $5723, $5724, $5725, $5726, $5727, $5728, VersionRange($5729, $5730)), ($5731, $5732, $5733, $5734, $5735, $5736, $5737, $5738, $5739, $5740, $5741, $5742, $5743, $5744, $5745, $5746, $5747, $5748, $5749, $5750, $5751, $5752, $5753, $5754, $5755, $5756, $5757, $5758, VersionRange($5759, $5760)), ($5761, $5762, $5763, $5764, $5765, $5766, $5767, $5768, $5769, $5770, $5771, $5772, $5773, $5774, $5775, $5776, $5777, $5778, $5779, $5780, $5781, $5782, $5783, $5784, $5785, $5786, $5787, $5788, VersionRange($5789, $5790)), ($5791, $5792, $5793, $5794, $5795, $5796, $5797, $5798, $5799, $5800, $5801, $5802, $5803, $5804, $5805, $5806, $5807, $5808, $5809, $5810, $5811, $5812, $5813, $5814, $5815, $5816, $5817, $5818, VersionRange($5819, $5820)), ($5821, $5822, $5823, $5824, $5825, $5826, $5827, $5828, $5829, $5830, $5831, $5832, $5833, $5834, $5835, $5836, $5837, $5838, $5839, $5840, $5841, $5842, $5843, $5844, $5845, $5846, $5847, $5848, VersionRange($5849, $5850)), ($5851, $5852, $5853, $5854, $5855, $5856, $5857, $5858, $5859, $5860, $5861, $5862, $5863, $5864, $5865, $5866, $5867, $5868, $5869, $5870, $5871, $5872, $5873, $5874, $5875, $5876, $5877, $5878, VersionRange($5879, $5880)), ($5881, $5882, $5883, $5884, $5885, $5886, $5887, $5888, $5889, $5890, $5891, $5892, $5893, $5894, $5895, $5896, $5897, $5898, $5899, $5900, $5901, $5902, $5903, $5904, $5905, $5906, $5907, $5908, VersionRange($5909, $5910)), ($5911, $5912, $5913, $5914, $5915, $5916, $5917, $5918, $5919, $5920, $5921, $5922, $5923, $5924, $5925, $5926, $5927, $5928, $5929, $5930, $5931, $5932, $5933, $5934, $5935, $5936, $5937, $5938, VersionRange($5939, $5940)), ($5941, $5942, $5943, $5944, $5945, $5946, $5947, $5948, $5949, $5950, $5951, $5952, $5953, $5954, $5955, $5956, $5957, $5958, $5959, $5960, $5961, $5962, $5963, $5964, $5965, $5966, $5967, $5968, VersionRange($5969, $5970)), ($5971, $5972, $5973, $5974, $5975, $5976, $5977, $5978, $5979, $5980, $5981, $5982, $5983, $5984, $5985, $5986, $5987, $5988, $5989, $5990, $5991, $5992, $5993, $5994, $5995, $5996, $5997, $5998, VersionRange($5999, $6000)), ($6001, $6002, $6003, $6004, $6005, $6006, $6007, $6008, $6009, $6010, $6011, $6012, $6013, $6014, $6015, $6016, $6017, $6018, $6019, $6020, $6021, $6022, $6023, $6024, $6025, $6026, $6027, $6028, VersionRange($6029, $6030)), ($6031, $6032, $6033, $6034, $6035, $6036, $6037, $6038, $6039, $6040, $6041, $6042, $6043, $6044, $6045, $6046, $6047, $6048, $6049, $6050, $6051, $6052, $6053, $6054, $6055, $6056, $6057, $6058, VersionRange($6059, $6060)), ($6061, $6062, $6063, $6064, $6065, $6066, $6067, $6068, $6069, $6070, $6071, $6072, $6073, $6074, $6075, $6076, $6077, $6078, $6079, $6080, $6081, $6082, $6083, $6084, $6085, $6086, $6087, $6088, VersionRange($6089, $6090)), ($6091, $6092, $6093, $6094, $6095, $6096, $6097, $6098, $6099, $6100, $6101, $6102, $6103, $6104, $6105, $6106, $6107, $6108, $6109, $6110, $6111, $6112, $6113, $6114, $6115, $6116, $6117, $6118, VersionRange($6119, $6120)), ($6121, $6122, $6123, $6124, $6125, $6126, $6127, $6128, $6129, $6130, $6131, $6132, $6133, $6134, $6135, $6136, $6137, $6138, $6139, $6140, $6141, $6142, $6143, $6144, $6145, $6146, $6147, $6148, VersionRange($6149, $6150)), ($6151, $6152, $6153, $6154, $6155, $6156, $6157, $6158, $6159, $6160, $6161, $6162, $6163, $6164, $6165, $6166, $6167, $6168, $6169, $6170, $6171, $6172, $6173, $6174, $6175, $6176, $6177, $6178, VersionRange($6179, $6180)), ($6181, $6182, $6183, $6184, $6185, $6186, $6187, $6188, $6189, $6190, $6191, $6192, $6193, $6194, $6195, $6196, $6197, $6198, $6199, $6200, $6201, $6202, $6203, $6204, $6205, $6206, $6207, $6208, VersionRange($6209, $6210)), ($6211, $6212, $6213, $6214, $6215, $6216, $6217, $6218, $6219, $6220, $6221, $6222, $6223, $6224, $6225, $6226, $6227, $6228, $6229, $6230, $6231, $6232, $6233, $6234, $6235, $6236, $6237, $6238, VersionRange($6239, $6240)), ($6241, $6242, $6243, $6244, $6245, $6246, $6247, $6248, $6249, $6250, $6251, $6252, $6253, $6254, $6255, $6256, $6257, $6258, $6259, $6260, $6261, $6262, $6263, $6264, $6265, $6266, $6267, $6268, VersionRange($6269, $6270)), ($6271, $6272, $6273, $6274, $6275, $6276, $6277, $6278, $6279, $6280, $6281, $6282, $6283, $6284, $6285, $6286, $6287, $6288, $6289, $6290, $6291, $6292, $6293, $6294, $6295, $6296, $6297, $6298, VersionRange($6299, $6300)), ($6301, $6302, $6303, $6304, $6305, $6306, $6307, $6308, $6309, $6310, $6311, $6312, $6313, $6314, $6315, $6316, $6317, $6318, $6319, $6320, $6321, $6322, $6323, $6324, $6325, $6326, $6327, $6328, VersionRange($6329, $6330)), ($6331, $6332, $6333, $6334, $6335, $6336, $6337, $6338, $6339, $6340, $6341, $6342, $6343, $6344, $6345, $6346, $6347, $6348, $6349, $6350, $6351, $6352, $6353, $6354, $6355, $6356, $6357, $6358, VersionRange($6359, $6360)), ($6361, $6362, $6363, $6364, $6365, $6366, $6367, $6368, $6369, $6370, $6371, $6372, $6373, $6374, $6375, $6376, $6377, $6378, $6379, $6380, $6381, $6382, $6383, $6384, $6385, $6386, $6387, $6388, VersionRange($6389, $6390)), ($6391, $6392, $6393, $6394, $6395, $6396, $6397, $6398, $6399, $6400, $6401, $6402, $6403, $6404, $6405, $6406, $6407, $6408, $6409, $6410, $6411, $6412, $6413, $6414, $6415, $6416, $6417, $6418, VersionRange($6419, $6420)), ($6421, $6422, $6423, $6424, $6425, $6426, $6427, $6428, $6429, $6430, $6431, $6432, $6433, $6434, $6435, $6436, $6437, $6438, $6439, $6440, $6441, $6442, $6443, $6444, $6445, $6446, $6447, $6448, VersionRange($6449, $6450)), ($6451, $6452, $6453, $6454, $6455, $6456, $6457, $6458, $6459, $6460, $6461, $6462, $6463, $6464, $6465, $6466, $6467, $6468, $6469, $6470, $6471, $6472, $6473, $6474, $6475, $6476, $6477, $6478, VersionRange($6479, $6480)), ($6481, $6482, $6483, $6484, $6485, $6486, $6487, $6488, $6489, $6490, $6491, $6492, $6493, $6494, $6495, $6496, $6497, $6498, $6499, $6500, $6501, $6502, $6503, $6504, $6505, $6506, $6507, $6508, VersionRange($6509, $6510)), ($6511, $6512, $6513, $6514, $6515, $6516, $6517, $6518, $6519, $6520, $6521, $6522, $6523, $6524, $6525, $6526, $6527, $6528, $6529, $6530, $6531, $6532, $6533, $6534, $6535, $6536, $6537, $6538, VersionRange($6539, $6540)), ($6541, $6542, $6543, $6544, $6545, $6546, $6547, $6548, $6549, $6550, $6551, $6552, $6553, $6554, $6555, $6556, $6557, $6558, $6559, $6560, $6561, $6562, $6563, $6564, $6565, $6566, $6567, $6568, VersionRange($6569, $6570)), ($6571, $6572, $6573, $6574, $6575, $6576, $6577, $6578, $6579, $6580, $6581, $6582, $6583, $6584, $6585, $6586, $6587, $6588, $6589, $6590, $6591, $6592, $6593, $6594, $6595, $6596, $6597, $6598, VersionRange($6599, $6600)), ($6601, $6602, $6603, $6604, $6605, $6606, $6607, $6608, $6609, $6610, $6611, $6612, $6613, $6614, $6615, $6616, $6617, $6618, $6619, $6620, $6621, $6622, $6623, $6624, $6625, $6626, $6627, $6628, VersionRange($6629, $6630)), ($6631, $6632, $6633, $6634, $6635, $6636, $6637, $6638, $6639, $6640, $6641, $6642, $6643, $6644, $6645, $6646, $6647, $6648, $6649, $6650, $6651, $6652, $6653, $6654, $6655, $6656, $6657, $6658, VersionRange($6659, $6660)), ($6661, $6662, $6663, $6664, $6665, $6666, $6667, $6668, $6669, $6670, $6671, $6672, $6673, $6674, $6675, $6676, $6677, $6678, $6679, $6680, $6681, $6682, $6683, $6684, $6685, $6686, $6687, $6688, VersionRange($6689, $6690)), ($6691, $6692, $6693, $6694, $6695, $6696, $6697, $6698, $6699, $6700, $6701, $6702, $6703, $6704, $6705, $6706, $6707, $6708, $6709, $6710, $6711, $6712, $6713, $6714, $6715, $6716, $6717, $6718, VersionRange($6719, $6720)), ($6721, $6722, $6723, $6724, $6725, $6726, $6727, $6728, $6729, $6730, $6731, $6732, $6733, $6734, $6735, $6736, $6737, $6738, $6739, $6740, $6741, $6742, $6743, $6744, $6745, $6746, $6747, $6748, VersionRange($6749, $6750)), ($6751, $6752, $6753, $6754, $6755, $6756, $6757, $6758, $6759, $6760, $6761, $6762, $6763, $6764, $6765, $6766, $6767, $6768, $6769, $6770, $6771, $6772, $6773, $6774, $6775, $6776, $6777, $6778, VersionRange($6779, $6780)), ($6781, $6782, $6783, $6784, $6785, $6786, $6787, $6788, $6789, $6790, $6791, $6792, $6793, $6794, $6795, $6796, $6797, $6798, $6799, $6800, $6801, $6802, $6803, $6804, $6805, $6806, $6807, $6808, VersionRange($6809, $6810)), ($6811, $6812, $6813, $6814, $6815, $6816, $6817, $6818, $6819, $6820, $6821, $6822, $6823, $6824, $6825, $6826, $6827, $6828, $6829, $6830, $6831, $6832, $6833, $6834, $6835, $6836, $6837, $6838, VersionRange($6839, $6840)), ($6841, $6842, $6843, $6844, $6845, $6846, $6847, $6848, $6849, $6850, $6851, $6852, $6853, $6854, $6855, $6856, $6857, $6858, $6859, $6860, $6861, $6862, $6863, $6864, $6865, $6866, $6867, $6868, VersionRange($6869, $6870)), ($6871, $6872, $6873, $6874, $6875, $6876, $6877, $6878, $6879, $6880, $6881, $6882, $6883, $6884, $6885, $6886, $6887, $6888, $6889, $6890, $6891, $6892, $6893, $6894, $6895, $6896, $6897, $6898, VersionRange($6899, $6900)), ($6901, $6902, $6903, $6904, $6905, $6906, $6907, $6908, $6909, $6910, $6911, $6912, $6913, $6914, $6915, $6916, $6917, $6918, $6919, $6920, $6921, $6922, $6923, $6924, $6925, $6926, $6927, $6928, VersionRange($6929, $6930)), ($6931, $6932, $6933, $6934, $6935, $6936, $6937, $6938, $6939, $6940, $6941, $6942, $6943, $6944, $6945, $6946, $6947, $6948, $6949, $6950, $6951, $6952, $6953, $6954, $6955, $6956, $6957, $6958, VersionRange($6959, $6960)), ($6961, $6962, $6963, $6964, $6965, $6966, $6967, $6968, $6969, $6970, $6971, $6972, $6973, $6974, $6975, $6976, $6977, $6978, $6979, $6980, $6981, $6982, $6983, $6984, $6985, $6986, $6987, $6988, VersionRange($6989, $6990)), ($6991, $6992, $6993, $6994, $6995, $6996, $6997, $6998, $6999, $7000, $7001, $7002, $7003, $7004, $7005, $7006, $7007, $7008, $7009, $7010, $7011, $7012, $7013, $7014, $7015, $7016, $7017, $7018, VersionRange($7019, $7020)), ($7021, $7022, $7023, $7024, $7025, $7026, $7027, $7028, $7029, $7030, $7031, $7032, $7033, $7034, $7035, $7036, $7037, $7038, $7039, $7040, $7041, $7042, $7043, $7044, $7045, $7046, $7047, $7048, VersionRange($7049, $7050)), ($7051, $7052, $7053, $7054, $7055, $7056, $7057, $7058, $7059, $7060, $7061, $7062, $7063, $7064, $7065, $7066, $7067, $7068, $7069, $7070, $7071, $7072, $7073, $7074, $7075, $7076, $7077, $7078, VersionRange($7079, $7080)), ($7081, $7082, $7083, $7084, $7085, $7086, $7087, $7088, $7089, $7090, $7091, $7092, $7093, $7094, $7095, $7096, $7097, $7098, $7099, $7100, $7101, $7102, $7103, $7104, $7105, $7106, $7107, $7108, VersionRange($7109, $7110)), ($7111, $7112, $7113, $7114, $7115, $7116, $7117, $7118, $7119, $7120, $7121, $7122, $7123, $7124, $7125, $7126, $7127, $7128, $7129, $7130, $7131, $7132, $7133, $7134, $7135, $7136, $7137, $7138, VersionRange($7139, $7140)), ($7141, $7142, $7143, $7144, $7145, $7146, $7147, $7148, $7149, $7150, $7151, $7152, $7153, $7154, $7155, $7156, $7157, $7158, $7159, $7160, $7161, $7162, $7163, $7164, $7165, $7166, $7167, $7168, VersionRange($7169, $7170)), ($7171, $7172, $7173, $7174, $7175, $7176, $7177, $7178, $7179, $7180, $7181, $7182, $7183, $7184, $7185, $7186, $7187, $7188, $7189, $7190, $7191, $7192, $7193, $7194, $7195, $7196, $7197, $7198, VersionRange($7199, $7200)), ($7201, $7202, $7203, $7204, $7205, $7206, $7207, $7208, $7209, $7210, $7211, $7212, $7213, $7214, $7215, $7216, $7217, $7218, $7219, $7220, $7221, $7222, $7223, $7224, $7225, $7226, $7227, $7228, VersionRange($7229, $7230)), ($7231, $7232, $7233, $7234, $7235, $7236, $7237, $7238, $7239, $7240, $7241, $7242, $7243, $7244, $7245, $7246, $7247, $7248, $7249, $7250, $7251, $7252, $7253, $7254, $7255, $7256, $7257, $7258, VersionRange($7259, $7260)), ($7261, $7262, $7263, $7264, $7265, $7266, $7267, $7268, $7269, $7270, $7271, $7272, $7273, $7274, $7275, $7276, $7277, $7278, $7279, $7280, $7281, $7282, $7283, $7284, $7285, $7286, $7287, $7288, VersionRange($7289, $7290)), ($7291, $7292, $7293, $7294, $7295, $7296, $7297, $7298, $7299, $7300, $7301, $7302, $7303, $7304, $7305, $7306, $7307, $7308, $7309, $7310, $7311, $7312, $7313, $7314, $7315, $7316, $7317, $7318, VersionRange($7319, $7320)), ($7321, $7322, $7323, $7324, $7325, $7326, $7327, $7328, $7329, $7330, $7331, $7332, $7333, $7334, $7335, $7336, $7337, $7338, $7339, $7340, $7341, $7342, $7343, $7344, $7345, $7346, $7347, $7348, VersionRange($7349, $7350)), ($7351, $7352, $7353, $7354, $7355, $7356, $7357, $7358, $7359, $7360, $7361, $7362, $7363, $7364, $7365, $7366, $7367, $7368, $7369, $7370, $7371, $7372, $7373, $7374, $7375, $7376, $7377, $7378, VersionRange($7379, $7380)), ($7381, $7382, $7383, $7384, $7385, $7386, $7387, $7388, $7389, $7390, $7391, $7392, $7393, $7394, $7395, $7396, $7397, $7398, $7399, $7400, $7401, $7402, $7403, $7404, $7405, $7406, $7407, $7408, VersionRange($7409, $7410)), ($7411, $7412, $7413, $7414, $7415, $7416, $7417, $7418, $7419, $7420, $7421, $7422, $7423, $7424, $7425, $7426, $7427, $7428, $7429, $7430, $7431, $7432, $7433, $7434, $7435, $7436, $7437, $7438, VersionRange($7439, $7440)), ($7441, $7442, $7443, $7444, $7445, $7446, $7447, $7448, $7449, $7450, $7451, $7452, $7453, $7454, $7455, $7456, $7457, $7458, $7459, $7460, $7461, $7462, $7463, $7464, $7465, $7466, $7467, $7468, VersionRange($7469, $7470)), ($7471, $7472, $7473, $7474, $7475, $7476, $7477, $7478, $7479, $7480, $7481, $7482, $7483, $7484, $7485, $7486, $7487, $7488, $7489, $7490, $7491, $7492, $7493, $7494, $7495, $7496, $7497, $7498, VersionRange($7499, $7500)), ($7501, $7502, $7503, $7504, $7505, $7506, $7507, $7508, $7509, $7510, $7511, $7512, $7513, $7514, $7515, $7516, $7517, $7518, $7519, $7520, $7521, $7522, $7523, $7524, $7525, $7526, $7527, $7528, VersionRange($7529, $7530)), ($7531, $7532, $7533, $7534, $7535, $7536, $7537, $7538, $7539, $7540, $7541, $7542, $7543, $7544, $7545, $7546, $7547, $7548, $7549, $7550, $7551, $7552, $7553, $7554, $7555, $7556, $7557, $7558, VersionRange($7559, $7560)), ($7561, $7562, $7563, $7564, $7565, $7566, $7567, $7568, $7569, $7570, $7571, $7572, $7573, $7574, $7575, $7576, $7577, $7578, $7579, $7580, $7581, $7582, $7583, $7584, $7585, $7586, $7587, $7588, VersionRange($7589, $7590)), ($7591, $7592, $7593, $7594, $7595, $7596, $7597, $7598, $7599, $7600, $7601, $7602, $7603, $7604, $7605, $7606, $7607, $7608, $7609, $7610, $7611, $7612, $7613, $7614, $7615, $7616, $7617, $7618, VersionRange($7619, $7620)), ($7621, $7622, $7623, $7624, $7625, $7626, $7627, $7628, $7629, $7630, $7631, $7632, $7633, $7634, $7635, $7636, $7637, $7638, $7639, $7640, $7641, $7642, $7643, $7644, $7645, $7646, $7647, $7648, VersionRange($7649, $7650)), ($7651, $7652, $7653, $7654, $7655, $7656, $7657, $7658, $7659, $7660, $7661, $7662, $7663, $7664, $7665, $7666, $7667, $7668, $7669, $7670, $7671, $7672, $7673, $7674, $7675, $7676, $7677, $7678, VersionRange($7679, $7680)), ($7681, $7682, $7683, $7684, $7685, $7686, $7687, $7688, $7689, $7690, $7691, $7692, $7693, $7694, $7695, $7696, $7697, $7698, $7699, $7700, $7701, $7702, $7703, $7704, $7705, $7706, $7707, $7708, VersionRange($7709, $7710)), ($7711, $7712, $7713, $7714, $7715, $7716, $7717, $7718, $7719, $7720, $7721, $7722, $7723, $7724, $7725, $7726, $7727, $7728, $7729, $7730, $7731, $7732, $7733, $7734, $7735, $7736, $7737, $7738, VersionRange($7739, $7740)), ($7741, $7742, $7743, $7744, $7745, $7746, $7747, $7748, $7749, $7750, $7751, $7752, $7753, $7754, $7755, $7756, $7757, $7758, $7759, $7760, $7761, $7762, $7763, $7764, $7765, $7766, $7767, $7768, VersionRange($7769, $7770)), ($7771, $7772, $7773, $7774, $7775, $7776, $7777, $7778, $7779, $7780, $7781, $7782, $7783, $7784, $7785, $7786, $7787, $7788, $7789, $7790, $7791, $7792, $7793, $7794, $7795, $7796, $7797, $7798, VersionRange($7799, $7800)), ($7801, $7802, $7803, $7804, $7805, $7806, $7807, $7808, $7809, $7810, $7811, $7812, $7813, $7814, $7815, $7816, $7817, $7818, $7819, $7820, $7821, $7822, $7823, $7824, $7825, $7826, $7827, $7828, VersionRange($7829, $7830)), ($7831, $7832, $7833, $7834, $7835, $7836, $7837, $7838, $7839, $7840, $7841, $7842, $7843, $7844, $7845, $7846, $7847, $7848, $7849, $7850, $7851, $7852, $7853, $7854, $7855, $7856, $7857, $7858, VersionRange($7859, $7860)), ($7861, $7862, $7863, $7864, $7865, $7866, $7867, $7868, $7869, $7870, $7871, $7872, $7873, $7874, $7875, $7876, $7877, $7878, $7879, $7880, $7881, $7882, $7883, $7884, $7885, $7886, $7887, $7888, VersionRange($7889, $7890)), ($7891, $7892, $7893, $7894, $7895, $7896, $7897, $7898, $7899, $7900, $7901, $7902, $7903, $7904, $7905, $7906, $7907, $7908, $7909, $7910, $7911, $7912, $7913, $7914, $7915, $7916, $7917, $7918, VersionRange($7919, $7920)), ($7921, $7922, $7923, $7924, $7925, $7926, $7927, $7928, $7929, $7930, $7931, $7932, $7933, $7934, $7935, $7936, $7937, $7938, $7939, $7940, $7941, $7942, $7943, $7944, $7945, $7946, $7947, $7948, VersionRange($7949, $7950)), ($7951, $7952, $7953, $7954, $7955, $7956, $7957, $7958, $7959, $7960, $7961, $7962, $7963, $7964, $7965, $7966, $7967, $7968, $7969, $7970, $7971, $7972, $7973, $7974, $7975, $7976, $7977, $7978, VersionRange($7979, $7980)), ($7981, $7982, $7983, $7984, $7985, $7986, $7987, $7988, $7989, $7990, $7991, $7992, $7993, $7994, $7995, $7996, $7997, $7998, $7999, $8000, $8001, $8002, $8003, $8004, $8005, $8006, $8007, $8008, VersionRange($8009, $8010)), ($8011, $8012, $8013, $8014, $8015, $8016, $8017, $8018, $8019, $8020, $8021, $8022, $8023, $8024, $8025, $8026, $8027, $8028, $8029, $8030, $8031, $8032, $8033, $8034, $8035, $8036, $8037, $8038, VersionRange($8039, $8040)), ($8041, $8042, $8043, $8044, $8045, $8046, $8047, $8048, $8049, $8050, $8051, $8052, $8053, $8054, $8055, $8056, $8057, $8058, $8059, $8060, $8061, $8062, $8063, $8064, $8065, $8066, $8067, $8068, VersionRange($8069, $8070)), ($8071, $8072, $8073, $8074, $8075, $8076, $8077, $8078, $8079, $8080, $8081, $8082, $8083, $8084, $8085, $8086, $8087, $8088, $8089, $8090, $8091, $8092, $8093, $8094, $8095, $8096, $8097, $8098, VersionRange($8099, $8100)), ($8101, $8102, $8103, $8104, $8105, $8106, $8107, $8108, $8109, $8110, $8111, $8112, $8113, $8114, $8115, $8116, $8117, $8118, $8119, $8120, $8121, $8122, $8123, $8124, $8125, $8126, $8127, $8128, VersionRange($8129, $8130)), ($8131, $8132, $8133, $8134, $8135, $8136, $8137, $8138, $8139, $8140, $8141, $8142, $8143, $8144, $8145, $8146, $8147, $8148, $8149, $8150, $8151, $8152, $8153, $8154, $8155, $8156, $8157, $8158, VersionRange($8159, $8160)), ($8161, $8162, $8163, $8164, $8165, $8166, $8167, $8168, $8169, $8170, $8171, $8172, $8173, $8174, $8175, $8176, $8177, $8178, $8179, $8180, $8181, $8182, $8183, $8184, $8185, $8186, $8187, $8188, VersionRange($8189, $8190)), ($8191, $8192, $8193, $8194, $8195, $8196, $8197, $8198, $8199, $8200, $8201, $8202, $8203, $8204, $8205, $8206, $8207, $8208, $8209, $8210, $8211, $8212, $8213, $8214, $8215, $8216, $8217, $8218, VersionRange($8219, $8220)), ($8221, $8222, $8223, $8224, $8225, $8226, $8227, $8228, $8229, $8230, $8231, $8232, $8233, $8234, $8235, $8236, $8237, $8238, $8239, $8240, $8241, $8242, $8243, $8244, $8245, $8246, $8247, $8248, VersionRange($8249, $8250)), ($8251, $8252, $8253, $8254, $8255, $8256, $8257, $8258, $8259, $8260, $8261, $8262, $8263, $8264, $8265, $8266, $8267, $8268, $8269, $8270, $8271, $8272, $8273, $8274, $8275, $8276, $8277, $8278, VersionRange($8279, $8280)), ($8281, $8282, $8283, $8284, $8285, $8286, $8287, $8288, $8289, $8290, $8291, $8292, $8293, $8294, $8295, $8296, $8297, $8298, $8299, $8300, $8301, $8302, $8303, $8304, $8305, $8306, $8307, $8308, VersionRange($8309, $8310)), ($8311, $8312, $8313, $8314, $8315, $8316, $8317, $8318, $8319, $8320, $8321, $8322, $8323, $8324, $8325, $8326, $8327, $8328, $8329, $8330, $8331, $8332, $8333, $8334, $8335, $8336, $8337, $8338, VersionRange($8339, $8340)), ($8341, $8342, $8343, $8344, $8345, $8346, $8347, $8348, $8349, $8350, $8351, $8352, $8353, $8354, $8355, $8356, $8357, $8358, $8359, $8360, $8361, $8362, $8363, $8364, $8365, $8366, $8367, $8368, VersionRange($8369, $8370)), ($8371, $8372, $8373, $8374, $8375, $8376, $8377, $8378, $8379, $8380, $8381, $8382, $8383, $8384, $8385, $8386, $8387, $8388, $8389, $8390, $8391, $8392, $8393, $8394, $8395, $8396, $8397, $8398, VersionRange($8399, $8400)), ($8401, $8402, $8403, $8404, $8405, $8406, $8407, $8408, $8409, $8410, $8411, $8412, $8413, $8414, $8415, $8416, $8417, $8418, $8419, $8420, $8421, $8422, $8423, $8424, $8425, $8426, $8427, $8428, VersionRange($8429, $8430)), ($8431, $8432, $8433, $8434, $8435, $8436, $8437, $8438, $8439, $8440, $8441, $8442, $8443, $8444, $8445, $8446, $8447, $8448, $8449, $8450, $8451, $8452, $8453, $8454, $8455, $8456, $8457, $8458, VersionRange($8459, $8460)), ($8461, $8462, $8463, $8464, $8465, $8466, $8467, $8468, $8469, $8470, $8471, $8472, $8473, $8474, $8475, $8476, $8477, $8478, $8479, $8480, $8481, $8482, $8483, $8484, $8485, $8486, $8487, $8488, VersionRange($8489, $8490)), ($8491, $8492, $8493, $8494, $8495, $8496, $8497, $8498, $8499, $8500, $8501, $8502, $8503, $8504, $8505, $8506, $8507, $8508, $8509, $8510, $8511, $8512, $8513, $8514, $8515, $8516, $8517, $8518, VersionRange($8519, $8520)), ($8521, $8522, $8523, $8524, $8525, $8526, $8527, $8528, $8529, $8530, $8531, $8532, $8533, $8534, $8535, $8536, $8537, $8538, $8539, $8540, $8541, $8542, $8543, $8544, $8545, $8546, $8547, $8548, VersionRange($8549, $8550)), ($8551, $8552, $8553, $8554, $8555, $8556, $8557, $8558, $8559, $8560, $8561, $8562, $8563, $8564, $8565, $8566, $8567, $8568, $8569, $8570, $8571, $8572, $8573, $8574, $8575, $8576, $8577, $8578, VersionRange($8579, $8580)), ($8581, $8582, $8583, $8584, $8585, $8586, $8587, $8588, $8589, $8590, $8591, $8592, $8593, $8594, $8595, $8596, $8597, $8598, $8599, $8600, $8601, $8602, $8603, $8604, $8605, $8606, $8607, $8608, VersionRange($8609, $8610)), ($8611, $8612, $8613, $8614, $8615, $8616, $8617, $8618, $8619, $8620, $8621, $8622, $8623, $8624, $8625, $8626, $8627, $8628, $8629, $8630, $8631, $8632, $8633, $8634, $8635, $8636, $8637, $8638, VersionRange($8639, $8640)), ($8641, $8642, $8643, $8644, $8645, $8646, $8647, $8648, $8649, $8650, $8651, $8652, $8653, $8654, $8655, $8656, $8657, $8658, $8659, $8660, $8661, $8662, $8663, $8664, $8665, $8666, $8667, $8668, VersionRange($8669, $8670)), ($8671, $8672, $8673, $8674, $8675, $8676, $8677, $8678, $8679, $8680, $8681, $8682, $8683, $8684, $8685, $8686, $8687, $8688, $8689, $8690, $8691, $8692, $8693, $8694, $8695, $8696, $8697, $8698, VersionRange($8699, $8700)), ($8701, $8702, $8703, $8704, $8705, $8706, $8707, $8708, $8709, $8710, $8711, $8712, $8713, $8714, $8715, $8716, $8717, $8718, $8719, $8720, $8721, $8722, $8723, $8724, $8725, $8726, $8727, $8728, VersionRange($8729, $8730)), ($8731, $8732, $8733, $8734, $8735, $8736, $8737, $8738, $8739, $8740, $8741, $8742, $8743, $8744, $8745, $8746, $8747, $8748, $8749, $8750, $8751, $8752, $8753, $8754, $8755, $8756, $8757, $8758, VersionRange($8759, $8760)), ($8761, $8762, $8763, $8764, $8765, $8766, $8767, $8768, $8769, $8770, $8771, $8772, $8773, $8774, $8775, $8776, $8777, $8778, $8779, $8780, $8781, $8782, $8783, $8784, $8785, $8786, $8787, $8788, VersionRange($8789, $8790)), ($8791, $8792, $8793, $8794, $8795, $8796, $8797, $8798, $8799, $8800, $8801, $8802, $8803, $8804, $8805, $8806, $8807, $8808, $8809, $8810, $8811, $8812, $8813, $8814, $8815, $8816, $8817, $8818, VersionRange($8819, $8820)), ($8821, $8822, $8823, $8824, $8825, $8826, $8827, $8828, $8829, $8830, $8831, $8832, $8833, $8834, $8835, $8836, $8837, $8838, $8839, $8840, $8841, $8842, $8843, $8844, $8845, $8846, $8847, $8848, VersionRange($8849, $8850)), ($8851, $8852, $8853, $8854, $8855, $8856, $8857, $8858, $8859, $8860, $8861, $8862, $8863, $8864, $8865, $8866, $8867, $8868, $8869, $8870, $8871, $8872, $8873, $8874, $8875, $8876, $8877, $8878, VersionRange($8879, $8880)), ($8881, $8882, $8883, $8884, $8885, $8886, $8887, $8888, $8889, $8890, $8891, $8892, $8893, $8894, $8895, $8896, $8897, $8898, $8899, $8900, $8901, $8902, $8903, $8904, $8905, $8906, $8907, $8908, VersionRange($8909, $8910)), ($8911, $8912, $8913, $8914, $8915, $8916, $8917, $8918, $8919, $8920, $8921, $8922, $8923, $8924, $8925, $8926, $8927, $8928, $8929, $8930, $8931, $8932, $8933, $8934, $8935, $8936, $8937, $8938, VersionRange($8939, $8940)), ($8941, $8942, $8943, $8944, $8945, $8946, $8947, $8948, $8949, $8950, $8951, $8952, $8953, $8954, $8955, $8956, $8957, $8958, $8959, $8960, $8961, $8962, $8963, $8964, $8965, $8966, $8967, $8968, VersionRange($8969, $8970)), ($8971, $8972, $8973, $8974, $8975, $8976, $8977, $8978, $8979, $8980, $8981, $8982, $8983, $8984, $8985, $8986, $8987, $8988, $8989, $8990, $8991, $8992, $8993, $8994, $8995, $8996, $8997, $8998, VersionRange($8999, $9000)), ($9001, $9002, $9003, $9004, $9005, $9006, $9007, $9008, $9009, $9010, $9011, $9012, $9013, $9014, $9015, $9016, $9017, $9018, $9019, $9020, $9021, $9022, $9023, $9024, $9025, $9026, $9027, $9028, VersionRange($9029, $9030)), ($9031, $9032, $9033, $9034, $9035, $9036, $9037, $9038, $9039, $9040, $9041, $9042, $9043, $9044, $9045, $9046, $9047, $9048, $9049, $9050, $9051, $9052, $9053, $9054, $9055, $9056, $9057, $9058, VersionRange($9059, $9060)), ($9061, $9062, $9063, $9064, $9065, $9066, $9067, $9068, $9069, $9070, $9071, $9072, $9073, $9074, $9075, $9076, $9077, $9078, $9079, $9080, $9081, $9082, $9083, $9084, $9085, $9086, $9087, $9088, VersionRange($9089, $9090)), ($9091, $9092, $9093, $9094, $9095, $9096, $9097, $9098, $9099, $9100, $9101, $9102, $9103, $9104, $9105, $9106, $9107, $9108, $9109, $9110, $9111, $9112, $9113, $9114, $9115, $9116, $9117, $9118, VersionRange($9119, $9120)), ($9121, $9122, $9123, $9124, $9125, $9126, $9127, $9128, $9129, $9130, $9131, $9132, $9133, $9134, $9135, $9136, $9137, $9138, $9139, $9140, $9141, $9142, $9143, $9144, $9145, $9146, $9147, $9148, VersionRange($9149, $9150)), ($9151, $9152, $9153, $9154, $9155, $9156, $9157, $9158, $9159, $9160, $9161, $9162, $9163, $9164, $9165, $9166, $9167, $9168, $9169, $9170, $9171, $9172, $9173, $9174, $9175, $9176, $9177, $9178, VersionRange($9179, $9180)), ($9181, $9182, $9183, $9184, $9185, $9186, $9187, $9188, $9189, $9190, $9191, $9192, $9193, $9194, $9195, $9196, $9197, $9198, $9199, $9200, $9201, $9202, $9203, $9204, $9205, $9206, $9207, $9208, VersionRange($9209, $9210)), ($9211, $9212, $9213, $9214, $9215, $9216, $9217, $9218, $9219, $9220, $9221, $9222, $9223, $9224, $9225, $9226, $9227, $9228, $9229, $9230, $9231, $9232, $9233, $9234, $9235, $9236, $9237, $9238, VersionRange($9239, $9240)), ($9241, $9242, $9243, $9244, $9245, $9246, $9247, $9248, $9249, $9250, $9251, $9252, $9253, $9254, $9255, $9256, $9257, $9258, $9259, $9260, $9261, $9262, $9263, $9264, $9265, $9266, $9267, $9268, VersionRange($9269, $9270)), ($9271, $9272, $9273, $9274, $9275, $9276, $9277, $9278, $9279, $9280, $9281, $9282, $9283, $9284, $9285, $9286, $9287, $9288, $9289, $9290, $9291, $9292, $9293, $9294, $9295, $9296, $9297, $9298, VersionRange($9299, $9300)), ($9301, $9302, $9303, $9304, $9305, $9306, $9307, $9308, $9309, $9310, $9311, $9312, $9313, $9314, $9315, $9316, $9317, $9318, $9319, $9320, $9321, $9322, $9323, $9324, $9325, $9326, $9327, $9328, VersionRange($9329, $9330)), ($9331, $9332, $9333, $9334, $9335, $9336, $9337, $9338, $9339, $9340, $9341, $9342, $9343, $9344, $9345, $9346, $9347, $9348, $9349, $9350, $9351, $9352, $9353, $9354, $9355, $9356, $9357, $9358, VersionRange($9359, $9360)), ($9361, $9362, $9363, $9364, $9365, $9366, $9367, $9368, $9369, $9370, $9371, $9372, $9373, $9374, $9375, $9376, $9377, $9378, $9379, $9380, $9381, $9382, $9383, $9384, $9385, $9386, $9387, $9388, VersionRange($9389, $9390)), ($9391, $9392, $9393, $9394, $9395, $9396, $9397, $9398, $9399, $9400, $9401, $9402, $9403, $9404, $9405, $9406, $9407, $9408, $9409, $9410, $9411, $9412, $9413, $9414, $9415, $9416, $9417, $9418, VersionRange($9419, $9420)), ($9421, $9422, $9423, $9424, $9425, $9426, $9427, $9428, $9429, $9430, $9431, $9432, $9433, $9434, $9435, $9436, $9437, $9438, $9439, $9440, $9441, $9442, $9443, $9444, $9445, $9446, $9447, $9448, VersionRange($9449, $9450)), ($9451, $9452, $9453, $9454, $9455, $9456, $9457, $9458, $9459, $9460, $9461, $9462, $9463, $9464, $9465, $9466, $9467, $9468, $9469, $9470, $9471, $9472, $9473, $9474, $9475, $9476, $9477, $9478, VersionRange($9479, $9480)), ($9481, $9482, $9483, $9484, $9485, $9486, $9487, $9488, $9489, $9490, $9491, $9492, $9493, $9494, $9495, $9496, $9497, $9498, $9499, $9500, $9501, $9502, $9503, $9504, $9505, $9506, $9507, $9508, VersionRange($9509, $9510)), ($9511, $9512, $9513, $9514, $9515, $9516, $9517, $9518, $9519, $9520, $9521, $9522, $9523, $9524, $9525, $9526, $9527, $9528, $9529, $9530, $9531, $9532, $9533, $9534, $9535, $9536, $9537, $9538, VersionRange($9539, $9540)), ($9541, $9542, $9543, $9544, $9545, $9546, $9547, $9548, $9549, $9550, $9551, $9552, $9553, $9554, $9555, $9556, $9557, $9558, $9559, $9560, $9561, $9562, $9563, $9564, $9565, $9566, $9567, $9568, VersionRange($9569, $9570)), ($9571, $9572, $9573, $9574, $9575, $9576, $9577, $9578, $9579, $9580, $9581, $9582, $9583, $9584, $9585, $9586, $9587, $9588, $9589, $9590, $9591, $9592, $9593, $9594, $9595, $9596, $9597, $9598, VersionRange($9599, $9600)), ($9601, $9602, $9603, $9604, $9605, $9606, $9607, $9608, $9609, $9610, $9611, $9612, $9613, $9614, $9615, $9616, $9617, $9618, $9619, $9620, $9621, $9622, $9623, $9624, $9625, $9626, $9627, $9628, VersionRange($9629, $9630)), ($9631, $9632, $9633, $9634, $9635, $9636, $9637, $9638, $9639, $9640, $9641, $9642, $9643, $9644, $9645, $9646, $9647, $9648, $9649, $9650, $9651, $9652, $9653, $9654, $9655, $9656, $9657, $9658, VersionRange($9659, $9660)), ($9661, $9662, $9663, $9664, $9665, $9666, $9667, $9668, $9669, $9670, $9671, $9672, $9673, $9674, $9675, $9676, $9677, $9678, $9679, $9680, $9681, $9682, $9683, $9684, $9685, $9686, $9687, $9688, VersionRange($9689, $9690)), ($9691, $9692, $9693, $9694, $9695, $9696, $9697, $9698, $9699, $9700, $9701, $9702, $9703, $9704, $9705, $9706, $9707, $9708, $9709, $9710, $9711, $9712, $9713, $9714, $9715, $9716, $9717, $9718, VersionRange($9719, $9720)), ($9721, $9722, $9723, $9724, $9725, $9726, $9727, $9728, $9729, $9730, $9731, $9732, $9733, $9734, $9735, $9736, $9737, $9738, $9739, $9740, $9741, $9742, $9743, $9744, $9745, $9746, $9747, $9748, VersionRange($9749, $9750)), ($9751, $9752, $9753, $9754, $9755, $9756, $9757, $9758, $9759, $9760, $9761, $9762, $9763, $9764, $9765, $9766, $9767, $9768, $9769, $9770, $9771, $9772, $9773, $9774, $9775, $9776, $9777, $9778, VersionRange($9779, $9780)), ($9781, $9782, $9783, $9784, $9785, $9786, $9787, $9788, $9789, $9790, $9791, $9792, $9793, $9794, $9795, $9796, $9797, $9798, $9799, $9800, $9801, $9802, $9803, $9804, $9805, $9806, $9807, $9808, VersionRange($9809, $9810)), ($9811, $9812, $9813, $9814, $9815, $9816, $9817, $9818, $9819, $9820, $9821, $9822, $9823, $9824, $9825, $9826, $9827, $9828, $9829, $9830, $9831, $9832, $9833, $9834, $9835, $9836, $9837, $9838, VersionRange($9839, $9840)), ($9841, $9842, $9843, $9844, $9845, $9846, $9847, $9848, $9849, $9850, $9851, $9852, $9853, $9854, $9855, $9856, $9857, $9858, $9859, $9860, $9861, $9862, $9863, $9864, $9865, $9866, $9867, $9868, VersionRange($9869, $9870)), ($9871, $9872, $9873, $9874, $9875, $9876, $9877, $9878, $9879, $9880, $9881, $9882, $9883, $9884, $9885, $9886, $9887, $9888, $9889, $9890, $9891, $9892, $9893, $9894, $9895, $9896, $9897, $9898, VersionRange($9899, $9900)), ($9901, $9902, $9903, $9904, $9905, $9906, $9907, $9908, $9909, $9910, $9911, $9912, $9913, $9914, $9915, $9916, $9917, $9918, $9919, $9920, $9921, $9922, $9923, $9924, $9925, $9926, $9927, $9928, VersionRange($9929, $9930)), ($9931, $9932, $9933, $9934, $9935, $9936, $9937, $9938, $9939, $9940, $9941, $9942, $9943, $9944, $9945, $9946, $9947, $9948, $9949, $9950, $9951, $9952, $9953, $9954, $9955, $9956, $9957, $9958, VersionRange($9959, $9960)), ($9961, $9962, $9963, $9964, $9965, $9966, $9967, $9968, $9969, $9970, $9971, $9972, $9973, $9974, $9975, $9976, $9977, $9978, $9979, $9980, $9981, $9982, $9983, $9984, $9985, $9986, $9987, $9988, VersionRange($9989, $9990)), ($9991, $9992, $9993, $9994, $9995, $9996, $9997, $9998, $9999, $10000, $10001, $10002, $10003, $10004, $10005, $10006, $10007, $10008, $10009, $10010, $10011, $10012, $10013, $10014, $10015, $10016, $10017, $10018, VersionRange($10019, $10020)), ($10021, $10022, $10023, $10024, $10025, $10026, $10027, $10028, $10029, $10030, $10031, $10032, $10033, $10034, $10035, $10036, $10037, $10038, $10039, $10040, $10041, $10042, $10043, $10044, $10045, $10046, $10047, $10048, VersionRange($10049, $10050)), ($10051, $10052, $10053, $10054, $10055, $10056, $10057, $10058, $10059, $10060, $10061, $10062, $10063, $10064, $10065, $10066, $10067, $10068, $10069, $10070, $10071, $10072, $10073, $10074, $10075, $10076, $10077, $10078, VersionRange($10079, $10080)), ($10081, $10082, $10083, $10084, $10085, $10086, $10087, $10088, $10089, $10090, $10091, $10092, $10093, $10094, $10095, $10096, $10097, $10098, $10099, $10100, $10101, $10102, $10103, $10104, $10105, $10106, $10107, $10108, VersionRange($10109, $10110)), ($10111, $10112, $10113, $10114, $10115, $10116, $10117, $10118, $10119, $10120, $10121, $10122, $10123, $10124, $10125, $10126, $10127, $10128, $10129, $10130, $10131, $10132, $10133, $10134, $10135, $10136, $10137, $10138, VersionRange($10139, $10140)), ($10141, $10142, $10143, $10144, $10145, $10146, $10147, $10148, $10149, $10150, $10151, $10152, $10153, $10154, $10155, $10156, $10157, $10158, $10159, $10160, $10161, $10162, $10163, $10164, $10165, $10166, $10167, $10168, VersionRange($10169, $10170)), ($10171, $10172, $10173, $10174, $10175, $10176, $10177, $10178, $10179, $10180, $10181, $10182, $10183, $10184, $10185, $10186, $10187, $10188, $10189, $10190, $10191, $10192, $10193, $10194, $10195, $10196, $10197, $10198, VersionRange($10199, $10200)), ($10201, $10202, $10203, $10204, $10205, $10206, $10207, $10208, $10209, $10210, $10211, $10212, $10213, $10214, $10215, $10216, $10217, $10218, $10219, $10220, $10221, $10222, $10223, $10224, $10225, $10226, $10227, $10228, VersionRange($10229, $10230)), ($10231, $10232, $10233, $10234, $10235, $10236, $10237, $10238, $10239, $10240, $10241, $10242, $10243, $10244, $10245, $10246, $10247, $10248, $10249, $10250, $10251, $10252, $10253, $10254, $10255, $10256, $10257, $10258, VersionRange($10259, $10260)), ($10261, $10262, $10263, $10264, $10265, $10266, $10267, $10268, $10269, $10270, $10271, $10272, $10273, $10274, $10275, $10276, $10277, $10278, $10279, $10280, $10281, $10282, $10283, $10284, $10285, $10286, $10287, $10288, VersionRange($10289, $10290)), ($10291, $10292, $10293, $10294, $10295, $10296, $10297, $10298, $10299, $10300, $10301, $10302, $10303, $10304, $10305, $10306, $10307, $10308, $10309, $10310, $10311, $10312, $10313, $10314, $10315, $10316, $10317, $10318, VersionRange($10319, $10320)), ($10321, $10322, $10323, $10324, $10325, $10326, $10327, $10328, $10329, $10330, $10331, $10332, $10333, $10334, $10335, $10336, $10337, $10338, $10339, $10340, $10341, $10342, $10343, $10344, $10345, $10346, $10347, $10348, VersionRange($10349, $10350)), ($10351, $10352, $10353, $10354, $10355, $10356, $10357, $10358, $10359, $10360, $10361, $10362, $10363, $10364, $10365, $10366, $10367, $10368, $10369, $10370, $10371, $10372, $10373, $10374, $10375, $10376, $10377, $10378, VersionRange($10379, $10380)), ($10381, $10382, $10383, $10384, $10385, $10386, $10387, $10388, $10389, $10390, $10391, $10392, $10393, $10394, $10395, $10396, $10397, $10398, $10399, $10400, $10401, $10402, $10403, $10404, $10405, $10406, $10407, $10408, VersionRange($10409, $10410)), ($10411, $10412, $10413, $10414, $10415, $10416, $10417, $10418, $10419, $10420, $10421, $10422, $10423, $10424, $10425, $10426, $10427, $10428, $10429, $10430, $10431, $10432, $10433, $10434, $10435, $10436, $10437, $10438, VersionRange($10439, $10440)), ($10441, $10442, $10443, $10444, $10445, $10446, $10447, $10448, $10449, $10450, $10451, $10452, $10453, $10454, $10455, $10456, $10457, $10458, $10459, $10460, $10461, $10462, $10463, $10464, $10465, $10466, $10467, $10468, VersionRange($10469, $10470)), ($10471, $10472, $10473, $10474, $10475, $10476, $10477, $10478, $10479, $10480, $10481, $10482, $10483, $10484, $10485, $10486, $10487, $10488, $10489, $10490, $10491, $10492, $10493, $10494, $10495, $10496, $10497, $10498, VersionRange($10499, $10500)), ($10501, $10502, $10503, $10504, $10505, $10506, $10507, $10508, $10509, $10510, $10511, $10512, $10513, $10514, $10515, $10516, $10517, $10518, $10519, $10520, $10521, $10522, $10523, $10524, $10525, $10526, $10527, $10528, VersionRange($10529, $10530)), ($10531, $10532, $10533, $10534, $10535, $10536, $10537, $10538, $10539, $10540, $10541, $10542, $10543, $10544, $10545, $10546, $10547, $10548, $10549, $10550, $10551, $10552, $10553, $10554, $10555, $10556, $10557, $10558, VersionRange($10559, $10560)), ($10561, $10562, $10563, $10564, $10565, $10566, $10567, $10568, $10569, $10570, $10571, $10572, $10573, $10574, $10575, $10576, $10577, $10578, $10579, $10580, $10581, $10582, $10583, $10584, $10585, $10586, $10587, $10588, VersionRange($10589, $10590)), ($10591, $10592, $10593, $10594, $10595, $10596, $10597, $10598, $10599, $10600, $10601, $10602, $10603, $10604, $10605, $10606, $10607, $10608, $10609, $10610, $10611, $10612, $10613, $10614, $10615, $10616, $10617, $10618, VersionRange($10619, $10620)), ($10621, $10622, $10623, $10624, $10625, $10626, $10627, $10628, $10629, $10630, $10631, $10632, $10633, $10634, $10635, $10636, $10637, $10638, $10639, $10640, $10641, $10642, $10643, $10644, $10645, $10646, $10647, $10648, VersionRange($10649, $10650)), ($10651, $10652, $10653, $10654, $10655, $10656, $10657, $10658, $10659, $10660, $10661, $10662, $10663, $10664, $10665, $10666, $10667, $10668, $10669, $10670, $10671, $10672, $10673, $10674, $10675, $10676, $10677, $10678, VersionRange($10679, $10680)), ($10681, $10682, $10683, $10684, $10685, $10686, $10687, $10688, $10689, $10690, $10691, $10692, $10693, $10694, $10695, $10696, $10697, $10698, $10699, $10700, $10701, $10702, $10703, $10704, $10705, $10706, $10707, $10708, VersionRange($10709, $10710)), ($10711, $10712, $10713, $10714, $10715, $10716, $10717, $10718, $10719, $10720, $10721, $10722, $10723, $10724, $10725, $10726, $10727, $10728, $10729, $10730, $10731, $10732, $10733, $10734, $10735, $10736, $10737, $10738, VersionRange($10739, $10740)), ($10741, $10742, $10743, $10744, $10745, $10746, $10747, $10748, $10749, $10750, $10751, $10752, $10753, $10754, $10755, $10756, $10757, $10758, $10759, $10760, $10761, $10762, $10763, $10764, $10765, $10766, $10767, $10768, VersionRange($10769, $10770)), ($10771, $10772, $10773, $10774, $10775, $10776, $10777, $10778, $10779, $10780, $10781, $10782, $10783, $10784, $10785, $10786, $10787, $10788, $10789, $10790, $10791, $10792, $10793, $10794, $10795, $10796, $10797, $10798, VersionRange($10799, $10800)), ($10801, $10802, $10803, $10804, $10805, $10806, $10807, $10808, $10809, $10810, $10811, $10812, $10813, $10814, $10815, $10816, $10817, $10818, $10819, $10820, $10821, $10822, $10823, $10824, $10825, $10826, $10827, $10828, VersionRange($10829, $10830)), ($10831, $10832, $10833, $10834, $10835, $10836, $10837, $10838, $10839, $10840, $10841, $10842, $10843, $10844, $10845, $10846, $10847, $10848, $10849, $10850, $10851, $10852, $10853, $10854, $10855, $10856, $10857, $10858, VersionRange($10859, $10860)), ($10861, $10862, $10863, $10864, $10865, $10866, $10867, $10868, $10869, $10870, $10871, $10872, $10873, $10874, $10875, $10876, $10877, $10878, $10879, $10880, $10881, $10882, $10883, $10884, $10885, $10886, $10887, $10888, VersionRange($10889, $10890)), ($10891, $10892, $10893, $10894, $10895, $10896, $10897, $10898, $10899, $10900, $10901, $10902, $10903, $10904, $10905, $10906, $10907, $10908, $10909, $10910, $10911, $10912, $10913, $10914, $10915, $10916, $10917, $10918, VersionRange($10919, $10920)), ($10921, $10922, $10923, $10924, $10925, $10926, $10927, $10928, $10929, $10930, $10931, $10932, $10933, $10934, $10935, $10936, $10937, $10938, $10939, $10940, $10941, $10942, $10943, $10944, $10945, $10946, $10947, $10948, VersionRange($10949, $10950)), ($10951, $10952, $10953, $10954, $10955, $10956, $10957, $10958, $10959, $10960, $10961, $10962, $10963, $10964, $10965, $10966, $10967, $10968, $10969, $10970, $10971, $10972, $10973, $10974, $10975, $10976, $10977, $10978, VersionRange($10979, $10980)), ($10981, $10982, $10983, $10984, $10985, $10986, $10987, $10988, $10989, $10990, $10991, $10992, $10993, $10994, $10995, $10996, $10997, $10998, $10999, $11000, $11001, $11002, $11003, $11004, $11005, $11006, $11007, $11008, VersionRange($11009, $11010)), ($11011, $11012, $11013, $11014, $11015, $11016, $11017, $11018, $11019, $11020, $11021, $11022, $11023, $11024, $11025, $11026, $11027, $11028, $11029, $11030, $11031, $11032, $11033, $11034, $11035, $11036, $11037, $11038, VersionRange($11039, $11040)), ($11041, $11042, $11043, $11044, $11045, $11046, $11047, $11048, $11049, $11050, $11051, $11052, $11053, $11054, $11055, $11056, $11057, $11058, $11059, $11060, $11061, $11062, $11063, $11064, $11065, $11066, $11067, $11068, VersionRange($11069, $11070)), ($11071, $11072, $11073, $11074, $11075, $11076, $11077, $11078, $11079, $11080, $11081, $11082, $11083, $11084, $11085, $11086, $11087, $11088, $11089, $11090, $11091, $11092, $11093, $11094, $11095, $11096, $11097, $11098, VersionRange($11099, $11100)), ($11101, $11102, $11103, $11104, $11105, $11106, $11107, $11108, $11109, $11110, $11111, $11112, $11113, $11114, $11115, $11116, $11117, $11118, $11119, $11120, $11121, $11122, $11123, $11124, $11125, $11126, $11127, $11128, VersionRange($11129, $11130)), ($11131, $11132, $11133, $11134, $11135, $11136, $11137, $11138, $11139, $11140, $11141, $11142, $11143, $11144, $11145, $11146, $11147, $11148, $11149, $11150, $11151, $11152, $11153, $11154, $11155, $11156, $11157, $11158, VersionRange($11159, $11160)), ($11161, $11162, $11163, $11164, $11165, $11166, $11167, $11168, $11169, $11170, $11171, $11172, $11173, $11174, $11175, $11176, $11177, $11178, $11179, $11180, $11181, $11182, $11183, $11184, $11185, $11186, $11187, $11188, VersionRange($11189, $11190)), ($11191, $11192, $11193, $11194, $11195, $11196, $11197, $11198, $11199, $11200, $11201, $11202, $11203, $11204, $11205, $11206, $11207, $11208, $11209, $11210, $11211, $11212, $11213, $11214, $11215, $11216, $11217, $11218, VersionRange($11219, $11220)), ($11221, $11222, $11223, $11224, $11225, $11226, $11227, $11228, $11229, $11230, $11231, $11232, $11233, $11234, $11235, $11236, $11237, $11238, $11239, $11240, $11241, $11242, $11243, $11244, $11245, $11246, $11247, $11248, VersionRange($11249, $11250)), ($11251, $11252, $11253, $11254, $11255, $11256, $11257, $11258, $11259, $11260, $11261, $11262, $11263, $11264, $11265, $11266, $11267, $11268, $11269, $11270, $11271, $11272, $11273, $11274, $11275, $11276, $11277, $11278, VersionRange($11279, $11280)), ($11281, $11282, $11283, $11284, $11285, $11286, $11287, $11288, $11289, $11290, $11291, $11292, $11293, $11294, $11295, $11296, $11297, $11298, $11299, $11300, $11301, $11302, $11303, $11304, $11305, $11306, $11307, $11308, VersionRange($11309, $11310)), ($11311, $11312, $11313, $11314, $11315, $11316, $11317, $11318, $11319, $11320, $11321, $11322, $11323, $11324, $11325, $11326, $11327, $11328, $11329, $11330, $11331, $11332, $11333, $11334, $11335, $11336, $11337, $11338, VersionRange($11339, $11340)), ($11341, $11342, $11343, $11344, $11345, $11346, $11347, $11348, $11349, $11350, $11351, $11352, $11353, $11354, $11355, $11356, $11357, $11358, $11359, $11360, $11361, $11362, $11363, $11364, $11365, $11366, $11367, $11368, VersionRange($11369, $11370)), ($11371, $11372, $11373, $11374, $11375, $11376, $11377, $11378, $11379, $11380, $11381, $11382, $11383, $11384, $11385, $11386, $11387, $11388, $11389, $11390, $11391, $11392, $11393, $11394, $11395, $11396, $11397, $11398, VersionRange($11399, $11400)), ($11401, $11402, $11403, $11404, $11405, $11406, $11407, $11408, $11409, $11410, $11411, $11412, $11413, $11414, $11415, $11416, $11417, $11418, $11419, $11420, $11421, $11422, $11423, $11424, $11425, $11426, $11427, $11428, VersionRange($11429, $11430)), ($11431, $11432, $11433, $11434, $11435, $11436, $11437, $11438, $11439, $11440, $11441, $11442, $11443, $11444, $11445, $11446, $11447, $11448, $11449, $11450, $11451, $11452, $11453, $11454, $11455, $11456, $11457, $11458, VersionRange($11459, $11460)), ($11461, $11462, $11463, $11464, $11465, $11466, $11467, $11468, $11469, $11470, $11471, $11472, $11473, $11474, $11475, $11476, $11477, $11478, $11479, $11480, $11481, $11482, $11483, $11484, $11485, $11486, $11487, $11488, VersionRange($11489, $11490)), ($11491, $11492, $11493, $11494, $11495, $11496, $11497, $11498, $11499, $11500, $11501, $11502, $11503, $11504, $11505, $11506, $11507, $11508, $11509, $11510, $11511, $11512, $11513, $11514, $11515, $11516, $11517, $11518, VersionRange($11519, $11520)), ($11521, $11522, $11523, $11524, $11525, $11526, $11527, $11528, $11529, $11530, $11531, $11532, $11533, $11534, $11535, $11536, $11537, $11538, $11539, $11540, $11541, $11542, $11543, $11544, $11545, $11546, $11547, $11548, VersionRange($11549, $11550)), ($11551, $11552, $11553, $11554, $11555, $11556, $11557, $11558, $11559, $11560, $11561, $11562, $11563, $11564, $11565, $11566, $11567, $11568, $11569, $11570, $11571, $11572, $11573, $11574, $11575, $11576, $11577, $11578, VersionRange($11579, $11580)), ($11581, $11582, $11583, $11584, $11585, $11586, $11587, $11588, $11589, $11590, $11591, $11592, $11593, $11594, $11595, $11596, $11597, $11598, $11599, $11600, $11601, $11602, $11603, $11604, $11605, $11606, $11607, $11608, VersionRange($11609, $11610)), ($11611, $11612, $11613, $11614, $11615, $11616, $11617, $11618, $11619, $11620, $11621, $11622, $11623, $11624, $11625, $11626, $11627, $11628, $11629, $11630, $11631, $11632, $11633, $11634, $11635, $11636, $11637, $11638, VersionRange($11639, $11640)), ($11641, $11642, $11643, $11644, $11645, $11646, $11647, $11648, $11649, $11650, $11651, $11652, $11653, $11654, $11655, $11656, $11657, $11658, $11659, $11660, $11661, $11662, $11663, $11664, $11665, $11666, $11667, $11668, VersionRange($11669, $11670)), ($11671, $11672, $11673, $11674, $11675, $11676, $11677, $11678, $11679, $11680, $11681, $11682, $11683, $11684, $11685, $11686, $11687, $11688, $11689, $11690, $11691, $11692, $11693, $11694, $11695, $11696, $11697, $11698, VersionRange($11699, $11700)), ($11701, $11702, $11703, $11704, $11705, $11706, $11707, $11708, $11709, $11710, $11711, $11712, $11713, $11714, $11715, $11716, $11717, $11718, $11719, $11720, $11721, $11722, $11723, $11724, $11725, $11726, $11727, $11728, VersionRange($11729, $11730)), ($11731, $11732, $11733, $11734, $11735, $11736, $11737, $11738, $11739, $11740, $11741, $11742, $11743, $11744, $11745, $11746, $11747, $11748, $11749, $11750, $11751, $11752, $11753, $11754, $11755, $11756, $11757, $11758, VersionRange($11759, $11760)), ($11761, $11762, $11763, $11764, $11765, $11766, $11767, $11768, $11769, $11770, $11771, $11772, $11773, $11774, $11775, $11776, $11777, $11778, $11779, $11780, $11781, $11782, $11783, $11784, $11785, $11786, $11787, $11788, VersionRange($11789, $11790)), ($11791, $11792, $11793, $11794, $11795, $11796, $11797, $11798, $11799, $11800, $11801, $11802, $11803, $11804, $11805, $11806, $11807, $11808, $11809, $11810, $11811, $11812, $11813, $11814, $11815, $11816, $11817, $11818, VersionRange($11819, $11820)), ($11821, $11822, $11823, $11824, $11825, $11826, $11827, $11828, $11829, $11830, $11831, $11832, $11833, $11834, $11835, $11836, $11837, $11838, $11839, $11840, $11841, $11842, $11843, $11844, $11845, $11846, $11847, $11848, VersionRange($11849, $11850)), ($11851, $11852, $11853, $11854, $11855, $11856, $11857, $11858, $11859, $11860, $11861, $11862, $11863, $11864, $11865, $11866, $11867, $11868, $11869, $11870, $11871, $11872, $11873, $11874, $11875, $11876, $11877, $11878, VersionRange($11879, $11880)), ($11881, $11882, $11883, $11884, $11885, $11886, $11887, $11888, $11889, $11890, $11891, $11892, $11893, $11894, $11895, $11896, $11897, $11898, $11899, $11900, $11901, $11902, $11903, $11904, $11905, $11906, $11907, $11908, VersionRange($11909, $11910)), ($11911, $11912, $11913, $11914, $11915, $11916, $11917, $11918, $11919, $11920, $11921, $11922, $11923, $11924, $11925, $11926, $11927, $11928, $11929, $11930, $11931, $11932, $11933, $11934, $11935, $11936, $11937, $11938, VersionRange($11939, $11940)), ($11941, $11942, $11943, $11944, $11945, $11946, $11947, $11948, $11949, $11950, $11951, $11952, $11953, $11954, $11955, $11956, $11957, $11958, $11959, $11960, $11961, $11962, $11963, $11964, $11965, $11966, $11967, $11968, VersionRange($11969, $11970)), ($11971, $11972, $11973, $11974, $11975, $11976, $11977, $11978, $11979, $11980, $11981, $11982, $11983, $11984, $11985, $11986, $11987, $11988, $11989, $11990, $11991, $11992, $11993, $11994, $11995, $11996, $11997, $11998, VersionRange($11999, $12000)), ($12001, $12002, $12003, $12004, $12005, $12006, $12007, $12008, $12009, $12010, $12011, $12012, $12013, $12014, $12015, $12016, $12017, $12018, $12019, $12020, $12021, $12022, $12023, $12024, $12025, $12026, $12027, $12028, VersionRange($12029, $12030)), ($12031, $12032, $12033, $12034, $12035, $12036, $12037, $12038, $12039, $12040, $12041, $12042, $12043, $12044, $12045, $12046, $12047, $12048, $12049, $12050, $12051, $12052, $12053, $12054, $12055, $12056, $12057, $12058, VersionRange($12059, $12060)), ($12061, $12062, $12063, $12064, $12065, $12066, $12067, $12068, $12069, $12070, $12071, $12072, $12073, $12074, $12075, $12076, $12077, $12078, $12079, $12080, $12081, $12082, $12083, $12084, $12085, $12086, $12087, $12088, VersionRange($12089, $12090)), ($12091, $12092, $12093, $12094, $12095, $12096, $12097, $12098, $12099, $12100, $12101, $12102, $12103, $12104, $12105, $12106, $12107, $12108, $12109, $12110, $12111, $12112, $12113, $12114, $12115, $12116, $12117, $12118, VersionRange($12119, $12120)), ($12121, $12122, $12123, $12124, $12125, $12126, $12127, $12128, $12129, $12130, $12131, $12132, $12133, $12134, $12135, $12136, $12137, $12138, $12139, $12140, $12141, $12142, $12143, $12144, $12145, $12146, $12147, $12148, VersionRange($12149, $12150)), ($12151, $12152, $12153, $12154, $12155, $12156, $12157, $12158, $12159, $12160, $12161, $12162, $12163, $12164, $12165, $12166, $12167, $12168, $12169, $12170, $12171, $12172, $12173, $12174, $12175, $12176, $12177, $12178, VersionRange($12179, $12180)), ($12181, $12182, $12183, $12184, $12185, $12186, $12187, $12188, $12189, $12190, $12191, $12192, $12193, $12194, $12195, $12196, $12197, $12198, $12199, $12200, $12201, $12202, $12203, $12204, $12205, $12206, $12207, $12208, VersionRange($12209, $12210)), ($12211, $12212, $12213, $12214, $12215, $12216, $12217, $12218, $12219, $12220, $12221, $12222, $12223, $12224, $12225, $12226, $12227, $12228, $12229, $12230, $12231, $12232, $12233, $12234, $12235, $12236, $12237, $12238, VersionRange($12239, $12240)), ($12241, $12242, $12243, $12244, $12245, $12246, $12247, $12248, $12249, $12250, $12251, $12252, $12253, $12254, $12255, $12256, $12257, $12258, $12259, $12260, $12261, $12262, $12263, $12264, $12265, $12266, $12267, $12268, VersionRange($12269, $12270)), ($12271, $12272, $12273, $12274, $12275, $12276, $12277, $12278, $12279, $12280, $12281, $12282, $12283, $12284, $12285, $12286, $12287, $12288, $12289, $12290, $12291, $12292, $12293, $12294, $12295, $12296, $12297, $12298, VersionRange($12299, $12300)), ($12301, $12302, $12303, $12304, $12305, $12306, $12307, $12308, $12309, $12310, $12311, $12312, $12313, $12314, $12315, $12316, $12317, $12318, $12319, $12320, $12321, $12322, $12323, $12324, $12325, $12326, $12327, $12328, VersionRange($12329, $12330)), ($12331, $12332, $12333, $12334, $12335, $12336, $12337, $12338, $12339, $12340, $12341, $12342, $12343, $12344, $12345, $12346, $12347, $12348, $12349, $12350, $12351, $12352, $12353, $12354, $12355, $12356, $12357, $12358, VersionRange($12359, $12360)), ($12361, $12362, $12363, $12364, $12365, $12366, $12367, $12368, $12369, $12370, $12371, $12372, $12373, $12374, $12375, $12376, $12377, $12378, $12379, $12380, $12381, $12382, $12383, $12384, $12385, $12386, $12387, $12388, VersionRange($12389, $12390)), ($12391, $12392, $12393, $12394, $12395, $12396, $12397, $12398, $12399, $12400, $12401, $12402, $12403, $12404, $12405, $12406, $12407, $12408, $12409, $12410, $12411, $12412, $12413, $12414, $12415, $12416, $12417, $12418, VersionRange($12419, $12420)), ($12421, $12422, $12423, $12424, $12425, $12426, $12427, $12428, $12429, $12430, $12431, $12432, $12433, $12434, $12435, $12436, $12437, $12438, $12439, $12440, $12441, $12442, $12443, $12444, $12445, $12446, $12447, $12448, VersionRange($12449, $12450)), ($12451, $12452, $12453, $12454, $12455, $12456, $12457, $12458, $12459, $12460, $12461, $12462, $12463, $12464, $12465, $12466, $12467, $12468, $12469, $12470, $12471, $12472, $12473, $12474, $12475, $12476, $12477, $12478, VersionRange($12479, $12480)), ($12481, $12482, $12483, $12484, $12485, $12486, $12487, $12488, $12489, $12490, $12491, $12492, $12493, $12494, $12495, $12496, $12497, $12498, $12499, $12500, $12501, $12502, $12503, $12504, $12505, $12506, $12507, $12508, VersionRange($12509, $12510)), ($12511, $12512, $12513, $12514, $12515, $12516, $12517, $12518, $12519, $12520, $12521, $12522, $12523, $12524, $12525, $12526, $12527, $12528, $12529, $12530, $12531, $12532, $12533, $12534, $12535, $12536, $12537, $12538, VersionRange($12539, $12540)), ($12541, $12542, $12543, $12544, $12545, $12546, $12547, $12548, $12549, $12550, $12551, $12552, $12553, $12554, $12555, $12556, $12557, $12558, $12559, $12560, $12561, $12562, $12563, $12564, $12565, $12566, $12567, $12568, VersionRange($12569, $12570)), ($12571, $12572, $12573, $12574, $12575, $12576, $12577, $12578, $12579, $12580, $12581, $12582, $12583, $12584, $12585, $12586, $12587, $12588, $12589, $12590, $12591, $12592, $12593, $12594, $12595, $12596, $12597, $12598, VersionRange($12599, $12600)), ($12601, $12602, $12603, $12604, $12605, $12606, $12607, $12608, $12609, $12610, $12611, $12612, $12613, $12614, $12615, $12616, $12617, $12618, $12619, $12620, $12621, $12622, $12623, $12624, $12625, $12626, $12627, $12628, VersionRange($12629, $12630)), ($12631, $12632, $12633, $12634, $12635, $12636, $12637, $12638, $12639, $12640, $12641, $12642, $12643, $12644, $12645, $12646, $12647, $12648, $12649, $12650, $12651, $12652, $12653, $12654, $12655, $12656, $12657, $12658, VersionRange($12659, $12660)), ($12661, $12662, $12663, $12664, $12665, $12666, $12667, $12668, $12669, $12670, $12671, $12672, $12673, $12674, $12675, $12676, $12677, $12678, $12679, $12680, $12681, $12682, $12683, $12684, $12685, $12686, $12687, $12688, VersionRange($12689, $12690)), ($12691, $12692, $12693, $12694, $12695, $12696, $12697, $12698, $12699, $12700, $12701, $12702, $12703, $12704, $12705, $12706, $12707, $12708, $12709, $12710, $12711, $12712, $12713, $12714, $12715, $12716, $12717, $12718, VersionRange($12719, $12720)), ($12721, $12722, $12723, $12724, $12725, $12726, $12727, $12728, $12729, $12730, $12731, $12732, $12733, $12734, $12735, $12736, $12737, $12738, $12739, $12740, $12741, $12742, $12743, $12744, $12745, $12746, $12747, $12748, VersionRange($12749, $12750)), ($12751, $12752, $12753, $12754, $12755, $12756, $12757, $12758, $12759, $12760, $12761, $12762, $12763, $12764, $12765, $12766, $12767, $12768, $12769, $12770, $12771, $12772, $12773, $12774, $12775, $12776, $12777, $12778, VersionRange($12779, $12780)), ($12781, $12782, $12783, $12784, $12785, $12786, $12787, $12788, $12789, $12790, $12791, $12792, $12793, $12794, $12795, $12796, $12797, $12798, $12799, $12800, $12801, $12802, $12803, $12804, $12805, $12806, $12807, $12808, VersionRange($12809, $12810)), ($12811, $12812, $12813, $12814, $12815, $12816, $12817, $12818, $12819, $12820, $12821, $12822, $12823, $12824, $12825, $12826, $12827, $12828, $12829, $12830, $12831, $12832, $12833, $12834, $12835, $12836, $12837, $12838, VersionRange($12839, $12840)), ($12841, $12842, $12843, $12844, $12845, $12846, $12847, $12848, $12849, $12850, $12851, $12852, $12853, $12854, $12855, $12856, $12857, $12858, $12859, $12860, $12861, $12862, $12863, $12864, $12865, $12866, $12867, $12868, VersionRange($12869, $12870)), ($12871, $12872, $12873, $12874, $12875, $12876, $12877, $12878, $12879, $12880, $12881, $12882, $12883, $12884, $12885, $12886, $12887, $12888, $12889, $12890, $12891, $12892, $12893, $12894, $12895, $12896, $12897, $12898, VersionRange($12899, $12900)), ($12901, $12902, $12903, $12904, $12905, $12906, $12907, $12908, $12909, $12910, $12911, $12912, $12913, $12914, $12915, $12916, $12917, $12918, $12919, $12920, $12921, $12922, $12923, $12924, $12925, $12926, $12927, $12928, VersionRange($12929, $12930)), ($12931, $12932, $12933, $12934, $12935, $12936, $12937, $12938, $12939, $12940, $12941, $12942, $12943, $12944, $12945, $12946, $12947, $12948, $12949, $12950, $12951, $12952, $12953, $12954, $12955, $12956, $12957, $12958, VersionRange($12959, $12960)), ($12961, $12962, $12963, $12964, $12965, $12966, $12967, $12968, $12969, $12970[...]Date: 2023-07-04 18:38:48
Detail: Process holding the lock: 1171. Wait queue: 1142.
Context: while inserting index tuple (406595,1) in relation "vuln"
Statement: INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30)), ($31, $32, $33, $34, $35, $36, $37, $38, $39, $40, $41, $42, $43, $44, $45, $46, $47, $48, $49, $50, $51, $52, $53, $54, $55, $56, $57, $58, VersionRange($59, $60)), ($61, $62, $63, $64, $65, $66, $67, $68, $69, $70, $71, $72, $73, $74, $75, $76, $77, $78, $79, $80, $81, $82, $83, $84, $85, $86, $87, $88, VersionRange($89, $90)), ($91, $92, $93, $94, $95, $96, $97, $98, $99, $100, $101, $102, $103, $104, $105, $106, $107, $108, $109, $110, $111, $112, $113, $114, $115, $116, $117, $118, VersionRange($119, $120)), ($121, $122, $123, $124, $125, $126, $127, $128, $129, $130, $131, $132, $133, $134, $135, $136, $137, $138, $139, $140, $141, $142, $143, $144, $145, $146, $147, $148, VersionRange($149, $150)), ($151, $152, $153, $154, $155, $156, $157, $158, $159, $160, $161, $162, $163, $164, $165, $166, $167, $168, $169, $170, $171, $172, $173, $174, $175, $176, $177, $178, VersionRange($179, $180)), ($181, $182, $183, $184, $185, $186, $187, $188, $189, $190, $191, $192, $193, $194, $195, $196, $197, $198, $199, $200, $201, $202, $203, $204, $205, $206, $207, $208, VersionRange($209, $210)), ($211, $212, $213, $214, $215, $216, $217, $218, $219, $220, $221, $222, $223, $224, $225, $226, $227, $228, $229, $230, $231, $232, $233, $234, $235, $236, $237, $238, VersionRange($239, $240)), ($241, $242, $243, $244, $245, $246, $247, $248, $249, $250, $251, $252, $253, $254, $255, $256, $257, $258, $259, $260, $261, $262, $263, $264, $265, $266, $267, $268, VersionRange($269, $270)), ($271, $272, $273, $274, $275, $276, $277, $278, $279, $280, $281, $282, $283, $284, $285, $286, $287, $288, $289, $290, $291, $292, $293, $294, $295, $296, $297, $298, VersionRange($299, $300)), ($301, $302, $303, $304, $305, $306, $307, $308, $309, $310, $311, $312, $313, $314, $315, $316, $317, $318, $319, $320, $321, $322, $323, $324, $325, $326, $327, $328, VersionRange($329, $330)), ($331, $332, $333, $334, $335, $336, $337, $338, $339, $340, $341, $342, $343, $344, $345, $346, $347, $348, $349, $350, $351, $352, $353, $354, $355, $356, $357, $358, VersionRange($359, $360)), ($361, $362, $363, $364, $365, $366, $367, $368, $369, $370, $371, $372, $373, $374, $375, $376, $377, $378, $379, $380, $381, $382, $383, $384, $385, $386, $387, $388, VersionRange($389, $390)), ($391, $392, $393, $394, $395, $396, $397, $398, $399, $400, $401, $402, $403, $404, $405, $406, $407, $408, $409, $410, $411, $412, $413, $414, $415, $416, $417, $418, VersionRange($419, $420)), ($421, $422, $423, $424, $425, $426, $427, $428, $429, $430, $431, $432, $433, $434, $435, $436, $437, $438, $439, $440, $441, $442, $443, $444, $445, $446, $447, $448, VersionRange($449, $450)), ($451, $452, $453, $454, $455, $456, $457, $458, $459, $460, $461, $462, $463, $464, $465, $466, $467, $468, $469, $470, $471, $472, $473, $474, $475, $476, $477, $478, VersionRange($479, $480)), ($481, $482, $483, $484, $485, $486, $487, $488, $489, $490, $491, $492, $493, $494, $495, $496, $497, $498, $499, $500, $501, $502, $503, $504, $505, $506, $507, $508, VersionRange($509, $510)), ($511, $512, $513, $514, $515, $516, $517, $518, $519, $520, $521, $522, $523, $524, $525, $526, $527, $528, $529, $530, $531, $532, $533, $534, $535, $536, $537, $538, VersionRange($539, $540)), ($541, $542, $543, $544, $545, $546, $547, $548, $549, $550, $551, $552, $553, $554, $555, $556, $557, $558, $559, $560, $561, $562, $563, $564, $565, $566, $567, $568, VersionRange($569, $570)), ($571, $572, $573, $574, $575, $576, $577, $578, $579, $580, $581, $582, $583, $584, $585, $586, $587, $588, $589, $590, $591, $592, $593, $594, $595, $596, $597, $598, VersionRange($599, $600)), ($601, $602, $603, $604, $605, $606, $607, $608, $609, $610, $611, $612, $613, $614, $615, $616, $617, $618, $619, $620, $621, $622, $623, $624, $625, $626, $627, $628, VersionRange($629, $630)), ($631, $632, $633, $634, $635, $636, $637, $638, $639, $640, $641, $642, $643, $644, $645, $646, $647, $648, $649, $650, $651, $652, $653, $654, $655, $656, $657, $658, VersionRange($659, $660)), ($661, $662, $663, $664, $665, $666, $667, $668, $669, $670, $671, $672, $673, $674, $675, $676, $677, $678, $679, $680, $681, $682, $683, $684, $685, $686, $687, $688, VersionRange($689, $690)), ($691, $692, $693, $694, $695, $696, $697, $698, $699, $700, $701, $702, $703, $704, $705, $706, $707, $708, $709, $710, $711, $712, $713, $714, $715, $716, $717, $718, VersionRange($719, $720)), ($721, $722, $723, $724, $725, $726, $727, $728, $729, $730, $731, $732, $733, $734, $735, $736, $737, $738, $739, $740, $741, $742, $743, $744, $745, $746, $747, $748, VersionRange($749, $750)), ($751, $752, $753, $754, $755, $756, $757, $758, $759, $760, $761, $762, $763, $764, $765, $766, $767, $768, $769, $770, $771, $772, $773, $774, $775, $776, $777, $778, VersionRange($779, $780)), ($781, $782, $783, $784, $785, $786, $787, $788, $789, $790, $791, $792, $793, $794, $795, $796, $797, $798, $799, $800, $801, $802, $803, $804, $805, $806, $807, $808, VersionRange($809, $810)), ($811, $812, $813, $814, $815, $816, $817, $818, $819, $820, $821, $822, $823, $824, $825, $826, $827, $828, $829, $830, $831, $832, $833, $834, $835, $836, $837, $838, VersionRange($839, $840)), ($841, $842, $843, $844, $845, $846, $847, $848, $849, $850, $851, $852, $853, $854, $855, $856, $857, $858, $859, $860, $861, $862, $863, $864, $865, $866, $867, $868, VersionRange($869, $870)), ($871, $872, $873, $874, $875, $876, $877, $878, $879, $880, $881, $882, $883, $884, $885, $886, $887, $888, $889, $890, $891, $892, $893, $894, $895, $896, $897, $898, VersionRange($899, $900)), ($901, $902, $903, $904, $905, $906, $907, $908, $909, $910, $911, $912, $913, $914, $915, $916, $917, $918, $919, $920, $921, $922, $923, $924, $925, $926, $927, $928, VersionRange($929, $930)), ($931, $932, $933, $934, $935, $936, $937, $938, $939, $940, $941, $942, $943, $944, $945, $946, $947, $948, $949, $950, $951, $952, $953, $954, $955, $956, $957, $958, VersionRange($959, $960)), ($961, $962, $963, $964, $965, $966, $967, $968, $969, $970, $971, $972, $973, $974, $975, $976, $977, $978, $979, $980, $981, $982, $983, $984, $985, $986, $987, $988, VersionRange($989, $990)), ($991, $992, $993, $994, $995, $996, $997, $998, $999, $1000, $1001, $1002, $1003, $1004, $1005, $1006, $1007, $1008, $1009, $1010, $1011, $1012, $1013, $1014, $1015, $1016, $1017, $1018, VersionRange($1019, $1020)), ($1021, $1022, $1023, $1024, $1025, $1026, $1027, $1028, $1029, $1030, $1031, $1032, $1033, $1034, $1035, $1036, $1037, $1038, $1039, $1040, $1041, $1042, $1043, $1044, $1045, $1046, $1047, $1048, VersionRange($1049, $1050)), ($1051, $1052, $1053, $1054, $1055, $1056, $1057, $1058, $1059, $1060, $1061, $1062, $1063, $1064, $1065, $1066, $1067, $1068, $1069, $1070, $1071, $1072, $1073, $1074, $1075, $1076, $1077, $1078, VersionRange($1079, $1080)), ($1081, $1082, $1083, $1084, $1085, $1086, $1087, $1088, $1089, $1090, $1091, $1092, $1093, $1094, $1095, $1096, $1097, $1098, $1099, $1100, $1101, $1102, $1103, $1104, $1105, $1106, $1107, $1108, VersionRange($1109, $1110)), ($1111, $1112, $1113, $1114, $1115, $1116, $1117, $1118, $1119, $1120, $1121, $1122, $1123, $1124, $1125, $1126, $1127, $1128, $1129, $1130, $1131, $1132, $1133, $1134, $1135, $1136, $1137, $1138, VersionRange($1139, $1140)), ($1141, $1142, $1143, $1144, $1145, $1146, $1147, $1148, $1149, $1150, $1151, $1152, $1153, $1154, $1155, $1156, $1157, $1158, $1159, $1160, $1161, $1162, $1163, $1164, $1165, $1166, $1167, $1168, VersionRange($1169, $1170)), ($1171, $1172, $1173, $1174, $1175, $1176, $1177, $1178, $1179, $1180, $1181, $1182, $1183, $1184, $1185, $1186, $1187, $1188, $1189, $1190, $1191, $1192, $1193, $1194, $1195, $1196, $1197, $1198, VersionRange($1199, $1200)), ($1201, $1202, $1203, $1204, $1205, $1206, $1207, $1208, $1209, $1210, $1211, $1212, $1213, $1214, $1215, $1216, $1217, $1218, $1219, $1220, $1221, $1222, $1223, $1224, $1225, $1226, $1227, $1228, VersionRange($1229, $1230)), ($1231, $1232, $1233, $1234, $1235, $1236, $1237, $1238, $1239, $1240, $1241, $1242, $1243, $1244, $1245, $1246, $1247, $1248, $1249, $1250, $1251, $1252, $1253, $1254, $1255, $1256, $1257, $1258, VersionRange($1259, $1260)), ($1261, $1262, $1263, $1264, $1265, $1266, $1267, $1268, $1269, $1270, $1271, $1272, $1273, $1274, $1275, $1276, $1277, $1278, $1279, $1280, $1281, $1282, $1283, $1284, $1285, $1286, $1287, $1288, VersionRange($1289, $1290)), ($1291, $1292, $1293, $1294, $1295, $1296, $1297, $1298, $1299, $1300, $1301, $1302, $1303, $1304, $1305, $1306, $1307, $1308, $1309, $1310, $1311, $1312, $1313, $1314, $1315, $1316, $1317, $1318, VersionRange($1319, $1320)), ($1321, $1322, $1323, $1324, $1325, $1326, $1327, $1328, $1329, $1330, $1331, $1332, $1333, $1334, $1335, $1336, $1337, $1338, $1339, $1340, $1341, $1342, $1343, $1344, $1345, $1346, $1347, $1348, VersionRange($1349, $1350)), ($1351, $1352, $1353, $1354, $1355, $1356, $1357, $1358, $1359, $1360, $1361, $1362, $1363, $1364, $1365, $1366, $1367, $1368, $1369, $1370, $1371, $1372, $1373, $1374, $1375, $1376, $1377, $1378, VersionRange($1379, $1380)), ($1381, $1382, $1383, $1384, $1385, $1386, $1387, $1388, $1389, $1390, $1391, $1392, $1393, $1394, $1395, $1396, $1397, $1398, $1399, $1400, $1401, $1402, $1403, $1404, $1405, $1406, $1407, $1408, VersionRange($1409, $1410)), ($1411, $1412, $1413, $1414, $1415, $1416, $1417, $1418, $1419, $1420, $1421, $1422, $1423, $1424, $1425, $1426, $1427, $1428, $1429, $1430, $1431, $1432, $1433, $1434, $1435, $1436, $1437, $1438, VersionRange($1439, $1440)), ($1441, $1442, $1443, $1444, $1445, $1446, $1447, $1448, $1449, $1450, $1451, $1452, $1453, $1454, $1455, $1456, $1457, $1458, $1459, $1460, $1461, $1462, $1463, $1464, $1465, $1466, $1467, $1468, VersionRange($1469, $1470)), ($1471, $1472, $1473, $1474, $1475, $1476, $1477, $1478, $1479, $1480, $1481, $1482, $1483, $1484, $1485, $1486, $1487, $1488, $1489, $1490, $1491, $1492, $1493, $1494, $1495, $1496, $1497, $1498, VersionRange($1499, $1500)), ($1501, $1502, $1503, $1504, $1505, $1506, $1507, $1508, $1509, $1510, $1511, $1512, $1513, $1514, $1515, $1516, $1517, $1518, $1519, $1520, $1521, $1522, $1523, $1524, $1525, $1526, $1527, $1528, VersionRange($1529, $1530)), ($1531, $1532, $1533, $1534, $1535, $1536, $1537, $1538, $1539, $1540, $1541, $1542, $1543, $1544, $1545, $1546, $1547, $1548, $1549, $1550, $1551, $1552, $1553, $1554, $1555, $1556, $1557, $1558, VersionRange($1559, $1560)), ($1561, $1562, $1563, $1564, $1565, $1566, $1567, $1568, $1569, $1570, $1571, $1572, $1573, $1574, $1575, $1576, $1577, $1578, $1579, $1580, $1581, $1582, $1583, $1584, $1585, $1586, $1587, $1588, VersionRange($1589, $1590)), ($1591, $1592, $1593, $1594, $1595, $1596, $1597, $1598, $1599, $1600, $1601, $1602, $1603, $1604, $1605, $1606, $1607, $1608, $1609, $1610, $1611, $1612, $1613, $1614, $1615, $1616, $1617, $1618, VersionRange($1619, $1620)), ($1621, $1622, $1623, $1624, $1625, $1626, $1627, $1628, $1629, $1630, $1631, $1632, $1633, $1634, $1635, $1636, $1637, $1638, $1639, $1640, $1641, $1642, $1643, $1644, $1645, $1646, $1647, $1648, VersionRange($1649, $1650)), ($1651, $1652, $1653, $1654, $1655, $1656, $1657, $1658, $1659, $1660, $1661, $1662, $1663, $1664, $1665, $1666, $1667, $1668, $1669, $1670, $1671, $1672, $1673, $1674, $1675, $1676, $1677, $1678, VersionRange($1679, $1680)), ($1681, $1682, $1683, $1684, $1685, $1686, $1687, $1688, $1689, $1690, $1691, $1692, $1693, $1694, $1695, $1696, $1697, $1698, $1699, $1700, $1701, $1702, $1703, $1704, $1705, $1706, $1707, $1708, VersionRange($1709, $1710)), ($1711, $1712, $1713, $1714, $1715, $1716, $1717, $1718, $1719, $1720, $1721, $1722, $1723, $1724, $1725, $1726, $1727, $1728, $1729, $1730, $1731, $1732, $1733, $1734, $1735, $1736, $1737, $1738, VersionRange($1739, $1740)), ($1741, $1742, $1743, $1744, $1745, $1746, $1747, $1748, $1749, $1750, $1751, $1752, $1753, $1754, $1755, $1756, $1757, $1758, $1759, $1760, $1761, $1762, $1763, $1764, $1765, $1766, $1767, $1768, VersionRange($1769, $1770)), ($1771, $1772, $1773, $1774, $1775, $1776, $1777, $1778, $1779, $1780, $1781, $1782, $1783, $1784, $1785, $1786, $1787, $1788, $1789, $1790, $1791, $1792, $1793, $1794, $1795, $1796, $1797, $1798, VersionRange($1799, $1800)), ($1801, $1802, $1803, $1804, $1805, $1806, $1807, $1808, $1809, $1810, $1811, $1812, $1813, $1814, $1815, $1816, $1817, $1818, $1819, $1820, $1821, $1822, $1823, $1824, $1825, $1826, $1827, $1828, VersionRange($1829, $1830)), ($1831, $1832, $1833, $1834, $1835, $1836, $1837, $1838, $1839, $1840, $1841, $1842, $1843, $1844, $1845, $1846, $1847, $1848, $1849, $1850, $1851, $1852, $1853, $1854, $1855, $1856, $1857, $1858, VersionRange($1859, $1860)), ($1861, $1862, $1863, $1864, $1865, $1866, $1867, $1868, $1869, $1870, $1871, $1872, $1873, $1874, $1875, $1876, $1877, $1878, $1879, $1880, $1881, $1882, $1883, $1884, $1885, $1886, $1887, $1888, VersionRange($1889, $1890)), ($1891, $1892, $1893, $1894, $1895, $1896, $1897, $1898, $1899, $1900, $1901, $1902, $1903, $1904, $1905, $1906, $1907, $1908, $1909, $1910, $1911, $1912, $1913, $1914, $1915, $1916, $1917, $1918, VersionRange($1919, $1920)), ($1921, $1922, $1923, $1924, $1925, $1926, $1927, $1928, $1929, $1930, $1931, $1932, $1933, $1934, $1935, $1936, $1937, $1938, $1939, $1940, $1941, $1942, $1943, $1944, $1945, $1946, $1947, $1948, VersionRange($1949, $1950)), ($1951, $1952, $1953, $1954, $1955, $1956, $1957, $1958, $1959, $1960, $1961, $1962, $1963, $1964, $1965, $1966, $1967, $1968, $1969, $1970, $1971, $1972, $1973, $1974, $1975, $1976, $1977, $1978, VersionRange($1979, $1980)), ($1981, $1982, $1983, $1984, $1985, $1986, $1987, $1988, $1989, $1990, $1991, $1992, $1993, $1994, $1995, $1996, $1997, $1998, $1999, $2000, $2001, $2002, $2003, $2004, $2005, $2006, $2007, $2008, VersionRange($2009, $2010)), ($2011, $2012, $2013, $2014, $2015, $2016, $2017, $2018, $2019, $2020, $2021, $2022, $2023, $2024, $2025, $2026, $2027, $2028, $2029, $2030, $2031, $2032, $2033, $2034, $2035, $2036, $2037, $2038, VersionRange($2039, $2040)), ($2041, $2042, $2043, $2044, $2045, $2046, $2047, $2048, $2049, $2050, $2051, $2052, $2053, $2054, $2055, $2056, $2057, $2058, $2059, $2060, $2061, $2062, $2063, $2064, $2065, $2066, $2067, $2068, VersionRange($2069, $2070)), ($2071, $2072, $2073, $2074, $2075, $2076, $2077, $2078, $2079, $2080, $2081, $2082, $2083, $2084, $2085, $2086, $2087, $2088, $2089, $2090, $2091, $2092, $2093, $2094, $2095, $2096, $2097, $2098, VersionRange($2099, $2100)), ($2101, $2102, $2103, $2104, $2105, $2106, $2107, $2108, $2109, $2110, $2111, $2112, $2113, $2114, $2115, $2116, $2117, $2118, $2119, $2120, $2121, $2122, $2123, $2124, $2125, $2126, $2127, $2128, VersionRange($2129, $2130)), ($2131, $2132, $2133, $2134, $2135, $2136, $2137, $2138, $2139, $2140, $2141, $2142, $2143, $2144, $2145, $2146, $2147, $2148, $2149, $2150, $2151, $2152, $2153, $2154, $2155, $2156, $2157, $2158, VersionRange($2159, $2160)), ($2161, $2162, $2163, $2164, $2165, $2166, $2167, $2168, $2169, $2170, $2171, $2172, $2173, $2174, $2175, $2176, $2177, $2178, $2179, $2180, $2181, $2182, $2183, $2184, $2185, $2186, $2187, $2188, VersionRange($2189, $2190)), ($2191, $2192, $2193, $2194, $2195, $2196, $2197, $2198, $2199, $2200, $2201, $2202, $2203, $2204, $2205, $2206, $2207, $2208, $2209, $2210, $2211, $2212, $2213, $2214, $2215, $2216, $2217, $2218, VersionRange($2219, $2220)), ($2221, $2222, $2223, $2224, $2225, $2226, $2227, $2228, $2229, $2230, $2231, $2232, $2233, $2234, $2235, $2236, $2237, $2238, $2239, $2240, $2241, $2242, $2243, $2244, $2245, $2246, $2247, $2248, VersionRange($2249, $2250)), ($2251, $2252, $2253, $2254, $2255, $2256, $2257, $2258, $2259, $2260, $2261, $2262, $2263, $2264, $2265, $2266, $2267, $2268, $2269, $2270, $2271, $2272, $2273, $2274, $2275, $2276, $2277, $2278, VersionRange($2279, $2280)), ($2281, $2282, $2283, $2284, $2285, $2286, $2287, $2288, $2289, $2290, $2291, $2292, $2293, $2294, $2295, $2296, $2297, $2298, $2299, $2300, $2301, $2302, $2303, $2304, $2305, $2306, $2307, $2308, VersionRange($2309, $2310)), ($2311, $2312, $2313, $2314, $2315, $2316, $2317, $2318, $2319, $2320, $2321, $2322, $2323, $2324, $2325, $2326, $2327, $2328, $2329, $2330, $2331, $2332, $2333, $2334, $2335, $2336, $2337, $2338, VersionRange($2339, $2340)), ($2341, $2342, $2343, $2344, $2345, $2346, $2347, $2348, $2349, $2350, $2351, $2352, $2353, $2354, $2355, $2356, $2357, $2358, $2359, $2360, $2361, $2362, $2363, $2364, $2365, $2366, $2367, $2368, VersionRange($2369, $2370)), ($2371, $2372, $2373, $2374, $2375, $2376, $2377, $2378, $2379, $2380, $2381, $2382, $2383, $2384, $2385, $2386, $2387, $2388, $2389, $2390, $2391, $2392, $2393, $2394, $2395, $2396, $2397, $2398, VersionRange($2399, $2400)), ($2401, $2402, $2403, $2404, $2405, $2406, $2407, $2408, $2409, $2410, $2411, $2412, $2413, $2414, $2415, $2416, $2417, $2418, $2419, $2420, $2421, $2422, $2423, $2424, $2425, $2426, $2427, $2428, VersionRange($2429, $2430)), ($2431, $2432, $2433, $2434, $2435, $2436, $2437, $2438, $2439, $2440, $2441, $2442, $2443, $2444, $2445, $2446, $2447, $2448, $2449, $2450, $2451, $2452, $2453, $2454, $2455, $2456, $2457, $2458, VersionRange($2459, $2460)), ($2461, $2462, $2463, $2464, $2465, $2466, $2467, $2468, $2469, $2470, $2471, $2472, $2473, $2474, $2475, $2476, $2477, $2478, $2479, $2480, $2481, $2482, $2483, $2484, $2485, $2486, $2487, $2488, VersionRange($2489, $2490)), ($2491, $2492, $2493, $2494, $2495, $2496, $2497, $2498, $2499, $2500, $2501, $2502, $2503, $2504, $2505, $2506, $2507, $2508, $2509, $2510, $2511, $2512, $2513, $2514, $2515, $2516, $2517, $2518, VersionRange($2519, $2520)), ($2521, $2522, $2523, $2524, $2525, $2526, $2527, $2528, $2529, $2530, $2531, $2532, $2533, $2534, $2535, $2536, $2537, $2538, $2539, $2540, $2541, $2542, $2543, $2544, $2545, $2546, $2547, $2548, VersionRange($2549, $2550)), ($2551, $2552, $2553, $2554, $2555, $2556, $2557, $2558, $2559, $2560, $2561, $2562, $2563, $2564, $2565, $2566, $2567, $2568, $2569, $2570, $2571, $2572, $2573, $2574, $2575, $2576, $2577, $2578, VersionRange($2579, $2580)), ($2581, $2582, $2583, $2584, $2585, $2586, $2587, $2588, $2589, $2590, $2591, $2592, $2593, $2594, $2595, $2596, $2597, $2598, $2599, $2600, $2601, $2602, $2603, $2604, $2605, $2606, $2607, $2608, VersionRange($2609, $2610)), ($2611, $2612, $2613, $2614, $2615, $2616, $2617, $2618, $2619, $2620, $2621, $2622, $2623, $2624, $2625, $2626, $2627, $2628, $2629, $2630, $2631, $2632, $2633, $2634, $2635, $2636, $2637, $2638, VersionRange($2639, $2640)), ($2641, $2642, $2643, $2644, $2645, $2646, $2647, $2648, $2649, $2650, $2651, $2652, $2653, $2654, $2655, $2656, $2657, $2658, $2659, $2660, $2661, $2662, $2663, $2664, $2665, $2666, $2667, $2668, VersionRange($2669, $2670)), ($2671, $2672, $2673, $2674, $2675, $2676, $2677, $2678, $2679, $2680, $2681, $2682, $2683, $2684, $2685, $2686, $2687, $2688, $2689, $2690, $2691, $2692, $2693, $2694, $2695, $2696, $2697, $2698, VersionRange($2699, $2700)), ($2701, $2702, $2703, $2704, $2705, $2706, $2707, $2708, $2709, $2710, $2711, $2712, $2713, $2714, $2715, $2716, $2717, $2718, $2719, $2720, $2721, $2722, $2723, $2724, $2725, $2726, $2727, $2728, VersionRange($2729, $2730)), ($2731, $2732, $2733, $2734, $2735, $2736, $2737, $2738, $2739, $2740, $2741, $2742, $2743, $2744, $2745, $2746, $2747, $2748, $2749, $2750, $2751, $2752, $2753, $2754, $2755, $2756, $2757, $2758, VersionRange($2759, $2760)), ($2761, $2762, $2763, $2764, $2765, $2766, $2767, $2768, $2769, $2770, $2771, $2772, $2773, $2774, $2775, $2776, $2777, $2778, $2779, $2780, $2781, $2782, $2783, $2784, $2785, $2786, $2787, $2788, VersionRange($2789, $2790)), ($2791, $2792, $2793, $2794, $2795, $2796, $2797, $2798, $2799, $2800, $2801, $2802, $2803, $2804, $2805, $2806, $2807, $2808, $2809, $2810, $2811, $2812, $2813, $2814, $2815, $2816, $2817, $2818, VersionRange($2819, $2820)), ($2821, $2822, $2823, $2824, $2825, $2826, $2827, $2828, $2829, $2830, $2831, $2832, $2833, $2834, $2835, $2836, $2837, $2838, $2839, $2840, $2841, $2842, $2843, $2844, $2845, $2846, $2847, $2848, VersionRange($2849, $2850)), ($2851, $2852, $2853, $2854, $2855, $2856, $2857, $2858, $2859, $2860, $2861, $2862, $2863, $2864, $2865, $2866, $2867, $2868, $2869, $2870, $2871, $2872, $2873, $2874, $2875, $2876, $2877, $2878, VersionRange($2879, $2880)), ($2881, $2882, $2883, $2884, $2885, $2886, $2887, $2888, $2889, $2890, $2891, $2892, $2893, $2894, $2895, $2896, $2897, $2898, $2899, $2900, $2901, $2902, $2903, $2904, $2905, $2906, $2907, $2908, VersionRange($2909, $2910)), ($2911, $2912, $2913, $2914, $2915, $2916, $2917, $2918, $2919, $2920, $2921, $2922, $2923, $2924, $2925, $2926, $2927, $2928, $2929, $2930, $2931, $2932, $2933, $2934, $2935, $2936, $2937, $2938, VersionRange($2939, $2940)), ($2941, $2942, $2943, $2944, $2945, $2946, $2947, $2948, $2949, $2950, $2951, $2952, $2953, $2954, $2955, $2956, $2957, $2958, $2959, $2960, $2961, $2962, $2963, $2964, $2965, $2966, $2967, $2968, VersionRange($2969, $2970)), ($2971, $2972, $2973, $2974, $2975, $2976, $2977, $2978, $2979, $2980, $2981, $2982, $2983, $2984, $2985, $2986, $2987, $2988, $2989, $2990, $2991, $2992, $2993, $2994, $2995, $2996, $2997, $2998, VersionRange($2999, $3000)), ($3001, $3002, $3003, $3004, $3005, $3006, $3007, $3008, $3009, $3010, $3011, $3012, $3013, $3014, $3015, $3016, $3017, $3018, $3019, $3020, $3021, $3022, $3023, $3024, $3025, $3026, $3027, $3028, VersionRange($3029, $3030)), ($3031, $3032, $3033, $3034, $3035, $3036, $3037, $3038, $3039, $3040, $3041, $3042, $3043, $3044, $3045, $3046, $3047, $3048, $3049, $3050, $3051, $3052, $3053, $3054, $3055, $3056, $3057, $3058, VersionRange($3059, $3060)), ($3061, $3062, $3063, $3064, $3065, $3066, $3067, $3068, $3069, $3070, $3071, $3072, $3073, $3074, $3075, $3076, $3077, $3078, $3079, $3080, $3081, $3082, $3083, $3084, $3085, $3086, $3087, $3088, VersionRange($3089, $3090)), ($3091, $3092, $3093, $3094, $3095, $3096, $3097, $3098, $3099, $3100, $3101, $3102, $3103, $3104, $3105, $3106, $3107, $3108, $3109, $3110, $3111, $3112, $3113, $3114, $3115, $3116, $3117, $3118, VersionRange($3119, $3120)), ($3121, $3122, $3123, $3124, $3125, $3126, $3127, $3128, $3129, $3130, $3131, $3132, $3133, $3134, $3135, $3136, $3137, $3138, $3139, $3140, $3141, $3142, $3143, $3144, $3145, $3146, $3147, $3148, VersionRange($3149, $3150)), ($3151, $3152, $3153, $3154, $3155, $3156, $3157, $3158, $3159, $3160, $3161, $3162, $3163, $3164, $3165, $3166, $3167, $3168, $3169, $3170, $3171, $3172, $3173, $3174, $3175, $3176, $3177, $3178, VersionRange($3179, $3180)), ($3181, $3182, $3183, $3184, $3185, $3186, $3187, $3188, $3189, $3190, $3191, $3192, $3193, $3194, $3195, $3196, $3197, $3198, $3199, $3200, $3201, $3202, $3203, $3204, $3205, $3206, $3207, $3208, VersionRange($3209, $3210)), ($3211, $3212, $3213, $3214, $3215, $3216, $3217, $3218, $3219, $3220, $3221, $3222, $3223, $3224, $3225, $3226, $3227, $3228, $3229, $3230, $3231, $3232, $3233, $3234, $3235, $3236, $3237, $3238, VersionRange($3239, $3240)), ($3241, $3242, $3243, $3244, $3245, $3246, $3247, $3248, $3249, $3250, $3251, $3252, $3253, $3254, $3255, $3256, $3257, $3258, $3259, $3260, $3261, $3262, $3263, $3264, $3265, $3266, $3267, $3268, VersionRange($3269, $3270)), ($3271, $3272, $3273, $3274, $3275, $3276, $3277, $3278, $3279, $3280, $3281, $3282, $3283, $3284, $3285, $3286, $3287, $3288, $3289, $3290, $3291, $3292, $3293, $3294, $3295, $3296, $3297, $3298, VersionRange($3299, $3300)), ($3301, $3302, $3303, $3304, $3305, $3306, $3307, $3308, $3309, $3310, $3311, $3312, $3313, $3314, $3315, $3316, $3317, $3318, $3319, $3320, $3321, $3322, $3323, $3324, $3325, $3326, $3327, $3328, VersionRange($3329, $3330)), ($3331, $3332, $3333, $3334, $3335, $3336, $3337, $3338, $3339, $3340, $3341, $3342, $3343, $3344, $3345, $3346, $3347, $3348, $3349, $3350, $3351, $3352, $3353, $3354, $3355, $3356, $3357, $3358, VersionRange($3359, $3360)), ($3361, $3362, $3363, $3364, $3365, $3366, $3367, $3368, $3369, $3370, $3371, $3372, $3373, $3374, $3375, $3376, $3377, $3378, $3379, $3380, $3381, $3382, $3383, $3384, $3385, $3386, $3387, $3388, VersionRange($3389, $3390)), ($3391, $3392, $3393, $3394, $3395, $3396, $3397, $3398, $3399, $3400, $3401, $3402, $3403, $3404, $3405, $3406, $3407, $3408, $3409, $3410, $3411, $3412, $3413, $3414, $3415, $3416, $3417, $3418, VersionRange($3419, $3420)), ($3421, $3422, $3423, $3424, $3425, $3426, $3427, $3428, $3429, $3430, $3431, $3432, $3433, $3434, $3435, $3436, $3437, $3438, $3439, $3440, $3441, $3442, $3443, $3444, $3445, $3446, $3447, $3448, VersionRange($3449, $3450)), ($3451, $3452, $3453, $3454, $3455, $3456, $3457, $3458, $3459, $3460, $3461, $3462, $3463, $3464, $3465, $3466, $3467, $3468, $3469, $3470, $3471, $3472, $3473, $3474, $3475, $3476, $3477, $3478, VersionRange($3479, $3480)), ($3481, $3482, $3483, $3484, $3485, $3486, $3487, $3488, $3489, $3490, $3491, $3492, $3493, $3494, $3495, $3496, $3497, $3498, $3499, $3500, $3501, $3502, $3503, $3504, $3505, $3506, $3507, $3508, VersionRange($3509, $3510)), ($3511, $3512, $3513, $3514, $3515, $3516, $3517, $3518, $3519, $3520, $3521, $3522, $3523, $3524, $3525, $3526, $3527, $3528, $3529, $3530, $3531, $3532, $3533, $3534, $3535, $3536, $3537, $3538, VersionRange($3539, $3540)), ($3541, $3542, $3543, $3544, $3545, $3546, $3547, $3548, $3549, $3550, $3551, $3552, $3553, $3554, $3555, $3556, $3557, $3558, $3559, $3560, $3561, $3562, $3563, $3564, $3565, $3566, $3567, $3568, VersionRange($3569, $3570)), ($3571, $3572, $3573, $3574, $3575, $3576, $3577, $3578, $3579, $3580, $3581, $3582, $3583, $3584, $3585, $3586, $3587, $3588, $3589, $3590, $3591, $3592, $3593, $3594, $3595, $3596, $3597, $3598, VersionRange($3599, $3600)), ($3601, $3602, $3603, $3604, $3605, $3606, $3607, $3608, $3609, $3610, $3611, $3612, $3613, $3614, $3615, $3616, $3617, $3618, $3619, $3620, $3621, $3622, $3623, $3624, $3625, $3626, $3627, $3628, VersionRange($3629, $3630)), ($3631, $3632, $3633, $3634, $3635, $3636, $3637, $3638, $3639, $3640, $3641, $3642, $3643, $3644, $3645, $3646, $3647, $3648, $3649, $3650, $3651, $3652, $3653, $3654, $3655, $3656, $3657, $3658, VersionRange($3659, $3660)), ($3661, $3662, $3663, $3664, $3665, $3666, $3667, $3668, $3669, $3670, $3671, $3672, $3673, $3674, $3675, $3676, $3677, $3678, $3679, $3680, $3681, $3682, $3683, $3684, $3685, $3686, $3687, $3688, VersionRange($3689, $3690)), ($3691, $3692, $3693, $3694, $3695, $3696, $3697, $3698, $3699, $3700, $3701, $3702, $3703, $3704, $3705, $3706, $3707, $3708, $3709, $3710, $3711, $3712, $3713, $3714, $3715, $3716, $3717, $3718, VersionRange($3719, $3720)), ($3721, $3722, $3723, $3724, $3725, $3726, $3727, $3728, $3729, $3730, $3731, $3732, $3733, $3734, $3735, $3736, $3737, $3738, $3739, $3740, $3741, $3742, $3743, $3744, $3745, $3746, $3747, $3748, VersionRange($3749, $3750)), ($3751, $3752, $3753, $3754, $3755, $3756, $3757, $3758, $3759, $3760, $3761, $3762, $3763, $3764, $3765, $3766, $3767, $3768, $3769, $3770, $3771, $3772, $3773, $3774, $3775, $3776, $3777, $3778, VersionRange($3779, $3780)), ($3781, $3782, $3783, $3784, $3785, $3786, $3787, $3788, $3789, $3790, $3791, $3792, $3793, $3794, $3795, $3796, $3797, $3798, $3799, $3800, $3801, $3802, $3803, $3804, $3805, $3806, $3807, $3808, VersionRange($3809, $3810)), ($3811, $3812, $3813, $3814, $3815, $3816, $3817, $3818, $3819, $3820, $3821, $3822, $3823, $3824, $3825, $3826, $3827, $3828, $3829, $3830, $3831, $3832, $3833, $3834, $3835, $3836, $3837, $3838, VersionRange($3839, $3840)), ($3841, $3842, $3843, $3844, $3845, $3846, $3847, $3848, $3849, $3850, $3851, $3852, $3853, $3854, $3855, $3856, $3857, $3858, $3859, $3860, $3861, $3862, $3863, $3864, $3865, $3866, $3867, $3868, VersionRange($3869, $3870)), ($3871, $3872, $3873, $3874, $3875, $3876, $3877, $3878, $3879, $3880, $3881, $3882, $3883, $3884, $3885, $3886, $3887, $3888, $3889, $3890, $3891, $3892, $3893, $3894, $3895, $3896, $3897, $3898, VersionRange($3899, $3900)), ($3901, $3902, $3903, $3904, $3905, $3906, $3907, $3908, $3909, $3910, $3911, $3912, $3913, $3914, $3915, $3916, $3917, $3918, $3919, $3920, $3921, $3922, $3923, $3924, $3925, $3926, $3927, $3928, VersionRange($3929, $3930)), ($3931, $3932, $3933, $3934, $3935, $3936, $3937, $3938, $3939, $3940, $3941, $3942, $3943, $3944, $3945, $3946, $3947, $3948, $3949, $3950, $3951, $3952, $3953, $3954, $3955, $3956, $3957, $3958, VersionRange($3959, $3960)), ($3961, $3962, $3963, $3964, $3965, $3966, $3967, $3968, $3969, $3970, $3971, $3972, $3973, $3974, $3975, $3976, $3977, $3978, $3979, $3980, $3981, $3982, $3983, $3984, $3985, $3986, $3987, $3988, VersionRange($3989, $3990)), ($3991, $3992, $3993, $3994, $3995, $3996, $3997, $3998, $3999, $4000, $4001, $4002, $4003, $4004, $4005, $4006, $4007, $4008, $4009, $4010, $4011, $4012, $4013, $4014, $4015, $4016, $4017, $4018, VersionRange($4019, $4020)), ($4021, $4022, $4023, $4024, $4025, $4026, $4027, $4028, $4029, $4030, $4031, $4032, $4033, $4034, $4035, $4036, $4037, $4038, $4039, $4040, $4041, $4042, $4043, $4044, $4045, $4046, $4047, $4048, VersionRange($4049, $4050)), ($4051, $4052, $4053, $4054, $4055, $4056, $4057, $4058, $4059, $4060, $4061, $4062, $4063, $4064, $4065, $4066, $4067, $4068, $4069, $4070, $4071, $4072, $4073, $4074, $4075, $4076, $4077, $4078, VersionRange($4079, $4080)), ($4081, $4082, $4083, $4084, $4085, $4086, $4087, $4088, $4089, $4090, $4091, $4092, $4093, $4094, $4095, $4096, $4097, $4098, $4099, $4100, $4101, $4102, $4103, $4104, $4105, $4106, $4107, $4108, VersionRange($4109, $4110)), ($4111, $4112, $4113, $4114, $4115, $4116, $4117, $4118, $4119, $4120, $4121, $4122, $4123, $4124, $4125, $4126, $4127, $4128, $4129, $4130, $4131, $4132, $4133, $4134, $4135, $4136, $4137, $4138, VersionRange($4139, $4140)), ($4141, $4142, $4143, $4144, $4145, $4146, $4147, $4148, $4149, $4150, $4151, $4152, $4153, $4154, $4155, $4156, $4157, $4158, $4159, $4160, $4161, $4162, $4163, $4164, $4165, $4166, $4167, $4168, VersionRange($4169, $4170)), ($4171, $4172, $4173, $4174, $4175, $4176, $4177, $4178, $4179, $4180, $4181, $4182, $4183, $4184, $4185, $4186, $4187, $4188, $4189, $4190, $4191, $4192, $4193, $4194, $4195, $4196, $4197, $4198, VersionRange($4199, $4200)), ($4201, $4202, $4203, $4204, $4205, $4206, $4207, $4208, $4209, $4210, $4211, $4212, $4213, $4214, $4215, $4216, $4217, $4218, $4219, $4220, $4221, $4222, $4223, $4224, $4225, $4226, $4227, $4228, VersionRange($4229, $4230)), ($4231, $4232, $4233, $4234, $4235, $4236, $4237, $4238, $4239, $4240, $4241, $4242, $4243, $4244, $4245, $4246, $4247, $4248, $4249, $4250, $4251, $4252, $4253, $4254, $4255, $4256, $4257, $4258, VersionRange($4259, $4260)), ($4261, $4262, $4263, $4264, $4265, $4266, $4267, $4268, $4269, $4270, $4271, $4272, $4273, $4274, $4275, $4276, $4277, $4278, $4279, $4280, $4281, $4282, $4283, $4284, $4285, $4286, $4287, $4288, VersionRange($4289, $4290)), ($4291, $4292, $4293, $4294, $4295, $4296, $4297, $4298, $4299, $4300, $4301, $4302, $4303, $4304, $4305, $4306, $4307, $4308, $4309, $4310, $4311, $4312, $4313, $4314, $4315, $4316, $4317, $4318, VersionRange($4319, $4320)), ($4321, $4322, $4323, $4324, $4325, $4326, $4327, $4328, $4329, $4330, $4331, $4332, $4333, $4334, $4335, $4336, $4337, $4338, $4339, $4340, $4341, $4342, $4343, $4344, $4345, $4346, $4347, $4348, VersionRange($4349, $4350)), ($4351, $4352, $4353, $4354, $4355, $4356, $4357, $4358, $4359, $4360, $4361, $4362, $4363, $4364, $4365, $4366, $4367, $4368, $4369, $4370, $4371, $4372, $4373, $4374, $4375, $4376, $4377, $4378, VersionRange($4379, $4380)), ($4381, $4382, $4383, $4384, $4385, $4386, $4387, $4388, $4389, $4390, $4391, $4392, $4393, $4394, $4395, $4396, $4397, $4398, $4399, $4400, $4401, $4402, $4403, $4404, $4405, $4406, $4407, $4408, VersionRange($4409, $4410)), ($4411, $4412, $4413, $4414, $4415, $4416, $4417, $4418, $4419, $4420, $4421, $4422, $4423, $4424, $4425, $4426, $4427, $4428, $4429, $4430, $4431, $4432, $4433, $4434, $4435, $4436, $4437, $4438, VersionRange($4439, $4440)), ($4441, $4442, $4443, $4444, $4445, $4446, $4447, $4448, $4449, $4450, $4451, $4452, $4453, $4454, $4455, $4456, $4457, $4458, $4459, $4460, $4461, $4462, $4463, $4464, $4465, $4466, $4467, $4468, VersionRange($4469, $4470)), ($4471, $4472, $4473, $4474, $4475, $4476, $4477, $4478, $4479, $4480, $4481, $4482, $4483, $4484, $4485, $4486, $4487, $4488, $4489, $4490, $4491, $4492, $4493, $4494, $4495, $4496, $4497, $4498, VersionRange($4499, $4500)), ($4501, $4502, $4503, $4504, $4505, $4506, $4507, $4508, $4509, $4510, $4511, $4512, $4513, $4514, $4515, $4516, $4517, $4518, $4519, $4520, $4521, $4522, $4523, $4524, $4525, $4526, $4527, $4528, VersionRange($4529, $4530)), ($4531, $4532, $4533, $4534, $4535, $4536, $4537, $4538, $4539, $4540, $4541, $4542, $4543, $4544, $4545, $4546, $4547, $4548, $4549, $4550, $4551, $4552, $4553, $4554, $4555, $4556, $4557, $4558, VersionRange($4559, $4560)), ($4561, $4562, $4563, $4564, $4565, $4566, $4567, $4568, $4569, $4570, $4571, $4572, $4573, $4574, $4575, $4576, $4577, $4578, $4579, $4580, $4581, $4582, $4583, $4584, $4585, $4586, $4587, $4588, VersionRange($4589, $4590)), ($4591, $4592, $4593, $4594, $4595, $4596, $4597, $4598, $4599, $4600, $4601, $4602, $4603, $4604, $4605, $4606, $4607, $4608, $4609, $4610, $4611, $4612, $4613, $4614, $4615, $4616, $4617, $4618, VersionRange($4619, $4620)), ($4621, $4622, $4623, $4624, $4625, $4626, $4627, $4628, $4629, $4630, $4631, $4632, $4633, $4634, $4635, $4636, $4637, $4638, $4639, $4640, $4641, $4642, $4643, $4644, $4645, $4646, $4647, $4648, VersionRange($4649, $4650)), ($4651, $4652, $4653, $4654, $4655, $4656, $4657, $4658, $4659, $4660, $4661, $4662, $4663, $4664, $4665, $4666, $4667, $4668, $4669, $4670, $4671, $4672, $4673, $4674, $4675, $4676, $4677, $4678, VersionRange($4679, $4680)), ($4681, $4682, $4683, $4684, $4685, $4686, $4687, $4688, $4689, $4690, $4691, $4692, $4693, $4694, $4695, $4696, $4697, $4698, $4699, $4700, $4701, $4702, $4703, $4704, $4705, $4706, $4707, $4708, VersionRange($4709, $4710)), ($4711, $4712, $4713, $4714, $4715, $4716, $4717, $4718, $4719, $4720, $4721, $4722, $4723, $4724, $4725, $4726, $4727, $4728, $4729, $4730, $4731, $4732, $4733, $4734, $4735, $4736, $4737, $4738, VersionRange($4739, $4740)), ($4741, $4742, $4743, $4744, $4745, $4746, $4747, $4748, $4749, $4750, $4751, $4752, $4753, $4754, $4755, $4756, $4757, $4758, $4759, $4760, $4761, $4762, $4763, $4764, $4765, $4766, $4767, $4768, VersionRange($4769, $4770)), ($4771, $4772, $4773, $4774, $4775, $4776, $4777, $4778, $4779, $4780, $4781, $4782, $4783, $4784, $4785, $4786, $4787, $4788, $4789, $4790, $4791, $4792, $4793, $4794, $4795, $4796, $4797, $4798, VersionRange($4799, $4800)), ($4801, $4802, $4803, $4804, $4805, $4806, $4807, $4808, $4809, $4810, $4811, $4812, $4813, $4814, $4815, $4816, $4817, $4818, $4819, $4820, $4821, $4822, $4823, $4824, $4825, $4826, $4827, $4828, VersionRange($4829, $4830)), ($4831, $4832, $4833, $4834, $4835, $4836, $4837, $4838, $4839, $4840, $4841, $4842, $4843, $4844, $4845, $4846, $4847, $4848, $4849, $4850, $4851, $4852, $4853, $4854, $4855, $4856, $4857, $4858, VersionRange($4859, $4860)), ($4861, $4862, $4863, $4864, $4865, $4866, $4867, $4868, $4869, $4870, $4871, $4872, $4873, $4874, $4875, $4876, $4877, $4878, $4879, $4880, $4881, $4882, $4883, $4884, $4885, $4886, $4887, $4888, VersionRange($4889, $4890)), ($4891, $4892, $4893, $4894, $4895, $4896, $4897, $4898, $4899, $4900, $4901, $4902, $4903, $4904, $4905, $4906, $4907, $4908, $4909, $4910, $4911, $4912, $4913, $4914, $4915, $4916, $4917, $4918, VersionRange($4919, $4920)), ($4921, $4922, $4923, $4924, $4925, $4926, $4927, $4928, $4929, $4930, $4931, $4932, $4933, $4934, $4935, $4936, $4937, $4938, $4939, $4940, $4941, $4942, $4943, $4944, $4945, $4946, $4947, $4948, VersionRange($4949, $4950)), ($4951, $4952, $4953, $4954, $4955, $4956, $4957, $4958, $4959, $4960, $4961, $4962, $4963, $4964, $4965, $4966, $4967, $4968, $4969, $4970, $4971, $4972, $4973, $4974, $4975, $4976, $4977, $4978, VersionRange($4979, $4980)), ($4981, $4982, $4983, $4984, $4985, $4986, $4987, $4988, $4989, $4990, $4991, $4992, $4993, $4994, $4995, $4996, $4997, $4998, $4999, $5000, $5001, $5002, $5003, $5004, $5005, $5006, $5007, $5008, VersionRange($5009, $5010)), ($5011, $5012, $5013, $5014, $5015, $5016, $5017, $5018, $5019, $5020, $5021, $5022, $5023, $5024, $5025, $5026, $5027, $5028, $5029, $5030, $5031, $5032, $5033, $5034, $5035, $5036, $5037, $5038, VersionRange($5039, $5040)), ($5041, $5042, $5043, $5044, $5045, $5046, $5047, $5048, $5049, $5050, $5051, $5052, $5053, $5054, $5055, $5056, $5057, $5058, $5059, $5060, $5061, $5062, $5063, $5064, $5065, $5066, $5067, $5068, VersionRange($5069, $5070)), ($5071, $5072, $5073, $5074, $5075, $5076, $5077, $5078, $5079, $5080, $5081, $5082, $5083, $5084, $5085, $5086, $5087, $5088, $5089, $5090, $5091, $5092, $5093, $5094, $5095, $5096, $5097, $5098, VersionRange($5099, $5100)), ($5101, $5102, $5103, $5104, $5105, $5106, $5107, $5108, $5109, $5110, $5111, $5112, $5113, $5114, $5115, $5116, $5117, $5118, $5119, $5120, $5121, $5122, $5123, $5124, $5125, $5126, $5127, $5128, VersionRange($5129, $5130)), ($5131, $5132, $5133, $5134, $5135, $5136, $5137, $5138, $5139, $5140, $5141, $5142, $5143, $5144, $5145, $5146, $5147, $5148, $5149, $5150, $5151, $5152, $5153, $5154, $5155, $5156, $5157, $5158, VersionRange($5159, $5160)), ($5161, $5162, $5163, $5164, $5165, $5166, $5167, $5168, $5169, $5170, $5171, $5172, $5173, $5174, $5175, $5176, $5177, $5178, $5179, $5180, $5181, $5182, $5183, $5184, $5185, $5186, $5187, $5188, VersionRange($5189, $5190)), ($5191, $5192, $5193, $5194, $5195, $5196, $5197, $5198, $5199, $5200, $5201, $5202, $5203, $5204, $5205, $5206, $5207, $5208, $5209, $5210, $5211, $5212, $5213, $5214, $5215, $5216, $5217, $5218, VersionRange($5219, $5220)), ($5221, $5222, $5223, $5224, $5225, $5226, $5227, $5228, $5229, $5230, $5231, $5232, $5233, $5234, $5235, $5236, $5237, $5238, $5239, $5240, $5241, $5242, $5243, $5244, $5245, $5246, $5247, $5248, VersionRange($5249, $5250)), ($5251, $5252, $5253, $5254, $5255, $5256, $5257, $5258, $5259, $5260, $5261, $5262, $5263, $5264, $5265, $5266, $5267, $5268, $5269, $5270, $5271, $5272, $5273, $5274, $5275, $5276, $5277, $5278, VersionRange($5279, $5280)), ($5281, $5282, $5283, $5284, $5285, $5286, $5287, $5288, $5289, $5290, $5291, $5292, $5293, $5294, $5295, $5296, $5297, $5298, $5299, $5300, $5301, $5302, $5303, $5304, $5305, $5306, $5307, $5308, VersionRange($5309, $5310)), ($5311, $5312, $5313, $5314, $5315, $5316, $5317, $5318, $5319, $5320, $5321, $5322, $5323, $5324, $5325, $5326, $5327, $5328, $5329, $5330, $5331, $5332, $5333, $5334, $5335, $5336, $5337, $5338, VersionRange($5339, $5340)), ($5341, $5342, $5343, $5344, $5345, $5346, $5347, $5348, $5349, $5350, $5351, $5352, $5353, $5354, $5355, $5356, $5357, $5358, $5359, $5360, $5361, $5362, $5363, $5364, $5365, $5366, $5367, $5368, VersionRange($5369, $5370)), ($5371, $5372, $5373, $5374, $5375, $5376, $5377, $5378, $5379, $5380, $5381, $5382, $5383, $5384, $5385, $5386, $5387, $5388, $5389, $5390, $5391, $5392, $5393, $5394, $5395, $5396, $5397, $5398, VersionRange($5399, $5400)), ($5401, $5402, $5403, $5404, $5405, $5406, $5407, $5408, $5409, $5410, $5411, $5412, $5413, $5414, $5415, $5416, $5417, $5418, $5419, $5420, $5421, $5422, $5423, $5424, $5425, $5426, $5427, $5428, VersionRange($5429, $5430)), ($5431, $5432, $5433, $5434, $5435, $5436, $5437, $5438, $5439, $5440, $5441, $5442, $5443, $5444, $5445, $5446, $5447, $5448, $5449, $5450, $5451, $5452, $5453, $5454, $5455, $5456, $5457, $5458, VersionRange($5459, $5460)), ($5461, $5462, $5463, $5464, $5465, $5466, $5467, $5468, $5469, $5470, $5471, $5472, $5473, $5474, $5475, $5476, $5477, $5478, $5479, $5480, $5481, $5482, $5483, $5484, $5485, $5486, $5487, $5488, VersionRange($5489, $5490)), ($5491, $5492, $5493, $5494, $5495, $5496, $5497, $5498, $5499, $5500, $5501, $5502, $5503, $5504, $5505, $5506, $5507, $5508, $5509, $5510, $5511, $5512, $5513, $5514, $5515, $5516, $5517, $5518, VersionRange($5519, $5520)), ($5521, $5522, $5523, $5524, $5525, $5526, $5527, $5528, $5529, $5530, $5531, $5532, $5533, $5534, $5535, $5536, $5537, $5538, $5539, $5540, $5541, $5542, $5543, $5544, $5545, $5546, $5547, $5548, VersionRange($5549, $5550)), ($5551, $5552, $5553, $5554, $5555, $5556, $5557, $5558, $5559, $5560, $5561, $5562, $5563, $5564, $5565, $5566, $5567, $5568, $5569, $5570, $5571, $5572, $5573, $5574, $5575, $5576, $5577, $5578, VersionRange($5579, $5580)), ($5581, $5582, $5583, $5584, $5585, $5586, $5587, $5588, $5589, $5590, $5591, $5592, $5593, $5594, $5595, $5596, $5597, $5598, $5599, $5600, $5601, $5602, $5603, $5604, $5605, $5606, $5607, $5608, VersionRange($5609, $5610)), ($5611, $5612, $5613, $5614, $5615, $5616, $5617, $5618, $5619, $5620, $5621, $5622, $5623, $5624, $5625, $5626, $5627, $5628, $5629, $5630, $5631, $5632, $5633, $5634, $5635, $5636, $5637, $5638, VersionRange($5639, $5640)), ($5641, $5642, $5643, $5644, $5645, $5646, $5647, $5648, $5649, $5650, $5651, $5652, $5653, $5654, $5655, $5656, $5657, $5658, $5659, $5660, $5661, $5662, $5663, $5664, $5665, $5666, $5667, $5668, VersionRange($5669, $5670)), ($5671, $5672, $5673, $5674, $5675, $5676, $5677, $5678, $5679, $5680, $5681, $5682, $5683, $5684, $5685, $5686, $5687, $5688, $5689, $5690, $5691, $5692, $5693, $5694, $5695, $5696, $5697, $5698, VersionRange($5699, $5700)), ($5701, $5702, $5703, $5704, $5705, $5706, $5707, $5708, $5709, $5710, $5711, $5712, $5713, $5714, $5715, $5716, $5717, $5718, $5719, $5720, $5721, $5722, $5723, $5724, $5725, $5726, $5727, $5728, VersionRange($5729, $5730)), ($5731, $5732, $5733, $5734, $5735, $5736, $5737, $5738, $5739, $5740, $5741, $5742, $5743, $5744, $5745, $5746, $5747, $5748, $5749, $5750, $5751, $5752, $5753, $5754, $5755, $5756, $5757, $5758, VersionRange($5759, $5760)), ($5761, $5762, $5763, $5764, $5765, $5766, $5767, $5768, $5769, $5770, $5771, $5772, $5773, $5774, $5775, $5776, $5777, $5778, $5779, $5780, $5781, $5782, $5783, $5784, $5785, $5786, $5787, $5788, VersionRange($5789, $5790)), ($5791, $5792, $5793, $5794, $5795, $5796, $5797, $5798, $5799, $5800, $5801, $5802, $5803, $5804, $5805, $5806, $5807, $5808, $5809, $5810, $5811, $5812, $5813, $5814, $5815, $5816, $5817, $5818, VersionRange($5819, $5820)), ($5821, $5822, $5823, $5824, $5825, $5826, $5827, $5828, $5829, $5830, $5831, $5832, $5833, $5834, $5835, $5836, $5837, $5838, $5839, $5840, $5841, $5842, $5843, $5844, $5845, $5846, $5847, $5848, VersionRange($5849, $5850)), ($5851, $5852, $5853, $5854, $5855, $5856, $5857, $5858, $5859, $5860, $5861, $5862, $5863, $5864, $5865, $5866, $5867, $5868, $5869, $5870, $5871, $5872, $5873, $5874, $5875, $5876, $5877, $5878, VersionRange($5879, $5880)), ($5881, $5882, $5883, $5884, $5885, $5886, $5887, $5888, $5889, $5890, $5891, $5892, $5893, $5894, $5895, $5896, $5897, $5898, $5899, $5900, $5901, $5902, $5903, $5904, $5905, $5906, $5907, $5908, VersionRange($5909, $5910)), ($5911, $5912, $5913, $5914, $5915, $5916, $5917, $5918, $5919, $5920, $5921, $5922, $5923, $5924, $5925, $5926, $5927, $5928, $5929, $5930, $5931, $5932, $5933, $5934, $5935, $5936, $5937, $5938, VersionRange($5939, $5940)), ($5941, $5942, $5943, $5944, $5945, $5946, $5947, $5948, $5949, $5950, $5951, $5952, $5953, $5954, $5955, $5956, $5957, $5958, $5959, $5960, $5961, $5962, $5963, $5964, $5965, $5966, $5967, $5968, VersionRange($5969, $5970)), ($5971, $5972, $5973, $5974, $5975, $5976, $5977, $5978, $5979, $5980, $5981, $5982, $5983, $5984, $5985, $5986, $5987, $5988, $5989, $5990, $5991, $5992, $5993, $5994, $5995, $5996, $5997, $5998, VersionRange($5999, $6000)), ($6001, $6002, $6003, $6004, $6005, $6006, $6007, $6008, $6009, $6010, $6011, $6012, $6013, $6014, $6015, $6016, $6017, $6018, $6019, $6020, $6021, $6022, $6023, $6024, $6025, $6026, $6027, $6028, VersionRange($6029, $6030)), ($6031, $6032, $6033, $6034, $6035, $6036, $6037, $6038, $6039, $6040, $6041, $6042, $6043, $6044, $6045, $6046, $6047, $6048, $6049, $6050, $6051, $6052, $6053, $6054, $6055, $6056, $6057, $6058, VersionRange($6059, $6060)), ($6061, $6062, $6063, $6064, $6065, $6066, $6067, $6068, $6069, $6070, $6071, $6072, $6073, $6074, $6075, $6076, $6077, $6078, $6079, $6080, $6081, $6082, $6083, $6084, $6085, $6086, $6087, $6088, VersionRange($6089, $6090)), ($6091, $6092, $6093, $6094, $6095, $6096, $6097, $6098, $6099, $6100, $6101, $6102, $6103, $6104, $6105, $6106, $6107, $6108, $6109, $6110, $6111, $6112, $6113, $6114, $6115, $6116, $6117, $6118, VersionRange($6119, $6120)), ($6121, $6122, $6123, $6124, $6125, $6126, $6127, $6128, $6129, $6130, $6131, $6132, $6133, $6134, $6135, $6136, $6137, $6138, $6139, $6140, $6141, $6142, $6143, $6144, $6145, $6146, $6147, $6148, VersionRange($6149, $6150)), ($6151, $6152, $6153, $6154, $6155, $6156, $6157, $6158, $6159, $6160, $6161, $6162, $6163, $6164, $6165, $6166, $6167, $6168, $6169, $6170, $6171, $6172, $6173, $6174, $6175, $6176, $6177, $6178, VersionRange($6179, $6180)), ($6181, $6182, $6183, $6184, $6185, $6186, $6187, $6188, $6189, $6190, $6191, $6192, $6193, $6194, $6195, $6196, $6197, $6198, $6199, $6200, $6201, $6202, $6203, $6204, $6205, $6206, $6207, $6208, VersionRange($6209, $6210)), ($6211, $6212, $6213, $6214, $6215, $6216, $6217, $6218, $6219, $6220, $6221, $6222, $6223, $6224, $6225, $6226, $6227, $6228, $6229, $6230, $6231, $6232, $6233, $6234, $6235, $6236, $6237, $6238, VersionRange($6239, $6240)), ($6241, $6242, $6243, $6244, $6245, $6246, $6247, $6248, $6249, $6250, $6251, $6252, $6253, $6254, $6255, $6256, $6257, $6258, $6259, $6260, $6261, $6262, $6263, $6264, $6265, $6266, $6267, $6268, VersionRange($6269, $6270)), ($6271, $6272, $6273, $6274, $6275, $6276, $6277, $6278, $6279, $6280, $6281, $6282, $6283, $6284, $6285, $6286, $6287, $6288, $6289, $6290, $6291, $6292, $6293, $6294, $6295, $6296, $6297, $6298, VersionRange($6299, $6300)), ($6301, $6302, $6303, $6304, $6305, $6306, $6307, $6308, $6309, $6310, $6311, $6312, $6313, $6314, $6315, $6316, $6317, $6318, $6319, $6320, $6321, $6322, $6323, $6324, $6325, $6326, $6327, $6328, VersionRange($6329, $6330)), ($6331, $6332, $6333, $6334, $6335, $6336, $6337, $6338, $6339, $6340, $6341, $6342, $6343, $6344, $6345, $6346, $6347, $6348, $6349, $6350, $6351, $6352, $6353, $6354, $6355, $6356, $6357, $6358, VersionRange($6359, $6360)), ($6361, $6362, $6363, $6364, $6365, $6366, $6367, $6368, $6369, $6370, $6371, $6372, $6373, $6374, $6375, $6376, $6377, $6378, $6379, $6380, $6381, $6382, $6383, $6384, $6385, $6386, $6387, $6388, VersionRange($6389, $6390)), ($6391, $6392, $6393, $6394, $6395, $6396, $6397, $6398, $6399, $6400, $6401, $6402, $6403, $6404, $6405, $6406, $6407, $6408, $6409, $6410, $6411, $6412, $6413, $6414, $6415, $6416, $6417, $6418, VersionRange($6419, $6420)), ($6421, $6422, $6423, $6424, $6425, $6426, $6427, $6428, $6429, $6430, $6431, $6432, $6433, $6434, $6435, $6436, $6437, $6438, $6439, $6440, $6441, $6442, $6443, $6444, $6445, $6446, $6447, $6448, VersionRange($6449, $6450)), ($6451, $6452, $6453, $6454, $6455, $6456, $6457, $6458, $6459, $6460, $6461, $6462, $6463, $6464, $6465, $6466, $6467, $6468, $6469, $6470, $6471, $6472, $6473, $6474, $6475, $6476, $6477, $6478, VersionRange($6479, $6480)), ($6481, $6482, $6483, $6484, $6485, $6486, $6487, $6488, $6489, $6490, $6491, $6492, $6493, $6494, $6495, $6496, $6497, $6498, $6499, $6500, $6501, $6502, $6503, $6504, $6505, $6506, $6507, $6508, VersionRange($6509, $6510)), ($6511, $6512, $6513, $6514, $6515, $6516, $6517, $6518, $6519, $6520, $6521, $6522, $6523, $6524, $6525, $6526, $6527, $6528, $6529, $6530, $6531, $6532, $6533, $6534, $6535, $6536, $6537, $6538, VersionRange($6539, $6540)), ($6541, $6542, $6543, $6544, $6545, $6546, $6547, $6548, $6549, $6550, $6551, $6552, $6553, $6554, $6555, $6556, $6557, $6558, $6559, $6560, $6561, $6562, $6563, $6564, $6565, $6566, $6567, $6568, VersionRange($6569, $6570)), ($6571, $6572, $6573, $6574, $6575, $6576, $6577, $6578, $6579, $6580, $6581, $6582, $6583, $6584, $6585, $6586, $6587, $6588, $6589, $6590, $6591, $6592, $6593, $6594, $6595, $6596, $6597, $6598, VersionRange($6599, $6600)), ($6601, $6602, $6603, $6604, $6605, $6606, $6607, $6608, $6609, $6610, $6611, $6612, $6613, $6614, $6615, $6616, $6617, $6618, $6619, $6620, $6621, $6622, $6623, $6624, $6625, $6626, $6627, $6628, VersionRange($6629, $6630)), ($6631, $6632, $6633, $6634, $6635, $6636, $6637, $6638, $6639, $6640, $6641, $6642, $6643, $6644, $6645, $6646, $6647, $6648, $6649, $6650, $6651, $6652, $6653, $6654, $6655, $6656, $6657, $6658, VersionRange($6659, $6660)), ($6661, $6662, $6663, $6664, $6665, $6666, $6667, $6668, $6669, $6670, $6671, $6672, $6673, $6674, $6675, $6676, $6677, $6678, $6679, $6680, $6681, $6682, $6683, $6684, $6685, $6686, $6687, $6688, VersionRange($6689, $6690)), ($6691, $6692, $6693, $6694, $6695, $6696, $6697, $6698, $6699, $6700, $6701, $6702, $6703, $6704, $6705, $6706, $6707, $6708, $6709, $6710, $6711, $6712, $6713, $6714, $6715, $6716, $6717, $6718, VersionRange($6719, $6720)), ($6721, $6722, $6723, $6724, $6725, $6726, $6727, $6728, $6729, $6730, $6731, $6732, $6733, $6734, $6735, $6736, $6737, $6738, $6739, $6740, $6741, $6742, $6743, $6744, $6745, $6746, $6747, $6748, VersionRange($6749, $6750)), ($6751, $6752, $6753, $6754, $6755, $6756, $6757, $6758, $6759, $6760, $6761, $6762, $6763, $6764, $6765, $6766, $6767, $6768, $6769, $6770, $6771, $6772, $6773, $6774, $6775, $6776, $6777, $6778, VersionRange($6779, $6780)), ($6781, $6782, $6783, $6784, $6785, $6786, $6787, $6788, $6789, $6790, $6791, $6792, $6793, $6794, $6795, $6796, $6797, $6798, $6799, $6800, $6801, $6802, $6803, $6804, $6805, $6806, $6807, $6808, VersionRange($6809, $6810)), ($6811, $6812, $6813, $6814, $6815, $6816, $6817, $6818, $6819, $6820, $6821, $6822, $6823, $6824, $6825, $6826, $6827, $6828, $6829, $6830, $6831, $6832, $6833, $6834, $6835, $6836, $6837, $6838, VersionRange($6839, $6840)), ($6841, $6842, $6843, $6844, $6845, $6846, $6847, $6848, $6849, $6850, $6851, $6852, $6853, $6854, $6855, $6856, $6857, $6858, $6859, $6860, $6861, $6862, $6863, $6864, $6865, $6866, $6867, $6868, VersionRange($6869, $6870)), ($6871, $6872, $6873, $6874, $6875, $6876, $6877, $6878, $6879, $6880, $6881, $6882, $6883, $6884, $6885, $6886, $6887, $6888, $6889, $6890, $6891, $6892, $6893, $6894, $6895, $6896, $6897, $6898, VersionRange($6899, $6900)), ($6901, $6902, $6903, $6904, $6905, $6906, $6907, $6908, $6909, $6910, $6911, $6912, $6913, $6914, $6915, $6916, $6917, $6918, $6919, $6920, $6921, $6922, $6923, $6924, $6925, $6926, $6927, $6928, VersionRange($6929, $6930)), ($6931, $6932, $6933, $6934, $6935, $6936, $6937, $6938, $6939, $6940, $6941, $6942, $6943, $6944, $6945, $6946, $6947, $6948, $6949, $6950, $6951, $6952, $6953, $6954, $6955, $6956, $6957, $6958, VersionRange($6959, $6960)), ($6961, $6962, $6963, $6964, $6965, $6966, $6967, $6968, $6969, $6970, $6971, $6972, $6973, $6974, $6975, $6976, $6977, $6978, $6979, $6980, $6981, $6982, $6983, $6984, $6985, $6986, $6987, $6988, VersionRange($6989, $6990)), ($6991, $6992, $6993, $6994, $6995, $6996, $6997, $6998, $6999, $7000, $7001, $7002, $7003, $7004, $7005, $7006, $7007, $7008, $7009, $7010, $7011, $7012, $7013, $7014, $7015, $7016, $7017, $7018, VersionRange($7019, $7020)), ($7021, $7022, $7023, $7024, $7025, $7026, $7027, $7028, $7029, $7030, $7031, $7032, $7033, $7034, $7035, $7036, $7037, $7038, $7039, $7040, $7041, $7042, $7043, $7044, $7045, $7046, $7047, $7048, VersionRange($7049, $7050)), ($7051, $7052, $7053, $7054, $7055, $7056, $7057, $7058, $7059, $7060, $7061, $7062, $7063, $7064, $7065, $7066, $7067, $7068, $7069, $7070, $7071, $7072, $7073, $7074, $7075, $7076, $7077, $7078, VersionRange($7079, $7080)), ($7081, $7082, $7083, $7084, $7085, $7086, $7087, $7088, $7089, $7090, $7091, $7092, $7093, $7094, $7095, $7096, $7097, $7098, $7099, $7100, $7101, $7102, $7103, $7104, $7105, $7106, $7107, $7108, VersionRange($7109, $7110)), ($7111, $7112, $7113, $7114, $7115, $7116, $7117, $7118, $7119, $7120, $7121, $7122, $7123, $7124, $7125, $7126, $7127, $7128, $7129, $7130, $7131, $7132, $7133, $7134, $7135, $7136, $7137, $7138, VersionRange($7139, $7140)), ($7141, $7142, $7143, $7144, $7145, $7146, $7147, $7148, $7149, $7150, $7151, $7152, $7153, $7154, $7155, $7156, $7157, $7158, $7159, $7160, $7161, $7162, $7163, $7164, $7165, $7166, $7167, $7168, VersionRange($7169, $7170)), ($7171, $7172, $7173, $7174, $7175, $7176, $7177, $7178, $7179, $7180, $7181, $7182, $7183, $7184, $7185, $7186, $7187, $7188, $7189, $7190, $7191, $7192, $7193, $7194, $7195, $7196, $7197, $7198, VersionRange($7199, $7200)), ($7201, $7202, $7203, $7204, $7205, $7206, $7207, $7208, $7209, $7210, $7211, $7212, $7213, $7214, $7215, $7216, $7217, $7218, $7219, $7220, $7221, $7222, $7223, $7224, $7225, $7226, $7227, $7228, VersionRange($7229, $7230)), ($7231, $7232, $7233, $7234, $7235, $7236, $7237, $7238, $7239, $7240, $7241, $7242, $7243, $7244, $7245, $7246, $7247, $7248, $7249, $7250, $7251, $7252, $7253, $7254, $7255, $7256, $7257, $7258, VersionRange($7259, $7260)), ($7261, $7262, $7263, $7264, $7265, $7266, $7267, $7268, $7269, $7270, $7271, $7272, $7273, $7274, $7275, $7276, $7277, $7278, $7279, $7280, $7281, $7282, $7283, $7284, $7285, $7286, $7287, $7288, VersionRange($7289, $7290)), ($7291, $7292, $7293, $7294, $7295, $7296, $7297, $7298, $7299, $7300, $7301, $7302, $7303, $7304, $7305, $7306, $7307, $7308, $7309, $7310, $7311, $7312, $7313, $7314, $7315, $7316, $7317, $7318, VersionRange($7319, $7320)), ($7321, $7322, $7323, $7324, $7325, $7326, $7327, $7328, $7329, $7330, $7331, $7332, $7333, $7334, $7335, $7336, $7337, $7338, $7339, $7340, $7341, $7342, $7343, $7344, $7345, $7346, $7347, $7348, VersionRange($7349, $7350)), ($7351, $7352, $7353, $7354, $7355, $7356, $7357, $7358, $7359, $7360, $7361, $7362, $7363, $7364, $7365, $7366, $7367, $7368, $7369, $7370, $7371, $7372, $7373, $7374, $7375, $7376, $7377, $7378, VersionRange($7379, $7380)), ($7381, $7382, $7383, $7384, $7385, $7386, $7387, $7388, $7389, $7390, $7391, $7392, $7393, $7394, $7395, $7396, $7397, $7398, $7399, $7400, $7401, $7402, $7403, $7404, $7405, $7406, $7407, $7408, VersionRange($7409, $7410)), ($7411, $7412, $7413, $7414, $7415, $7416, $7417, $7418, $7419, $7420, $7421, $7422, $7423, $7424, $7425, $7426, $7427, $7428, $7429, $7430, $7431, $7432, $7433, $7434, $7435, $7436, $7437, $7438, VersionRange($7439, $7440)), ($7441, $7442, $7443, $7444, $7445, $7446, $7447, $7448, $7449, $7450, $7451, $7452, $7453, $7454, $7455, $7456, $7457, $7458, $7459, $7460, $7461, $7462, $7463, $7464, $7465, $7466, $7467, $7468, VersionRange($7469, $7470)), ($7471, $7472, $7473, $7474, $7475, $7476, $7477, $7478, $7479, $7480, $7481, $7482, $7483, $7484, $7485, $7486, $7487, $7488, $7489, $7490, $7491, $7492, $7493, $7494, $7495, $7496, $7497, $7498, VersionRange($7499, $7500)), ($7501, $7502, $7503, $7504, $7505, $7506, $7507, $7508, $7509, $7510, $7511, $7512, $7513, $7514, $7515, $7516, $7517, $7518, $7519, $7520, $7521, $7522, $7523, $7524, $7525, $7526, $7527, $7528, VersionRange($7529, $7530)), ($7531, $7532, $7533, $7534, $7535, $7536, $7537, $7538, $7539, $7540, $7541, $7542, $7543, $7544, $7545, $7546, $7547, $7548, $7549, $7550, $7551, $7552, $7553, $7554, $7555, $7556, $7557, $7558, VersionRange($7559, $7560)), ($7561, $7562, $7563, $7564, $7565, $7566, $7567, $7568, $7569, $7570, $7571, $7572, $7573, $7574, $7575, $7576, $7577, $7578, $7579, $7580, $7581, $7582, $7583, $7584, $7585, $7586, $7587, $7588, VersionRange($7589, $7590)), ($7591, $7592, $7593, $7594, $7595, $7596, $7597, $7598, $7599, $7600, $7601, $7602, $7603, $7604, $7605, $7606, $7607, $7608, $7609, $7610, $7611, $7612, $7613, $7614, $7615, $7616, $7617, $7618, VersionRange($7619, $7620)), ($7621, $7622, $7623, $7624, $7625, $7626, $7627, $7628, $7629, $7630, $7631, $7632, $7633, $7634, $7635, $7636, $7637, $7638, $7639, $7640, $7641, $7642, $7643, $7644, $7645, $7646, $7647, $7648, VersionRange($7649, $7650)), ($7651, $7652, $7653, $7654, $7655, $7656, $7657, $7658, $7659, $7660, $7661, $7662, $7663, $7664, $7665, $7666, $7667, $7668, $7669, $7670, $7671, $7672, $7673, $7674, $7675, $7676, $7677, $7678, VersionRange($7679, $7680)), ($7681, $7682, $7683, $7684, $7685, $7686, $7687, $7688, $7689, $7690, $7691, $7692, $7693, $7694, $7695, $7696, $7697, $7698, $7699, $7700, $7701, $7702, $7703, $7704, $7705, $7706, $7707, $7708, VersionRange($7709, $7710)), ($7711, $7712, $7713, $7714, $7715, $7716, $7717, $7718, $7719, $7720, $7721, $7722, $7723, $7724, $7725, $7726, $7727, $7728, $7729, $7730, $7731, $7732, $7733, $7734, $7735, $7736, $7737, $7738, VersionRange($7739, $7740)), ($7741, $7742, $7743, $7744, $7745, $7746, $7747, $7748, $7749, $7750, $7751, $7752, $7753, $7754, $7755, $7756, $7757, $7758, $7759, $7760, $7761, $7762, $7763, $7764, $7765, $7766, $7767, $7768, VersionRange($7769, $7770)), ($7771, $7772, $7773, $7774, $7775, $7776, $7777, $7778, $7779, $7780, $7781, $7782, $7783, $7784, $7785, $7786, $7787, $7788, $7789, $7790, $7791, $7792, $7793, $7794, $7795, $7796, $7797, $7798, VersionRange($7799, $7800)), ($7801, $7802, $7803, $7804, $7805, $7806, $7807, $7808, $7809, $7810, $7811, $7812, $7813, $7814, $7815, $7816, $7817, $7818, $7819, $7820, $7821, $7822, $7823, $7824, $7825, $7826, $7827, $7828, VersionRange($7829, $7830)), ($7831, $7832, $7833, $7834, $7835, $7836, $7837, $7838, $7839, $7840, $7841, $7842, $7843, $7844, $7845, $7846, $7847, $7848, $7849, $7850, $7851, $7852, $7853, $7854, $7855, $7856, $7857, $7858, VersionRange($7859, $7860)), ($7861, $7862, $7863, $7864, $7865, $7866, $7867, $7868, $7869, $7870, $7871, $7872, $7873, $7874, $7875, $7876, $7877, $7878, $7879, $7880, $7881, $7882, $7883, $7884, $7885, $7886, $7887, $7888, VersionRange($7889, $7890)), ($7891, $7892, $7893, $7894, $7895, $7896, $7897, $7898, $7899, $7900, $7901, $7902, $7903, $7904, $7905, $7906, $7907, $7908, $7909, $7910, $7911, $7912, $7913, $7914, $7915, $7916, $7917, $7918, VersionRange($7919, $7920)), ($7921, $7922, $7923, $7924, $7925, $7926, $7927, $7928, $7929, $7930, $7931, $7932, $7933, $7934, $7935, $7936, $7937, $7938, $7939, $7940, $7941, $7942, $7943, $7944, $7945, $7946, $7947, $7948, VersionRange($7949, $7950)), ($7951, $7952, $7953, $7954, $7955, $7956, $7957, $7958, $7959, $7960, $7961, $7962, $7963, $7964, $7965, $7966, $7967, $7968, $7969, $7970, $7971, $7972, $7973, $7974, $7975, $7976, $7977, $7978, VersionRange($7979, $7980)), ($7981, $7982, $7983, $7984, $7985, $7986, $7987, $7988, $7989, $7990, $7991, $7992, $7993, $7994, $7995, $7996, $7997, $7998, $7999, $8000, $8001, $8002, $8003, $8004, $8005, $8006, $8007, $8008, VersionRange($8009, $8010)), ($8011, $8012, $8013, $8014, $8015, $8016, $8017, $8018, $8019, $8020, $8021, $8022, $8023, $8024, $8025, $8026, $8027, $8028, $8029, $8030, $8031, $8032, $8033, $8034, $8035, $8036, $8037, $8038, VersionRange($8039, $8040)), ($8041, $8042, $8043, $8044, $8045, $8046, $8047, $8048, $8049, $8050, $8051, $8052, $8053, $8054, $8055, $8056, $8057, $8058, $8059, $8060, $8061, $8062, $8063, $8064, $8065, $8066, $8067, $8068, VersionRange($8069, $8070)), ($8071, $8072, $8073, $8074, $8075, $8076, $8077, $8078, $8079, $8080, $8081, $8082, $8083, $8084, $8085, $8086, $8087, $8088, $8089, $8090, $8091, $8092, $8093, $8094, $8095, $8096, $8097, $8098, VersionRange($8099, $8100)), ($8101, $8102, $8103, $8104, $8105, $8106, $8107, $8108, $8109, $8110, $8111, $8112, $8113, $8114, $8115, $8116, $8117, $8118, $8119, $8120, $8121, $8122, $8123, $8124, $8125, $8126, $8127, $8128, VersionRange($8129, $8130)), ($8131, $8132, $8133, $8134, $8135, $8136, $8137, $8138, $8139, $8140, $8141, $8142, $8143, $8144, $8145, $8146, $8147, $8148, $8149, $8150, $8151, $8152, $8153, $8154, $8155, $8156, $8157, $8158, VersionRange($8159, $8160)), ($8161, $8162, $8163, $8164, $8165, $8166, $8167, $8168, $8169, $8170, $8171, $8172, $8173, $8174, $8175, $8176, $8177, $8178, $8179, $8180, $8181, $8182, $8183, $8184, $8185, $8186, $8187, $8188, VersionRange($8189, $8190)), ($8191, $8192, $8193, $8194, $8195, $8196, $8197, $8198, $8199, $8200, $8201, $8202, $8203, $8204, $8205, $8206, $8207, $8208, $8209, $8210, $8211, $8212, $8213, $8214, $8215, $8216, $8217, $8218, VersionRange($8219, $8220)), ($8221, $8222, $8223, $8224, $8225, $8226, $8227, $8228, $8229, $8230, $8231, $8232, $8233, $8234, $8235, $8236, $8237, $8238, $8239, $8240, $8241, $8242, $8243, $8244, $8245, $8246, $8247, $8248, VersionRange($8249, $8250)), ($8251, $8252, $8253, $8254, $8255, $8256, $8257, $8258, $8259, $8260, $8261, $8262, $8263, $8264, $8265, $8266, $8267, $8268, $8269, $8270, $8271, $8272, $8273, $8274, $8275, $8276, $8277, $8278, VersionRange($8279, $8280)), ($8281, $8282, $8283, $8284, $8285, $8286, $8287, $8288, $8289, $8290, $8291, $8292, $8293, $8294, $8295, $8296, $8297, $8298, $8299, $8300, $8301, $8302, $8303, $8304, $8305, $8306, $8307, $8308, VersionRange($8309, $8310)), ($8311, $8312, $8313, $8314, $8315, $8316, $8317, $8318, $8319, $8320, $8321, $8322, $8323, $8324, $8325, $8326, $8327, $8328, $8329, $8330, $8331, $8332, $8333, $8334, $8335, $8336, $8337, $8338, VersionRange($8339, $8340)), ($8341, $8342, $8343, $8344, $8345, $8346, $8347, $8348, $8349, $8350, $8351, $8352, $8353, $8354, $8355, $8356, $8357, $8358, $8359, $8360, $8361, $8362, $8363, $8364, $8365, $8366, $8367, $8368, VersionRange($8369, $8370)), ($8371, $8372, $8373, $8374, $8375, $8376, $8377, $8378, $8379, $8380, $8381, $8382, $8383, $8384, $8385, $8386, $8387, $8388, $8389, $8390, $8391, $8392, $8393, $8394, $8395, $8396, $8397, $8398, VersionRange($8399, $8400)), ($8401, $8402, $8403, $8404, $8405, $8406, $8407, $8408, $8409, $8410, $8411, $8412, $8413, $8414, $8415, $8416, $8417, $8418, $8419, $8420, $8421, $8422, $8423, $8424, $8425, $8426, $8427, $8428, VersionRange($8429, $8430)), ($8431, $8432, $8433, $8434, $8435, $8436, $8437, $8438, $8439, $8440, $8441, $8442, $8443, $8444, $8445, $8446, $8447, $8448, $8449, $8450, $8451, $8452, $8453, $8454, $8455, $8456, $8457, $8458, VersionRange($8459, $8460)), ($8461, $8462, $8463, $8464, $8465, $8466, $8467, $8468, $8469, $8470, $8471, $8472, $8473, $8474, $8475, $8476, $8477, $8478, $8479, $8480, $8481, $8482, $8483, $8484, $8485, $8486, $8487, $8488, VersionRange($8489, $8490)), ($8491, $8492, $8493, $8494, $8495, $8496, $8497, $8498, $8499, $8500, $8501, $8502, $8503, $8504, $8505, $8506, $8507, $8508, $8509, $8510, $8511, $8512, $8513, $8514, $8515, $8516, $8517, $8518, VersionRange($8519, $8520)), ($8521, $8522, $8523, $8524, $8525, $8526, $8527, $8528, $8529, $8530, $8531, $8532, $8533, $8534, $8535, $8536, $8537, $8538, $8539, $8540, $8541, $8542, $8543, $8544, $8545, $8546, $8547, $8548, VersionRange($8549, $8550)), ($8551, $8552, $8553, $8554, $8555, $8556, $8557, $8558, $8559, $8560, $8561, $8562, $8563, $8564, $8565, $8566, $8567, $8568, $8569, $8570, $8571, $8572, $8573, $8574, $8575, $8576, $8577, $8578, VersionRange($8579, $8580)), ($8581, $8582, $8583, $8584, $8585, $8586, $8587, $8588, $8589, $8590, $8591, $8592, $8593, $8594, $8595, $8596, $8597, $8598, $8599, $8600, $8601, $8602, $8603, $8604, $8605, $8606, $8607, $8608, VersionRange($8609, $8610)), ($8611, $8612, $8613, $8614, $8615, $8616, $8617, $8618, $8619, $8620, $8621, $8622, $8623, $8624, $8625, $8626, $8627, $8628, $8629, $8630, $8631, $8632, $8633, $8634, $8635, $8636, $8637, $8638, VersionRange($8639, $8640)), ($8641, $8642, $8643, $8644, $8645, $8646, $8647, $8648, $8649, $8650, $8651, $8652, $8653, $8654, $8655, $8656, $8657, $8658, $8659, $8660, $8661, $8662, $8663, $8664, $8665, $8666, $8667, $8668, VersionRange($8669, $8670)), ($8671, $8672, $8673, $8674, $8675, $8676, $8677, $8678, $8679, $8680, $8681, $8682, $8683, $8684, $8685, $8686, $8687, $8688, $8689, $8690, $8691, $8692, $8693, $8694, $8695, $8696, $8697, $8698, VersionRange($8699, $8700)), ($8701, $8702, $8703, $8704, $8705, $8706, $8707, $8708, $8709, $8710, $8711, $8712, $8713, $8714, $8715, $8716, $8717, $8718, $8719, $8720, $8721, $8722, $8723, $8724, $8725, $8726, $8727, $8728, VersionRange($8729, $8730)), ($8731, $8732, $8733, $8734, $8735, $8736, $8737, $8738, $8739, $8740, $8741, $8742, $8743, $8744, $8745, $8746, $8747, $8748, $8749, $8750, $8751, $8752, $8753, $8754, $8755, $8756, $8757, $8758, VersionRange($8759, $8760)), ($8761, $8762, $8763, $8764, $8765, $8766, $8767, $8768, $8769, $8770, $8771, $8772, $8773, $8774, $8775, $8776, $8777, $8778, $8779, $8780, $8781, $8782, $8783, $8784, $8785, $8786, $8787, $8788, VersionRange($8789, $8790)), ($8791, $8792, $8793, $8794, $8795, $8796, $8797, $8798, $8799, $8800, $8801, $8802, $8803, $8804, $8805, $8806, $8807, $8808, $8809, $8810, $8811, $8812, $8813, $8814, $8815, $8816, $8817, $8818, VersionRange($8819, $8820)), ($8821, $8822, $8823, $8824, $8825, $8826, $8827, $8828, $8829, $8830, $8831, $8832, $8833, $8834, $8835, $8836, $8837, $8838, $8839, $8840, $8841, $8842, $8843, $8844, $8845, $8846, $8847, $8848, VersionRange($8849, $8850)), ($8851, $8852, $8853, $8854, $8855, $8856, $8857, $8858, $8859, $8860, $8861, $8862, $8863, $8864, $8865, $8866, $8867, $8868, $8869, $8870, $8871, $8872, $8873, $8874, $8875, $8876, $8877, $8878, VersionRange($8879, $8880)), ($8881, $8882, $8883, $8884, $8885, $8886, $8887, $8888, $8889, $8890, $8891, $8892, $8893, $8894, $8895, $8896, $8897, $8898, $8899, $8900, $8901, $8902, $8903, $8904, $8905, $8906, $8907, $8908, VersionRange($8909, $8910)), ($8911, $8912, $8913, $8914, $8915, $8916, $8917, $8918, $8919, $8920, $8921, $8922, $8923, $8924, $8925, $8926, $8927, $8928, $8929, $8930, $8931, $8932, $8933, $8934, $8935, $8936, $8937, $8938, VersionRange($8939, $8940)), ($8941, $8942, $8943, $8944, $8945, $8946, $8947, $8948, $8949, $8950, $8951, $8952, $8953, $8954, $8955, $8956, $8957, $8958, $8959, $8960, $8961, $8962, $8963, $8964, $8965, $8966, $8967, $8968, VersionRange($8969, $8970)), ($8971, $8972, $8973, $8974, $8975, $8976, $8977, $8978, $8979, $8980, $8981, $8982, $8983, $8984, $8985, $8986, $8987, $8988, $8989, $8990, $8991, $8992, $8993, $8994, $8995, $8996, $8997, $8998, VersionRange($8999, $9000)), ($9001, $9002, $9003, $9004, $9005, $9006, $9007, $9008, $9009, $9010, $9011, $9012, $9013, $9014, $9015, $9016, $9017, $9018, $9019, $9020, $9021, $9022, $9023, $9024, $9025, $9026, $9027, $9028, VersionRange($9029, $9030)), ($9031, $9032, $9033, $9034, $9035, $9036, $9037, $9038, $9039, $9040, $9041, $9042, $9043, $9044, $9045, $9046, $9047, $9048, $9049, $9050, $9051, $9052, $9053, $9054, $9055, $9056, $9057, $9058, VersionRange($9059, $9060)), ($9061, $9062, $9063, $9064, $9065, $9066, $9067, $9068, $9069, $9070, $9071, $9072, $9073, $9074, $9075, $9076, $9077, $9078, $9079, $9080, $9081, $9082, $9083, $9084, $9085, $9086, $9087, $9088, VersionRange($9089, $9090)), ($9091, $9092, $9093, $9094, $9095, $9096, $9097, $9098, $9099, $9100, $9101, $9102, $9103, $9104, $9105, $9106, $9107, $9108, $9109, $9110, $9111, $9112, $9113, $9114, $9115, $9116, $9117, $9118, VersionRange($9119, $9120)), ($9121, $9122, $9123, $9124, $9125, $9126, $9127, $9128, $9129, $9130, $9131, $9132, $9133, $9134, $9135, $9136, $9137, $9138, $9139, $9140, $9141, $9142, $9143, $9144, $9145, $9146, $9147, $9148, VersionRange($9149, $9150)), ($9151, $9152, $9153, $9154, $9155, $9156, $9157, $9158, $9159, $9160, $9161, $9162, $9163, $9164, $9165, $9166, $9167, $9168, $9169, $9170, $9171, $9172, $9173, $9174, $9175, $9176, $9177, $9178, VersionRange($9179, $9180)), ($9181, $9182, $9183, $9184, $9185, $9186, $9187, $9188, $9189, $9190, $9191, $9192, $9193, $9194, $9195, $9196, $9197, $9198, $9199, $9200, $9201, $9202, $9203, $9204, $9205, $9206, $9207, $9208, VersionRange($9209, $9210)), ($9211, $9212, $9213, $9214, $9215, $9216, $9217, $9218, $9219, $9220, $9221, $9222, $9223, $9224, $9225, $9226, $9227, $9228, $9229, $9230, $9231, $9232, $9233, $9234, $9235, $9236, $9237, $9238, VersionRange($9239, $9240)), ($9241, $9242, $9243, $9244, $9245, $9246, $9247, $9248, $9249, $9250, $9251, $9252, $9253, $9254, $9255, $9256, $9257, $9258, $9259, $9260, $9261, $9262, $9263, $9264, $9265, $9266, $9267, $9268, VersionRange($9269, $9270)), ($9271, $9272, $9273, $9274, $9275, $9276, $9277, $9278, $9279, $9280, $9281, $9282, $9283, $9284, $9285, $9286, $9287, $9288, $9289, $9290, $9291, $9292, $9293, $9294, $9295, $9296, $9297, $9298, VersionRange($9299, $9300)), ($9301, $9302, $9303, $9304, $9305, $9306, $9307, $9308, $9309, $9310, $9311, $9312, $9313, $9314, $9315, $9316, $9317, $9318, $9319, $9320, $9321, $9322, $9323, $9324, $9325, $9326, $9327, $9328, VersionRange($9329, $9330)), ($9331, $9332, $9333, $9334, $9335, $9336, $9337, $9338, $9339, $9340, $9341, $9342, $9343, $9344, $9345, $9346, $9347, $9348, $9349, $9350, $9351, $9352, $9353, $9354, $9355, $9356, $9357, $9358, VersionRange($9359, $9360)), ($9361, $9362, $9363, $9364, $9365, $9366, $9367, $9368, $9369, $9370, $9371, $9372, $9373, $9374, $9375, $9376, $9377, $9378, $9379, $9380, $9381, $9382, $9383, $9384, $9385, $9386, $9387, $9388, VersionRange($9389, $9390)), ($9391, $9392, $9393, $9394, $9395, $9396, $9397, $9398, $9399, $9400, $9401, $9402, $9403, $9404, $9405, $9406, $9407, $9408, $9409, $9410, $9411, $9412, $9413, $9414, $9415, $9416, $9417, $9418, VersionRange($9419, $9420)), ($9421, $9422, $9423, $9424, $9425, $9426, $9427, $9428, $9429, $9430, $9431, $9432, $9433, $9434, $9435, $9436, $9437, $9438, $9439, $9440, $9441, $9442, $9443, $9444, $9445, $9446, $9447, $9448, VersionRange($9449, $9450)), ($9451, $9452, $9453, $9454, $9455, $9456, $9457, $9458, $9459, $9460, $9461, $9462, $9463, $9464, $9465, $9466, $9467, $9468, $9469, $9470, $9471, $9472, $9473, $9474, $9475, $9476, $9477, $9478, VersionRange($9479, $9480)), ($9481, $9482, $9483, $9484, $9485, $9486, $9487, $9488, $9489, $9490, $9491, $9492, $9493, $9494, $9495, $9496, $9497, $9498, $9499, $9500, $9501, $9502, $9503, $9504, $9505, $9506, $9507, $9508, VersionRange($9509, $9510)), ($9511, $9512, $9513, $9514, $9515, $9516, $9517, $9518, $9519, $9520, $9521, $9522, $9523, $9524, $9525, $9526, $9527, $9528, $9529, $9530, $9531, $9532, $9533, $9534, $9535, $9536, $9537, $9538, VersionRange($9539, $9540)), ($9541, $9542, $9543, $9544, $9545, $9546, $9547, $9548, $9549, $9550, $9551, $9552, $9553, $9554, $9555, $9556, $9557, $9558, $9559, $9560, $9561, $9562, $9563, $9564, $9565, $9566, $9567, $9568, VersionRange($9569, $9570)), ($9571, $9572, $9573, $9574, $9575, $9576, $9577, $9578, $9579, $9580, $9581, $9582, $9583, $9584, $9585, $9586, $9587, $9588, $9589, $9590, $9591, $9592, $9593, $9594, $9595, $9596, $9597, $9598, VersionRange($9599, $9600)), ($9601, $9602, $9603, $9604, $9605, $9606, $9607, $9608, $9609, $9610, $9611, $9612, $9613, $9614, $9615, $9616, $9617, $9618, $9619, $9620, $9621, $9622, $9623, $9624, $9625, $9626, $9627, $9628, VersionRange($9629, $9630)), ($9631, $9632, $9633, $9634, $9635, $9636, $9637, $9638, $9639, $9640, $9641, $9642, $9643, $9644, $9645, $9646, $9647, $9648, $9649, $9650, $9651, $9652, $9653, $9654, $9655, $9656, $9657, $9658, VersionRange($9659, $9660)), ($9661, $9662, $9663, $9664, $9665, $9666, $9667, $9668, $9669, $9670, $9671, $9672, $9673, $9674, $9675, $9676, $9677, $9678, $9679, $9680, $9681, $9682, $9683, $9684, $9685, $9686, $9687, $9688, VersionRange($9689, $9690)), ($9691, $9692, $9693, $9694, $9695, $9696, $9697, $9698, $9699, $9700, $9701, $9702, $9703, $9704, $9705, $9706, $9707, $9708, $9709, $9710, $9711, $9712, $9713, $9714, $9715, $9716, $9717, $9718, VersionRange($9719, $9720)), ($9721, $9722, $9723, $9724, $9725, $9726, $9727, $9728, $9729, $9730, $9731, $9732, $9733, $9734, $9735, $9736, $9737, $9738, $9739, $9740, $9741, $9742, $9743, $9744, $9745, $9746, $9747, $9748, VersionRange($9749, $9750)), ($9751, $9752, $9753, $9754, $9755, $9756, $9757, $9758, $9759, $9760, $9761, $9762, $9763, $9764, $9765, $9766, $9767, $9768, $9769, $9770, $9771, $9772, $9773, $9774, $9775, $9776, $9777, $9778, VersionRange($9779, $9780)), ($9781, $9782, $9783, $9784, $9785, $9786, $9787, $9788, $9789, $9790, $9791, $9792, $9793, $9794, $9795, $9796, $9797, $9798, $9799, $9800, $9801, $9802, $9803, $9804, $9805, $9806, $9807, $9808, VersionRange($9809, $9810)), ($9811, $9812, $9813, $9814, $9815, $9816, $9817, $9818, $9819, $9820, $9821, $9822, $9823, $9824, $9825, $9826, $9827, $9828, $9829, $9830, $9831, $9832, $9833, $9834, $9835, $9836, $9837, $9838, VersionRange($9839, $9840)), ($9841, $9842, $9843, $9844, $9845, $9846, $9847, $9848, $9849, $9850, $9851, $9852, $9853, $9854, $9855, $9856, $9857, $9858, $9859, $9860, $9861, $9862, $9863, $9864, $9865, $9866, $9867, $9868, VersionRange($9869, $9870)), ($9871, $9872, $9873, $9874, $9875, $9876, $9877, $9878, $9879, $9880, $9881, $9882, $9883, $9884, $9885, $9886, $9887, $9888, $9889, $9890, $9891, $9892, $9893, $9894, $9895, $9896, $9897, $9898, VersionRange($9899, $9900)), ($9901, $9902, $9903, $9904, $9905, $9906, $9907, $9908, $9909, $9910, $9911, $9912, $9913, $9914, $9915, $9916, $9917, $9918, $9919, $9920, $9921, $9922, $9923, $9924, $9925, $9926, $9927, $9928, VersionRange($9929, $9930)), ($9931, $9932, $9933, $9934, $9935, $9936, $9937, $9938, $9939, $9940, $9941, $9942, $9943, $9944, $9945, $9946, $9947, $9948, $9949, $9950, $9951, $9952, $9953, $9954, $9955, $9956, $9957, $9958, VersionRange($9959, $9960)), ($9961, $9962, $9963, $9964, $9965, $9966, $9967, $9968, $9969, $9970, $9971, $9972, $9973, $9974, $9975, $9976, $9977, $9978, $9979, $9980, $9981, $9982, $9983, $9984, $9985, $9986, $9987, $9988, VersionRange($9989, $9990)), ($9991, $9992, $9993, $9994, $9995, $9996, $9997, $9998, $9999, $10000, $10001, $10002, $10003, $10004, $10005, $10006, $10007, $10008, $10009, $10010, $10011, $10012, $10013, $10014, $10015, $10016, $10017, $10018, VersionRange($10019, $10020)), ($10021, $10022, $10023, $10024, $10025, $10026, $10027, $10028, $10029, $10030, $10031, $10032, $10033, $10034, $10035, $10036, $10037, $10038, $10039, $10040, $10041, $10042, $10043, $10044, $10045, $10046, $10047, $10048, VersionRange($10049, $10050)), ($10051, $10052, $10053, $10054, $10055, $10056, $10057, $10058, $10059, $10060, $10061, $10062, $10063, $10064, $10065, $10066, $10067, $10068, $10069, $10070, $10071, $10072, $10073, $10074, $10075, $10076, $10077, $10078, VersionRange($10079, $10080)), ($10081, $10082, $10083, $10084, $10085, $10086, $10087, $10088, $10089, $10090, $10091, $10092, $10093, $10094, $10095, $10096, $10097, $10098, $10099, $10100, $10101, $10102, $10103, $10104, $10105, $10106, $10107, $10108, VersionRange($10109, $10110)), ($10111, $10112, $10113, $10114, $10115, $10116, $10117, $10118, $10119, $10120, $10121, $10122, $10123, $10124, $10125, $10126, $10127, $10128, $10129, $10130, $10131, $10132, $10133, $10134, $10135, $10136, $10137, $10138, VersionRange($10139, $10140)), ($10141, $10142, $10143, $10144, $10145, $10146, $10147, $10148, $10149, $10150, $10151, $10152, $10153, $10154, $10155, $10156, $10157, $10158, $10159, $10160, $10161, $10162, $10163, $10164, $10165, $10166, $10167, $10168, VersionRange($10169, $10170)), ($10171, $10172, $10173, $10174, $10175, $10176, $10177, $10178, $10179, $10180, $10181, $10182, $10183, $10184, $10185, $10186, $10187, $10188, $10189, $10190, $10191, $10192, $10193, $10194, $10195, $10196, $10197, $10198, VersionRange($10199, $10200)), ($10201, $10202, $10203, $10204, $10205, $10206, $10207, $10208, $10209, $10210, $10211, $10212, $10213, $10214, $10215, $10216, $10217, $10218, $10219, $10220, $10221, $10222, $10223, $10224, $10225, $10226, $10227, $10228, VersionRange($10229, $10230)), ($10231, $10232, $10233, $10234, $10235, $10236, $10237, $10238, $10239, $10240, $10241, $10242, $10243, $10244, $10245, $10246, $10247, $10248, $10249, $10250, $10251, $10252, $10253, $10254, $10255, $10256, $10257, $10258, VersionRange($10259, $10260)), ($10261, $10262, $10263, $10264, $10265, $10266, $10267, $10268, $10269, $10270, $10271, $10272, $10273, $10274, $10275, $10276, $10277, $10278, $10279, $10280, $10281, $10282, $10283, $10284, $10285, $10286, $10287, $10288, VersionRange($10289, $10290)), ($10291, $10292, $10293, $10294, $10295, $10296, $10297, $10298, $10299, $10300, $10301, $10302, $10303, $10304, $10305, $10306, $10307, $10308, $10309, $10310, $10311, $10312, $10313, $10314, $10315, $10316, $10317, $10318, VersionRange($10319, $10320)), ($10321, $10322, $10323, $10324, $10325, $10326, $10327, $10328, $10329, $10330, $10331, $10332, $10333, $10334, $10335, $10336, $10337, $10338, $10339, $10340, $10341, $10342, $10343, $10344, $10345, $10346, $10347, $10348, VersionRange($10349, $10350)), ($10351, $10352, $10353, $10354, $10355, $10356, $10357, $10358, $10359, $10360, $10361, $10362, $10363, $10364, $10365, $10366, $10367, $10368, $10369, $10370, $10371, $10372, $10373, $10374, $10375, $10376, $10377, $10378, VersionRange($10379, $10380)), ($10381, $10382, $10383, $10384, $10385, $10386, $10387, $10388, $10389, $10390, $10391, $10392, $10393, $10394, $10395, $10396, $10397, $10398, $10399, $10400, $10401, $10402, $10403, $10404, $10405, $10406, $10407, $10408, VersionRange($10409, $10410)), ($10411, $10412, $10413, $10414, $10415, $10416, $10417, $10418, $10419, $10420, $10421, $10422, $10423, $10424, $10425, $10426, $10427, $10428, $10429, $10430, $10431, $10432, $10433, $10434, $10435, $10436, $10437, $10438, VersionRange($10439, $10440)), ($10441, $10442, $10443, $10444, $10445, $10446, $10447, $10448, $10449, $10450, $10451, $10452, $10453, $10454, $10455, $10456, $10457, $10458, $10459, $10460, $10461, $10462, $10463, $10464, $10465, $10466, $10467, $10468, VersionRange($10469, $10470)), ($10471, $10472, $10473, $10474, $10475, $10476, $10477, $10478, $10479, $10480, $10481, $10482, $10483, $10484, $10485, $10486, $10487, $10488, $10489, $10490, $10491, $10492, $10493, $10494, $10495, $10496, $10497, $10498, VersionRange($10499, $10500)), ($10501, $10502, $10503, $10504, $10505, $10506, $10507, $10508, $10509, $10510, $10511, $10512, $10513, $10514, $10515, $10516, $10517, $10518, $10519, $10520, $10521, $10522, $10523, $10524, $10525, $10526, $10527, $10528, VersionRange($10529, $10530)), ($10531, $10532, $10533, $10534, $10535, $10536, $10537, $10538, $10539, $10540, $10541, $10542, $10543, $10544, $10545, $10546, $10547, $10548, $10549, $10550, $10551, $10552, $10553, $10554, $10555, $10556, $10557, $10558, VersionRange($10559, $10560)), ($10561, $10562, $10563, $10564, $10565, $10566, $10567, $10568, $10569, $10570, $10571, $10572, $10573, $10574, $10575, $10576, $10577, $10578, $10579, $10580, $10581, $10582, $10583, $10584, $10585, $10586, $10587, $10588, VersionRange($10589, $10590)), ($10591, $10592, $10593, $10594, $10595, $10596, $10597, $10598, $10599, $10600, $10601, $10602, $10603, $10604, $10605, $10606, $10607, $10608, $10609, $10610, $10611, $10612, $10613, $10614, $10615, $10616, $10617, $10618, VersionRange($10619, $10620)), ($10621, $10622, $10623, $10624, $10625, $10626, $10627, $10628, $10629, $10630, $10631, $10632, $10633, $10634, $10635, $10636, $10637, $10638, $10639, $10640, $10641, $10642, $10643, $10644, $10645, $10646, $10647, $10648, VersionRange($10649, $10650)), ($10651, $10652, $10653, $10654, $10655, $10656, $10657, $10658, $10659, $10660, $10661, $10662, $10663, $10664, $10665, $10666, $10667, $10668, $10669, $10670, $10671, $10672, $10673, $10674, $10675, $10676, $10677, $10678, VersionRange($10679, $10680)), ($10681, $10682, $10683, $10684, $10685, $10686, $10687, $10688, $10689, $10690, $10691, $10692, $10693, $10694, $10695, $10696, $10697, $10698, $10699, $10700, $10701, $10702, $10703, $10704, $10705, $10706, $10707, $10708, VersionRange($10709, $10710)), ($10711, $10712, $10713, $10714, $10715, $10716, $10717, $10718, $10719, $10720, $10721, $10722, $10723, $10724, $10725, $10726, $10727, $10728, $10729, $10730, $10731, $10732, $10733, $10734, $10735, $10736, $10737, $10738, VersionRange($10739, $10740)), ($10741, $10742, $10743, $10744, $10745, $10746, $10747, $10748, $10749, $10750, $10751, $10752, $10753, $10754, $10755, $10756, $10757, $10758, $10759, $10760, $10761, $10762, $10763, $10764, $10765, $10766, $10767, $10768, VersionRange($10769, $10770)), ($10771, $10772, $10773, $10774, $10775, $10776, $10777, $10778, $10779, $10780, $10781, $10782, $10783, $10784, $10785, $10786, $10787, $10788, $10789, $10790, $10791, $10792, $10793, $10794, $10795, $10796, $10797, $10798, VersionRange($10799, $10800)), ($10801, $10802, $10803, $10804, $10805, $10806, $10807, $10808, $10809, $10810, $10811, $10812, $10813, $10814, $10815, $10816, $10817, $10818, $10819, $10820, $10821, $10822, $10823, $10824, $10825, $10826, $10827, $10828, VersionRange($10829, $10830)), ($10831, $10832, $10833, $10834, $10835, $10836, $10837, $10838, $10839, $10840, $10841, $10842, $10843, $10844, $10845, $10846, $10847, $10848, $10849, $10850, $10851, $10852, $10853, $10854, $10855, $10856, $10857, $10858, VersionRange($10859, $10860)), ($10861, $10862, $10863, $10864, $10865, $10866, $10867, $10868, $10869, $10870, $10871, $10872, $10873, $10874, $10875, $10876, $10877, $10878, $10879, $10880, $10881, $10882, $10883, $10884, $10885, $10886, $10887, $10888, VersionRange($10889, $10890)), ($10891, $10892, $10893, $10894, $10895, $10896, $10897, $10898, $10899, $10900, $10901, $10902, $10903, $10904, $10905, $10906, $10907, $10908, $10909, $10910, $10911, $10912, $10913, $10914, $10915, $10916, $10917, $10918, VersionRange($10919, $10920)), ($10921, $10922, $10923, $10924, $10925, $10926, $10927, $10928, $10929, $10930, $10931, $10932, $10933, $10934, $10935, $10936, $10937, $10938, $10939, $10940, $10941, $10942, $10943, $10944, $10945, $10946, $10947, $10948, VersionRange($10949, $10950)), ($10951, $10952, $10953, $10954, $10955, $10956, $10957, $10958, $10959, $10960, $10961, $10962, $10963, $10964, $10965, $10966, $10967, $10968, $10969, $10970, $10971, $10972, $10973, $10974, $10975, $10976, $10977, $10978, VersionRange($10979, $10980)), ($10981, $10982, $10983, $10984, $10985, $10986, $10987, $10988, $10989, $10990, $10991, $10992, $10993, $10994, $10995, $10996, $10997, $10998, $10999, $11000, $11001, $11002, $11003, $11004, $11005, $11006, $11007, $11008, VersionRange($11009, $11010)), ($11011, $11012, $11013, $11014, $11015, $11016, $11017, $11018, $11019, $11020, $11021, $11022, $11023, $11024, $11025, $11026, $11027, $11028, $11029, $11030, $11031, $11032, $11033, $11034, $11035, $11036, $11037, $11038, VersionRange($11039, $11040)), ($11041, $11042, $11043, $11044, $11045, $11046, $11047, $11048, $11049, $11050, $11051, $11052, $11053, $11054, $11055, $11056, $11057, $11058, $11059, $11060, $11061, $11062, $11063, $11064, $11065, $11066, $11067, $11068, VersionRange($11069, $11070)), ($11071, $11072, $11073, $11074, $11075, $11076, $11077, $11078, $11079, $11080, $11081, $11082, $11083, $11084, $11085, $11086, $11087, $11088, $11089, $11090, $11091, $11092, $11093, $11094, $11095, $11096, $11097, $11098, VersionRange($11099, $11100)), ($11101, $11102, $11103, $11104, $11105, $11106, $11107, $11108, $11109, $11110, $11111, $11112, $11113, $11114, $11115, $11116, $11117, $11118, $11119, $11120, $11121, $11122, $11123, $11124, $11125, $11126, $11127, $11128, VersionRange($11129, $11130)), ($11131, $11132, $11133, $11134, $11135, $11136, $11137, $11138, $11139, $11140, $11141, $11142, $11143, $11144, $11145, $11146, $11147, $11148, $11149, $11150, $11151, $11152, $11153, $11154, $11155, $11156, $11157, $11158, VersionRange($11159, $11160)), ($11161, $11162, $11163, $11164, $11165, $11166, $11167, $11168, $11169, $11170, $11171, $11172, $11173, $11174, $11175, $11176, $11177, $11178, $11179, $11180, $11181, $11182, $11183, $11184, $11185, $11186, $11187, $11188, VersionRange($11189, $11190)), ($11191, $11192, $11193, $11194, $11195, $11196, $11197, $11198, $11199, $11200, $11201, $11202, $11203, $11204, $11205, $11206, $11207, $11208, $11209, $11210, $11211, $11212, $11213, $11214, $11215, $11216, $11217, $11218, VersionRange($11219, $11220)), ($11221, $11222, $11223, $11224, $11225, $11226, $11227, $11228, $11229, $11230, $11231, $11232, $11233, $11234, $11235, $11236, $11237, $11238, $11239, $11240, $11241, $11242, $11243, $11244, $11245, $11246, $11247, $11248, VersionRange($11249, $11250)), ($11251, $11252, $11253, $11254, $11255, $11256, $11257, $11258, $11259, $11260, $11261, $11262, $11263, $11264, $11265, $11266, $11267, $11268, $11269, $11270, $11271, $11272, $11273, $11274, $11275, $11276, $11277, $11278, VersionRange($11279, $11280)), ($11281, $11282, $11283, $11284, $11285, $11286, $11287, $11288, $11289, $11290, $11291, $11292, $11293, $11294, $11295, $11296, $11297, $11298, $11299, $11300, $11301, $11302, $11303, $11304, $11305, $11306, $11307, $11308, VersionRange($11309, $11310)), ($11311, $11312, $11313, $11314, $11315, $11316, $11317, $11318, $11319, $11320, $11321, $11322, $11323, $11324, $11325, $11326, $11327, $11328, $11329, $11330, $11331, $11332, $11333, $11334, $11335, $11336, $11337, $11338, VersionRange($11339, $11340)), ($11341, $11342, $11343, $11344, $11345, $11346, $11347, $11348, $11349, $11350, $11351, $11352, $11353, $11354, $11355, $11356, $11357, $11358, $11359, $11360, $11361, $11362, $11363, $11364, $11365, $11366, $11367, $11368, VersionRange($11369, $11370)), ($11371, $11372, $11373, $11374, $11375, $11376, $11377, $11378, $11379, $11380, $11381, $11382, $11383, $11384, $11385, $11386, $11387, $11388, $11389, $11390, $11391, $11392, $11393, $11394, $11395, $11396, $11397, $11398, VersionRange($11399, $11400)), ($11401, $11402, $11403, $11404, $11405, $11406, $11407, $11408, $11409, $11410, $11411, $11412, $11413, $11414, $11415, $11416, $11417, $11418, $11419, $11420, $11421, $11422, $11423, $11424, $11425, $11426, $11427, $11428, VersionRange($11429, $11430)), ($11431, $11432, $11433, $11434, $11435, $11436, $11437, $11438, $11439, $11440, $11441, $11442, $11443, $11444, $11445, $11446, $11447, $11448, $11449, $11450, $11451, $11452, $11453, $11454, $11455, $11456, $11457, $11458, VersionRange($11459, $11460)), ($11461, $11462, $11463, $11464, $11465, $11466, $11467, $11468, $11469, $11470, $11471, $11472, $11473, $11474, $11475, $11476, $11477, $11478, $11479, $11480, $11481, $11482, $11483, $11484, $11485, $11486, $11487, $11488, VersionRange($11489, $11490)), ($11491, $11492, $11493, $11494, $11495, $11496, $11497, $11498, $11499, $11500, $11501, $11502, $11503, $11504, $11505, $11506, $11507, $11508, $11509, $11510, $11511, $11512, $11513, $11514, $11515, $11516, $11517, $11518, VersionRange($11519, $11520)), ($11521, $11522, $11523, $11524, $11525, $11526, $11527, $11528, $11529, $11530, $11531, $11532, $11533, $11534, $11535, $11536, $11537, $11538, $11539, $11540, $11541, $11542, $11543, $11544, $11545, $11546, $11547, $11548, VersionRange($11549, $11550)), ($11551, $11552, $11553, $11554, $11555, $11556, $11557, $11558, $11559, $11560, $11561, $11562, $11563, $11564, $11565, $11566, $11567, $11568, $11569, $11570, $11571, $11572, $11573, $11574, $11575, $11576, $11577, $11578, VersionRange($11579, $11580)), ($11581, $11582, $11583, $11584, $11585, $11586, $11587, $11588, $11589, $11590, $11591, $11592, $11593, $11594, $11595, $11596, $11597, $11598, $11599, $11600, $11601, $11602, $11603, $11604, $11605, $11606, $11607, $11608, VersionRange($11609, $11610)), ($11611, $11612, $11613, $11614, $11615, $11616, $11617, $11618, $11619, $11620, $11621, $11622, $11623, $11624, $11625, $11626, $11627, $11628, $11629, $11630, $11631, $11632, $11633, $11634, $11635, $11636, $11637, $11638, VersionRange($11639, $11640)), ($11641, $11642, $11643, $11644, $11645, $11646, $11647, $11648, $11649, $11650, $11651, $11652, $11653, $11654, $11655, $11656, $11657, $11658, $11659, $11660, $11661, $11662, $11663, $11664, $11665, $11666, $11667, $11668, VersionRange($11669, $11670)), ($11671, $11672, $11673, $11674, $11675, $11676, $11677, $11678, $11679, $11680, $11681, $11682, $11683, $11684, $11685, $11686, $11687, $11688, $11689, $11690, $11691, $11692, $11693, $11694, $11695, $11696, $11697, $11698, VersionRange($11699, $11700)), ($11701, $11702, $11703, $11704, $11705, $11706, $11707, $11708, $11709, $11710, $11711, $11712, $11713, $11714, $11715, $11716, $11717, $11718, $11719, $11720, $11721, $11722, $11723, $11724, $11725, $11726, $11727, $11728, VersionRange($11729, $11730)), ($11731, $11732, $11733, $11734, $11735, $11736, $11737, $11738, $11739, $11740, $11741, $11742, $11743, $11744, $11745, $11746, $11747, $11748, $11749, $11750, $11751, $11752, $11753, $11754, $11755, $11756, $11757, $11758, VersionRange($11759, $11760)), ($11761, $11762, $11763, $11764, $11765, $11766, $11767, $11768, $11769, $11770, $11771, $11772, $11773, $11774, $11775, $11776, $11777, $11778, $11779, $11780, $11781, $11782, $11783, $11784, $11785, $11786, $11787, $11788, VersionRange($11789, $11790)), ($11791, $11792, $11793, $11794, $11795, $11796, $11797, $11798, $11799, $11800, $11801, $11802, $11803, $11804, $11805, $11806, $11807, $11808, $11809, $11810, $11811, $11812, $11813, $11814, $11815, $11816, $11817, $11818, VersionRange($11819, $11820)), ($11821, $11822, $11823, $11824, $11825, $11826, $11827, $11828, $11829, $11830, $11831, $11832, $11833, $11834, $11835, $11836, $11837, $11838, $11839, $11840, $11841, $11842, $11843, $11844, $11845, $11846, $11847, $11848, VersionRange($11849, $11850)), ($11851, $11852, $11853, $11854, $11855, $11856, $11857, $11858, $11859, $11860, $11861, $11862, $11863, $11864, $11865, $11866, $11867, $11868, $11869, $11870, $11871, $11872, $11873, $11874, $11875, $11876, $11877, $11878, VersionRange($11879, $11880)), ($11881, $11882, $11883, $11884, $11885, $11886, $11887, $11888, $11889, $11890, $11891, $11892, $11893, $11894, $11895, $11896, $11897, $11898, $11899, $11900, $11901, $11902, $11903, $11904, $11905, $11906, $11907, $11908, VersionRange($11909, $11910)), ($11911, $11912, $11913, $11914, $11915, $11916, $11917, $11918, $11919, $11920, $11921, $11922, $11923, $11924, $11925, $11926, $11927, $11928, $11929, $11930, $11931, $11932, $11933, $11934, $11935, $11936, $11937, $11938, VersionRange($11939, $11940)), ($11941, $11942, $11943, $11944, $11945, $11946, $11947, $11948, $11949, $11950, $11951, $11952, $11953, $11954, $11955, $11956, $11957, $11958, $11959, $11960, $11961, $11962, $11963, $11964, $11965, $11966, $11967, $11968, VersionRange($11969, $11970)), ($11971, $11972, $11973, $11974, $11975, $11976, $11977, $11978, $11979, $11980, $11981, $11982, $11983, $11984, $11985, $11986, $11987, $11988, $11989, $11990, $11991, $11992, $11993, $11994, $11995, $11996, $11997, $11998, VersionRange($11999, $12000)), ($12001, $12002, $12003, $12004, $12005, $12006, $12007, $12008, $12009, $12010, $12011, $12012, $12013, $12014, $12015, $12016, $12017, $12018, $12019, $12020, $12021, $12022, $12023, $12024, $12025, $12026, $12027, $12028, VersionRange($12029, $12030)), ($12031, $12032, $12033, $12034, $12035, $12036, $12037, $12038, $12039, $12040, $12041, $12042, $12043, $12044, $12045, $12046, $12047, $12048, $12049, $12050, $12051, $12052, $12053, $12054, $12055, $12056, $12057, $12058, VersionRange($12059, $12060)), ($12061, $12062, $12063, $12064, $12065, $12066, $12067, $12068, $12069, $12070, $12071, $12072, $12073, $12074, $12075, $12076, $12077, $12078, $12079, $12080, $12081, $12082, $12083, $12084, $12085, $12086, $12087, $12088, VersionRange($12089, $12090)), ($12091, $12092, $12093, $12094, $12095, $12096, $12097, $12098, $12099, $12100, $12101, $12102, $12103, $12104, $12105, $12106, $12107, $12108, $12109, $12110, $12111, $12112, $12113, $12114, $12115, $12116, $12117, $12118, VersionRange($12119, $12120)), ($12121, $12122, $12123, $12124, $12125, $12126, $12127, $12128, $12129, $12130, $12131, $12132, $12133, $12134, $12135, $12136, $12137, $12138, $12139, $12140, $12141, $12142, $12143, $12144, $12145, $12146, $12147, $12148, VersionRange($12149, $12150)), ($12151, $12152, $12153, $12154, $12155, $12156, $12157, $12158, $12159, $12160, $12161, $12162, $12163, $12164, $12165, $12166, $12167, $12168, $12169, $12170, $12171, $12172, $12173, $12174, $12175, $12176, $12177, $12178, VersionRange($12179, $12180)), ($12181, $12182, $12183, $12184, $12185, $12186, $12187, $12188, $12189, $12190, $12191, $12192, $12193, $12194, $12195, $12196, $12197, $12198, $12199, $12200, $12201, $12202, $12203, $12204, $12205, $12206, $12207, $12208, VersionRange($12209, $12210)), ($12211, $12212, $12213, $12214, $12215, $12216, $12217, $12218, $12219, $12220, $12221, $12222, $12223, $12224, $12225, $12226, $12227, $12228, $12229, $12230, $12231, $12232, $12233, $12234, $12235, $12236, $12237, $12238, VersionRange($12239, $12240)), ($12241, $12242, $12243, $12244, $12245, $12246, $12247, $12248, $12249, $12250, $12251, $12252, $12253, $12254, $12255, $12256, $12257, $12258, $12259, $12260, $12261, $12262, $12263, $12264, $12265, $12266, $12267, $12268, VersionRange($12269, $12270)), ($12271, $12272, $12273, $12274, $12275, $12276, $12277, $12278, $12279, $12280, $12281, $12282, $12283, $12284, $12285, $12286, $12287, $12288, $12289, $12290, $12291, $12292, $12293, $12294, $12295, $12296, $12297, $12298, VersionRange($12299, $12300)), ($12301, $12302, $12303, $12304, $12305, $12306, $12307, $12308, $12309, $12310, $12311, $12312, $12313, $12314, $12315, $12316, $12317, $12318, $12319, $12320, $12321, $12322, $12323, $12324, $12325, $12326, $12327, $12328, VersionRange($12329, $12330)), ($12331, $12332, $12333, $12334, $12335, $12336, $12337, $12338, $12339, $12340, $12341, $12342, $12343, $12344, $12345, $12346, $12347, $12348, $12349, $12350, $12351, $12352, $12353, $12354, $12355, $12356, $12357, $12358, VersionRange($12359, $12360)), ($12361, $12362, $12363, $12364, $12365, $12366, $12367, $12368, $12369, $12370, $12371, $12372, $12373, $12374, $12375, $12376, $12377, $12378, $12379, $12380, $12381, $12382, $12383, $12384, $12385, $12386, $12387, $12388, VersionRange($12389, $12390)), ($12391, $12392, $12393, $12394, $12395, $12396, $12397, $12398, $12399, $12400, $12401, $12402, $12403, $12404, $12405, $12406, $12407, $12408, $12409, $12410, $12411, $12412, $12413, $12414, $12415, $12416, $12417, $12418, VersionRange($12419, $12420)), ($12421, $12422, $12423, $12424, $12425, $12426, $12427, $12428, $12429, $12430, $12431, $12432, $12433, $12434, $12435, $12436, $12437, $12438, $12439, $12440, $12441, $12442, $12443, $12444, $12445, $12446, $12447, $12448, VersionRange($12449, $12450)), ($12451, $12452, $12453, $12454, $12455, $12456, $12457, $12458, $12459, $12460, $12461, $12462, $12463, $12464, $12465, $12466, $12467, $12468, $12469, $12470, $12471, $12472, $12473, $12474, $12475, $12476, $12477, $12478, VersionRange($12479, $12480)), ($12481, $12482, $12483, $12484, $12485, $12486, $12487, $12488, $12489, $12490, $12491, $12492, $12493, $12494, $12495, $12496, $12497, $12498, $12499, $12500, $12501, $12502, $12503, $12504, $12505, $12506, $12507, $12508, VersionRange($12509, $12510)), ($12511, $12512, $12513, $12514, $12515, $12516, $12517, $12518, $12519, $12520, $12521, $12522, $12523, $12524, $12525, $12526, $12527, $12528, $12529, $12530, $12531, $12532, $12533, $12534, $12535, $12536, $12537, $12538, VersionRange($12539, $12540)), ($12541, $12542, $12543, $12544, $12545, $12546, $12547, $12548, $12549, $12550, $12551, $12552, $12553, $12554, $12555, $12556, $12557, $12558, $12559, $12560, $12561, $12562, $12563, $12564, $12565, $12566, $12567, $12568, VersionRange($12569, $12570)), ($12571, $12572, $12573, $12574, $12575, $12576, $12577, $12578, $12579, $12580, $12581, $12582, $12583, $12584, $12585, $12586, $12587, $12588, $12589, $12590, $12591, $12592, $12593, $12594, $12595, $12596, $12597, $12598, VersionRange($12599, $12600)), ($12601, $12602, $12603, $12604, $12605, $12606, $12607, $12608, $12609, $12610, $12611, $12612, $12613, $12614, $12615, $12616, $12617, $12618, $12619, $12620, $12621, $12622, $12623, $12624, $12625, $12626, $12627, $12628, VersionRange($12629, $12630)), ($12631, $12632, $12633, $12634, $12635, $12636, $12637, $12638, $12639, $12640, $12641, $12642, $12643, $12644, $12645, $12646, $12647, $12648, $12649, $12650, $12651, $12652, $12653, $12654, $12655, $12656, $12657, $12658, VersionRange($12659, $12660)), ($12661, $12662, $12663, $12664, $12665, $12666, $12667, $12668, $12669, $12670, $12671, $12672, $12673, $12674, $12675, $12676, $12677, $12678, $12679, $12680, $12681, $12682, $12683, $12684, $12685, $12686, $12687, $12688, VersionRange($12689, $12690)), ($12691, $12692, $12693, $12694, $12695, $12696, $12697, $12698, $12699, $12700, $12701, $12702, $12703, $12704, $12705, $12706, $12707, $12708, $12709, $12710, $12711, $12712, $12713, $12714, $12715, $12716, $12717, $12718, VersionRange($12719, $12720)), ($12721, $12722, $12723, $12724, $12725, $12726, $12727, $12728, $12729, $12730, $12731, $12732, $12733, $12734, $12735, $12736, $12737, $12738, $12739, $12740, $12741, $12742, $12743, $12744, $12745, $12746, $12747, $12748, VersionRange($12749, $12750)), ($12751, $12752, $12753, $12754, $12755, $12756, $12757, $12758, $12759, $12760, $12761, $12762, $12763, $12764, $12765, $12766, $12767, $12768, $12769, $12770, $12771, $12772, $12773, $12774, $12775, $12776, $12777, $12778, VersionRange($12779, $12780)), ($12781, $12782, $12783, $12784, $12785, $12786, $12787, $12788, $12789, $12790, $12791, $12792, $12793, $12794, $12795, $12796, $12797, $12798, $12799, $12800, $12801, $12802, $12803, $12804, $12805, $12806, $12807, $12808, VersionRange($12809, $12810)), ($12811, $12812, $12813, $12814, $12815, $12816, $12817, $12818, $12819, $12820, $12821, $12822, $12823, $12824, $12825, $12826, $12827, $12828, $12829, $12830, $12831, $12832, $12833, $12834, $12835, $12836, $12837, $12838, VersionRange($12839, $12840)), ($12841, $12842, $12843, $12844, $12845, $12846, $12847, $12848, $12849, $12850, $12851, $12852, $12853, $12854, $12855, $12856, $12857, $12858, $12859, $12860, $12861, $12862, $12863, $12864, $12865, $12866, $12867, $12868, VersionRange($12869, $12870)), ($12871, $12872, $12873, $12874, $12875, $12876, $12877, $12878, $12879, $12880, $12881, $12882, $12883, $12884, $12885, $12886, $12887, $12888, $12889, $12890, $12891, $12892, $12893, $12894, $12895, $12896, $12897, $12898, VersionRange($12899, $12900)), ($12901, $12902, $12903, $12904, $12905, $12906, $12907, $12908, $12909, $12910, $12911, $12912, $12913, $12914, $12915, $12916, $12917, $12918, $12919, $12920, $12921, $12922, $12923, $12924, $12925, $12926, $12927, $12928, VersionRange($12929, $12930)), ($12931, $12932, $12933, $12934, $12935, $12936, $12937, $12938, $12939, $12940, $12941, $12942, $12943, $12944, $12945, $12946, $12947, $12948, $12949, $12950, $12951, $12952, $12953, $12954, $12955, $12956, $12957, $12958, VersionRange($12959, $12960)), ($12961, $12962, $12963, $12964, $12965, $12966, $12967, $12968, $12969, $12970[...]Date: 2023-07-04 18:38:51
3 1 FATAL: sorry, too many clients already 2023-07-04 18:41:40.681 UTC ... DEBUG: time to inline: 0.000s, opt: 0.000s, emit: 0.009s
Times Reported Most Frequent Error / Event #3
Day Hour Count Jul 04 14 1 - FATAL: sorry, too many clients already 2023-07-04 18:41:40.681 UTC [1230] DEBUG: time to inline: 0.000s, opt: 0.000s, emit: 0.009s
Date: 2023-07-04 18:41:40
4 1 LOG: database system was shut down at ... 2023-07-04 12:35:03.417 UTC ... DEBUG: checkpoint record is at 0/777184D0 2023-07-04 12:35:03.417 UTC ... DEBUG: redo record is at 0/777184D0; shutdown true 2023-07-04 12:35:03.417 UTC ... DEBUG: next transaction ID: 1965; next OID: 105480 2023-07-04 12:35:03.417 UTC ... DEBUG: next MultiXactId: 2; next MultiXactOffset: 3 2023-07-04 12:35:03.417 UTC ... DEBUG: oldest unfrozen transaction ID: 717, in database ... 2023-07-04 12:35:03.417 UTC ... DEBUG: oldest MultiXactId: 1, in database ... 2023-07-04 12:35:03.417 UTC ... DEBUG: commit timestamp Xid oldest/newest: 0/0 2023-07-04 12:35:03.417 UTC ... DEBUG: transaction ID wrap limit is 2147484364, limited by database with OID 1 2023-07-04 12:35:03.417 UTC ... DEBUG: MultiXactId wrap limit is 2147483648, limited by database with OID 1 2023-07-04 12:35:03.417 UTC ... DEBUG: starting up replication slots 2023-07-04 12:35:03.417 UTC ... DEBUG: xmin required by slots: data 0, catalog 0 2023-07-04 12:35:03.417 UTC ... DEBUG: MultiXactId wrap limit is 2147483648, limited by database with OID 1 2023-07-04 12:35:03.419 UTC ... DEBUG: oldest MultiXactId member is at offset 1 2023-07-04 12:35:03.419 UTC ... DEBUG: MultiXact member stop limit is now 4294914944 based on MultiXact 1 2023-07-04 12:35:03.423 UTC ... DEBUG: starting background worker process "..." 2023-07-04 12:35:03.423 UTC ... DEBUG: autovacuum launcher started
Times Reported Most Frequent Error / Event #4
Day Hour Count Jul 04 08 1 - LOG: database system was shut down at 2023-07-04 12:35:02 UTC 2023-07-04 12:35:03.417 UTC [17] DEBUG: checkpoint record is at 0/777184D0 2023-07-04 12:35:03.417 UTC [17] DEBUG: redo record is at 0/777184D0; shutdown true 2023-07-04 12:35:03.417 UTC [17] DEBUG: next transaction ID: 1965; next OID: 105480 2023-07-04 12:35:03.417 UTC [17] DEBUG: next MultiXactId: 2; next MultiXactOffset: 3 2023-07-04 12:35:03.417 UTC [17] DEBUG: oldest unfrozen transaction ID: 717, in database 1 2023-07-04 12:35:03.417 UTC [17] DEBUG: oldest MultiXactId: 1, in database 1 2023-07-04 12:35:03.417 UTC [17] DEBUG: commit timestamp Xid oldest/newest: 0/0 2023-07-04 12:35:03.417 UTC [17] DEBUG: transaction ID wrap limit is 2147484364, limited by database with OID 1 2023-07-04 12:35:03.417 UTC [17] DEBUG: MultiXactId wrap limit is 2147483648, limited by database with OID 1 2023-07-04 12:35:03.417 UTC [17] DEBUG: starting up replication slots 2023-07-04 12:35:03.417 UTC [17] DEBUG: xmin required by slots: data 0, catalog 0 2023-07-04 12:35:03.417 UTC [17] DEBUG: MultiXactId wrap limit is 2147483648, limited by database with OID 1 2023-07-04 12:35:03.419 UTC [17] DEBUG: oldest MultiXactId member is at offset 1 2023-07-04 12:35:03.419 UTC [17] DEBUG: MultiXact member stop limit is now 4294914944 based on MultiXact 1 2023-07-04 12:35:03.423 UTC [1] DEBUG: starting background worker process "logical replication launcher" 2023-07-04 12:35:03.423 UTC [19] DEBUG: autovacuum launcher started
Date: 2023-07-04 12:35:03